Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
ac2f1fefe4a79db259fe249dd5fd2b2a_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ac2f1fefe4a79db259fe249dd5fd2b2a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ac2f1fefe4a79db259fe249dd5fd2b2a_JaffaCakes118.html
-
Size
30KB
-
MD5
ac2f1fefe4a79db259fe249dd5fd2b2a
-
SHA1
012e1b10d21a4946065a0671e9b141ee39387dde
-
SHA256
1088b293742e2a0b942d0a8d72225bff4d6005234a5cfa54a0d0ddf4c7deb1c8
-
SHA512
54b7b18e144c57ba7957938739882ecaabac577589260128e913e9a2d6cc2a5f558b14e7123549e58e07d9ee81c6101365dc23ac78732a8ff2ee3f9b22456d57
-
SSDEEP
768:4FyLODnuU7CRfXCyydL2O9Mo02Sja+sbU34X4hw4U4Z3494j494t4W9w3fc:4FyLODnuU7CRfXCyydL2O9Mo0ja+sbUb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000fb2eccbb7a0c933ab3498820919c8d04652e9bcd4c0bb3cc6575e7cd8ca0d6a2000000000e8000000002000020000000efd6d715e05ab48f92395268f318ca578869a24c4d29a9d77d7742d66c489a602000000074c94ca9dc5363b05f998b558a3ad4bcce8e38ab438bf8229a17fc4379973dc440000000bfbfa7d1061a8ec465ca14e297657d36a28ccc22beb5c928645c774aa22815b570fc68fee18351132dc5e53687e293e7c86ec115fbc40ae9f9e059bb63be8a8b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424572410" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67B10291-2AAC-11EF-A550-7E1039193522} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303f5546b9beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2632 2220 iexplore.exe 28 PID 2220 wrote to memory of 2632 2220 iexplore.exe 28 PID 2220 wrote to memory of 2632 2220 iexplore.exe 28 PID 2220 wrote to memory of 2632 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ac2f1fefe4a79db259fe249dd5fd2b2a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6cb1064c88fe30d7d375dd12aa0e46
SHA1e918943840443d0fed1dadfea2c771a8844e731d
SHA256c4bba3dc72020516cb50f4d0c344664bc2d4ab2373c94b7a8dd2d2b296f21e19
SHA51254347d173243e857ff421c5273149a21af81b5435d909fe55a190c825edf76b05c25b6f0b32072f423b0aa389905485e1b3d4746ba754a12916f40fe415d826c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2968f48d8420ed320dc7ed6ab4add00
SHA1f628625fbf8e9f902daabd407b08d3d3df3c9a93
SHA256fd93a850d717d3a9aa73d56d0e250ab5be490b1bfe65dd0a77da5b16d0c5cb93
SHA512b79d70800f2fec8a07b69efb2b054a8a3c4dc513ec4335a5671d2aa124b45c8f36dc931683dd1e8fefd2515646bf44c3eeaa01c585c9c037b2a681ee28f938e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535e27f29cce3f801e570c636e6920abc
SHA1b73689b8021d24f8ff879f9d0d99f6e5070ec717
SHA25607adfd076228b0b4937c499712ebae4edf8a2822368cb8058462d02b5d233d4d
SHA5123eabcb8a1c45122985122771ade8c92540c752319cfe24396a7c5ac19acc4f0d22688c9d0a2e035f288345f0beb696ff8953533ee076298159df0a2726814e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f28648dc5309050c98326bde8805a625
SHA166ac27ad84750b3f1a1542bec16f02ccc19b832c
SHA2568526c49a28c7218932b21e13cd49ee106b8ed3f2f7383a3eeecda6645a70bd48
SHA51288e8a2cd57569158ad6d1247b60bb19c3f9e648e96f823fd65169d8e38a7d51733f2a3199baba0f35f0a1db463bc75b9c2b01b15146b9d9206a55386a1c15d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519959afd69ad5bfbf4bdb06518965290
SHA1b4876affc8a973c4e24f3bac4ac3a8a626f49b89
SHA256255a80f66652029a2339200fdeea42a7b2909917ccbd2faa536f38c75ae1f76b
SHA51271735588fd0632d89f2eea5d14a2fc8bc5b9eb10ba97c1e6407cb0c2a69e96f9fec7ae6f5b8cf23cc910f5816adaeec19811219c1388ff76b8cdacb20ea06956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59505a4126a18e35afaac524f55c1f2ff
SHA13561d1403e8645a5bc386f4e20c939437cb35340
SHA2567e4ce4e705599695b711e35e47d11a634a39e9dff5691dce8e55be72868e596f
SHA512098bd6b0a49ad38d5a24ee023df1b7bf29b01cbc3ee360e2ac817de7abb5c47e127ac10e22502d662ef3ebdcf77c59d59a937540489ff9028a6ecc8bedd8fe40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ea53cfe63d6052dcc9706eb71ddb99
SHA14f793a3801756293a6121ee7de7266e7170c0c88
SHA256376b75d390e51868305c8d30ae2240a0f53734ef8f1f00c3f7fc4326c3c5646f
SHA5126a473e5362a8080141110f5db0e4b75455d942d803e39153808d44b34f0623da07daeaa1278104947179059fb15db68bfe8da333f22b6cfc7eb83ad918541f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad3ca07424daaccfc5fc58964112cb38
SHA1dfce2c600db5975e628b1580ba5ca9e934c875dc
SHA256c2fea6c10c71a544435071f2aceff9ab9bbaf38a6475bbc23dfb35c90344eec5
SHA512fbbf19764b5102aafa3209830c1a3c078cf36d2cbd5257a4a2939e0acc69e0bdc0495646d50d1aac42ea1252dcc69025102b195d0b02c5ee4fc861923f94184f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f841c6f13d92ed38d02daf7a3cc0d7ce
SHA1fa7d1919080c767571e0d81cc6736db3c2140398
SHA2563a00ee3ea87fb5db62040f2a52b4ac967d4be6a78f8ea1eb6bf5218d0954e737
SHA512efcda19769ca4e0b888ca20ec68617b5e80b8d81f4832c9be9c303814685e978892fe9023167ef2a96c97582768dd81b5b46d522064ad1706ad5e4181a86355c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3ab1e2c11b5f02033f654b29e277176
SHA19e2df8ae27d4bbafcaf7dc5bf9a21ab518c3d6e9
SHA256cb46af1f3eb50165fcb0ea90394be6730447b1ba3942e9c1ed193f49c36ac248
SHA51288a52c08ecb8aa46913d82ade672d55caf6296b8975f36cc38355c1ee2f880147a758d62b078c51127528722101f42f29b30cf3e97cd9d2d26225930fb1c19ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4e00ee0d22382fc1fd75102f61f034a
SHA14a8946b3f7b3a644c504b32bb8614bc276d91022
SHA25686a63b5d61de1e3780a49d4f56523796e17e3d03d3edc467a7b055aa02032fbe
SHA51230126bcf07507f0280e8524ad3747e8ef9c43d358186faa35d656881b1d7a5ed030f697886af973370cd1ba6afd1631d4f8c9a92e14617aa148ad01f4ae0d59a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f1c82d3ec39f6d4e876d2d249bf69b0
SHA1498e317417c33f59538e19210a6550896d073dfc
SHA256fc84284da49db3eb219b5662c12ea113e333a9872c12dff5cb0a0fbffbc6bf9f
SHA512955e6416f380edb3b06260824beb4fef9a9c67aee422b902885458983398f32c0b44d80ff298ff5543d89d4ad3940f5f56e9c2c0aaefa74cbe1840c6a329deaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507080034b513ee69d61dc4b35146730e
SHA1ed816f4077226816b168e88d58b45fb59ebe9a26
SHA256dd9a971ca0610757e26f49a68682e2347e5dd3cd034d8cb4d9dd6d6a26cfe05a
SHA5127e74b8d728414a525e186cb70f336e0e39855ce1daa54caa490116837b4632bb8e68673d3dc225b5e3e3e6a36a5493eb8623471f4a7b51f35115b8c8a5eb3809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c726fefbd6e36e822073441bbb42ddcb
SHA102a5cbd20312ca2eefa8ff8e517fa79a7003e446
SHA25609cd65e1048e360b52ba709783a08840d7f475c06329414d2fe09c5465f06335
SHA512fc3dd03c6b09edf472b374828e5b974970c947fd772e2475928a7be86859b8b12594af9b1a38394f9abe57a08d55f18a08072177faf9038dd55b21a38a2e1147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5befc6d951558d74246424007227ce124
SHA1b97fc663070c638f74d3bb77b05b0d23f3bfc080
SHA256c75e81f45be6663fc45b174ba57a7d0f6d7512be1d0e058a4933bb8e62151ac4
SHA51215bc5db1d2f401763841a83581973894811969579f084c70a806cfe754e7cf327c7f1083a1a88b6bbcb7942238fd3740a77deaf7e4f41f1275fab9549810b408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb495578134683524422d7f09e9f21b
SHA19f2ae6526eb69e87c9f8a621704d53fa4e6c2a4f
SHA256ad262f47d4532a56d38971a58f482b1337521f1716418fdbbc3696497c19b904
SHA512d8ae151ff5fa4005e1e9759accea4484a8ae0359660c0130a6ac387b30f86546c1d7a036f4600e6e19e52a827f31f94c3aeec6e07cd43bffc8a59b4f2ee5cbdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926156bc9115be6f668c7b7c3dc78c58
SHA1571c01f7261536a87c71e187b54531a2d01567cb
SHA256138000317145fea0ea744e463f83c82d6d490e4b53eecd3b825206ed042f567d
SHA51291ea82e3240ce88c6f94966f862389aa8b3eb74daa600cdfb9c44f26886268de7ca07f64e90b633d454afdec756d46d4528387df6eab4264ac509fb78463011a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52321c3d0146fe28aa93158dc749e7374
SHA1cc04164bd6f0a6557f95917afd63181856b89f66
SHA256cb5570e5de62c9b108aa6e7b75d4b84cb9080c4baf233c5ef094f8477ce4875f
SHA51227ff3172f685802d6d35ad6acf956bf33eae3e7fad83ccf66ac3f820734c9116ced0dec389579acace8f5dadda494a9d782fbade3b5a2aae9c05152af31a4c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789526a3ab7a24fd6fc5545aa033025b
SHA16339b54de0b2d527dc429cee0f3dbf525fc0b920
SHA256c4469d30b6c21ad548cad17072acbfb6519b439034a3e4f5e6d4590877286d1e
SHA5121fda306f2b01a863c5e7b6678fd4f919c0d3bd0c84aa36a7c1e2f297d20a70951f048fa286b92510a44b6ab0864b75988a34aeec31cd28d671d3da18f9492272
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b