Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
a4ab34a7ae2ff1b38cb0fcbdd32bae04_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a4ab34a7ae2ff1b38cb0fcbdd32bae04_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a4ab34a7ae2ff1b38cb0fcbdd32bae04_JaffaCakes118.html
-
Size
9KB
-
MD5
a4ab34a7ae2ff1b38cb0fcbdd32bae04
-
SHA1
1fab0daf7d4de6ea270db85eb6b5af6f1d727ad4
-
SHA256
55df4508538d57fb2ea8c740cfba2195028f28c86588a5f72e3bfb3045ee844d
-
SHA512
2f4c7d61df2567d6adce0a0d830039807aaed8bf39cadb6f47795c3154d677b49015f550da405946d75f035e40c5455b0e58b4905b0df70aaa2b7c312ecf81d7
-
SSDEEP
192:L4MwmOOslJcrxfDjOEjebEfHXUHbV4IRRcl9RRgRWPxRfnRWjRIRWEYRIRRW1RIP:LlwmOOslCCEjJEHbV4IRRcPRRgRWPxRL
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424429799" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9055f0316dbdda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000007a383f1ad36d6c41551060a2eb45f792ebd88092a92d119ed544112b9d12b9da000000000e800000000200002000000006d463cd73bfc6e4b072d8dcf290d7889cca38250ec4209b9b32a305df3e73ef20000000214e9a97e907564dc911bb841044e324dcc27fa99458fbbc90ff5210d637e426400000008b1fdea40eea3451a060e44d70d3d73b8189899b1e2a5c8ccbe5f1eaae14ea2d9ca1d6ec5843f7274444b0f508201f79d82108e105dfe96159feb82a1eec8c5c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C50C861-2960-11EF-BEDB-DEDD52EED8E0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2088 2344 iexplore.exe 28 PID 2344 wrote to memory of 2088 2344 iexplore.exe 28 PID 2344 wrote to memory of 2088 2344 iexplore.exe 28 PID 2344 wrote to memory of 2088 2344 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4ab34a7ae2ff1b38cb0fcbdd32bae04_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51253d06381f56d53448d19fa55e56150
SHA12c7262a1463ca49554419b44330b6cd2a997f7f1
SHA2569fad4940a36dfa96010a24752c5d9239ba7a2e4abd93da3cc36a5b837deb378a
SHA5120287addf495ffd026376c6b0adfea90ed3128e8c30a3d2a39d20d38ff9554e8f894cdc74f5867e5a99771e2e182d0c337466e058cc4abc33635590b62209daca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b3d78a9ffe16b4b584fc850a4f9857
SHA1bc81606dc839e3f73fb4d6ef3eef39e8f462e966
SHA25689aa74330c7c4e2e90d681d402b0002f1f186f0f9108d4a560bce31f181f8c73
SHA5123cc65b5b37c8458c08b236daf2bfe4f142d479dbe0ce3731a68cfccb9efa94fa883c18bf2efa78a2fef8030e5fe46b9e9446b8784268b52470cd8897528e3b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5322a802309fe001dca3f15bf93180498
SHA122fc99303c82842ec4a96b023965efcc3626d83f
SHA25603f1be232c37bbf5e29390bca7e7f4303fbf662685269e4057f656d8cd97c265
SHA5122239ed7cc2c0ebeb14163089679dbd539098ec82f467bde6481a60120776bb86298175394ec3a802c30b620a1224aac148e82f026b35819eff15e3c0ff5af3de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a65ac38d04edd2045f87017e806292
SHA10b369a99315ae8b827dee4ae677b074abd9fd131
SHA25603098d16f9b1fa4c5ce198e7ec5e9b13487bb50520b99af4d7b7d712ec18d783
SHA5122fce20dc18497aafc25c6cdcb8774afdfa82401bffd8eb2ba30a32052e54c76955fae7dcb4ae0cda7357b61709f682cf74c267f13ab1c445cab9040be3db143b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fcdf4cc7f6dc6802c0e8f3b211ae647
SHA19b9d98aa1e799cbfb64a18201abce2be3764e4ef
SHA256f904e6d6bf117f6035c7983c2d41920f543355f9bc56e56bdd8e78462f28c9b0
SHA51255aa088cd565184a8d0a77df4487c24134f013d74c8a4cf667d80188e706c364de3e38cc6b24ace6e661233d52866a5b9af7defa956f3c313901e8c2e1c15010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bab55c882c116ddbab5c8e87cc2a523a
SHA134ead8853a305fd6c1861354dfe7abc923399ab4
SHA256350bcdc4739c43e227870c8bf85c192ee10203fbb28e9949134c223e0b3b6d23
SHA512acf6b84c7d0487e55fb86dc8465d7d5b94c158837c0b6bd1f9739c48eb829f0093574f437a58037d6c28940ff639f8692d76fd3646818e1ffe915a4ece33861c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548de6324f6d3b19e5434ac7bff6ba4aa
SHA1eeb7ef3ca64ad6904964dbe01873e39fe23d0f6e
SHA256e25151a0ebe96525ba6ee9120c55a4929f1348e3927a8983c49f1bbbc1504c56
SHA512bea2ae22268639d3be0dbfe5efc9545a094107877404feadb18b71a8aeff81f760d2af9774fa91b2c44a2103e96f6d7d7fda05912aecd3809ae22988b0963ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cdc9c036b5c9d17d9083e84ba9ba8f6
SHA1810d4137b0155777ee4d7e8e1dadca097ed3df0f
SHA2567065ca625ace5e82259b748007c6208309338a987940139947d0ea7bdf470cf0
SHA512105dce7a7815928eb6414b77e63f3c0326ca86f831415b5768ad2c6bcb941bfe1612ab5cb534fbff57fd44cd485721bba31f9b85dc9b4ef60da8b87641663500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f1eb6a56c3d5f7f8455771d34fb2492
SHA1c5393dfbd2c85227034d2bf05af45f4759921c04
SHA256f24c046633f0557643fb27351c460989f1cb285678138b3bf6298e970ff96a6c
SHA5121481bd36638057916d0bb474b68e9a9de22ba74ca110ccce30eee0d2cc39951333f02d79e40f745b681bed49e4f3193098449c4b56069563ae3181358e59be81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cabac6821c2225ce9bbc57a4c0cfdfe
SHA1fc8ea36c8883216a488c71eab76ef4281f818f0a
SHA256bdd5437a92257f244aab85ef3293f3a3291c3d385836c2a81f1d09854361757f
SHA512fd69663e847fbc8bd799103d778c73e2355787c7af66abdf52742b7d46ff511042769b495ad9d12a875a88c733fb61600bde78fc9826011fb4586491ef3011cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd3fd8a639aab219c0c166d2d42487bb
SHA1a1ebfd8d94c5df7e270a00a2eaa3c1a12efe99a3
SHA2561802c732d40f7a7bcfd656139f4ef095c6a207c95c3512daf7a2366e671dab4b
SHA5120fe6e560b086c75c0e8ee9acccd01a59d8c4d491aaffa85d7b9f87dfdf5940e7d82b28b30d817bd79d672bbc68751666901070c215727828d7fa720b96994b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7db169f806963260c0c25786813bca8
SHA11fc13ba854e8054fd63797d6bf6c5a4a4f4dd8f8
SHA256aa3dc2a54164982f86b26a9b98ae1cbd41938fc328abec16893b365c099e8785
SHA512f8a42e3a3db5175d01882893c2d82d293114e08e03d2446457b0528c8ee8b1c066ea2472acf3391c2853f9282a390ba235f29a11262c8cb5f46ddeb0c1b20055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b6a1970b9b8dcc1871e67405fb51f44
SHA1dab8bb4d1838052dd6077f3c2fd9f978a6788e42
SHA25654a97a9767d155f01b23ac430ab1b3a5d2c5b6ef2d6b117947895f2344db3f2d
SHA5126e23c326fa90faa49050e698f9f618dbaea8e6e078e171dd6835e45ea6d2956ae2385bce9dadfe80bca397c2f2ec9d3e8a1bc15e4eb4e4f989f2ee02b4ed2405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c4c5fc265174bb16f23ca10b5a8dbde
SHA1c1d13b8a5632af2f2938c9715a3d26f6b290dfbe
SHA2563ccb1c077ed76293f990444d4434f38675441c8db2f54213b51eaf764e31338c
SHA51246bdbb4f9a5959a3abc79d87db3c99014a442539a2246467caef4039bb92b82a0d863fca383d56561013a369958f1053b4aeba84005da51359b1a3e11a43ce9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2e8128ff225e786296b15ddc5e5d702
SHA15b381bbc6a90a811602aa2a5fbb12a596e45874f
SHA256c7f88f21bcca856af57d541c943fa0a391602fd2f30be25358caa846808da559
SHA51225f0cecc028a3e6509dce90af4534637e45f256622aed31ca4ae33d8eb971da7b3fb2ad39cb308252c115966f55067f90fcebe0292eaf540199e9320cae4e979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548b189ab97321fb73e7927bed66622de
SHA15163349f9169dece725360c06aac91690b8bcc77
SHA256dd7e30bed529c66c87dff8936ca4b25b835dfc4f555aafb773d8c21ea882d070
SHA51213c1ef1c89fe671898fab5775f2eb5670d6c772177cf27497c48f608f92ab87f8bf088aea76bebad9f5d29987b6a55817d8ac86b0c1685a0350daa3ad505eb5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b0b48bb4eafafb0d9c0e34645f5d71e
SHA13aea3fc881ad559ae6f64bb8c732ad5a58f0067c
SHA25690b57d76219103a2f105af6f1ec3b7f27dd340a3f1719d5bb4b6a10f757ce763
SHA512777027cb8949ec25365b08b3e8de9fba5e9ba5d0aaac096e3640cd9f39127ffb2bae065ad4242607579bb799c4fdc610f2cbbe450459d2f05563b0de2aa585dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af366abdf1a6d384100906b2fb20924d
SHA155e540f905fc66ea1d60c3032448914fd017f091
SHA256220a2d79931aadc792ce184e4c59be6121d6d40c9611c51b7f2be39eb3b03ad6
SHA512141da0def3d2b28438a801c409cd42503491a6e72331efe7fc72dcbd7bae5515172bb7363f22e0d323d89378eaaa362004a06ebeb2002789fdb410701928cbdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc61cb9eb9bdef9663d1b0d59d78c9ff
SHA1f5956444427560929127fe4feefcac5ab5f5b2f7
SHA256a72cb7dfb5a972087aee85359dab18769a32a5bf12f7948169a410557173d773
SHA512ca484907832cc3114a95a12712dbef64df0becdf0ebf82a4d40ca4d74689717086ef1eeb31d132355920dae64c7322ab7869a33813cd1fca403351adf97b784f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cea57844a9e1f7853bcc438c66cf7ff
SHA10654c0d37c29d63f5cdb16086cb39926f5497f79
SHA2562f3246b991aed1fb7ca2872db10d6530fa6c1066a1e69789f7cfbc88c57ee222
SHA512a81deefde0f6b50dc4b1bdb56186d7876ad5b045009d3928776a3acd70b65cd65d861796c921ed7fd540d37d0036a41146d4aa0f609d7fb1dd31f9c2c7bf03fc
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b