Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
a76419858fae1dbba151569b95fd4e8f_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a76419858fae1dbba151569b95fd4e8f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a76419858fae1dbba151569b95fd4e8f_JaffaCakes118.html
-
Size
68KB
-
MD5
a76419858fae1dbba151569b95fd4e8f
-
SHA1
3941b2dc31d59968cf07c2acd85997020a2a54bf
-
SHA256
076082420ec331773528332d9d50229a6f08600b9745bb4bf719a1320d8a0402
-
SHA512
a81a846fe4890096017fbf451a913cec3e158a35c471f7814ad0632538b7971b91ca82dcfe6477a6e70a301fdf43e175e8e7b13a14ec632fe8e96058679de029
-
SSDEEP
768:Ji39gcMsSZ8tN99OIse4bAoT2fQCZkoTnMdtbBnfBgN8/oygcRWQFVGys//IjkKc:JIGW8T6Pec0tbrga6crNnz8PJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4352311-29E7-11EF-AA16-D671A15513D2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000001cca88cdefd7d221b760b82507c9add051dd5b47f97da0f9cdbc3d4a17e54842000000000e8000000002000020000000ff9c8e3bf41553cbbdf44b867bba7e61812ca2668eafbdf9a0156eb900b451812000000021fc03d5e0de39c6b711c879e78d6e332fb61280076819af4ea16a764370d08a40000000a134cf65a7f50f5c472171e588711a542e7c7b52ae4c942f408f5df63fae015ca995ff44e199d0ea99a6bbf38263368227244f8339a81f73e148dd6ad41df5f5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10081bcaf4bdda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000e500f3abbfe2de004582674f7cd8e410acf7cbba1f1ab392d59c1cffe4b64d24000000000e8000000002000020000000f8be96d6df3a93c7428331fbdeb67a442d9cd705b009f2ae5b49b2164aa2c81290000000d09b574b362d88feb9a2fce70b4272f960a6da21aee2cef1167044b5a928e5142312027a04a5be0e21e36730cd0222babf203553328a29bf504fa4a0d454fe0cf27fb22d2605f753d82cb29e553958b5b4ac0b296bad106043064ce5ca9e088436c40aabaad0bb8b20870900ca187e6183efdf377e671725cad2e4000ac75b2bfc9bcb4e4daae6a3c030026e2973f02a40000000cab31447f6ae3fd066d0d07cee92d766ef384b80c2eb290491724f6f179e8c77e2ffe21d8e382d7da6d3f8524ac214b51b97b1dd8d3b79def37abc33fc683402 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424488037" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 836 iexplore.exe 836 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 2016 836 iexplore.exe 28 PID 836 wrote to memory of 2016 836 iexplore.exe 28 PID 836 wrote to memory of 2016 836 iexplore.exe 28 PID 836 wrote to memory of 2016 836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a76419858fae1dbba151569b95fd4e8f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe9a75a097332e9d47db9120f9c72d7
SHA1c668ec24ef301bb662e4603facf0d74489d4b9aa
SHA2566c97ea98ba9b1e147a617f6aa80c1e11a495418cfd8df3c9b42b450c64364fa8
SHA512b8608e42b9cfce1f69c3e52eea85f2cbd48b347a29e2d2d713434fdd70ed7bf4309eb51060c23e2fd4fc455743f8aaeb0e2199e9fd0ea5eeef77a32dc24066ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59700b25de890f8392dc328679d3fd0ff
SHA1382224c786fdc9fa6209acc7155f3e204a2d6d38
SHA2565749ef0211361955590bd08f8ca6a8f7e241e2375a9e8b0f804b7c68a2111160
SHA5126671603e1a66a3299e75e4b64325711dafdb56c34d7a07750be36fabdc4658290394913a592ccf8314b397573d55e39b16fd13d4724f413cff4edf64af676675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa65d9f73d47f8c45a0d99c4f2fd792
SHA1f3b6dceb7d18c95540b4726887009b2a4259516a
SHA25698f8b87940c2095fed8b63080cee6fc109dd6925e3669e3aa204fa7cbbe9798d
SHA512ee4b9bc0c277d177b2d3e98721492a4d1732aa89d651d9710d3df034500d21d6d007bc8bc673fc5d602fae5062d3b819b09772c762ce075ce0df7d068e89b94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d3033197102463a8458d8c747cd0aa8
SHA10a882e0da8fdc4d1508182a365d838e457267a4d
SHA2562b5f7e0986505433df60bfddca2d1cf88e8d0ff0a68bf4173f1046e4cf2a1974
SHA5120c592ae91a69ac5d0794ba18b214c5867e494c01a5f5956b0d640b7298a985b0c99974a417ad8cb6d74d5b9426220e42e0ce737a14b5173ddafcbec04a5a60e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c2768461949c74245e407b846943d4
SHA13980923ca9ba8cf8896520ff6c3402b8011e8d2a
SHA25619ce80e3e05f2ccc71c14302b6c7e1cda011a3a91731f50c48da7479c0757956
SHA51229c4a5edb4a3293a1c33115076ecc72c41828f8d96fa9a43cfe1e8f58ddcbe0d66732852267b2bad4d744c36656ab3264d0b4ce863182390689c4028cad56de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54908eba668221adae0557d9387f93a98
SHA1205e4904a543b9b1991301ef2bdff7521306dd9a
SHA256d5e65b79b2e39b99c50650b176b2c93194025357449fa221a1ffcc813e9ad844
SHA51203bd1dafcce9dff734600fcb2191d0fa09363b1f1e1b608b9ec710a921f1a268664cad2eca4b16aeb3a33612e4c080fbd6797c5b433bbeed32d402fb90528c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc816dbed4c62192612112cf9564208e
SHA187ddab43789aa6471fc411b3ebee086ad7e8b56e
SHA256a6f6dc9fb8a982e5a98ded552c2c67a2c88139161d647468460fbf16b18ac726
SHA512d68a12b24e6eebbedc353c93f24786daf464c06bcd15e3ba8125fe50b57c4ae97085b5d4ba42b5f18fcfc72847eda3b508220f0e61997e579d6e2512d0b63dfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553b8e2369c94477f1f7dcfe3d650bf81
SHA19ae92879c8ba8ad7b3dbb2690ca45e651da3577d
SHA25644f8d496a5017cfdd6a9b439ef9aa523dee4a7f3fd19ebda72b6fdd4486ed7d7
SHA5124ea838e9f6862b37b9213d9011de38a660226c8f05776f0068c844725e204ef6d55ec12cd9b4dd035fcabff1430d6e7b286dd28e6d486f04c4bb6939566c69a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e334e54784f806e9c8e741241b64c74
SHA16691d61cb11d6e061a2cf1ff734ef333b133373f
SHA256b02c3233417c426f4cea96042d303c56cf475f9073aeda87891af20d01f9fe3b
SHA512915574a59714e7f5a7068d8b19eb05b0c4c90343afbe3180657640f86a3e6943e36b5f40379516662ea0a6fd32e10fd393bafe5e1ec81512ae17bc53353ca76f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7c6196dc534bb55e90118263baf60bf
SHA1e1304afb984970a6077ac1aef4ab52673b767692
SHA256a4338b032cff1649771abab4f7f17debf8e2e5228cce116e515df9270e36e594
SHA512fa58fc3e5204bc049dccf8871ed2d8b0cabbc9a96a596cf79f36b598e112dd337518fea6a53debeabb7347b38a7b34008acff400148781d85ead60edfa060138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf34ef5cc79b1e567c78573f6e30262
SHA1fb0f429a88e56a3f70e8db94a75eb91676a8c539
SHA256b5a011adb12fe678213a584fd4a8632eec2fce6697eac13c177e0b04eb5ab7b4
SHA512d7360dcfbb3d49d0e67c703d4f59999dba74e7d09fade888a6d2264e35932f3d2f48769b7ed095de99c752829f8a633af626438480a94c4053da85336a4ae574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521dcc9f0a9a8af73411b29ecb14576c4
SHA1be8cf5ce3f197f4170c81c07e71815de318ab573
SHA2568620ae3352cf3e35356f50fadaab83a2a2bc2b3ee6dab58cd7bd2e2945472b3e
SHA51235b1c14406e3e6da24e68194bd559cd9759c50fd3e4f86b2a50ef68a911b8d9cbbc134a4d79080ce196980adac6fba2cfbe11219904988fb7dd2f171627e9357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b78139de3d6e3f10d33e2e1e9b4daf2
SHA12a43ed766c4e464db3b291ef250325ab3309d836
SHA256e30cb40c2d548ce0f2b198131e5b8a4dfb1bc09b5f2f951174163265600644e2
SHA5126241b6dfb4d6d9b8ec2531849410d513c5d98199fcf39bb9f9d5b91d487776a3c809a15d15f2cc74b96c47923e427f045ad49dc7b45d805a52db68b76f0ab5b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52399eb9a85ba8003960c9177867ba84d
SHA1a86f0b6cb23f33ac060b279d149a58c2c43da436
SHA256255402c46c3b60608c925dd58ffd0b62996d11358fec9836479a75f803553580
SHA512ebea7de343c2b0cc514baf4a30f11afb6a52e58c2ae6d2b101cddd5e450020eb6dbd8fc5cda9ab0fbdd39073c098ecde6f53d44be30905416b73af64d85ac3bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5170520d2db0d1580d037ece0542f4812
SHA19b3d438146b45003829c8870b1fd34bbc64170c0
SHA2562d16310eee46d33dab2d40551b20b87fe7d72b430e2f755a82078ac332e44b59
SHA512564334531b3b6eb0cb9c79efd1ff6e01672cdfe90940f85e9e29871d8acc9400efc5602402416276604883fea224c5eb8a2ba9f0fd4af0884c965d119d09eba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f59cad69602906aab82055c9a356123
SHA16f0633d2ff14a4d57baaf6d4bb0f87b6f4ac72a1
SHA2567cdb1d9bc3f7ddc5e4e9dfab855e9b71ceab96214298ce79252a576500e9b369
SHA51252e7cc85aca872488f269a35579d9d64342f619d590a6913eeba51e778b2d2fc563fc5b5586e842e55f094436718549c8795a67574b6fb40e7fb20a3f38de728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5345e66b802a1bca01bbe8105ee11b29d
SHA101592a265c2b20202b835254f22af697f7a45ed6
SHA256e07da89aedf07c49c2f9675e0f5c169c7f861c2e3ff7fcaf39e83ac16c0efc41
SHA51212be6e8edcb83d4d6902057afa64489713f8382779fe90bef819cdb71e7a66f7b68a35b6a07bdf94aca9d74f41be14661fee3ed6da1c13f96889f1a91b16f51a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b