Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
ab5e71c593c2a76d2b30fa1a2a472532_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ab5e71c593c2a76d2b30fa1a2a472532_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
ab5e71c593c2a76d2b30fa1a2a472532_JaffaCakes118.html
-
Size
37KB
-
MD5
ab5e71c593c2a76d2b30fa1a2a472532
-
SHA1
1e9be5fa492154a4b2938117fbe4bef6664a7466
-
SHA256
6b4910d897f9c184f2d3bb0946e6e2f006a62ebcd92a446252079d84518f9bc2
-
SHA512
dd0b683cb4f2b1d31fd7673e0ae5910a8ae9f78bb2a1620e5fa1c002676a8d81de04ae1d57aa09e4d594fb0608d079e22ecbcab1f10d38abc7f04f3146e42d96
-
SSDEEP
384:DDGAiiuo8P1hXxX+8vFIuy97sb7OSAn0eD1E:DDGAiLoCv5y97sb7OHZD1E
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000388f413849704308aa52adb5acfb5372f98bd5c3b310ac4a81c222938cb0d406000000000e8000000002000020000000df13b7a056353f518d80c295411c0c6462df90e8ce5fb28520f230f42319fb3a2000000095c40ce1c651fb466e076bab89e126749d611d7220e059c0ce147e957b058ff940000000b2ae24116fcd077b0adad30600278141a291c16c7e4bebc5df60fc9197fbc5eded0f4b4747deffbb14c958a68c8d4cd72488bbc6a07a6160284867d8bcc870f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4554B11-2A8E-11EF-917B-C299D158824A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ee1a8a9bbeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424559655" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2216 2924 iexplore.exe 28 PID 2924 wrote to memory of 2216 2924 iexplore.exe 28 PID 2924 wrote to memory of 2216 2924 iexplore.exe 28 PID 2924 wrote to memory of 2216 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ab5e71c593c2a76d2b30fa1a2a472532_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a607c5e62aa9c1e61ec37213fbd56e12
SHA166e3f385c893e3ff85cb6d6ab3157a4c31f938ab
SHA256b8cf1426b22f78a4c31e318c7793cb40632ad135f19fdf9edc9ea04218e702c6
SHA512bbc01eeeceeb7d1e9ac904ed3761d55cf6fe28cd4ff87f82db1b801b6401d554399d77cb796fddb4ef9bb4e0ebd7ef66130e9e8684825946d353de3dc10dc04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5604a2df8d99ba89595d3c80afeb9bff7
SHA1d3859522f1ff275802ac609bbfa2ae0e9a70a37c
SHA2565a6aa233e9f3d7c85f4149fbd029c7f2ea79b1d0ecfe10f926e2967e01316594
SHA51206787ac22a0fd3932b45590dd27743823fcf5ff9eb25caae81b17c1c6b31c6a84ef486f4953eb019397ead5064edac603a6e3309d09493429c03080b8f41e10e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8560829fc4c6faabc732f12829262d1
SHA17c06e7f03eb173b3912cdcbef4d97ad834d473f5
SHA2563261bf8ce52062680257c48c95596f9a17c3b058dacb93c765f9dedec350f262
SHA512a35b34f04582234ecbefa87c71e46ea9e9f9d6a1699dcd5629816448fa1254d4c7f9cd49998ea85b7ac6cd64b0305a4f2ddbc12a9d277f1c37ec41fede92dcda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da10ffec1edc41767aa4d050b6a72916
SHA13982b4949ef19f89c238f33a89a450fe5c270330
SHA256f94fa2eb2fb107b5ab6bd3dfcf65f9cc39d2a795d27cf101736035de85e8de9f
SHA51248d75d3d36cee68166c409d0f5c53aa7ac352d91a47b1021a75264e3e0f512471884c416093467d0d7cc43f4e9e0e0e6dde838e2d2830792de08ed56c238e6ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597986286c9579b49031eb6c0f111e653
SHA1f151860f7aa2ff467e682204ed18fee96adc1ac1
SHA2563ddb66c91a921a0752ba4bcfeaf765de2303c7cdba04a9dadb10e4b976e1202a
SHA512b318a80c6934c1c3c666c83429722655f02cb66cad72734a4601c8539e51b8a3d1e546822c0c438b7b0ff019c2dca678d2ee7f03959610e5f7a95e69322e08f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5955ce082ff54f605099143da6c5ab6e0
SHA1bde3b5a591723c4a84f24cd22b4b49f4cf286904
SHA256178d1c41dcf30543994bc4b0dafd317e0b34367da601d9258665746f10a452c1
SHA5123332a0c311775b7fe73f2fd0a37d1f2b26bece234f2ad2d22c167aef4bfb5efb891c1aa12e853ab7fa8c4d7fbd9b4438d242af759001a3a5511cfb6b0a6b02d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e84c3d01bc2fa8ade53e00c70ea7d03e
SHA16c023aa1855432c2b9e2d0c8f641e4fddcd13416
SHA256d1500f94ea1e8e4bc3a032b965224a06e8e1ed6166052e14969eafe21315f745
SHA51222b13349711901d90317c1ce6c9a610755b851e7a0da6b40efa81a6e7f92d5a881721e59671ae733320e54e69d3c39bc7ff391d114069d60ac917c8342bc0a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a031dbd5dd95f113901f0ec406cecef
SHA183d1d3df727b64d3956cb5f885e55816dbfd24d1
SHA256bcb41ff8d6c7c3cf910f615285797fa689a1b0473cfd769faf4fa78a894b9b69
SHA512346461af55dc22b339e2a285de7e628a8a90b7bfc8edde437517df8ce1273a23551a0c2ebd920601b4ecdd0493d9df1926ab1f0d8d850ea8543266999313ebd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5868d5f6523e5742022ebc2f29c4496a8
SHA198db3bad7dfd977ab15096b6f45b51a09657519f
SHA256fb7366de72269c7d97de2e8fb28a1fd8a591d3857f6d2599faa4ddb9881bf5d0
SHA512b9340dcba0d0d3b9fd637a972fd2020a6c826f60500dfce872c0b2f5a1b9abc7f38353534af60af0daf3f21088375d2b11ae94e5ce67861ffd41a2b5134387df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c732f35c0efcb7832353c17a580d7cf
SHA1c90eb296e7faef8f26f162e3a3666afdbaed5e25
SHA256f6599c3b78b4e19fde5c04ff5fb9c0950c80a61db67df459761262b1755327c6
SHA51250231505623d1c98ad3d7f88b23ed57dd9e5804a76379d21331789a6c2a8f52a59bf2b6f080fa3b8f7d9517de577525c6b8d97d9f05d89b8c4ade9e65debfec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cedf0656816511c8de3c8ed33dfd815
SHA147f3ca7b6358bd9c546b1160ddbc984d7c590f21
SHA25653dfdc0cb1dbfd2dd8aa1ffb67e8e6cfc6ee5f1cc10d934bd5aa3accd5829055
SHA512e542fd22368acf8e3ecd4781c21ea7f80730107c6efca4b04373cba4383bfed116985106fc89f45d12b637ee4819866e3e69491019aa4680b7b7820a664e02ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbdac47f011153252ed2ce7209355d71
SHA1cff4ec7d8b2a65a8dbebb47b83613876dea819e1
SHA256f4cc41e15ceef086d10d198b5416426e6b2530ade37e039f9fa4df2be8b997ee
SHA512960f656c4e303d00af9b17838ef33baa183e030bdd53d46642399d3368517164b45ef2b0dc10f5e2fdb65131ad9b4d7a44397b8c463e575aa2c3c90601eeb803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c54888f4bb271357fe45d2b6f4b7987
SHA18679b82fe9730493bf67a53e23d8544b6eb5c8fa
SHA2567a04e9f3f24ce480e6ee30052ef6eab4d2175919b6bfc4aa694d4341b35e4126
SHA512253136e9a489b919b69c5bf03c19411cf06a4844b2e259a47c0d3c3881770454668f87b531e5b484344cead095dfa6d19fd06b6ab8434adb89b4cf1f72b788f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556225fc2645727abd225b8aaac6e887f
SHA130684208da95bd6b56adf795903ebc7b9c0a8657
SHA2564b6e253247d62307d589bd3663a43f623d0df3b8f061c02d3d2543604a6e7b6e
SHA51213cf6581d596c30e52130c37ee8b648af86fe084cbcde685efa681699b6aff0e948becc19bc27d76b461b4061878d4ecc9a5c18cdfd2f02577df0bf63bad59b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1227492e40d20e50ece535317d581a8
SHA1743e3f11ed479b7716d5d92c0420f2f2b78355b4
SHA25666cdfd0ef89fb291bde0a91007fd2714a60f75fa7d143fca54730036f2e6a024
SHA512ac5c8a9a01e53a0bd88ee73f481c8d42701838eaa87ce223811a2b7e6ecdc55e75a85891610db3dc8e3676aa048b4da210ef8edf0f7415b6336af3107a667d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57240c4b2e6e611cb15f61496edc60097
SHA132a1cf54f97b9e018e21d99b419183cb7c57d3ab
SHA256deddbb8067049bfaf5a32599fdf08de69a063cef9a4ed302058ad863f46f3d4c
SHA512458fa341f15225b2703606d64d6510336087e4e9e5e13cdff01ebaae90ee8502b3e48a1196077920cd5c16ef7cea22f25cdf4ef8cb3e398410af4965cd087a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553b7e18dbce76bcc35482b42a4085f0a
SHA1b524dc886887e3d23128d9d1b36d026502d58b30
SHA256f0e9a8b97bfb0b324a3ca896a20cf74b9770fce0eb1d5f9a073db2ed00b8d983
SHA512a955d4674e8bd38316509a9d127a269336df7d3216d67bb2fcd30c173934c81d92c4276200b5567238a86c2f7ace06432036c59bf5c805d4214786a02f7d2ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e58877d6688c7b2a8c03ca462b6c74fd
SHA13efcd1e1a9eb0284790da5c36a6b6c282dc558bf
SHA2567db156f493f5ca39391182406671f239104eb13607b8915deb9496d8bdfc497d
SHA512ec592dceeb5bb800fbd997332f4bc5526befffbdec19178d57d908981eac6ff5b690440c341dce818251f1160f5f258a318b0dcb0ff9525fa89140dee3efce92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3bc6214b6210d8a265c2290196407b2
SHA1f163dfb6b131076d10597ca697ec273c233ba722
SHA25697ba2740ccc5cebf325157cddc54aa92019bc5d63d4b6e198e699388e980d39d
SHA5129ea6c8966b807f6b9a5537f59b5d67f8ec593f9124987c377980cfc6e7042376ba0d1dae7f7c781aa1362164cc5da0adc5ec9761971b225947803939906387f3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b