Analysis
-
max time kernel
122s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 11:05
Static task
static1
Behavioral task
behavioral1
Sample
a9584c62271365e734cc79c42bce51f3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a9584c62271365e734cc79c42bce51f3_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
a9584c62271365e734cc79c42bce51f3_JaffaCakes118.html
-
Size
155KB
-
MD5
a9584c62271365e734cc79c42bce51f3
-
SHA1
e291be2c7a8e2956e305722b2964fceb85e8a530
-
SHA256
4938daea49509159644ae0756185d2665ec74858b90dbfda4699b497114ba1ba
-
SHA512
dd503d69644e235bc19ae836c08eed7142ade247bbe8c532638c8600fd146a14213f72a8e0e200d194dd5d99dad468403e265568192662c7d1dd69e7351f804b
-
SSDEEP
1536:3KIQ3cgSmyi8m2FTyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:7fTyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{08085731-2A3E-11EF-92B8-52226696DE45} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424525006" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40f1edf54abeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009e7053bd964aa24a9c7fceb7688ec74f000000000200000000001066000000010000200000004b07b02b9438e148d8bebbf102bf60aa87ce4c9a0394dfd0690294ca9f59830e000000000e800000000200002000000088cfaa00386c91f94ff39e0d35ca3cfbba0ce1d70977635de1c54c9f41c9260820000000f5facc0726b932dcdce7734f5a6d530deb4be95e16064f93f1cd60f5c31244fe4000000047640c3c7cf3c775ed798766ad1578b528ac50623ae75e8cfc87dd04df421d62bee5df953ffcea05c92468a898341749ec2260af472e054a076dd0afaf9e5c8e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2712 2208 iexplore.exe 28 PID 2208 wrote to memory of 2712 2208 iexplore.exe 28 PID 2208 wrote to memory of 2712 2208 iexplore.exe 28 PID 2208 wrote to memory of 2712 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a9584c62271365e734cc79c42bce51f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b88a8bc5b3eb75badda64f5365b6fda5
SHA1607adeac294037246070df4c77200fa0e98baaa5
SHA256c75e9292e9dd493d4ac38c60319582061af9f0a76556dbdd35ce212f2bca3c04
SHA5121b7ca8bc3000a97f4d2202bcd5830d3e0ccb6a1b81d56bddf272e197af2298cc4a1229cabe3251e59e5b72d10e01c6d89951892198cf8c945be39ca4ed6c9f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb18744d8c680ce3f01b0c29a1f3fe4
SHA160c731ea13446b7322173665f9f39a91d3a1abfe
SHA256cac6dd99701e5e15d6101f9ca830dc87f8935dc917cbe79d16e65bd81ec61223
SHA5129511df8e003ac8c8491887c5ee6ee62bd4f3468fe2a12845bab054d20fb78f924b1779574dbb2cb3c14b7f11dda773c12456ec09b9e1157fdca4d88052432e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53482ddd0059b4c40f5696130379b3417
SHA1a37ca54eadef3e9dd1f51074900ca9703052adda
SHA2564a68315ca55d09b04488099889ee80805b1b0eda05352cb5632fbab8052c62c1
SHA5122343ebb4ac5ca2409d7bee9040ba7d5de8b845ee7f799030af8555cceb63edaa18256076982e4bb6d2c1004ae3ab71d74abd3eeb6f0b635d691f7331f1947c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5695bcb7124b386bf187d29d33cc30e57
SHA16efbf7e82a0005c934b817ebb3d1a17f5b846a55
SHA256cd48fe6debdf421bed6237f160f4d91a6951f7f5b289372e2cce5ff2e9f69f8a
SHA512ce882d3d869954fcde736caebac4e58d7a9caf08bb6e3842a91b64fc613eec3bac1f4e73effb33bd88f9c441c7ca25208ca8244f06cdcdd6da54a220b3c2755d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7f3335d1a42bedf9cb53fee3a3851d9
SHA1c2e6559605d3c08d29d8b9cf67963195700ab9d0
SHA25679cdda61e77e3798757c423d55f99d59c45881b6421b1710d903f9b80ac49d9b
SHA51250484fa4ec066170f044896123f426b2b9f3452a5798393c3e46cc749deaa9a6d775842237e737249bcf8ab25fbb50ca04b02aa34fc5cbdea27d8d16c64fad6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5658aea51fcc7a5c94b39e122e9083af0
SHA1c7c5dc4f96c7b280eb71d4526304439c94e5df62
SHA256382625d4ca7ddb01d846510dd02464153a6f48b6a6ff6d8040d63c62f3eafe19
SHA512f797595976baf859ae2859f4c7c525eae34a586cdbf8059b298f6356d47c565a8e05e23d3e0c6298f6e0dddb8fc2a2d74a5de1e1eef64099fdd078805e08fa09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5106de4364e83a0a3cb1ccc8221e3e7b5
SHA1888e7e54886b47b758ea0cd9dadc64916956249b
SHA256a708dfde1daf2e12376c2f8264351cce8965c8912cff7da3afe1b2e90deb30c3
SHA512f94fd592a3bb76c6a62b415ef64c65476c142ee18ebd95e6e91ac51c78beba605b0c50783e640e803d7f089c7d3e599ce5fb0ad1ea7cc6e1b511af0abd2908c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a07c174a202dde3ee4ffd6fcee4c2b
SHA188934683386b867b8968c74db0f095e74e16348e
SHA2560cb4cb2034ad78099fb8a1eeb5c05932a1f87013ae0f8de99ff539031adfbaa1
SHA512d8280881e6c470d6080264ec125f9b27c6cd8ad437adcbbb18b5a9af401005e1743091a229cc9705845bdb7019f6ab032341e0cdb5e353e711438ee097fe3031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a64642b2b21cf3850fd0305dc5c6107
SHA10bef116bc682c499bcbe2513b8284b651b337a98
SHA256419c5df10b6df96c144057ae9a4f3eb1d1a5d9b9d3387946d6d70e668863bab2
SHA512d2049f784cbe797b6e339101737d26040da2fd201b8de469008c0d3a790da0f5dd7fcdde0715871adc515a0eb1f63c7a8136c418992de775e2275b46d926865a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b59765cff33476fb6b129c6c66ab9c
SHA15edc8172e93458e1f4f20ee7cda5a2799b96fa8f
SHA256d26b41c38e92f8f52ebc38ab88330dc54097316acf53bffdcd1e669114a13b75
SHA5120174384b467948739d0991c4a93ee6a09abf28e1bc6e49b7d4d587755eb03b8898b7d3921fe60c977c4a7dca150562acaa80044400b90b11278317a955960241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d5d4d837c2ba76c56e790a6dbc70a4
SHA11336091caa4c47fac895b97cd327df9c796dad09
SHA25681f8df14d6cf29739b3442885d2f9ed542a710d5f08d4640e4ddc0200356774d
SHA512c5cea3367ceead74a446e074a16ce5c81b85a56c6d6e90134c335d6e647eac1cb5a2f147e1c5921927591d4e21a9e12c879004578cfe522a966cf05604ae509c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5636d4303c970859b9c77623e70b5c168
SHA1fe2cd010482d4a90c23ce42b417c360c988700a3
SHA2568e0261e28afa5aab99959f53f58b9a98ea41cbb8a808a70443627a34e86a13ba
SHA5125742e7bce12161bbc79b548c4bf61088648078ac0d9e51c0c33cd5f6c3791f316c0fdff001e1bb6cb84338c66b0d0381c98904089a4d183ee9de7ddb174dce1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbbcb3147a6917009c33631cf12bdced
SHA18c332a991cb670ce5efd8ac3002306f70c6af244
SHA2562e761849d218cfd19559b83efb73497b67a27aa46dec37385aa493b94b9773a1
SHA512a770e3da750e9f5ca3bf2b4c1d5e01806c73c9cc809737730a02a68ed9c8e47b0b4b537c9e2a3838e5a1c654f933b95cee8c5fcb0a9d559f0e768407046ee144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594559147ce5e8ccd258616e52aeb2825
SHA14cf30d9100b28d66b781e21a39073b0294d0519e
SHA256bf4ac4859085419145eedb80423aeedd6db9fe96f5f9341edac9566f5ea9dad8
SHA512ecc04d4efbce62681e0f817ed559431bbe009a8c67e6753a4c75e0101eb9034908e8b358905ad2c915d70289b9d5394d142081d0544edc04766cfe012457b301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5046212b6dae11e7026fc3281fdc39738
SHA1a3ec184a42ea0315f4a3a91b417c1568aaa09d5d
SHA25642771c7fcda42ea146a3c1f451c07c1da91a75eaa6be3e443a0058e6c4c67370
SHA512b6d6bfa7463613ee8a7b242cce5b07f7a0d293ccd2fd764f1a1066e742f5c5d92597d412a9fed4569181ecf04407f2d82048fdd3f16c63ec0edbc173c9e2f7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c222f078da7bdf6e76cfe37b4a0e4df
SHA1d5edb72b0c326d229a6d5bd6c881abe41ba03e4d
SHA256bcb0975de938889fad7ec0e0e94e18dbc7ebceea78a9b05de9deccf612fcee73
SHA5124151f9d038cd3b951ec948071831a7dfca3dbcb7e504ebc9bae54114aa3dfd949b6aca6e015ae1f76b957b49738879c91b72801205b799d0ae5b7d9efaa7c134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba822fca443a01241358344e42759fc3
SHA1c66f55b5133c21ee818f570085827868cbcf01fd
SHA256527c87e1e3bddb0bd2228a2dc3c72aa47cf736a38eb48e27d3344ef38691f802
SHA512be94a462636be9a95ccf88e258f5628a48fe77b573d75a5f0db43d220f19a604e2f50326d430b9fedb21cb0a97f6655847fd31a132ae49d49a2cc5d0524131d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c52c3bce7e520d8d1294b1441e1f3a3
SHA16afdd9bce1b7dc6b8c21896ca1d7b2b6b496d6ef
SHA25611414182a43463bc7dbae88e9497084bbd22ae463e981c7097d156a26d3f1519
SHA5121d07e19536efffc9d7f6df944d3adac27242e4d10d4d2bba8dfa9344993f15b55780cf297beb33e1ff6d01ae7070d1f09d557751369a878fe501506a3fbcaf09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514da5472b30c6234aae7a46daf380d2f
SHA11defcda39afcd231d6b3b815b3299f03d0ef244d
SHA256c21f75a80e9d0a15321e294c810a1ebaf31ff7ad009ca6d2d59e01829b195c16
SHA51272fcc9300562cc35ec640f06190b887ddcd24297727549ba7e636302d52c0eb80e1a8eb8b4f7ed8dc119f3fe79be8118d4d6c5dd46066db19408d13650aaeb34
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b