Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 05:54
Static task
static1
Behavioral task
behavioral1
Sample
a83866a9c64ef38dc2ee8f9e1e07453e_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a83866a9c64ef38dc2ee8f9e1e07453e_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a83866a9c64ef38dc2ee8f9e1e07453e_JaffaCakes118.html
-
Size
461KB
-
MD5
a83866a9c64ef38dc2ee8f9e1e07453e
-
SHA1
6d4f58c4720eb6e7559bb428b88e36295990bee5
-
SHA256
f94cbf72d92b3ce87f12ba1e6b37e005630ab61b5e38bbadcb950b50d4daf29b
-
SHA512
5396d5b3da2fcd6c0cd02f472aab5616b6b5edce83d050f315f3f7161fea44784681355fa4e64d0dba09c5b4cdc18782d266645d467b60f042be11b2c4131e0a
-
SSDEEP
6144:SusMYod+X3oI+YOsMYod+X3oI+Y0sMYod+X3oI+YLsMYod+X3oI+YQ:X5d+X3+5d+X3Y5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02b8f721fbeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99FC8D91-2A12-11EF-AFF9-DA79F2D4D836} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000002ae80412d3a8a6ba525dce94d7af591ddc0ee864c43b74d19005107412abbbb8000000000e8000000002000020000000f446d539f36c9ecf7f30b5be884d9cf770b76e77a0d802c8933a18c4eac96d05200000003d74d70296d5cbeee567cd7fca33ec4104864573c50f791623547e60f2a7b51c40000000929752cde2b6ac5ed1eb749b2feec5e7be61f11f5500c3505735af61bfe3cbe5843954da76240836d87b81181e548e44621b0c83713e45111db8c699bf8d2dfe iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424506352" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2600 2020 iexplore.exe 28 PID 2020 wrote to memory of 2600 2020 iexplore.exe 28 PID 2020 wrote to memory of 2600 2020 iexplore.exe 28 PID 2020 wrote to memory of 2600 2020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a83866a9c64ef38dc2ee8f9e1e07453e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f31e4702d31d576e99c17a9fd19e786
SHA124eeb082dc7a1880b4d2dd2ee77b1aae5d831f19
SHA2566f57b7f0b61b17bb289693df98b3e6a6c03580a5a83455dacc1cc330b631f98f
SHA512d9a239506b8639be4227c084fc0688515b0951a241d422be47982fdf10dd6d5a5660cca4603fd83d66a4962d2f39fa4632b734be0bd23fe715764b692897280d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a88c1bd9a3841964971294dedecd5c4
SHA17f1b8404da24783125a384a5dffcca84fca12a38
SHA256415b2d2530d33732e341c420077a2e1c90ac7cd98359c4dff21b584b1ac62e1c
SHA5127603c231861aa0de0147d0b495697ff32125bb8f74c882df2e1e907c351e3ca7eee864d704d5ee011a323275e6f343e33a641ebd13ed7d6256051da91d9fc7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e528106affc55b83035ea827a084c66
SHA141f1a552e894ffa281e13a8e1e4bb95d9cea8856
SHA2560d466aee0bd150998ea106303799bbcdbd3ea124d5635c48b24803ba43a2a85b
SHA512a9b906348a29e1c85ba52125cc1e8c999d661a6083e54583450714b71214793d1af5eed8467b224bc6a2bf3e00db90a1bd304d01db5073c00f685b0c2e1965e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ba757cc2527dd234be54938c840430
SHA1892f5e717da026452a50e5179a3185c30af16f7b
SHA256fafa3b5b3096f3d0c434f4b8b566e9f28417889d42635fe4a77da36b9fc8a3f5
SHA512274c99f7c7dc92f39988f8a07fa6c7a7d9206730ddf68c3d845a0ed4cce6d37d1f59ec59499368745f34a0e1808e536b1ce010eb0f4a93d13bef8f3e6906c616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a086f6a689a9dd1d03e18d71fb386244
SHA12cf83fde1d64f5d38be1511764c6a478b0c5b331
SHA2561731b44e4ea512157d6ed7e6d9f902664e75986785da0f495819b0f2519714a6
SHA512aa2c7d9ca99ffba4e9862b7f3de59b510e2c3243e5f8f72f3b39243858de10e76f8084dab739af56a27e8e73731830bee4bf3238e9cdfb451b0bba861f85ae0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f1469a91bf7775081078063de3edf05
SHA1a2c3083d15fbc18bc0b108223be90b825e68850b
SHA25640d59c5f37f36f81a1947417acabf28786d5115e5727aba5a492ed48d7a68c44
SHA5128e727d3a3db0b3e46721948c0a002c1068dc2c306621ef924775b03faa4e09efb5f880975d4121a305bbb4e39d7cbc8538f51f6d692906e83a2d1a68341d127b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b3aabb89e068063eeadfacc1a3ebd91
SHA1b97129576aeac2a30e28445233e50172770303a5
SHA2563e8e11abf8cf533786615450c61cc8ab751cd749bd81226a04ff7295f033d2c4
SHA51280350b6fa7ccbb1cebf402f197ef1a8e4a6d33eb170dccad344b73866fab5301a258b8f66e77ab5ef3bbe4457986c0235413108fcc47d3e7b4bf6752d75e21a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f13ef4d6c425487dd745564ac2278035
SHA12e620e91c64e272e23ea72a44fb3427ebac66c4e
SHA2569077a8dc8be9a207a7e66b72fb6404c83b6fe6d938593683f87c9d9ae5a4c663
SHA51221a9f864e65e867f24b124b074b0f5fdf5cb793aca4602053d1671968dedaa340db35e629eff8b3dc0c82eaa651aee087f4875d9730b43ce8de55ec1cac58abf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d625ebd2c3aec74917829aeb50c0885
SHA145c149c0e680b77cb477182f25a4932dcf17fefd
SHA256e71d8da8819324828a1af515ff8b7ddda930ee331ab617a49402ae6093745b0d
SHA512837dc6db4748592b27138e886ec1d0d1b9c5c5ad7d6e51f059d916661282b15fa7472dd5776eb66e0bb2ecb71f48be9d0b8854ad1b8ce06ab493b50caa2e8361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59da2236ab3c9d050cec266ea5dd7c23b
SHA17df28e0249a7a33c5520bfedd69218b17612f6f6
SHA256e09d9c3b48667a9f560eed6a6567e8b0354ab2296d8af3ed9349691901c27d21
SHA512d64ac6131d3ce01dc245f4cfbff261e3afc8fd22e256a73eb88490626c8a5553d713809d4674a530f2612788f8b99bb2c0995da4a78279431dc098903e754add
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3eb565dd2497f91cbbfaae2bb36157c
SHA1da7af390f994986062b73112a0ee50d300f4dd48
SHA25641e7b136ac65e2431c0f23a976712c680f12d02d99f1c66bfee62b12765aae24
SHA5128f6f72e77c6b3cd7fda4499fce408f9eac508ecbf8360c4d6a7cff00c291a8139e99babe185024d16aa192dcf282767851c88e671db62d62754390d348b5e7ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e27bf0b5acafd36bc5d49b6278440312
SHA188ab7035681cb4f00b644f020a2ff9c1b1ea91e4
SHA256d9aa204ae6618cb46671695c4e8529ab304d962df0214ae62f72e7baa29e7c28
SHA512f33af1624997944be577aff206159c4846c00fe2d440feb5e18cd4976852434e3d457eb48dc4483c19730f0947031a1e509022407e0c7c92119119c0b09dddbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524585f0002257b51ef7cd157fb72a403
SHA140bd7bca9632df7890185fe9a56ca678e37b10b8
SHA256823dc35dafd243ff8e0e3836a512d3aae065d027cb7cf41292ade622344b7b1b
SHA512febf17ae4de3600ba254c6f5ec983d58a633ead053be17a1ac8d2dde40a44a6cd0370814580690f0c1249fad312c7bcb788edc93b8a412cf1b9d2749088187e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d909ee8a1e6cf5d03ae485229e2718c
SHA1e72a26a9fd2235a636476d6c9a32f645f70dfeb6
SHA2563c3f0a0e605ac714b7242137181d41cdfc3b25817eff4414ff4cee8b51561c7e
SHA5128e53fa5dda3655cde0ffc6611b05277aff747d7e7a4e102fdc536ed88e9b75666f9a74b5b4cd42fe588dbcfa1f8560fd0120f896029ef4ade251145a97dbe919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f58fbee351a61fec68621c5be5e3a1d7
SHA1d651ff848b58167f0b0eb342a3e90ad7c939c1c2
SHA2566159bbc75e61f6ca981f150d555018ddf49f06e1e23844a3861b883a49cc6483
SHA512966d47ea21d72b8c9fe1f8227fb7a77f0879ebab317094da9aa0553b0eca22667a7f7a676f2a4b9864fe08fec5110cfbd45fcf26c9d23791a46526c49c1e3d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1409cf5aa2ed82dfeb8ca48de9fc189
SHA16b274bcef2cbfa153719b0ecf7918f50ef5778f2
SHA25645f99458674583c5bdd236e8bf993899736d9d73cb9e225823fdabf2151d7bc0
SHA512b4c079716c23215a8df056c8fbf27b4f8ad74db5b891f44ce262ab1a93de97ddbeba39a899f7ad35ed94b8015e4820cc15e23a71e6d3db62d3bf8b3f2c41b23f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d47d5a877a3ba8f3e5b03d00a2078b
SHA1e69da3482139c45fda83f5aa80695333287a1e1c
SHA2566d8a3c1bfc6e638cd3919d18db5568176f74cd2f83aa4e7d1242c000f098c2bf
SHA512d85669adfaa9072d34cb9ec92ae4c8365ab8fd51961d7c70a00e5432c403d40af576c9626fc2e45a0064c700ce9d6ebae9ecf05ab979472a3be2bcfe359bf509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51088bc885e14f9c70670a778f0696256
SHA15f522de3250a1c30599697a3314ccd95e85c6206
SHA256d3eaa4398c2e54f83d732c9066a835bb7cb7c6e824d8b4598147ae27da588939
SHA51241c951f755e1c6403cd3c3f3ed9202c4580a3038cf6d7963eb182855190635fe6dcba7ee02ed83cce7f2bde8d9a19479d51427185a9ee7b0942bdfffed7a8f89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5527b7c91d1296630ce633847c9435a39
SHA1df006dbbe5632f536152ad779530fe4577961a6b
SHA256d2bfc56318a1a235f13d6f5cba6cc8f1a6f18010b243650e53abf3021f612c96
SHA512dcbe7f5d15580f9cf049f2772f03f7d0393bc2ed215d33357d24d1696471c85b874e9e472069159ea3a9b628ea61c7025e0773edf004a1adca04c9d6548dabb6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b