Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 23:08
Static task
static1
Behavioral task
behavioral1
Sample
abeb35e0cecdc9962ad22a39cd76bdcb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abeb35e0cecdc9962ad22a39cd76bdcb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
abeb35e0cecdc9962ad22a39cd76bdcb_JaffaCakes118.html
-
Size
460KB
-
MD5
abeb35e0cecdc9962ad22a39cd76bdcb
-
SHA1
80adce423f9f000895f8edd514403a565ec74ded
-
SHA256
ffa9d2d817eb84fb5cc2677e0d34a0ecffaf0ae3e0f2a151db7ab1bcea26dabd
-
SHA512
afac4758c3523b55f21694779e732d5bbe4d0dc1a9438f8bb3bc3596635a58a9862df1bf009ebda071b09eb9111e62e01edc16084610078ad1965c703d0aeb97
-
SSDEEP
6144:SDsMYod+X3oI+YHsMYod+X3oI+YbsMYod+X3oI+YLsMYod+X3oI+YQ:Y5d+X3x5d+X3J5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906021eeafbeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ee54bf20a74e5247be26ea414235df0e000000000200000000001066000000010000200000007efb6716766ea4a5b47ae4cb71b1b2285af21215c1739377e607d7251894f16e000000000e80000000020000200000007210a22662ae802866d50cf46ca7cd7b6ad66eed873aac98d9b491285138524020000000d7841809a2cfa6d4f4087dba7803989a032debe887e4e674c7422816dc34f8dc4000000023b4f715f56bfd989fb9e516999cb8db6ea97a88321977bc0c68a6a19949f32befcd684058a39dabf13b8c4b8bbe4d751b9ad675602580ea8a7133167980480f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424568407" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{159F9B01-2AA3-11EF-B991-7EEA931DE775} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2232 2164 iexplore.exe 28 PID 2164 wrote to memory of 2232 2164 iexplore.exe 28 PID 2164 wrote to memory of 2232 2164 iexplore.exe 28 PID 2164 wrote to memory of 2232 2164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\abeb35e0cecdc9962ad22a39cd76bdcb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53068bb8ac6dd5cafd83d2a751d4cc303
SHA109c9d7350d468aa22ba90a38b14a4220fb2e9517
SHA256598b139f8c5b6b0ae10d821fd7ee0521207d4f5e2fe82be02f88e6075d90e0e3
SHA512271f7f7fa687efcf5f08ac6449313fcb3b68d3d87214bcffe0e511cb14ad8d6d290b7298fe7bb43091a6ea5c1ba5bccdd2ce26e0e2be6220a79c9e0d986d7517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5280229bbded567c5ccec3d3fdfd0142f
SHA182ece672673579872c1b388a99f87adf49bfc965
SHA256f8c82e5025a94f18dc233089424911b22e7e63f624bfd0a5a8cc162f3a49b668
SHA5125718db25d63774975344c3e6d90714300f07569e6fcf03233e6f61c0ad64e96c82ea64d9ee70c6b5a43da3d310389ef97aa7d6d2019662824b30f030e33fd37d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6706b30920ebf54a2fd20511a545a9f
SHA1dee4a3579e7f0d54e0ae851c17261eed32001201
SHA2561a7f79ee065908645c9e98c9345832e1f4d79fa6b43ac025a0268d1621b06bed
SHA5122216b88c558e6caa651acb8fe6ba1c41786607310e7a8a070316fe42354119e1cf83766301005d66f845e3a72104529791acef11e315e053dabf5e641728a21d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54418867ff788b94f2f93323896f4d25d
SHA117ae3913113c712b6997c780bb93becfc6e0c1df
SHA2564cb730c8dbb1462e0d8cef6ff93af53a0c82e6bbbb71f9a189a953d0ddb0986f
SHA51201249d47692f3db297775fc5bf1cc932f66db6fd0b45c5709d9c090a8c440706ffd6536b733b98ffb66f8834a4f3b8885e302ce06a641ccbab4c505bb138cac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f85c934b44d75dbaa8915723dc36b979
SHA199b500f6d1b2dcdedcd01eedd70f41f10b3af3ff
SHA2560bf0b74b8502fffa451bf6ec9967d6946178dbb1283581ea59bf0ca5e7640535
SHA5122067175652d37813443035dd578b4a4241e5c2c364b76c1ca3965498fbcd4f0c1d79f2a8ece529d3c797085ffeb8a59ab6ac3190efc28ab5b1c9e0adcdcd8941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dffecee45820bbf6920fda9ac1a13e9d
SHA14c133da367292bbbbf9ea04a707686dd4e6d39b3
SHA2560692fe84fb09f69c44e545ed46f790e16f5c78190f6d32f109c20836b28b1cb9
SHA5120f2127c1863363d5eb30f48ff6765e6b1e666d321d1a46ef04b41911ed32583878823891548751bf61d71ca980e11e1e4240cb379bab0ea80ec86eac39d1d9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe7b3141d12524ba347107302f58652
SHA15a0962143d635ed3e090754d560a415a492a1f14
SHA2560a439a3c108d01e89bb93aaa5db0b6f027d70a2ae8080e54830fb9af24cd110b
SHA512c70cc86b871cf0d499db21bb8e8098cb04ace6f3cac84e70ae78161520848777e9079924c1e3cf4cf3348e402314756ddf914ffa1d7c445e019fed3cb67e366a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6d0475df9176ad1489ad7d39d6a27ff
SHA13d69ab768045b58bf6f46f4ae400b8487cd544a8
SHA25670cedd3c1c62d52befa693f5831239a3e99d2db8b275267a37ccf1c278ca3608
SHA512c8ceade8b341fc020d51674a5e44809de8ba1899900fd56ddb5dcdea893a7c48b6780ef12215882028acea863a215440f71c9bb7dbcb1ad7d8c5bb9e82b36553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c28141d413b6e3e72fcc9e9bad6bb0e3
SHA1ace04e171a20b2e21ae7b183b255c76bb7891ac2
SHA25663f1846bde113925c5b31f468f04b1777f1684f9df733d07b196cfa99f6f92c5
SHA51292ddb7dc171f065ff95b0f68f22a784efad0b519dc6defbab9056ac6127d2febd98e1a717e4963234f2a5ef21b7b4be4d8d625e6e56de2121553e12216f15e05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5359383b26d7a99c6e34bb5cfa889e01c
SHA1b9f8f9f1be49f1a4d2dd9f4b217798f3575a1f2f
SHA25652cbfa23cbc17c7c7ece3c4cd152899065876ce98b5f705e35bb9ecfb1692bce
SHA512c436e3b50584875df6a2f656a1568a424c0c5f8d415b8f81a470bdbe1a8bdd8fce9ef25191a155f8c43eadced8b8eeed5fa29ef2359dcab8179b7646d1c365f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd9567cddec54a36fba360bdff819495
SHA1a03a91fcef705f7f12379ec54b62c7e943e0c639
SHA25605b176bbbea22926e9e02008a7a0251c5e5024fba6e023e3e9a7a72cba0dc795
SHA5129fe3426d30edbbc470d2487d1f923fa222f0b89b0d71b23212ed0bc267178254c3550a3de0437940dddbbfa6868629501c352fd19de9824cdb92374c807fb6ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534a40f96e49f2ae936fd4afe5489a70f
SHA1a49013f12730ed6f2c8e97bcf299cb3dbe02ec88
SHA25682742e6ee9e6394ee70810df876a09c1e47bc9885c280c4231bb27356a092371
SHA51293824f47c8ad8640d695d00bc4c6b898ee8814ef00423a8c5512752a607cdec997f64eebe278e0a4809701b7e573602687c3c3e1966551e2ab5416600207df82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479fe3142db794bd158d05fb13b301ef
SHA11cb17fbd18a40f140ec8ce70c286eebee02a5821
SHA2563ada50f347b4ac19f004bc638d08309485a34d27a243fb3e0820c5daa71ccf19
SHA51208989de65145640cae3fe135a92c6954ab7e2f75d40ca4d7ea8d9c18e16c6f1207c4c9cae02ec18583bc13de88de7afda623a74ec315c7e5d6fec4ef69da041c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b8ee74550986711e4234992007e219
SHA1e1bd69318df59456760ce9cc5f6b15a0e0ae09c2
SHA2568b96f34717dfe5539966bc22fdaa516181befaaf539319ed657e6dae57f6ce22
SHA512aca27caef9b59933c2c3affcd4a5c8ac65d08b3ac73e8d1a7a7c73b191fd3805e9bf2cf752b9b51162290635a6a63a38e83d2c543b7d5908f4bf599232c9b984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b3d22ae315868fd46b23bce7abe1775
SHA1c01e6b00e028697808f674a97cb7c4e3fd41834d
SHA256e54adcc71805b993556ac787af665a465943a59a9f058a02a4ff70ab5ea5a7ff
SHA5123fc15160ee074e1eebc5de71e787279296874b10f14933ddc5f8ebec768d0c61da2757e8c33f35ae2aced1a929ffda534fd040f9265335378d1b1141556b0fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554e9ecd77d1853a03583a15cb37d5c42
SHA1439154a6c54898618310ea3df7850b86de80b518
SHA256020282d7b555620031fd6c5346a0c27465ea25647f8e8e5d1233d20ff383b541
SHA5127bd96b2b85d7394332b9940e34527af633e74f7acc3c4aed0db0200efb1de2201539d25ca950e4136d1b80f74e2f6adb24e261ff64facd515e92c938c7e45f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5082b73acaabc8e2b8400a78c4f738348
SHA1b48f00027f649f41d6461825558a830f49bfdf65
SHA256101831fe1ba1da0bd21751a2a0755867210d50292b5fa0ecfb437ce4cb3845f9
SHA5124b2b45ae8d89f1ecc85f2fcd3c21fc404ad12b3f7c007859e569ca88863b867e9255c9f69b205b575642794bdf7ea2cf2e74088f63ef996f45bf83884b8a55ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554687b12a6ad318c153ea3319695202b
SHA1ac223909b9eb9ea60123fc7a8f3b21d884557f84
SHA256e38289879319361feb6aebff1ef516d04b2dda393f686ba0e1241fc638415d6d
SHA512c53aae902e00669e566e968202a73b6e61d5cdc6cce7bd89756ea1ea0ee7dde78437f3defd33a94c4b74dc7668e4f8ff86dca1f7f9f2b044c3651eb47274f788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b285ac7ea74293655ca1759c10fe2359
SHA16b1fd894099fd3683987fa51654339f384df1fa3
SHA2569dd1440bcc74a58b742ab691f11e6a788e1b1c3ce1024d6aab2c72313d19b16d
SHA5125979c5e2d67b56e615426d1808e6d4bea83adc5a1491b2279c688d0396fb7c54e67e7c03854901224d4ed6e004840c62d4d4978f87c9718ca0777ad51a966930
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b