Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
a7835e628ccac3237fcafecf8ed4a78c_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a7835e628ccac3237fcafecf8ed4a78c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a7835e628ccac3237fcafecf8ed4a78c_JaffaCakes118.html
-
Size
69KB
-
MD5
a7835e628ccac3237fcafecf8ed4a78c
-
SHA1
02731d3ad3b4334b9502f0d0f39555ae5b9160a6
-
SHA256
a32c41940a6fa5cae5f09eea3eb7b5c8e0128b170e0dbfbe92e5a9a6dce13fa0
-
SHA512
12f63635fe5961115b70697fb8cacb1b62087c1408b019ab6f080599bec551bbf6f7641f5f6905192b1525aa61c69f43bb52022d2790708d78ef0f174bc18725
-
SSDEEP
768:JicgcMWR3sI2PDDnd0g6e81epeoXA1oTye1wCZkoTyMdtbBnfBgN8/lboiGhcRob:Jy+NowyTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b62b94f9bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000005972acc397e42df4d98208791691f582344b4b6a75314fbde58e2c6b147399d6000000000e80000000020000200000006c064a555c8f56843f59c61935e39582e13f3b4231e01ab5415d9e27702b19bb200000006d11da4e963405c91300eac264885b2fc51bc36e6146d695876a22e7cc58520c40000000f4010a3826f063d9a0f2f5c2eb294885ab3adc58d5e453d5f29a8020f0c89225c7f9e84c42fefadbfdef72a87a6c37f05f806ce93e3465dc84589fe8587773d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA21D1F1-29EC-11EF-AAE0-7E2A7D203091} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424490087" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1052 iexplore.exe 1052 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1052 wrote to memory of 2708 1052 iexplore.exe 28 PID 1052 wrote to memory of 2708 1052 iexplore.exe 28 PID 1052 wrote to memory of 2708 1052 iexplore.exe 28 PID 1052 wrote to memory of 2708 1052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a7835e628ccac3237fcafecf8ed4a78c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546bf1a205218d2aab1041a8566d36c78
SHA1455416c01c561d7557626978e63a1e399b998114
SHA2562a83fbc96bd6d5899523facc9ff5352042d45122bfb8ab730ac6c6edb3340249
SHA512a53476a2542eb4f96482bda9906d3d2ae4c86fb231c5416da0b43eadbe7f818d43a3a9648115236137be9fc2822c4bffcef00a2191f2718b40972a2809ed0ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ed410800852f4743a3438ffa0f428a5
SHA1f681719ecfc2f321ba4762e909992c649c021f84
SHA25633b8f1d8540c5f99581cc6968244180691d889bdf37e76e5a33d25b025101bd3
SHA5128d28e130e68cde3397c4ca7be50b9117970f3cb56cb06160361c0f20ef0622625456769cb295e2fce364b7a2417b8afe9f982f3ff7b85337c7dd5ddcaff2209d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ec71294cd06087bf6717d74b4d6b01
SHA125f9a8af5b071e4ac05e01205a921e984bfea84f
SHA256044c4c2fa450e4d6e52cc1775d5a9a0f2e65cb94a84d08c72c64a5a191012dab
SHA5127bfbf20ebe4e47e1414518fbe5c051c6fc78b6aea98003b4d27a0067a91e3b244ed0ffb3ad8418f06e664497395c3a37f8a66a7411028b748842635750eacb6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d88ee77bbdc62da9df325989181d53c4
SHA17267c92fb15eba75a9d5c19935ff847480dae1cc
SHA2568fee8425ce11f022fd826cb01b79bd97c54d7b968c804a3e55f72193c302c860
SHA512fb83483ee4017b352cd1f54e6dd24dac4fc52add6c48fdd9568d4750933da1d5d70d6b807b5a5379457f24e96ab8afd789ec2221b186078c65e1a8632f479ef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5644831a6a958b6359f1c6e98f1ecff1f
SHA16960e2834bbc7cace83a95fa985d2c575ad56f43
SHA256abef061f6590023f1d2a1d7d5b7b58bdddd1a4ac5ee2d7ed0c3c26e3dc0031e2
SHA512c9430ff488b0b61ff16e1baab72c42a0b33dd689f11587bdebeb62fe364c1ec9a01b0e7aaa1baa1b13d33d7cb4394398eda4bd3a10f1f0b540dcae33f5944784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538f00d3832dc5689368737a94c7abe15
SHA15411f3c5bce5dd43c8971c4d9362008b6f3f4104
SHA256058044ffc9f1c169ec0738d186b433a24436b68889d2ffb75eb59eaad719473e
SHA512805264a286739a92bbbd560d746f0b1ca6263dc01a67cccb28f17eab413396a05f1a89a17e332a1901de374d9a9bd6ebaee38095b2871b7b2cd01bf5b4fa5b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5903b3d6ff054d9fc7cd2e4e02644256a
SHA136d7194b26df10a219d7b98bfda8cf7cc04b0dee
SHA25663275c22e95479bcdb774d7dead2bf1b2249d9267b5a036ceae43b9cdbf90887
SHA512cd8e29da575615694bae68e773d92240addbf2bc768667ec97093b8b031a6c26d26eb80c3ae46ecd6975f6d37075f6dde63e850b5e998dcde46e59380c6dc35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bb39ffb24b776d25a762b388f11ac89
SHA1f47d7707a78f8365dcfdbc4198541c19b511b8af
SHA256a60c72014abd627949989c848c9ad91cc5e1421aebd5b5a57f83d6c6ffc4c352
SHA512f841fed7b684b0c4786329feb97898f97500c6bfc249746d636260f76f5682f93ea97d22caa1e3557014d24669f86b6ee98be0be6ebe4ad2dc74f56448eac494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594694bdee0a12abdfb38f0220b6e267c
SHA126a5d0a36afb596e30636136022af9347cbffa3e
SHA2563b8f05a76740d0faa0018724d8803080ebf5b1acc4b4fc11771ce435e0f98809
SHA51231bd1cba3b8b60fe28dda9217f9957d4b8c594751e3e351b6e3a8f9811d004b40c83689af5372bc8e725d5183ca9587196629fffd2407222d2acaf398b14b2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3442f8faa490115a32662d6880b5b1a
SHA1e7ed990ada02547df4a42fac1efb5f34624ce286
SHA2563b453c213f73735bfc1995c206f6e65c2e1eb82945d29d8a5a73bf11c6f68e33
SHA512d45161bd521099679b349aa536bfde3f7a5be8e73ebaea8ba66c1babe783b1aafaa8c27febd859f166849dcb87422a9be7b8aadbb8bf51864547f40ee4f9e1c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5596e46ad0cb5df46f3ce0fa12fd20b89
SHA1be1b134fba81a567741bce4881c894742a80c11a
SHA256c8b037d75cf4910acbb6af1aef6dc3c5140f209f8505924b1ca8913a1722e5bc
SHA512d3dda631f2e33adb6371a8fa4ecc89a45549f596da69c2ca4fbd9b9a1f58f37c0e1058bef9b85e1be6320a175b5f78693fc045df67b7ed2a9dfa73c2a129b151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b233de69e25d2e87cfd69b6d4e087a8
SHA1f838ad3b527ee5ab1d4ac6e5fbb1e9938724119d
SHA256ac850e23f79ac0d24c546776e99b0061f87b2aaf609ceb7a0f98be0b2bfff2e8
SHA512e17c653c567c57e71c5312834dd2e91c03155781b2ffb427bed5ffaffbf380019bd02a6853df3d49d2b90258d4d7f1ea9178807e9c8eb49eeb43e9443ec88385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab256cf022b7c10abd1bb8b9a7566bd
SHA1858f1f03c82f36c2ebbaa3f7f3af18315940da9f
SHA256b6c016cc1c0d26eca74dcf483ab32f1e0077e453fa920aa580078f22eb0fe988
SHA512e5daf472694a2fc26188b1792e19288f9c89f910c4b8bc5378a899bddf67a82a1f68d1f3d830743b66617aadf53a73b58fae292779f7bb9a22d775b0bf10441c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d4b1d69cba2dec0ccb70b9336a9f234
SHA1a1f01de59f24ac9e3f6cb2479496b170b27453bc
SHA2560eb9a16a1b20d89d4054cd870f0e397470397fd366d1c7e426bc5f23c40394dd
SHA5123f6feabe78d693f5dd5042786be65d666d1c2c0d1529ed14ad55fcd30e026c0b2b6c03fc2f4886d948367d6d47a39bfa05752471389c6f2fad574526209de2d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aabf6c7739c5711d28a95237d3f2859
SHA1215654e06bea7bbe31174bd3e2baf67dad1769bb
SHA256e64df2cc8a766f403461b0f0f16f13706bdffec406cc1c41fbc981204e9a7c30
SHA512db13f4f2ecec78340c4e62fe136078b2740cef2f109a6ab53582408f873c6e72bbb0faa456eb8a322b5341c1d82e007608e9485b1535c8db9c8ffd37fc3d0339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e55f32b0bb13989f24610ae03f2aa41
SHA1d38d8c1f4338834f43317314c877733d0cf9e88c
SHA256113ba90c00f08dc5d42b87638753047f4fe31c2eab03b0189b1d91468bd2a382
SHA5126580dd2ed5e9e761b51e0fbdee131cbb71c38e087f7d88ded6199a2541d90bc7c589b37105c2f90dcf7fbfc60c600f9cb8ff88e28ae3804de1e2dd508806a67f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583c2bdadd5f7804d4eecf57619cc40ee
SHA14534244bf786ddaab0d841ec82408799d18611eb
SHA256e8cc67f467bf0f9d759eb82767257a6decc16df7c8ef650e606126ecc9be989d
SHA512e0f47b9811a8f2096fa91af4faa9d292b8b2eaa289f4c019413da235fb7da636a1ded191d9bfe2eaea7233ddaa8fa160d974ab6c91eaa6cb2197073ca1c15c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898ede808f3a3d48708664896cd6c8ff
SHA127b857ad06a86fc4a3214d2995a88e6c6414883f
SHA256a88e14f26649bef494ed9fb980432bdb53f94fe636d6e90d89d5717cbdd731f2
SHA5123206051ddcdb10a224d08ede2fdf2f1b5cdac55a32aec6f7d06e1cdbc82e25c6e741dac50d2790d01ad882bd7ba3dd8a5d9408d0aacdf402013078740cdf1fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5537379375e35ffec12090ed3e02b7479
SHA1f6afa55705e327c1d18bce4a3542e028dce45164
SHA256cd37d066fadacb98cbb7d31646b9f800c65b9ee5887d6d0ede044d1edd71b874
SHA512741ea4b4702f0d652d5025cb26bfd93666eb972f8df19fc88bbea3edac46a2297269cf2be364c2daf0a56f6132e8f48fc4325ec4ddc1c191ab302e92abcc9447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5849d88b23f276c21418964c89bf4d0
SHA1cfb6a5f8f33295068e57276d6fcc08b823b47e7a
SHA25630cd56973bb78b1f840c25af058a3662f93eeb7dc7564245d9a2e6bdae174a77
SHA512014f80d520ed0e2a43dd8e552fa6e8396d7ca8e5a9215c08aebefd6443b643af3bb846925c729cda420599446beabc16ec5634f74e93b78e0cff3fd6e5f9bc35
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b