Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
a956e7db2b193d9af3a5ef652af8a6fd_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a956e7db2b193d9af3a5ef652af8a6fd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a956e7db2b193d9af3a5ef652af8a6fd_JaffaCakes118.html
-
Size
14KB
-
MD5
a956e7db2b193d9af3a5ef652af8a6fd
-
SHA1
3460e662726463bf98fa9bc032026b1eec325d37
-
SHA256
aa5dcd4d5e6c3091114a055c594c44c14dfea6b2f74c65b8e28d34b05ae919b5
-
SHA512
95bff0a5b258c0538ad228436f10835b3182563860362bd6c85709cd053bacdb4fada054e4ec1b1c6e8b2bb1b43b590152db6b884f2078170e05d85ccbadd702
-
SSDEEP
192:bl7vFZ7v/PEi3qXAf1ItkpuOim7aXkZG1DrI4BJVgUYNSEdNcHSQ4woNEt5juXMc:1fHB1Iqp0ikEutlwj83F3lQM3M3fgpIF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405c5fba4abeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E311F801-2A3D-11EF-A490-4A2B752F9250} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000fc098b5af9e57fa2f270dc96c16b2e18235e098922f0938559f269866fdcf065000000000e8000000002000020000000e0ea3a4880db0a6e9240b9e22f8f87922ff972b4af5b3648310ea0894864d862200000004dd6aadfd789a0b752ef29f04a0cf7ea07a1df06f98d6edeaf479e01fe83cd8540000000ead1a43e93a0456c5868ad81623769de7c80d7c4d1a5ab09e3c6dbf0850893daaff4ee4760c0d07a52860aca7c60dd537ccb34ed7056ded5c4d4c3ce478a9606 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424524944" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1748 iexplore.exe 1748 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1748 wrote to memory of 1808 1748 iexplore.exe 28 PID 1748 wrote to memory of 1808 1748 iexplore.exe 28 PID 1748 wrote to memory of 1808 1748 iexplore.exe 28 PID 1748 wrote to memory of 1808 1748 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a956e7db2b193d9af3a5ef652af8a6fd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53007e823224160621b86995dc7f72d3c
SHA147557b4f484582df97616ad9bebf335dbd2007ed
SHA256fa9b24b5fe7fd2cfeaa3d2f0feee2a677376b72845e61fd4ad9b65695c1e51e3
SHA5122e2389a719769e563453fa0068064d00cbb3097b25c60e8e58977094921c8217e27a0c6e5651f13db726f479f50d11f5136da28ace705c9b3cc00e3945be223d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59340dc233eb8cdd3b7cb1e55a3dccf68
SHA171522edaf8366935b7936e668a68f7e8fd6dc431
SHA256b09d569409392485f1d9efb655a595edc784f485bcb91d0e5591b2308e8c0a03
SHA5125676f287627a51856664fc83a790e8906e64d66dacdf81d1ef2442fc91f770e3e06ef38ff6cd4fa0d6f6331696a3487636e542a8d4efe060799bbb3443576006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a5461bdde91050d6bc07a61f29e6f0a
SHA1424c1d7312e0d0f9c8b30a52cec506cd49ea6734
SHA256368ac0906a302e32157f6e1ab3b37f8d60f1405280db07387639e2c590ca7489
SHA512edd0ef3d88a30144241f75f4af4db53f2214660d3a5c49cc472189654f6490c1809628c1ad7cadaec65034bc1db2d2912f3eeb6125c705d49ca287748efb747f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8f012aebfb047d82287361cbe196d42
SHA1a4cd237cdca6eee9fdebfbc69f79de07df90ae53
SHA256d4ee680940bebe307c1d89a7db5d00f18b61e5167d0223c09e9a1af7b8c17210
SHA5129d42118d6a21cd6e427c9757bdb69c4a9424fe6635c1ebd1eab265ba713e9e9fcbb11b987cf7d63bdd07e36d8abacb29df4ab91644d2c35a0b73e8140b3c2764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562437091cc6220f49588b502b8d813cf
SHA105113d1337b91311cbd32ec31fbdaa9f8fee1d78
SHA256b0c6c614817aedc60027e2589221a023b9cc460be9fff9db5206a0a935191cd5
SHA512c61a2662aafb781a1bf2e2195f67c993769c70a55d6aa89a82dba57e17b0edfd1162260d6d45a5d352a882a4c9284c63986a56d58ffc6bfb4bbbb6ca2a894c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d703ee97fb4306417611257fa9bdc0
SHA1f2a27f1d00f509ba06de2de098f1470395fa9675
SHA2567a7603b661dd7a3466a8e7122b0806e05437337d45772b991c16a234f5c93155
SHA51252463b0e25769aa584f83c240260fafaf96b4f4bf19a51a7ea81802dd406cd229ceea6d1d9601543997f2e0c2833c5e9bbd6ab88169d104417479440d259a46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9a1ad6e9a0d577ce9a530152aa05eb8
SHA152ff58f436242de705c361ddb0bba0cc629d3d53
SHA2564e03c065925957651b21c56ccf9138f72dcb56c37a1f12a14e885247055f0f6b
SHA512d7856c7f6df035d76a602eaac3f908a2c82ae92f9e91185de0282ab4ec942d5c21492e7015dc4cf086a1c16d50f408d4a6181434e0a68338ae90d6b182cc7b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f3be51e15e9d56e43dc6e42ed84520
SHA176dda13709e491fa495d124e82f1edb678f786de
SHA256ba60299b7940941458de6821b84a9b95dc82f87f5778c8fbee37a958519774a7
SHA5127027e1e7b1b64c1beaf9b26fd3c447e866cc285ee7920ca4e1daadeb56f1e25f4ca60012ddf268f423faf5820f9557ed0886d7f3013cbf88150efc55c2aa06a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560aa62e403a35ae03f63cd8856e23fd6
SHA10417a87db6d8663afd43d4d816a450c12739513e
SHA2569ceb3e84483fca19ae61d7091b3d8755e95f51c956fcfcf890a4030a2bba38bd
SHA5122bc8c5e43efdd102369930c04781971cf0d5ee4e4d13128cf5f1dcaa773fe1f8673aa97e6fb809065b9971491c4db3ed9a7d1d47d93e4c7a6eaaf9f725bb680c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ecca615658bcd8de264084f3a8fc115
SHA130cc35327b5a95c5e7e9263745fed7ee04c0ec1b
SHA256e09b2450f1fbe62b936b0194eb4631dd751de0f3dbdcac16c4310631bde69a75
SHA512c1794ddad7883fc0073aad5499cd4347a9f1c2378426e7b441b5f3e4193323fea11385f14c085bbb439671efce5a48b857e370e4cbbafb5ce58e30bac6dc5806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40e3cd7d7465f46a0f63d636e4039b6
SHA184301fb1e1010c565d81beaeccdae9e143d0505e
SHA2566799f55d477185d35f94df9f288ba18c378a6ecfa659e1eea9fa74bda635162b
SHA512fc371b364e19e390d2204b7c2465536eba779a85d01a36f52bf5a3d651cd03064b6ada7d76256373cafd909197f897d8aee113187331245643b141b2c0d805df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525c19323eec8da9dbb72d5f5080dc690
SHA1987ab2531db896cc41cb18c49a305169f4e0e105
SHA256f9d730bb9fc8992a5741221c11839a475f71e59a9a2af28705ac8accdb5b6720
SHA5122c28f67482bca59ae10ff6cc084cdc6fafeff2a0fb215a67c91d38b8c2cc03454f03c2a75c2580b414542524723b3949c19222d66eb889c7a41e33b1281f8b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63c5ee1a002a69a92a54cbd8adda3fa
SHA158c5a2d2b8fdd9b832b903294bf943bd9c8c87f6
SHA2564a4fc376bf8682c08035f998cf7385d42b188b74a7861e79e60beb501f901739
SHA512f6fa566c9bae78b2230bc6aad4c8b3404ea21f9ccde8aad21c14096101fa111d9b785cab2bcbdac53d70718d5fa53c678b1d9f24f25d725303871abfb47af207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59970ad999f6a4d1ce557fb1d8bb7ee06
SHA195ae6e2ec926d217d5728a2a38dc02c358b56134
SHA256bd1994fb44157d0a9df42a5012b1a0d6afbaa11f5aeceb382d445d7326fa8ed7
SHA5128596562175cdb56e2b0ef675aa2b78ac3cc0364bf9728d3f5c9d8a0ed1e2c7aebdd9d72c9da28c1ee566b2a898c37a7e03a6758d499a049d1490879c22162311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519fedf1b2df89e6466f2cffcbd5a6f3e
SHA12665b76cbee98b3ea8e4202f6da5f758083865f1
SHA25668429394b9eb6f6b25f6e6165e5b24c850d0370f9b20d355ddb91e9245fd8d1e
SHA512d26159922243606c5c1fc91e07548d1cccb2e076023792ce9df032718f710dffaae3700c61e58654296d9dc308159f6887209b8be4a64c958980cb9c48a0d21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a4ab3da825e503dd1d6d961ba6bd84d
SHA126fcc5915ac8aa0ced3631f480edb2d570d5e443
SHA256381ef2b1b7f6a181cd691993ea7324b68c61762e55e0ea00e6b454838f2e6bcb
SHA512fb54bd0281926f857aaa43a737ca7cb36e1cfa4cebf31c348c79bc6301d170c23dadaaf99b25bd38206f155a7a54a2236554b7e58da50f2d0d4c25537a017e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f895ba179c457e578e1387453d5ec2ad
SHA11944d1aff9292055f840088ac85d2fb0dfbb24f3
SHA25642e51817e873a56bb3834e8255f79021f0c1d1545f025e05d4691d0bdd23aa38
SHA51215de604e7c4ccbdcbf9692d3c21a11461465e01ebdf2cdea2ba5408c85791c6d9b1c66d2f7c23ff2cd339efd99e2b598c2ddb6afe1ef62547d16aba25b2f096b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b816a0a154caad20aadba2aabd9b072
SHA120acebd53e63101a82d8c818d9d8b5fd17806b1c
SHA256378f3f24cfb64a4164b91e77ce40b41aeb02e896aba69e1621bacbb8009493dd
SHA512e0bf140f504aafe37b58fbaf01d0c718ebf971a8f73c0f70225afd4adaeb96946e195fd4288c05347e7036ebb34d8c0e1eedb2c4bf29a4a5154d9775427f38db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58927d7a7cd5455aa4b79e19abd824263
SHA1cd32fbe958d65a20351654e41897c58d21b56e54
SHA256ee87eee72b82cde28424c98bca4b086b03c440a8861ce1cccad4bd5d5ba267d7
SHA5121950a7ccb0005d3c1d25bbf567b6fa5000b23259dc669423a7eed73b5d5360b589ac650536ad044cab9291d8cd88ab917db2daf8017c34cd3a50e3f0048e8912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63e765a80c0ed720598078684733328
SHA1997cf3fbeeed11fa5de661a2bf868697e47194d0
SHA2566146078fc260285b8f2ba97a5cd36f09b051b72781e63510a6ee5a8d2351ca3d
SHA512d3530fec1a21fe65c2ee12109175490e140d638a97ad57008ce00db1fa24c246d50a6721ce32e845557c6cf96124afd7c3bd5ac8774c70563624bef3c21c9c4e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b