Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
a51e941ca16ca3fa87df7727f7d7d9ac_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a51e941ca16ca3fa87df7727f7d7d9ac_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a51e941ca16ca3fa87df7727f7d7d9ac_JaffaCakes118.html
-
Size
461KB
-
MD5
a51e941ca16ca3fa87df7727f7d7d9ac
-
SHA1
9e20ae8507aea18997ce628e605da3b67cc6a58b
-
SHA256
955201c06af2215fb5c6c43f354cc42c1e9c0a82442049b09fada7fae2d975f6
-
SHA512
3d5be3da6248fcc36f096a9c6c98ecc32efae54133d273681730ac6aca78623a4bea05cc63e699ad546fd747f37c0c4f51acd842c7a75ac45a8ccf5b3dc7fbbd
-
SSDEEP
6144:SEsMYod+X3oI+YF0sMYod+X3oI+YCsMYod+X3oI+YLsMYod+X3oI+YQ:p5d+X3PC5d+X3W5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e2ecfe7dbdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424437010" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26578D51-2971-11EF-A490-4A2B752F9250} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000bc0b109befca4f9fa8bdf6dfcc74543bb88b2d178f6f6f2c50afa9817bb1a566000000000e800000000200002000000004d13eea3de77ffbdb077a70345c5cae1b2d1609f6ff3def22a1a0827994cb80200000002921402f12f333c40b6306357e189585455d9fcbb34b207793cab72bccd62b5740000000055cf314dde6c76ad4fe1b8c9a1e08e9cfa58c144918d0bd83a439d375a4293948d0c1ddbbfa1e5687dcba4c94a015bb90403dd6bf056971f63eb8b9d211e441 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1748 iexplore.exe 1748 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1748 wrote to memory of 1808 1748 iexplore.exe 28 PID 1748 wrote to memory of 1808 1748 iexplore.exe 28 PID 1748 wrote to memory of 1808 1748 iexplore.exe 28 PID 1748 wrote to memory of 1808 1748 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a51e941ca16ca3fa87df7727f7d7d9ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d9c9a8dc88b71bf8bf00478e63143a9
SHA1fe973018bf156a386bd0c901a8293c72c301cfd9
SHA256b093b363a63203ef97f83ce1abe6f657b37c9a28451ac2f90c9e48b5ae6f3a54
SHA5124420620e599efc9bc1f69002bff19d8c924e3b4c6a73bac2204765081ddf6c9c5de1426c6dce74bf0f20a3107d18d5e83c8efa2e09f536c1cf0dffed754c5bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5483194b9c759b859454a867c356be279
SHA153a2163f325cdd0ffa8231017e4277c301370d74
SHA2569fc658d76d66f94be95b50822113b87bfe5034503db655623ff40056c2d76df7
SHA512e7970eaa18e4ca79e94466b6a8ab14484f17f099e2197addc07b2af39a613c39b17c01fb7c7b28d9d139cce798a6cb1a0fa22bed81d788918dc54f57fa2f1649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b01a57a44c2df520a441f6dd785757
SHA15a9d4c08aac72e60dde9888c20da82d53b7fd9cb
SHA256b870e2f05121c278b71887ab3b5d691778512799f42f70ba966da71d89d86bd2
SHA5125d61399f30eb2015855e3dd10d357b3ef078367350e55a6684abe444acb27abb674f3403e975fa38a657c6603a3b3b45191c3a2f08c2f3524e498184f12805e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f1071cd1370d30551cf1ee0c6f5e228
SHA1d272be01ae62c89e2b09dfae60ba424d5607e38b
SHA256272710d16f3028ad7dc3674dcec0acd87d80dacd41a574cd9c645c72c888c826
SHA512824262d2704227c2555452565716c897e952a064ebd314605109debb3be49b2a73487728c7a16f56a5e14f091e1ed14b8262a378a79ab1d7cc2ed5f71f60a708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5746c60241fec4b56e4167efe4030f192
SHA1999d247ca329feecfc8195355fc43aa0872c91ae
SHA256b55a18b9bdc37f8018aca523076d6d2a7bd9f458bd31ccf8b09e521297c95279
SHA512f76fea1f297b1666f2892930fd468127dc152504c4696177c062165968a051fc434efae1082a1d8ef0fe9137c575fdd12118c72560ff8f29b4a0bedba57982dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa9cb2b9588f8368f0c80fd4ea98759
SHA1edbf36eeadef33b87c122f2a117de4fa717710b8
SHA2569082ca0a8e4dc0d4dc62a6afb47370cf66b80add8ddbc08ad729c20d403ffb8b
SHA512355aad4fbf05ac3ed45aa58a996fd2d25521be59f7d8f715faa500d589e56e3c38344bf92b7dd9a7418f923b7eeb3cec4832cc2e700909db8fea97f62e05aedc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583843c8d5d607c85c3a6405d0a3be4e0
SHA18bc20d834f4598768f6620acaf0f8f420cee6bd0
SHA2565109fb9054441267ce46f4eee4e62c77c21677355585d9348e588b83d26c6b92
SHA512e6c6d3c7098897007e82cbbb81e06ac102da87bd47c440e9b8a3c2ed1397b0d7e192a9353bcfc352106575db0ce6c124a8ededd6358fd3336d9f076dccf40a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54202c060aef01655cc926be7b3ad349c
SHA144a4f32484ea3bea0334477db3d21584eb0f8786
SHA2563687cc60b5a252cc04d9abc2801b29a4fa63231e59e6c2d7a05a25677aac3fcf
SHA51231129b5f0cf568b519cbf4cc1baca9e8647318acf876bc042d16041cdc5e6387a3fde9c13a1f01cfb551c077f071fed22adeb3963be6af4966764c990f4e7226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52129eddf5f427ece1318c741cbfdacf8
SHA1e7a2e6e635af815d1037c7a1d494f55d52089026
SHA2560490a9e2e4c5e85be4d85ac5f96ee81594d521e40c2903edaafc841ae2b12374
SHA512e3cd90e46b4b09116d9a94ee9d1b655891d7e55ba6bd36ced381ebf1e7af9b7c4326e3ce49dcacb0645e607cb4c384f5b9bb905919e11ad0038bcf330ee1ebd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36f8be8a7b458b716d695c847cdbd1d
SHA1033f6912cdbe2f693b50c6c450821cb69285bfe7
SHA256fab7206cf4a4ed124c91515b8b71a1e37a65691d64967f7bc48491a312167e1d
SHA512f82ce0260a38ebb09cd932825ad736119abe20f5de60a48d2df2b028665967eb366bdb3ae5cef169b6f95c06a8f542146bcb1b4068d8014f1db9c9d2c4a3a65b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b724463c026e15e9ae460c7371c16b0
SHA1288dfb0be90921beef0ae5cfcced04a71168816d
SHA256323730214fde8f57161b061a9a66dd7c4048fb162448aa2db2d95739b69f3aa1
SHA512b35f4093ec70070791f2d9dec0d6cc50c9eae95d5c4ad05808636190183f5d245afef706181fba382e03e6c41c45add51e5a1cdcf9c30ec1e4f6f08a48d5eec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc607aba9ebb6b1ead49f0963c22922
SHA11cccf85081f912178c1e4e5b73cd202ab1360698
SHA25638857f7872ab2ecca3a9d206448c9bf51e1f39f399866b53fa9e7a0dfb108b5f
SHA512cb49cf5d381f8686385cebf2b0cb11531c53e97bb43d903571c49ffee422c84e06ea1808bbac020912cb7e378fd8b331162cfee81fa9da03dca54100bd71953e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f499cef6ce542aeba9d56b8cfbbb494b
SHA13b831816c5bd244c0ed772b4c4d35c5963930c10
SHA2567ffa3b6b6bcb01d20756e174cc79bf1e24bfc6d7dc793f576e4fc75759690e7a
SHA512d532c5fbcb1b4cb6b28cfce195ff957a9cb58df9970d460bc9d8c2e972ca70c29ba06a4cd75f79ac32465d98ccb77d570a980caa52d19719899a4c6596ffcfcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d9087551a028bd087786965d5a2d5e2
SHA1e4bc04ecce04ec64c0ecd7eca9bd687cb0f59d6c
SHA256d11dc880a247d4ac3209a93fbde0796414611c5cb78a5ff36b29086aff561b88
SHA512513bffc2c16770864018a2b1d5f808c690f4851c7175e2361765765fb4b18b4671e61eb2d29ee5c893cab4bbb86867ce4a5cf2d75c8731a04f1b8a0df03fc290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d18770205d73a5e1347f8e0672c2b36
SHA172faccd656705ec98410ed1bf667671668ad4456
SHA256864fa9ef2d4a5c86cfe53128e05adad14519a78be9161153e780f099070f0de7
SHA5122a68745f65a01a47d60d8b789326de0c41404334dbcddb56386ff75920346f0785a65fe931aad47214012b322132460b15901d0a0da311d183650bdae95f7093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507aa406a09fbd7cf7c25ecce769ee0eb
SHA1fecfd3ddbc91e9fff6d811d3f0a19fbc230e5bfd
SHA25609f207b2a7c960ef52241d4c0e57540ac5a9c854a28f1adb2ee2b58491015441
SHA512a760c7c95dc19dcf0e95315270280c4c48d26dc96d8288852faa2256edab8b194ac752a89dff3f285b19100519fada781d9d9bb5b06563352204638a94ece9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50697e8de2b41adb3ac91c72ebc6650a6
SHA1f053aba6e2f77a70ab3502fdcd3f3822f1e0c119
SHA256234dc5cf364ef1d43ff0f601a89e5c227ff96828efcc2376a88243cad1a44854
SHA512de9b8f39a7963943bcf827b02f139de3f29478842dfa2e3561bd62abc56cf80228347ad0a79eaad4e39646bc26fa1858d1e389e0fb25baf17978ff8308984597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531652c114ba226961ca6fba77133e485
SHA1ee3985e40b74556580bb154c80a5777402fbccd1
SHA256130dde472f2449b55188f1ff38bb9f20c1850ef4d423792c570f438bb8b8baf4
SHA51262490d1b3a84d13435a38f652abe14df07051b802fd1a874fa76b4c5ac1a6f2d0bfae761cf477f3e10db267e54b4bd7a1fe54ed7f47632ace102257381c2a0ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542469ad76211192c6d5668f9b2de9b55
SHA126440c86110bc02503db53ca57f425f43fe70cda
SHA2566c3af5c36ceb1ccc923932a4c2d6382d23737d7b700164fe3d2b8dce19aa90ef
SHA512a0a17363e8aebcfc0429406bdbb0036e1308a0993818df7706f9c7c117938474da351c4336d88ff869ea27f45d435914702576a1ae8434a1a509b0e2f08c2151
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b