Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 13:16
Static task
static1
Behavioral task
behavioral1
Sample
a5bbc41232d5dbbac23f0b81059cd36e_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a5bbc41232d5dbbac23f0b81059cd36e_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a5bbc41232d5dbbac23f0b81059cd36e_JaffaCakes118.html
-
Size
45KB
-
MD5
a5bbc41232d5dbbac23f0b81059cd36e
-
SHA1
a76c0e9757a8b5421fef55a1c7b53263e2dbae18
-
SHA256
833f007814f1a35b5bf89cc7a6c783f7ddf13913151e97490918abb91e74005e
-
SHA512
b69a40403b940ffa5c09e67c6547cee27d7433e652aa6ccc3e34dd586edd56b62622e2e1d2c4b3ec541200730925a264609a292493c33fd895915efe11cfb75e
-
SSDEEP
768:HEwN4kjOvjAqsox+z7LX0q351U+DJCgQ2dST4WlP0fjjUCLs:HzN4kjOvjbuLl51A0vDs
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C7975C1-2987-11EF-968C-FEBBC6272832} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000a1259056376756633721fdf19ab3422ce1d76ee6b3da3429f83bcd65b8174a88000000000e8000000002000020000000e340f1bf5197484288cb52e5ccfcf3b3b58c02aa13d355e1efd6b7e92241ff8a20000000f3598c82e2b497bd0c6c17212a6d6ceb0c74bf7f407b8876865dbdef3097e99740000000c37b567d5aeefd80a8218b8c32f550e1c43913b6663fa811223e6074c25d959badb384c740710f89879d7403b4483ff6da9ac8355f10b456b9f3a447501f9a42 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d4140294bdda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424446470" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2728 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2728 1724 iexplore.exe 28 PID 1724 wrote to memory of 2728 1724 iexplore.exe 28 PID 1724 wrote to memory of 2728 1724 iexplore.exe 28 PID 1724 wrote to memory of 2728 1724 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5bbc41232d5dbbac23f0b81059cd36e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e3bd1d209141ba38f2acbd4596c541c
SHA161d4931f823bf417db077f0f93d065bcc6b24208
SHA2564dee1d3a058eea89533748a37f6b1fe6ac1065b890943efc168fe65d9b2bc470
SHA512d4f4b1a1485f77f2f323f9405aeeaee6abe9c18bd664f938d9b79b9b54d01625f907aece2e373f7989ea79dc17eaf06bcf1ad30b38bf185364245c08050c700b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c88078ae8b4ccb11bfdd32c0a97cfd3b
SHA1a85f6110b238750fb22838dc2d70591ffefe8135
SHA2569adca9378375ba81fff42cb082975c262ca822ee904b717b80ff4e0bdeb84376
SHA51287f0e2644288cc2b55b7fa9801b59f8a2b5398b6489a3d3b0463ff4f9809be30cb78b8f9404552bd57fee22d6e7b39f37dc92704e9bf04b174158fbea30835bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab73cd2a632a511ff8372421f9174c8a
SHA198181108f66fd3be6fee5cccbb866f6153f91ee8
SHA25661b03d6504b4b2c356e917b6b4022c1ab9fd3e1af55ea377b25915eadf9ca61f
SHA5123f50b537a9a992e124bf8a5b5fb2583d684353e4fd760f4eacaf0d067ff8c7795942220a81c69a56ed181dfc773159d0c433d336a813398a3797dfdf790384a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5533ca974e0531803bc2b0c0ee33145c6
SHA1e16e60d2dcc399dce5e7b9685976af9973a469ed
SHA256a980b35b4f6f64e246e110b8b2fe2607fb070c1d56b5f709fbdadacd5c24d3e1
SHA512ee50e57ede15dde54bcc57056a35ca7cbebd26f25045454cc917b8739cffb11e7d4adc00509cde47c7b98d01d7d4eee338f47849da4d812189fe6057a7016474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7e2db25ac1ea62383fcd8652411afa
SHA1f2f5f57c38b444585dd1ec017b9c1b49dc99dcbe
SHA256be6152c7365314dc989ce8483a266bd66ed79bcf42802592fab51f774106b9d7
SHA512efa47441aa4d3f87ccc48ceb75edbc51e4c09f773eba5873cfa4cafec9ca514e641f833b5926bcb815a8e66a27d2435416241a719257b6039d2ed2cb1bf716bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2c48e11371d60d67e5d3d5175dae24
SHA15b3833c29a0410644b32e693f7856545c83f1535
SHA2568ec3ef8b366a7feb41a29aca6675800ecd937d55589154418ca45f3b2e2abeca
SHA512ac9b126b4b0274c7a603adfb0194013c257119aed5259c4df35ef299931c2fe8172c153bdcf1a1da2aab7c54d1ec0fab1031aa7704162ad67a6bf3a693234e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adc16a8598cdc459500441a60f9bffb4
SHA11819b5b2ef02f82c69bdb408fa79e48f93683230
SHA256d888db9a1f8d9e1e87214f88df21ae919354727f939cf27ded149d5395f18c2b
SHA51293371bc1312963a0ddb6e23039131c45b7a7554a6babfc1f6c23b8f753deed2aa11ceb3e9b6f1c5eff768793ed16ed8ae8e45391aefc11b4abaa41086c76402d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c38b8b1e3194271868d0579321c038c8
SHA18694beaacf616430c79a953d33e8abfd0711f039
SHA256f7d312ddd10f5c4b6d062d5f930b3ddd74d03aeaac3f04cd76eaeb56b71c5700
SHA51250bc6cf8965b2da1fc8251d65ec2535c73d714c35c95631c08e8b84ac7ee9d5a778a3077c3012c6de9850cb6b1cdcbf1e9119e84a709a8c1017e626249a194d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53232574066c5e556989c2d2b53412e2b
SHA1a8179862ef306f7a47b3d8a2fd5e2e380d49e371
SHA2561a9746ccb154cfbe93c7b44f6d8d92b1a2477773bad6cd9e6a3a91fe87f95922
SHA512fc0fa3aa13a04c07b4aecacfa3688933d6f8736129213f7c06a2f7d5833282e7b0d02f14e9975069d8e3d95a13a2530ec901a43649cc494b3117ee43a4d331a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b78720fe5f2883c118edcaf5266c1908
SHA129c6673085d9e2a60b8e44e99c9471f29ebc2e41
SHA256e27e8e992eed64eb549e7d0fcf1f1797befb4c13740d5944b42b5a41e380ef8a
SHA51236480072608ce2d157cdf8fd647a828a4a4324341ad1a30d4ce9cd75a8503c7ee527af39383e72d7e3d454c8b5d899782213adc18e75360ef440ed846561cd5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6bb049fb6abac104a8f60bc8d171542
SHA15b88f905436a7f1536c812242da38410f674b184
SHA256e2ef1e4611f16c99986d997963d8d15fac87b7601c11aa452bca157d782f70e0
SHA5121b4e5f0837b40267cb23402336ccd610d8a0068576ce29df15d5876552d899ee396c777f4d1cafa4e1c3526003f551a7228075c37a342fc1c800cc2bbbd65cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572607e390bc7e4e87d4fbf707244921f
SHA188fae9ef4db259703e8f61b5fe14910f8c279cae
SHA256dd642ab86bc4970b78afebabd9c14c5dfdabe2edd343f4ba896dbabe6a995dc6
SHA51224a561675c806e6ffd801887f7042d73216d7955d5d45adf1f403fbee31bf92334bb832e71e2a700013dcf827e2993a71a9580c6636cc4c6587927da2a6443ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca00055b673dce749e6a4614bcb266b
SHA13f6510439cacdb6fde82926db4f40904fa9eeb4e
SHA2567566511233d80cef1ce1735b32e951bd37c427530954ebfa6081dd6e05058a4c
SHA512b354d5bb8b7fcfa3efa7080c13af188b0b269fdd207d776313c08aad7019976d889d05056aff7dd8001f19093a5ab5b7ac4ca5979fcce7a6cce83348226a4f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cea973971627b617b5f2424fa3889b1b
SHA14a8f6e35e439490884e90e98d76e2f02d901b0ea
SHA25623943335d464a5e1244f2edae16d9d8e0b18656b03915381ffb74fcdb29eca87
SHA512bfb7b5c7fc3730e74c93baa809a340b6f2cd5d306b4eb6328344e132d35de1282e4c8300532bb7b64d91d4c64291908766d5b8639d6ea0e0a6b13f3a0bc58c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64227a2d7eb63f3ba7e89970d560eca
SHA18eb470a654cf9cb4f2b2f7478ae7c5d4fac689f2
SHA256a566a9b37ba468b68475e8795b635cda949c6f658e25de2f6bbc1f7e7c9f00d0
SHA512c52bb27469b6c6e702efdc5c6549477784977ab093c3d44c6c62d5775b38ce632dd2b269ed3f2e43dfc4b03798dc3feb08ddb07c479380ff4ac1b7a3b20ec75e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c382c589d74394119e06a1e3694aa7be
SHA1b09e1d0aab122bd2dc0f25a4a83f9dc2ed4fc846
SHA256fb9b79ecf23c9ff8cef0aca3b53b0e725ccd1c988f5bc4104247acc0371ab645
SHA51290718a3789bcbe8a5e287fc77373fde51ec782a3b0cad3f00853834bb85f2bbf0772599a88b262e86ab970e04d9af35937a1b7693913086cbbd483ea73039e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567746462eed3ad324b46e77ed48d18e7
SHA1ea8d11ce7cb4a3dbac6e81ec1a5819eed2c116c6
SHA25631b79e26cbc81a113395060edf5ba00d29d3a9a62f7acb4e833fb1b0982251d7
SHA512b248c32116d0952122be5e48b27f2a85ba7feda61efd7dc7c654f868c6d3cfd56f1cd557e72b0f0e63926106ab0e77b984bde26fd6c68a5a588985e79d8e2d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7ad213b7ed691c77b2b1d95aec91571
SHA1b3dcedf08ca97e313594bb0ccc25d36600aeaad7
SHA2569f85a5179a2c66e761fdcbc30d841de19016cb7a86cdc92ea1d8ad84f3f2828e
SHA51242d6000c9abcb996a45b018e394cbd43fe6531dda5195e065503cd16dc218ec74ba5e2c30fc592bda5c415c04c50c1b5138c1ba4d6f82303fde0ad57a27629cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53864f00762a3b0fe7c949e6fb7253cdb
SHA13d63d7770e60ad09ab2950a089851dda908a3223
SHA256ab83b0b63b800f081e4fb3b27bed58a828b0734ca89016f2a3c9b5e25ec5733f
SHA5126138e82388839a86a0f45ad08ed5ac6eb0fafda62becbd03e9b80bc69fe1b5b6c45a63a2eba3da25a71709c0f8b75627dde97d404d184d5ecc358db1630e8c36
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b