Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 08:24
Static task
static1
Behavioral task
behavioral1
Sample
a49d8cd2aa6674fe118b084f8c0d96bd_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a49d8cd2aa6674fe118b084f8c0d96bd_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a49d8cd2aa6674fe118b084f8c0d96bd_JaffaCakes118.html
-
Size
226KB
-
MD5
a49d8cd2aa6674fe118b084f8c0d96bd
-
SHA1
1f5a345d4e7cbb3cd752583b4deb4ab1ea525257
-
SHA256
8963dfdec39be09a25697e79b7fc48d364db15cbf40891f3aa50a8c64fe1fca2
-
SHA512
8bb5917909170d5e2a5e3c7c6b5ed4b0883831f6b904d4863e9ce99e2ce622157146b3a455bd64b98833526343484bcfd3a3d0f11e21ef1996593897817d54ba
-
SSDEEP
6144:0qvUekZdwe1aAvkqDX3oyq5BrieD0OT6S28fl:0qEZdwe1aAvkqDX3oyq5BrieD0OT6S2a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb810000000002000000000010660000000100002000000012149c08bad0558381d4798b9c33088863fe8f5c6a92d4b1c80ca4e74099b147000000000e80000000020000200000004056b94262ccc9c7ff3b10730861538fcd992583d57262415af84728238b9dbf200000006c745755a0977d46a76fdd67234f63f430ed94de8dd69c36a04b7308046812a84000000048cf7f15f708077f811f96fea3bbef3f0866334efd9c82c177d8f7af9db4120dd5488b847e6026f716aaa3fecfd2684987d98484e4fcdc4c8b76343425a21504 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424428937" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A777EA1-295E-11EF-B0BD-CE03E2754020} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10c7802f6bbdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 3024 2120 iexplore.exe 28 PID 2120 wrote to memory of 3024 2120 iexplore.exe 28 PID 2120 wrote to memory of 3024 2120 iexplore.exe 28 PID 2120 wrote to memory of 3024 2120 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a49d8cd2aa6674fe118b084f8c0d96bd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c5353d89f40a958f793c51c274844d
SHA1c6629364cb37fe0b643b1fca02432d60405fce66
SHA256e51c52cb3e6bce0e6a628b9b35d6552d0c0072ce951565f147d22105812396d1
SHA5128aaf0fa6664180fc8f1a559d3ba1206467028bd1be08874c69aaa0ad8cd2a70bd65e0dc052a314197e5a5ae781c953182a218ecdce89acbddbeb0613b4a8bf0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aebb263c8352c856bd8fb7fa51e0e5e0
SHA15f2949bcfeb3f0547e53df79b38a00eba1014132
SHA256f890fab30752bd7049da41914c3bd35e661a52ef7fd1bee6e325ae1f7a85207c
SHA512c2451c5408f53b615c74cf9137bdef82ea4abc2a59fb27ba9e327197eed20cd6d60ce106df00a1d4719c18089ed075fef9636570ed83ac1fa1f3456f0a0b5e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccf7942a4b1b5f0199e4de507c380f25
SHA1adc8050e063a53e195fa281339688abf8aec8179
SHA2565b02c62b02f507b28d60bb0349cf7e8f7a8a7f611bef18dc908f152db7cdd114
SHA51239856221a40994a78dcce428867a7cef54993caa2f265802ac3e9f064c3a0652b38e5d050c2a279c37659e358893bf21f490578f233600237043986c5bc9f74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b156687f75b6ba1d4968f66df570309
SHA1fa60957479d2c8722755d55656fbb3dd3bd0068e
SHA25637ae8369d3d2f3f6c6a31a9fdd5cf6d6996b4ba6ef31806e40956299203ddaa7
SHA5128e07f6d511a5a5dff14ca67181bf2b91b2282153b11b05c4599cadaffe199cc0ace188a0dc715485c60ba8a44cf14b814071206f4cff0f79c0bc83a9a98c2136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ca5ea9a0b81d333e8ed7d3a1e07b4b7
SHA1966ae1aab9f0182006b152df4816f714e1633183
SHA2563baf6e76209a817df3559d619aa07ee54a1c6df6000c186b282f191193ec65de
SHA5127abbfc804840df163c1a922313d203159e32ac124fcce4ffa926f602a8023dc7edf984f68326966a0aa3b6f46e399fa9e0726d3e16a359de8cae04731012928c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b8c9e27c81d96bf6549a2bf31634ed
SHA1afcdff67fc2fbce8dcd29f26654f6cefca517bfe
SHA25699504d5e8b6f01e6c9fa15df1cf734f9e6ae793b85c97a9caa638532feafab28
SHA51265a56fe6789882309a1d90b44ac1142850ea6648afb78eb2f8d0373cde43c256f09c9f82fb56eb8285ab32184f37760d04f09e283e9e99e89bc0ac62a0970c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac5a12326be0e24b7328e757b1b97291
SHA13b0b195a79c562578a31c5f89acb201eee80fe77
SHA2565e07bc65cdcbe55245577ba6889f4120e7ba2b2eed05c9eb9f93a39b26f04ddb
SHA5123c9903c7db7b20bab08889c148282a8f59effc549269c1d63f642ebb690c3f479ce3f59b45359d5cb0f2f79c548dca15d2cd8c233585faa3d875c640099091b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f3089e93b4a1746a0d85df5d9430f8e
SHA1f636bdb26f827cf24e8f5a3f59bcd21fc24b0607
SHA256ce93c6386fee2cddf929333cdb3ff87affc049c8d3c35028c274dd4d86c73963
SHA512da1c388b79f506ca9687adbf4446307fbdf894214cd0aaab9c920162648b412fc29aea32d3d6b4f4e7c45be01793b6a28325fd505fc35a5d44055c1691fb34fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dde5191a41f4a7336844d13bf3ccb52
SHA18e01049391f9d77abcd30b79b836d0095c5ccee9
SHA25614a960586f4f7015fbe9bb2bcc07d6e823d1c6379f35f55d905452400f4d12c1
SHA512c07692abd1abb00a9b21136dd141a6b30f289a46edbfca49c0f9b7eee3e2985f2796295205b0439d8280f5144e06234bc0786121cd455d195ef6182a44a4be54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b14b70184a814e977ec2975ac26b5c4
SHA18ac008437b8e8f0852b2f3bd121261e2ef456dd3
SHA2569bab9ea020bb6e2d31c942c92780e5f62b548e3749045c9e09c0b09c3e227cd5
SHA512e95b54722e323f2a28f68b54c78e4355144a74cd71f588f9500b55b4dc54867591945143d966184ee040409cad8ba25e7ee7f80ea59482f2baf8d8153bf5af6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3cb6f8cd7095ba41f8d050f006ee1eb
SHA1989e61966c2a902ee937eb5d75aceb9d8feb0991
SHA2566aa88930729234a63264ccf2dfc517fbf212a8e025eea85fd89bf48a5e19caf9
SHA512d61b8053a83aea8ba19705552acd402898de92fe2730694d656fe82ec29f991efd110ca53c7b1b5b33d5b771e57f24b0aa90c45d554735fd90582bdec960a78c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3474445f36f385ae44aee7fe6bf5098
SHA13346398815fe5d0670d49ea7290849b1895f3e4e
SHA25686afdf996936923b4df8bd2e3b6c5ebbd951cc43adf1e52845ef4b7ae9aa2970
SHA512b0fb985168da7e0376874aa7dec0203d69d8ab08a02832b8b58942236f4998ed04314db1cd7a9b974c1cd23258982c4f5fab07b95f3dcb4a728c443ede079c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeaa36632b7a42b6ca757c68bf5bb2cf
SHA1ee6167aebd8beb520561cf9bfc4d862140a5f960
SHA256c5185a46c93c12429968ae18d955d4c94835c1fa4ff811f06a9848bf3e16fff0
SHA512e6fcec1c636c8483d9d23e79f3a3a43767441d7e28a599cf9bac136ce441877df25189a91ce2c99f9e40a993262752c5d5f37e9dfb59e3f7a95108c13129854a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e2c90fcf2868b7f136db6e5002290ed
SHA1164a34b21cdf32824d9cdabf2726010865e5448a
SHA256631d0980d666e29a86d12d6f97a4a33184bbcf7e448e54711b47559f588b38e7
SHA512b8ed541df64a43bbd6e39eaa64ba607ae5b333c0349c67e7b46409a0ffd3ce697d63586bdd1e9e00b268a29500aa825b4993a7f037b1fb21741294b510cd44b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50366df1c1b4f989562b60ca29f47cdb2
SHA16b1237af71d37ff02269be8dffe2c44646fd8ba6
SHA256028dcc577268a5b9b918379b85f798c37141c54b8add06de633b1a6f48f80a83
SHA512701c5b009b37470aeb89140ceb5061f75896005ec19e0800eccb37f7220954bad1ed09ac59d744606576432072250aae92e346228e63516611011e9d2a8df84b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7b61161ec54655235b0760cd781d879
SHA1bbd76634479f2e6404337fe06e31f8f94024c1fb
SHA256bbe3e3fd72d6d04a0d52cfb663198edc7177785a2db7833e14d9a0cffb415cb8
SHA512a13e7df5256de2a7f6c601b479e6e740df665e1757619e50e237eba330e81f7c3acb25ed77d5ec71ba266f7dc9e3c34930bc094f8cf1300182872f3951e8e8f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57144eddd4213cdc20629dde0d603529d
SHA118d2ee0afc5c1ef0793e3414a95d9e4aceb00b8f
SHA256561010ebeb39ad9d9b6d135475c0e174b602c697a122688236d8f0871c133951
SHA5120bd692103098eed79efe1c46ed5ef2189e51f72d7b025289f8583acf35f5d2c15008ef0997f1ea0c53a27d3eeaec75c03b2f96918926f1661b6360ab9aeaa4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5218c8ecc5ba75546949d780497dbc2ca
SHA16aabac48fba2767543ed1207d34cb68cd9bdaf36
SHA256708f447056656b6d685f6dc560d574a8393caf58eb524a8fb306869b491025e6
SHA5126b03fad9c7a1ab03f95b36601a23197e62cbb5b5b6df599da99296626c2b9d986568ffa8c2ab6a0f47c9f69ae2e730eb82cb3dfc594d6b513627a4c0b061dd91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1ffac6f2c76e5ddf57c2ab63245c89e
SHA1af1b6dc4fe3096f72073dcae93155f11d374f5aa
SHA2564489897281e702c75901ec50523bf43ec68ee3cb45057a8e0fbefa0fe0fb706e
SHA512ff7985a92b882e6ee3b9df6cd0725930f0487951d7a2443463716f87849cbafd4c5ff74e382aded3e427f8c6bca4a7652b00b11d1b4a48593785463449666e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514882210e9adad06c8c9e5515cf26b8d
SHA10ba9e0f0e09503e813c7c2993ad03ff1482550a0
SHA256f54d9bbdf7d70dbe31f6aec343b00a38b6199c8e07de02041694c810dcfb6c7c
SHA5128d8def4319aa8b449e665944f8b3c1073426c9067d9d5b90299cb43cbbf5a123d882b59e0cd1eaa1247c0fcb4ee3b7e726802eaf6a6ca53a7cf39dcbed79c15d
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b