Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
a5ca9df0a443b3c12cfd918edc1e180f_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a5ca9df0a443b3c12cfd918edc1e180f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a5ca9df0a443b3c12cfd918edc1e180f_JaffaCakes118.html
-
Size
4KB
-
MD5
a5ca9df0a443b3c12cfd918edc1e180f
-
SHA1
977edc09c72afe701894cd11226a4981df65254e
-
SHA256
16229e47233e0b28b7b25aadf2bd52c8f8674ba785edafd8dc861f6b5fa0b057
-
SHA512
94a93d5719dd05b0a0064d76164a970eae62dd8af1bc5c0ebce6de0396b44211469c0678d449c9e7c6740fbe93fe5ed6b4d3b1c7bb4c6810c436013b8cac25ad
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o0+b+7zd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDf
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c638c595bdda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424447228" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000e9ed995800d083c5a83d26b2ed61292ea751dde60c92495dbbb116ad146d3636000000000e8000000002000020000000045ae4ed6828175dd926bc1b9067b81cee0db57acba0a8c66a4a418aff14505f20000000f3d9b8e5d79632974d06bec421beabcb5f5f29643442e957be21e72b98b5132e40000000ca58472e6eef5c3bc30fea709d7b7742d706babf30da9da513e5fa332625fc76c781353483c1fc1fc694b3b638636037e32370bb2550d8b72a8882f59c902c29 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0C341D1-2988-11EF-A5CD-D671A15513D2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1800 1916 iexplore.exe 28 PID 1916 wrote to memory of 1800 1916 iexplore.exe 28 PID 1916 wrote to memory of 1800 1916 iexplore.exe 28 PID 1916 wrote to memory of 1800 1916 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5ca9df0a443b3c12cfd918edc1e180f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d7f202d3224e7e3b69929c6310ab41
SHA162f458b9c25fd7dc34424e7f92a2c66f719214fa
SHA256188ee78416719157fb8536e0a62c6507fbe543f6e56c3aea687e01ce13ea947d
SHA51231163b177665948d257026b02b81e35dc6c78f8bdf03048564b3a1137cf29f56f659097464517aa6775699d74321f8b459c0fd13502146fe427f56c699348ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e64bef3886ee800e2cf89fce8e82967
SHA1a2b91e3dc079e6f57192a4dd9d62b6ae3541a40e
SHA25601b40783a13b952980020c8f6157d05af47e218033a55a4c5fcfb024777926eb
SHA512069f110816f81a3930e91f62a5ef67f0391062ca0886af311373ac84fc793a0b35d44b4720809fd9230aba54caf570df42195e53b6dbb51e50024e8d213deb15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdadc64bfb9bbac9165ac351806a5e59
SHA1fabb68c435ab78452d94a76e456844dd901776e8
SHA256a9c0c8dff3fb4db57f5d1ea67ed30c947a7b486734fefbd59635f8632c17f576
SHA512b3df0b125e218161b401c870f5ebce2f1d84a81970dfec880d3b44d38fba6cc259a9a62366626d8146e76727450b56ca658e89f99201891eb8587f5373c2f210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce362479ca1009f6131f7b0cf97c1a2
SHA1070481e0d72093efdb7a4dffbfced1649b514649
SHA2561f41ae32dba508a0395999ceb6c020f4dbe2a73c3b6689b2effbef56e008db65
SHA512e9104c954a5fdbecaeadb097fdaef76107cc57254f175d20610d2a9e926ae8df107e1cb374297ef594ac7c7d3917861691923a710e00e89d427ced24e62df871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503fa409e5d00c9570783cb3faf010909
SHA12879411eb0f682da054a74e3fe685d470ad06000
SHA2563ca3a9299991fb6a7edde47f00aaa939729404ca84fef2ad7db8d00d810b50d1
SHA5128970d46774db997374417930d8988617f1fac26659c6e626f40b935c588e205dbd956082fb77459d1bc382ec3abe2ea756b8e3d5a0316a23c0ff6e3db6acefc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57280e2367eb05e6857b26a1674da170f
SHA183b3ef39dcd09b5e0dd963a374016f95ea762a15
SHA256f01ca478bdeb7a04d82f3f539b5160a44f7126f0ec65c9dbb10098f4e7d210ba
SHA5121073f9c957c45a83c83bcea6692936a8163662c94956ae1aaef680d8b76c2a30c5e8cd53641d78540c868eb4454052344ba16b25ccf0a6e7c6047179b4bb2a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5325c6877c65db702a3d50d68e825f08b
SHA1e5af574ae0fb021aa10afef007b49309dacb9944
SHA2560e81f9e5d37b9b87d535688669f2c839da0d5f509c40750ae076c3dc1a951834
SHA512754e11efeac555164a3929003d71c852c01082dfcf0602f6b6301b85224a1826d7fb384b5475ea9fb2dd0db57c4b9fc762d84f0e6a2ff1b63829b1aaee7654af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beefa3e11217650840bc0be84a064211
SHA1f2dfd910da59d54706a666eb84d796c758609f85
SHA2566359f962da28560eb80aafbc5dfb37aef561e7ac4ad66ea2b2150b42fe7473ab
SHA512346ed19166dd9bae18f2badcfaa0c83e4fd4b1c37cecf233563d761529e5c8b63b593eca239dbed25b651a709bd213eb47df5fa9ec3f383673ed09bcc5b31305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a5c6209a561d1697ce75f56c5b634d
SHA1e0507baf5bb3610d89788d7e06fa3d7c86ab868a
SHA256e45bbe8d3bcc7b23051803ae1895158b6a05a509289be1cc0fbac4c57723a2ee
SHA512f9345f385540611f1997c34c1fe953570757443f9117c91b44df26a44611d03bb5745f5cef9df3f0af57646fc3fd60d946324e74a00176932413107a1e078701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb47ce8bcff195ecd07585647fa7a0b
SHA14386bf54460c34fe6a5e37343233d53e3c0bd025
SHA2567a606dd498cb30686512e485026044942cd8a69cc0c65d868a12f39d8f9cac4a
SHA51269b0dacfc976b7b4a9220201248f33d374d4830fe57811a28a29ea55950801aec7ebb9059e978dc4dcd33999d58aa0d58a46adfec2b8adaba9ca021a16d31762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf504ab638e2fbdc6852332f8424b394
SHA10e81ec1773fa590f7c2140bc41a9ebbad4a4682c
SHA2569abe4fddac9ab79052c78ba6fc471eccd1b0895011f8bc25e09fd091163955a8
SHA512946a82f215188b9142d502d922e811f46a548ea6f88b7621442c67cca9f0c84826a4b047edd17dbed11f53cd95ba9d959be7f9c5ece50fd5c57654e07b13cfec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa4701cd2743c7176eff503b8cbf570
SHA13deea20498bb36232a59093f45286f3242a29886
SHA25605d7b0dab568b90cfb39f27d9dc0115f5e2710d1fac6dbc470fb7fc285edd5f6
SHA5120061367d754e4b2d4770694cb889203c7be0cd37676d82863695a5077778f62b2322ce034444c9febeb8e6a544e5360315fc4c65af1e2da24b7a66b3f94c5a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb6be4a7fc25da1e7ff969134b851a98
SHA196f5a191e4966ddc56f1b7f6fb8b45c2e5354869
SHA2564d27674564741e644fe01d7e26ae908bbde632abfd9c995a4f1cf1e844df94e6
SHA512b83a226efa6f78a2b04ed3baa1287cb0d93b61fffb89da3a3d70b81193216fbdafaea17a45a4e736cece397dafd59ff7a8f012dfa51abb8dceef5c8d6f8b479e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2464a1fbd82e7c700ef0ad0d513a19a
SHA10d95cf1c4478f7a50321ab2edde8c95b8ba84b70
SHA25696d24f782f60cb224de809afff2096ec567ae17de2672a652211d62b1459c855
SHA5127300212c09c069573ac0e1e23684ba271c86be4b662ff0448a4394c08b01cf711f202d81810001f66c00932c96a7c9cdb97af56da1dcfea0ea84a60589f79036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f10de40bf5cfc77b25885674423ff0
SHA1522de43e24c937342d72d855d8be4f3bbf692c46
SHA256138047accaecf15e0b18c5878387f31d3e49cfaa710f4662c16bd61a296585e3
SHA5129b8cb44a2c629969565b0e168a46efb38875988916d2f0873f7cfbcd4eb922c5e91a6088938dde64a6ec7f97d6978c27463072fac32a1dad963de19400ccd36f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb9df066b01815a5999582a9234e437
SHA1e46a6bfab62bd47ac4333e18d5de077e585d96c1
SHA25651dc6e758adfb8addfae1ab2731a86703775c3d6d6e68816316aa609dffa8509
SHA51247dc2cbc4b214b96fcdacef113b91a7f64509730e27e78df035af5762b5e427c3c1756109d3b9fedcb09d1afb7d9fa1b001472a54ed0332911a84567e48ad884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b105c0779aedd3d2870cfa25ecad832b
SHA10a4168e79c5cd818576a3116d1e32316584ec800
SHA256026f9ac61192bcfa503cdf38ea05a9b4c20d9b1f5c1e3711883f2ed1fd85b3d0
SHA512d3d1ffec67d016574a596504b65899a5310700b171f213ada77bc279b83ddd0465f6c2d983a508cc80cda05d4d2053646e2a7364af2e7dc52c89d9394d036a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5919fd5672e8be1f42fcb3c0ed77f0ac7
SHA1b46314af96abce0ed975a6a24977a07dc3bed440
SHA256612eb61004f1317c2bb34a27e300e71c74eb96cc16d2e80021d9d10f4ca45f2e
SHA512eb1eef36efcd5bc4993b2369e48f8b6b84e5a6e5ca88bc639b6ae193bdb450815763150564858fac619eee74c0332ad1ecc3fac090fae46279638bd09a51ac28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e0c8db69f5aa64e0507dda71860bbec
SHA100242b60a0e64d4fb746803f35475b1c2ce4ef6a
SHA256c63c43cde0c21e7fc2a0091131a4f2ee4c563ef2e6f761aa8570197f008f61f2
SHA5125ca296ce5b75df012a577b3f186c8aa054362c0d2660fb73ddbb71b329304e9e66667c1b0c17ff83c2b7487fec4fff4cc27927cabee1e05db8f42b7871d0c3ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aecd616708a696a3e258d31fa716f01
SHA1ca609c323b4b3987f6fab98538ed030d6d822be9
SHA2566dfc0436d4cec60e2d030b00353b5219c9095156e893cb41f7d95a8b9fa39fee
SHA5128aac631ec51b75ecc6fcb83ad1d9004e91272a78924fb99ca1fb31be2f64b4a2fc1e4e4a4765dfa21fb7ddd988308037ff2411d617f550e086905cdf2ad6839d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b