Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
a5ac1e897c658010acad20e5ece26cd3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a5ac1e897c658010acad20e5ece26cd3_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a5ac1e897c658010acad20e5ece26cd3_JaffaCakes118.html
-
Size
460KB
-
MD5
a5ac1e897c658010acad20e5ece26cd3
-
SHA1
9b2fb48e39c7dced7d5de8af77a2c1ce4ce2fe72
-
SHA256
9c2a720b352a7d3cccba43192f586f36cd471be2ba4f6a1f5475ca5465dfc043
-
SHA512
f8aadb6abd1a58bfaf3a7a6c8f04cf5416ec490fb861af99585997035c25e1f297812f3707dae45c8b4b45ebb2173010e4c5ef5756efe0c5ff872b0739fbf46e
-
SSDEEP
6144:S2sMYod+X3oI+YFQesMYod+X3oI+Y1sMYod+X3oI+YLsMYod+X3oI+YQ:B5d+X3N5d+X3X5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4EF4FBD1-2985-11EF-87AA-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d4de7d1e30b0bf488aa7fa8ae418a6bd000000000200000000001066000000010000200000003c4bddaff3e524b28ce49d9ba577a99c543d7c28f55b3bca88401d29c6ae9050000000000e80000000020000200000008bc7a60a42af2fba1fd24cde9003caddedbf38246370acff72393c9ce252fe9820000000aa180646fe9bfa54a4ce94e08612770d577284beb489bce7d5d6026700ad3e8440000000f61a7a1a3cca84a6a342b8997ef1b420b063c2c0a4994af106bbc1b59da6db4a3273e42493dcce0c33005feb1848825ef598a876aa80b18c9152144cf6bba87f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3009962792bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424445668" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2936 2076 iexplore.exe 28 PID 2076 wrote to memory of 2936 2076 iexplore.exe 28 PID 2076 wrote to memory of 2936 2076 iexplore.exe 28 PID 2076 wrote to memory of 2936 2076 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5ac1e897c658010acad20e5ece26cd3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee3895c2246a297eedd2e7fb7c96cefd
SHA15a3c83e5e3bfd95db1d6634a95582653b0d835c5
SHA256173144b4e76039e0baad1d539106c4bccfa176c3f19dde317ba63d30b339f14a
SHA5124cf7bdd0500f13c16fe0bb78cf2304f81ae10319569c7958e4e240c129553657683f60161b7c3f4a657ec7f8f7256361a85c2864348606fbf9bc9dce1f5b7140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53147808f343f8f7a99642fba67a87dec
SHA14f8fd21ec271d81243700aaa373c931118276ced
SHA256c1008bfeda301ef647fcfb38edbceed5b9a157aec5a2502ed6cf8b962c8996ac
SHA5125604e2968e59f70bb34e17666678a191dc571fd0569eaac944a7d8e36fe36bfd06672079421415032f7829308a363ef5291e5ddd18711beb132d55255373775b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b988ee35683bb47431e8f15fe277f10
SHA1c43cd62c70c80c1fe30b324d43fee755fc369883
SHA256d0b53527b511acba523bfe2043dd9fc7fee8618e563bd1e8e7d419bc520fea60
SHA512807ae99ddef8b664fffa7f4313c92b325bb0cf3228ba899e719c8735122b87d27b7eb1356993c7b426990424a01bac55d5994b3cf6841e2a7e397c625beb76af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5563c150d7a8cdafdeff36dcc68525b00
SHA140e7e69985df6bc526042d3b5203d50d44ab444c
SHA2568816a19f6a7738cafb52b2e6a8fa2dd8e3d1a50cadabf4405905c309f69aa56f
SHA5123854d3969a2ea584e9f76738edf45c8f271b80e3690948a06eda905caa451fa4d3eddce1e7600e0328b24b2b3ccc77e1965f27900d7782505008d8ea3f31ce5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c903808047e4b4cb51a7c5c17e65660
SHA14b796b822de530a1e003fba25262c243b32ce342
SHA256ff45f3928da83641c1c85f5858f78efe612de0dcf92d0a33954c4356d56a886f
SHA512f01b936a78a3846e674cac9297c7cfb2821f27b3fe16f7134c51d926ff293614f896c68b557666e7cc86835127e279cdb82bd051f3508333917f3290fce916b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da0ec9d4b5cfd98231e046d48624ed2
SHA12f44edb7ab137d7bcf46f0a7c6abced2a62d82b5
SHA256deff142a92cbd7f87aadc113d3504a32df37ed8af445561eefd4d2ffbf63b443
SHA5125e052041e790d140304d87e7eda3116b45cf9b42438392f6ef32be3f938b8647f98b700fda258a95b3dab6ccc7d5b33aa0ccd8f5f094eefa813c4ad381ac83df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5101ba497f8360dbdfedf8b9c6693d7
SHA1ec10b068f906e64ab5fc6671fce7f9fe10d9807e
SHA2568b4187416af6e6578c2b88f5398405cfb6c0961fa96f1a058df1443f617c1e10
SHA51200f61079e707460794bbae63c9734eb1d5e071c12a98da16054a4692ef98e49b19793384d2b489ebb29cb86bb1522835e3a70dfe370279510b134b8eafad957b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f8d232b60f50be5ac77056e85532a0
SHA19742fbd4fdaac43bd9293a9009e34e2601606254
SHA256c58cf9f3e4a8b14ae98bfabfbe5f469ac6bbf31c541b3b35e288004b504cf6b1
SHA51217865f7a097a79dfc41d5e2be01d86eb28a62a63ab5097b32d6654b50c73b565dd6e6977503ba27d9897ed8b5e6cd0d1869b80145ccc78195a2daa1f24f3402f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540d58a0133b364c6b8e86d0395951915
SHA152e31c301e26b09abcb13e704c68abc383534977
SHA2566c904f6ae92353db515e5795246d21ade265af2d9f2d97dc10350e6eac24112e
SHA51251331d7c9253e67efd0b16c216dbdba736b641378a7e90a7e6f99e18b81dd64d48b38a9d1abc8ffdc91f146ce22cb13d6561dbf178e79786ffa838acaf112605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee2f4b375d6d4154507429529dd2e917
SHA15d7bf45c89a8b27da0c85cc55fc19cb6e7d9bc4b
SHA256e920b0235caef39044a539322368ed7f0740e481672eabae4a874a61157ff036
SHA512f4deb2628c9605cd90de4b43858469383f9608c473276c09bae69d02b83221c6eeeee84145e014ae3d375212abef029e8ef137cb42a06bc15d2d57a6396dc72f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557bda75ed73c92a5f18663636869f52f
SHA17a7c9fbd33664a5213ac7c82036c4d5b22c25b79
SHA2569b494d3c22e21314566335f6e899c1d20153948947e67bc561efd8e27548de9e
SHA51234544c7550a1552854496f9d5df13ba8753d22d7f181a2ab11db39d82954325bda745d7ee9479dbe84b4ded1e7f8907d6f716edf7422954e2d1f7bf8de163258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d502b21074b325a0dc61b760021b635f
SHA1de7aaefd076174ecf6def9558cf172f7f26eb644
SHA2566a7a661aa4ce477ade052f5d710d9ac367a8749b425fa82607c7c42002d149d7
SHA5121cb7bd67c31deb1c9455e59cb649befbcd073fcdba011cb1e6ce062ab6f230bdd411c3278c3ceac0c38c04eddc7028d41672567f08678759c343578dc39138cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d5055fb95d42bca07e3243c046f992
SHA1ceeeb9f87c06b7b694a02ccad42d6063aee9f8d8
SHA25601af1974009ac7440ca724cf773fcd863b65943cac6b34f241462e6e9a2014a3
SHA5127a2e8edcd009a7db6f78977d9ba2fe35cad82b4f4c5419f271cc0f769716377a7d57373d74d24e0c3524aa8472adb66b059c20c9f039afd222d4e25092e7e445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be3cdac420a9175e65d8848940b6a7fb
SHA18f1a4814ea68fc7e5332fe87c85e36e9f5a03e66
SHA256d12d426e2a5354c80d8f1747d5de7b0e66e6c6fc8b66375db907f38e173503c7
SHA5126de183df46e2b0ba37baf7114e094215cc26bb0bbd7446b51f2cf658dbce6b54c297967780ec31a6a64806ef1b40225b08b3e4447107111586c074f29b18cb88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e46781e1fcfd250378e5949b672082e
SHA17c47aadb5dadf04083fb8d9b324dd1352492ae84
SHA2560b05366a927a1900c07f8f339570df58cacc497678729014620290ca1ff2c6cf
SHA5126fe77ac1ffe9996a013e56d9e271e8ea1f767f332c27bafeb7d9c6fec45c53f120e63e34a1661d52f5915b3f71856e2a44556e4881ca7915c381569c92937c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf928737f5d5eb0857675b7b27f0a27f
SHA1c752e10ce2d05134f7c1d9f71f16e2530fcda628
SHA256aa229f9d8542db8d73149f259b43c5d36b0806e8addad8117f82121cccaf0daf
SHA512199e34cbc09a420e7b3a2c91bf6b36bd0049f81e7b4a6bee064779e0b52f5ba4f31790600fd866f039b0f7a2672d448ec9ff0422e9b48a33542a1a5649bf4f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db2677b775406a84d325a2d24c40197c
SHA162c44fb9b284fbb69ea5f7f955498d4237c5d192
SHA25647f560aad452b3b3553cde3bb7fe1f169eee377ed1e94b8f9948a8f2c3243b12
SHA512b3f7dcddbcef48d734b44e9538a1700a423a12f3ddf3e095e09ac9a3ad03b670eb4e9dff64fee0cb7cbca2e3bceacc6c7c76cf58ff3ed4c933084a6e18872991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583beda637411237b9023dcf8e9b0bf65
SHA1e8f2d4fdebdd5afedba45895fa7a2703315e6e65
SHA256dba0cde62d33bcf22e01fb7045978d62d5e9239e7f98bc51f3bf291b9db22579
SHA5121d872bdf36752cfd0eb74b721200ad05a951140a2f907553b46ba4c63e020f43960cbdf7df45a2bbfe81ab9a7fe7c172e0342868d44563ac8e8575d7583a84d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f0142f879d136abf564fb6dfebd556a
SHA1d1124aa1a2fe12e4e5d72bb75891b6f399438bd0
SHA25650088bff5d6730258560d42d70f8fa77e047f5453a6fadc8afd13e7004bec55a
SHA5127f513adc56e2cb4287174baa164bd22f6c5da4e26cce75213dfd1a5ea2d82355ba51a58a78401d35dda310d8f6d64ce8e30d473ef2d736a90c8249084781cadf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b