Analysis
-
max time kernel
117s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 10:43
Static task
static1
Behavioral task
behavioral1
Sample
a522a3b3fd4287d05af585d17609a100_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a522a3b3fd4287d05af585d17609a100_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a522a3b3fd4287d05af585d17609a100_JaffaCakes118.html
-
Size
8KB
-
MD5
a522a3b3fd4287d05af585d17609a100
-
SHA1
f0c6d890d66917fec4d4e67114504841a8040184
-
SHA256
86474ce3a6d3c7f46037d4b332b8452ccbf5d61a5228356d442f17dd85aff74a
-
SHA512
3885a248cbdf089813026f93840d307aeb7125fb98bfb37e5131a37700cd06e7ee7cfbc6abc4ff16cd024518ed513a6cbc0154cff30581e536e19242f05763c6
-
SSDEEP
192:fvRVSYjpKumK44+OAYI6Zb03dRKORd0swhxKSY4FZR3rKn3l0swhxKSY4+j6cR/v:fpuJ4+pYI6R03dRKORd0swhxKS73rKnN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000842cdab5f54191f9d29be4efc26d4e882e95028b02b1aed09dfa5f56ee65125a000000000e800000000200002000000012e1e43ebdf4841483dc2cb98f9954b80203ef8fc31829a60b9ab80a72d242b1200000005b8b13e7bc9f017926af39a1d6db1565dc305f95fcd38182eea424ae86d5d80240000000ff08e6ff449a4c67e761670efa4211c4af0f17cd091fef68baf7b90d64539c2ff1ece51225c930de3d46773535bc1617743fcd045f5a66a8ee651a989cdc214c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f666967ebdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424437270" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C170E7A1-2971-11EF-B98D-FE0070C7CB2B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1672 iexplore.exe 1672 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2668 1672 iexplore.exe 28 PID 1672 wrote to memory of 2668 1672 iexplore.exe 28 PID 1672 wrote to memory of 2668 1672 iexplore.exe 28 PID 1672 wrote to memory of 2668 1672 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a522a3b3fd4287d05af585d17609a100_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596a7aa8710e0fe4f47b17bd03d7c5bfe
SHA1629cafb50a5f6c886c01e2cacbdbc099d589a3c3
SHA25652e37890a7470f277542cfa82468e968b507c0f75f9213a493fa29e00912e87c
SHA512813f6873e61dd146adf267956f74dea7c410175e16bf0bf26e488e06c6067c117cf507209a8d30063eda1153c2398ee869d4822188c4cfbc3c1caafcb44eb0a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9e43faaf89fa70321d20d23e48ee534
SHA138a6897298bf323f6b6efa4896af09ef91b1aae8
SHA256416cb68c4818c821048a95d0fcb11fca57c1c8c8da6d122d27adc050641a33a9
SHA5129cf664e1ac7191f1790a0431ca6bf703fd232bb10c2316736e3f3becc15fccf3ac3a720abe67a9109010dafede2448a13c0982a6b64be7d34068a7fbda65596a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514aefd6aab8158b38cfd247c45500fef
SHA153bcccfc50072e097edb1ab455b96d3ef02ce741
SHA256877b875838193ec9a05a7752bf6cca4cb538a7ef4c507f7123359f56cac75dba
SHA5120c849056434ee3ce56139fa31f93525df543e8288cd5e08adc15d7ca191ea6770ce4ae2cbaad9105ee391136fe0da2e36c465852e6593a77f6894bede7f36b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564e721d37d7f60c1a4557dbc96829f13
SHA1c48dfd85702eefcb384ad8db59fb7dc732b53ae5
SHA2563ec883b41e9465ae6fbf873286d72c4ec2b3db5e35de517a0b241eb848d60bc8
SHA512240ed53b052be8690eb2fe565412c843c465c6dbf12738bf89e834e070b217d85fc94190255da0b88eaa5659296d8fadd6fff0a99747ca3dd90931122b85ec3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5364a9c9bb9085dc9c1d7e275d2b2329b
SHA1ddd1bd83b1b85a829a515919dd77d85864e04940
SHA25640aab80c94c1a03ea6f89127bec69964b96ec89d3ef240ae93d3c661c5a4eaf1
SHA5127bf383b02597c0a6dc698666ae3bb2329a43bcbf54e6460c4fffc406de287458d370d737cc420721ab4c0d11ea030a07c97ca74a03e79d18bcb6c68eba645ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b044fe172a55fd1c64485eaf50b5e1e7
SHA1335cc69c82f93760fbb8569fb0b08aed4a64bb5f
SHA25679c054e329ce5f460b68bcc9fc0d95087820bd3158c8eefdef3b30e575ffa540
SHA5120ec813440e14454336684d3349d38639702a44ffbbcfecfc0eba42c67af88793513c2be80afd4cb1de5494717f1c17b49c5b1d2429584d819457deb69e7ea951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c128eb46aa682d5d699485703c3a94c
SHA17fd4253432531a2d1c976574f25611c342fc816e
SHA256b7ffbb5dac26207a5b74651bedcff7042a9b0ecfcd579ade913cbbd71736b7fe
SHA5125a5e5138d90ba6fea1b87915ca0ee15b998a3545f2da79d1f16e164d7fddd647777a559390ec1f5936d769688921a5146ad0549cfabd0d52e9c8fd4f66b5d47c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c59c901835e6fd61137064bc63b03da
SHA127e07acb27edf66b07a2b09676dabeeb91a36b13
SHA25605eb9a45822d3ff5353e8852b6e50e96dc8de133faccc6957b26cf469d5a7a80
SHA512771c7f9dea91faac5b9895905b327f9f9a909915dd4329e71cbb90eeef610efdea05077549fb9ab19d05a4f3b7a21f569db7af421f4ddd77067f6f85df930815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5956decbd174282dfcf56f7521297902b
SHA1bbbbf1c4fdfa0efda78725c85e0a43e212729bf7
SHA256edec45d287eb65ac27e19b1c0ade90ada0941afd010bbcef4fea8e8a6909d087
SHA51286488a63a475b6384ed3211fe113e9d62fc46bb12d284b151a15edd585b18d7f61d3f786930df16dbee950bfe64b9fe486f5a8008d9ba170281b0a26d4c9845f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b267cfe301b9c07c2c027a1ddd9c7fd3
SHA10c3d7271562fff21fbb1db65b5b7cd23edb1c362
SHA2561688d837d03866ec236a233eb677337891e9556930ec1d499c605fc0626a1408
SHA51235055ba73706901b46f29785d8a422960ba2f741e42c1efbfc1726cfb437962f8eb8d05d242233b79951f1d54028e42335e1e60ffcc8832b095b0925540ebf54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c682398f44662b55b41d26ae0745ca3
SHA14e0744460aeba07a3aadf95e78105648a681fe23
SHA256413dc0cb3b75c743e551fe307906c5becd0f12a14047f2ad7a419b91d1ff606e
SHA5129a88e02e3772635e757aa2c62dbfb2a0471cde8a171cea074bc8e6b654ce77634ce82a72d1d62ed1c467697abfe774fea88d0cfba3b603573dac27cc78774287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a108b9468af9a8382a4e64193e7d5bd
SHA1d67b273dc110abfbbb611c166f31aff6c48db47b
SHA256f21df1551477c8c600d2644b2df344ea5502ba2023383abcd4b1b9033caad29a
SHA512ed7e637773d1b2dd62ae9386472cdba0c9af555f1e3aa58d8a86f14a9327432bd77ea963232ded37b81e40593c1f765435fef061fd3f10cef719808a258d68f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d7e913bc471ccd61862337a855611b
SHA19ecb342b4f83e263924d19f8d74cd43531d4e575
SHA256bc0e90561006fb5d387fb7263f3495c306764f44c4fcc1748ba5c3e645f6005d
SHA512f78148848a4532b0c8baa9558bbd6c7150b78d08c753ef64fc48bb522cbbdd368fceec008003c74d8c4f89a1307a37f84f3d7075b5da4a01f4e9c78abd39214b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54084a8e7a5f25983a2709f6cdacc0f2c
SHA11de63861840a5ccffa3ddf73cb0bda1bf2b7119d
SHA25625c4ac54da790a0f6ba5dfa8791b996c63c073c73d32584e8262ee828dea7291
SHA5127795b04ff987d883513456cd3f4f18a0b66028e3867fcca9303bb0c5069ef77601fb6dfe615f29d02e1c260e5fd019facc399da51bade033bb03fe666080789a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53408f3a80fdd1ba4803c13214dcd3c24
SHA1d4350a1faaeb7344d55409965290ed93203acc78
SHA256fa513edad5b9aae2e091919861bf8709233b5a1fd4961e3cddf074e0e3bd0b6c
SHA51259a2b8110409c168f6ae3397752368b75922b974eb69da611984980306225af33ccbd81f7253f04b0be4fde59a335773e8fac27daf37a9436fdd294f6d90eb8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545ddc2cc3176b76cf639688a705eea72
SHA1ea39451572827c4ef0b7003b4c925ca6d650f8ba
SHA25685a9d897749027240163585d79cb431fa90849b99f05f192d90544e57088b768
SHA5129125fe0aecb59de560c87debf28b0aea15eb747330d5ec1a53ac1a04c198f17a9ea3973e4c66003014918336b2f457d03add936a6b2183a709bdde975ff31a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54960d4784802c20db2da31db9c27b49d
SHA188e6950371c778cf9dcd60e7d8885d924ac8fe96
SHA2560d9e6adf6e7b05d3dbc87a8cc90c1797991ba94bb003df0b9f37857e7489c22c
SHA512697465d78077a865742d014718c1b40997088cfc307410a3e3021754579c94818361b48d3bb7ae92cd08703c00a11bcde81f6c15717d34e7adf5d8a2b7f6d323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5393162dabe7eed669e8f8779576dc635
SHA197eed7a381055cbc449111f450b3bb0b66055b7b
SHA256c9d69507f1a938173cb7719b56f514801c546b5b75b1cb6a9dbad7f6475ec94a
SHA5128e04dbbc6745c596f8617606b5db522f2317a44b078bd06187e15323174f8aa83ae1d791ac6f82dca699e7a90c4345916ba50e2a3bc61024b4b86840f0ead153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a682f539c54a9378b9c0f37ed4dbc5
SHA1b116816072944c25c393f0b2bac0eae8c143b116
SHA2563ccd33c0255ac5a6b5bc87ec22fbccc36e659e39256581ececfea35536e73a27
SHA5120a06445bd1989fcbefd42052f60916eb47e152165ec8046bdfbd6729f052b099f5b45689656843d4892f9df496d169ec1db04bcefa80e20fe0b7a6cda8caed5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec6409799ea3bd1d9ac67b1252e1e36e
SHA196ac6257f00a2cfa8c8a6f367a0c5743b3c858a9
SHA256318238fcd2a5369966c3bdd7f640949006a6cb1b1a45499df983edfc5f76b6e0
SHA5121796437f1768fc385ed2487ec98e011aa5a13257c5fa605632d531f960dc51dd14bf69a500d2a352886e50368500519706f0a24dce592c392505335ddfc4c96a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b