Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 10:00
Static task
static1
Behavioral task
behavioral1
Sample
a9180b014de0fbb9a24046bcddfbad97_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a9180b014de0fbb9a24046bcddfbad97_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a9180b014de0fbb9a24046bcddfbad97_JaffaCakes118.html
-
Size
84KB
-
MD5
a9180b014de0fbb9a24046bcddfbad97
-
SHA1
975d539dbced6c31126aaca8fc30302be1b9cc99
-
SHA256
d1d3e6d9377a6d0e141139300c19d9ca09af0c33d17ff5dfecd7531ea25dcdaf
-
SHA512
eababc10cfd11d8553fa9024b6bde8f725b53ff96ee9241a8373f65026671b7740424d9ed461cf93f00cfcc4c8ab4b0adb3c723e9167632a7671b080ed25f96b
-
SSDEEP
1536:Bma12cXIv8vEy0qozQsrUEsE/xM1GBO1aM7SK/cxDTByRePxX29r6Xjyv6+1VUUW:Bma12cXIv0Ey0qozQsrUEsE/xEGBuaMk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f95ec841beda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424521107" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2E35F21-2A34-11EF-AA16-D671A15513D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000000d6b4a6ed0fd98f51d2ee52b78426915f6b58a46e407f599e545d6af77bf1252000000000e80000000020000200000008ce48a64316757928bf4ec8b6303731b737a48a94022e149c792e639d80e53ff200000009f5215e3ae9a66df5910b1dc37452a8e160f88f94b0d4dd8ff194ce50890bff14000000099bd8958a3fb0360dcedeee4aeb93b8f488a036535ebe72569235e1db20a281d0097ca70cfec604041997641a503152f97e629b04eac56508e251a520d2854c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2580 iexplore.exe 2580 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2580 wrote to memory of 3060 2580 iexplore.exe 28 PID 2580 wrote to memory of 3060 2580 iexplore.exe 28 PID 2580 wrote to memory of 3060 2580 iexplore.exe 28 PID 2580 wrote to memory of 3060 2580 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a9180b014de0fbb9a24046bcddfbad97_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573f79b6b9b5f64d3b394000aaa80ade2
SHA1ebd32c3c3b97df0c1747d1b1de6f9c5326ca61d3
SHA25645ac05dd68ff6fc3f6f55046e9472c3e63a09644753f19ea44c3bfe335836399
SHA512e91876ad1d014522ae68f71fe1c42b531e90ffd0264bdc4c49d5de845f5ab6153329a56cb8d1af06ae2c127fb796fb7d78aec3c52e2ac2c536cacf83ebc00cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5110c784f9ecf264cbcf2eed4f2ddfd31
SHA1466c14e29dbb57ad4409dadd88112e5ff8e0d65f
SHA25663467a0078307c473e0a26197202addcd675984c2d98d5941b132dde4a1083f8
SHA5127a09c8150ffe19d4a81274ff60831142e7dde3481089ab09738419e5a0834f2910373d09d9aad977f4912cc1b55939659d952d9aa3839d23e0e03b6a4c8b802f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d6155511641359d42fa7d55126ad09
SHA1a2344f05ed85d160fca214645b4412f33aab75a5
SHA256d59d41654895bffcc4adf3ab31f4eed701d8ff55aacf343ed95e944983879a67
SHA512b42b91d4c530b416949719e4b67e887630ff7abe7b693fdef51a02ff1051c1c459e9b372818042ef8e1c95e95598f1d942ee3ba09c9695bf14d20df1cfb29e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59290c39e0ff21c26ccf78051808d567f
SHA17d131fd46a3558a7c9a66acca4c82c902589c81d
SHA256093049911d00f7766b5952966d33c075de1f9d33132c8146184643dfb3c635b8
SHA512363d20d14a74ff92b22dc1a9b481709128a26b9abefbb387b8999b4bd9cce9c3f1b71c5a2d4bc88d94b83fa4d95b009a1bc9c90207149146e859061968f69d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51613ecaef77b38213d68c745c7e0debc
SHA1f8f833ce8ce3c2899cf6e78e156e796b172cf83b
SHA256d45ce9f29c135aeda54ef9d0901ce32b9e4435d34ab7af27acf2a408259a64b3
SHA51210c6842422cdcd35850d322f2f1aca4becad1d40b254949d40cda3712a44ec78e287faef2661f0d2fa1098b460d32974b711fec903bf3d5509ac7c040a5cddcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1202bff3f9d99c380bfe9ab7c41afe1
SHA1c46b311c2981c9d24a228d3d6c29adaa09d09ddf
SHA256ee81d9e300788091cc679cd821519a52d562a330cea7009b39327c33984eb171
SHA5129b03f79fef336536f54ae625fe4c438f86139a9c26d2aa6d6141951eea8cff74f6e0037d7d23d908bf81114149b247f681de5117b01d09910694bf693d7a0d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af43eb1b45bbb506861fb2a22e9cd504
SHA11575db2c4ac2f7a15de57b824688fbd48d864a17
SHA256304e23c60a15b1a6097b8297be57336f5109013f2c49b8ec4e563382e9f284f8
SHA512cfa7bdc780c77b28ffcfa48418d75d8a1d4f98a6ae1a55b85834d8e15c53d53e829baec6bda7449f53003d0d6efa05a35e645af96e3b01f15e659d018a0145dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d182af3fc2a5ae8c0f2eaa764bc09e3
SHA1519216bc8567b4b30404eb2170d88cf14392d830
SHA256da0e10ea457711d53a24836abb73ea135332bcf47b1ac77effed39ec479f65d5
SHA512f1ec513b8e177788c400219973b779e2eb39e374c800591ac31c4f39b1ddb45e109fee9f4339808640447e8e10faeb5abfffb6b58af324453b8ff6b6ed5315e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52137d6a766094f4a6ee3870c5e95187b
SHA1dfb64ca8e9151d2d70e0142571fb58ffe815f2b6
SHA2562f56de8a9883ca4b98e19f6f0ed19cbd5f898dcca3faa607fbc788f64673b76d
SHA512e11e3c3b81040d1b2b0b7524e9552b3ac2def07454362fe90b7bc90820b639c85d709eecff9162b6e0e1cd2339ef0126d93914ee0c7df4a944574fa169c75a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5289958272aba667204ae664234558ff9
SHA1bf44c8012608652f8782fe6c854ecabbe103f835
SHA256b924537f7c1525e8f36a5fcd101653b6a5537a70afa2c6e2ae826f23bdc23243
SHA512f3e51c1b1f2759660cfef5885f081247de440a93822807d3b78d45348c238a7b2d10bf8b8c52ce059017a24fad3a543d49fb0a55f621e6fb33d02a51377ac38f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ab6a142d205ffeccc06782a66927d42
SHA1a523bf97dc34bca6a639fccdc8679606790ce248
SHA256c6955511fb9b6a25351f3f32a7b8de7b10faf11f97f821e26b6aa834f3df2afb
SHA512b0e6821a49281e4866865e58e8f95fdad6d25796fcf270e29bf685a95a65c38c8a35faabb64b646dbb8800eb05c142007c07ce133fdbd3775936977a8733c9b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ac19f263e5de77fbd5933199f53218
SHA1afdf4d5676fd8bfa707f9d5cb9f7a1b9b2a3fe2e
SHA25610af172b3f197cc7c9a955290552bca89cb96d849c48abc9f57a0cbfbf062900
SHA51242d28f782c3b88e84da38e1bbdbaed9b4d2a43d10680986952d5fc06bbf3b74eb4c34b4ec8c30dac23b8d0f8988d6254f3b82cb4df86127026fa6834b924cf93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568f43dfd5a780d8901fa9b1a24bebabf
SHA19a3a3e36025484fd1cec4c9b6c591d3a293e1bfb
SHA256be096c752a33c60b1c72e88f6d2f0b9b62369e836fd9dc42d064f021d1ce5d49
SHA51222c4f80b5c36ee2147f997dec34ef889cf441eda966702a7eecc11a1444334fc8941660323cd134d47fabd9d440e96f486bd69ecf9183edf0f88ecfb497b50e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bb59a57c6482ebccde4bbe0b20ccb64
SHA1e7695954f955f683238f5df5b255185e7e83e880
SHA256b39c5d3421228a2d38a1ed4297c5949f60293fd2b6a16bf4a98a0939bf3bea54
SHA5124208bcf9a85141db6c7c5879b838de0582866784a57117513684b8618a2c827b0ac9cc6ac280b1b26145b5677f77d07c6881111e9fa75cd050063d8503ad9d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b62c9b60aa69cfe184e890cb4bbf3e
SHA1f5b153cb5ec5e69121d53116989228a123575817
SHA2569691b083f4f655bd9d5a541bfccfaeff0245c3603f37efcf775723e0408413fe
SHA512bb9ba0e018e4afc125d3c4d6c2059f4f92563156283ba3da62c972e3b92929be41ce1c3c247134e2869790e3857164126721239e851de003b38e0d15e9f4e920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c01f3280a528721cf935eefde069ab0
SHA105d669a6a6824cab46898948259a6bfe7a134663
SHA2569274df94786f7a719a81849ee365bb8a34c289b91ac7dc921160d1af2056bec3
SHA512c4af6f1025f77768217265eef61476a7554f6421a05d09134343bebc2a4ad19cc96b9ac1de47519d26a28ccffce5dc6b3bc306e05f667d1a2eae843f359a242e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba4d81c603b5cea81cef3253a73e642
SHA1891a062f2f828d2fe495b11693c3f32bb71da0c7
SHA256b0ee9ba8bb6cec5c5d5c07d102c924e7d9fb13b704eda0fa351a75e6f968771a
SHA512904e1c217260d893450e7215d2325edda415ac7d544d7180ae31969c9896af0adb6824f028b21023bb9ea9a8e9be71f7316fb8ddb7f9ab0a5faf8be64a0456d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502985f74af5b3f082bac0da4b631dfd9
SHA1e9848231cde4dde9e485a7469fdfdd88a79699e2
SHA2562e0fcd93af6078a8c33dfc0c392148cc36c7a15cdfcd9235c237c7537cdeb641
SHA51297ceb2a2d4fc03ab1ee72cdd5689ab90f0509769a8b4bf79f86e35e7120a1e11239cda6b7b53d3da52ad1b020e61fd7ba2711e7262680847e07df636d4a8cf1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bead6db306130ad4ce08ac7542e158a2
SHA151d1de579f7fde28bbe80c84aae9805dc8eff886
SHA256f645b19d2e949869eab58487762a58cb211983a6e813e26d66cdf72cdb06ea87
SHA512bc4d741f81aab3a6643f93d38fb44633f3e3bc91d1209fba76f36f04465886dedecbf2b97f5ff9b8db5df363142f00a3fc9b9645fbb01838bba1b6f626aebc1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a46ff8076d86bebd22b110be2f2ac9
SHA17838f87ff3922b888c869771e6d3e3a2c2937c4e
SHA256310001dac76138e5facaf755882ae6eacfea4f0dfb0555e25b8432146460333c
SHA512b77767c5325a4b2b961020fa5fb938a56ecf033ea583292e88d5f29d6e55a7799bc8731aaaf27707088087fd89f03b79c742a4f638912e0c9aa699a8ce695577
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b