Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 21:53
Static task
static1
Behavioral task
behavioral1
Sample
aba1ce24f9cccb35226d170d1c9e0a38_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
aba1ce24f9cccb35226d170d1c9e0a38_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
aba1ce24f9cccb35226d170d1c9e0a38_JaffaCakes118.html
-
Size
636B
-
MD5
aba1ce24f9cccb35226d170d1c9e0a38
-
SHA1
68de8bf502f863c2ec5852e2b0ac7520f3f8505e
-
SHA256
ff514c038bfcf60996fc01b6a361d8071ec2b2ac1df6b2981c8551b8bcc935e8
-
SHA512
da53e5ea55c0cfe2967e1c72fc31d1fc63b412ef72db9cac91e0ddc888fc4960eda0c77382affc8c5842d5fff068e5bd8cd31a0fd430463a4105fcaf369efbe9
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2004866aa5beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9318E2E1-2A98-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424563894" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fa0901f80ec930469caf10fc0e92252600000000020000000000106600000001000020000000072c6e55fa66699bec30f36264dbc50a016da15dcfa3e32c1110867efc5db8cd000000000e8000000002000020000000f9a77ef8141fb4b0f53a6baeaced825192708afdaa889042fc95a0eed7a01d282000000042abc0d4dff94bbef2a038c15c089435036cf835993d49e7877f02f754f2ac46400000005e9c8070e2290b4b752a701e64ffed7744f7c1293688173f8bc1e602c89c41e816dbcfc5c557781878bf88ca71451430157e6d9a7380505a90d74f90eb49181d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2908 iexplore.exe 2908 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3024 2908 iexplore.exe 28 PID 2908 wrote to memory of 3024 2908 iexplore.exe 28 PID 2908 wrote to memory of 3024 2908 iexplore.exe 28 PID 2908 wrote to memory of 3024 2908 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aba1ce24f9cccb35226d170d1c9e0a38_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3743a4bed2c6f36937730e8a2e0a638
SHA1b66d30038f0941692e99487280ad8bfec3effbd3
SHA256b599bf4c9c5151591d48cab33b96a73ac3b8887471b96a6d663d00bdd3b5c72c
SHA51213ead424c69100f5da269c245e319ba01a78de85a8de20388e70e65ef6fc2ff70e4e865d8a1e24377fbcde037276e240deda4ce2dd80c207660e3a02231ee7f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c37ae5521047b2c38a34aae82c6bae6
SHA1b565751a37f39a072a3926fd5769735771a64d35
SHA2562c0cd4cc5760679ac35725f0a0e0073c48c6956a389bc8c15be275cf80f328db
SHA512363635425d93a9934ab3e0b8cd1703ef3e0a93fd89115af34df6c26d8de81c01b8ce2eadb714dfcf66be1ee40ada0b78f7af9938ea52314b28847373a15740e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543234b145f051ffd66e2ce954096bba6
SHA10f7eac9aad6dd8243f3bcf86a578f1e8f90ad412
SHA2564274f37323f6fdf0bd96ca74861a2f6de0729a98b26095c7b172742d6806eebe
SHA512c905d9dbbb0debf352fa5b2c94bc7b0e3849d048c6d626194731123d46d9ae8def44d0388ef355c45e68bfe015b5dcd7113693b6510076aca2fec91f5be9bc45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581db04ab3bbc0b93509d390093603733
SHA1c52d8a13ef28a646829e5861e16c3c2a111aa0f6
SHA256601ceee8f0d5de8f11622453cc6bcf0fe0969ab758a836cfb253d2d1f7978aa9
SHA512cbb2c28b7ece9fca81315c9876739fa46468e4ac8b057e1c72ce5f2d54a84a165a92803438552b25d5c5d833392597cee09ed29110ce928f062280aa1e8aeb54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a66b183bfb04f3fa19a96e937f972a
SHA1ac713b477ceae61a37e02650248a8bce4d37637d
SHA2561b6ab7a7922ca443efce7ad7dd7f83e441786a2fd0f87f2ddda482b48481fd87
SHA512fead34d819f2c18190ca516c5854fb070937e28917159ca8cb41c3a4c437bac711a662bedcd683bceb9fe596bc596699943fd70d194bf06abd10316a16b01cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b55f20826756fa5658aea98d8c45902e
SHA1bb0edd9daa17f82b039037a61df6370b7f93364f
SHA2568ac6e5a502397aa2dab9e7c2fd8d153d6fe26947d7f56613593c1ff0bb67bf74
SHA512fb60177295b1ec14cdabb8ba004a3f34c1f9be823d7612d1e33164e6c5d61a75a61c8b4156be58a862425abc47ebad98f2c3d53eab8c6b7b77101d6ddeaac96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5100d5450d12746baa0aedb3294d3cbcb
SHA1125688a1fe8bb0b5ad8edeab922ff1dfa4bea603
SHA2567f377da1be4fdbb171a13e7fd6c2aa2edd325dc25e3a0f2bc1b712bd3954f1a2
SHA5125007f671beb21e3fee5ae07f3d827a6f305df7d501d80e7e231b8744433358058487d735a00ef04cd3f9837c305794891aebc685839d8e2880aae191f3c5b56b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541aaf027595580fd3692280b8ecb8e5c
SHA1b4de62805ab7bd3438986f97ef28b1c7f1c56aae
SHA25693d2d9db16c0ed97a8d1c3e19ef6714051706e581f87f5c8c42082e55649c71f
SHA51214e9e3cd4a10465c4548f9252fc52da40efd0d663da03b63b7e0d78f6e02bc9c05d5425477fe539a090c4d75832f1bcec9eeefa550c0885111e267ab6e59189d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea304ce3a2cc75626eedb419cffd5b7f
SHA16c33ef7630c76ec684d894aceb3cf43f79a63d91
SHA256a9edd4eaf7eda12b206635ac5a2fcf52f2ff262b93b83ddd022fcceb3f345112
SHA51292dc29d7a6a62b60fd90cbdfc25d0df9332eda285e3ce553d95fa8eb8bc3c6281a6936b46518d8f6a4008304c40c8b0702cf36848c01599bec270537df8d0062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507919c1e3476763eda5827e160ea7ce9
SHA1b5e9518d48fcc017a6b1ce0c336c519b114f935b
SHA256e164cd02e01b09e55b5988b77c1330be68c5098d167e299372d44d7d158b41ee
SHA5124e42c5bea1f57ac08eea193306983222adc02babb2e0aef2f4481905b8daf535be0f92218c2916f366e1a69a96bcd2ae379cbc10f8f83a3fcad286d588213585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f61098e5e3753b8a8f21fcade05e8a7
SHA144257a3b7595506c504165cb86469c364ed5f61b
SHA256a828b37b5497fe86e927c2c1dfcfd2396e502e59591d5a880a8f74de86f9a51b
SHA5124060a0cd0bf942f85fbfcacc465f82047188404bce644cb84353883bd08d4b0691c891df8a83ced0e506a3715e308eb8b10b00b7ed61edd8b257848a322e9be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3a9a07d86d9dcf2bec1b4badda156f7
SHA1c800ed4e610317987fcc57e6ead917dde5996fa4
SHA256f5f56b54210018ff42d71c483c1cc46348d5ad90c770ebe5dda8bcfb95897adb
SHA51283affa5aea12f2efc31d05dadccb660c705a4e208df397d0828aa46ded423ebdb4afa4fb4b8128b9a3b132aa4f512af4ad8a5c6a67f891eaaca68a006bd06342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fbd74075a62c25b41f2f2fe0a225fd5
SHA1bb87edcc454d9e6021984ca8e102236481563b3b
SHA256385b047e7a1df3c7289f21eaf8f91ea8559c74ee1527578d56ce32736d669d5d
SHA51213c0a5d72928a522a3099a7632a8ee3e33256c4a86683a7761c0d7e5a3838b34200e6eb6c9a7bff7c7608bb8ca6c17415db01487b6694034642688e1a3b61e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf02faacde28d62c86f9973ab36871ac
SHA1bd45ac891a6da08d62438ca8b41cfdb31d83e431
SHA2567be1c94bba3d534afaae2c67b2da3956154cee94d0392046d8ce9a2a0ffbf379
SHA512817b2e92549e25bbe579d92f72296d7e1a9986310a81d4f47eb5d8007c7f62ac5b632f1099168caefb34ef62786287ecc94d81d98f6fc072e7a0a231a8da5c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65a2d420b3877c2901bb0e944af2118
SHA178d073220d2f5174d1552c37ea34d267340e3cba
SHA256e602349fea53f7b6e61106755a2f10aeecf1b6df3fe1627860cfff14637dda19
SHA512078604bc61dac7c9ce53eb7639bc436e4aeb1f40689769ec39545ffb4382e04a1323f8323527ab4589f5eff2d9c48c92ce5569fc220710e86cbd34f4806718dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506e898957de4acca19bd9d9b65577cd5
SHA19249e3477ce126fb41095752e3d58c7da2cf0f4b
SHA2562e60f2de10bbd319b0388c808dbf843c054ee385e9ce31d7718bf8533c11fecb
SHA512eb3579f2b0f5b06380723ca1679d67d13c19d9b28af15f00f40807453309fce1fbaa564d5c7b5adadda46b96dd3bec5d87625a72af893e3ac47650dee693ebd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d43310ac5e6feb9039dcee43f53f6023
SHA16f228e11863eb0549df4fd058173481c737522cc
SHA256be650547ec1551a014c7682be0dc5f2f8e35a43e42374f5f5042444e70845d6a
SHA51230efd511adebac4ccd2309f756399dd8c8f89489232dbe2df220b202d7e73603cae41c7bfb496e71ac8523656bae5e971daab25d3d54ef971b3381cf4b8e398a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6e5004ab3b6b49a0fe39881d17fb41d
SHA1b4a746b5814299f92e4e9b7e82c5c69afdf14bd6
SHA2561ced111b75ee81e9a59419d50f80d0e5fa909a9329d8df5b6878b30e0d739ddb
SHA512e0e372f17a38c332adcd538297ac4f3d8909cfcbdc66a9d3297271583b7db6dbb67d7fe44ce2028531561226b5a36d823f520c7275e3a5c11674e455f897a1d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dce61113731bbdb0a260d5469a92dc3
SHA1249c185b3a28a7fc1e5d17ca529a97bfeccbe9d4
SHA256fe98ba80ef3e3b4441be3ec12622dc270629ca35e4946d4f72b46a7cfbab6d49
SHA51234f7d679f9b34ab0f8250f15db620bb1ac5d775e253815b48f7c15544204f96df5338f632110b1f1c48de803d1e1a2021fb7867e6bf67cc81b5244df9c410100
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b