Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
ac31eac3d07eba990a2860a29b505367_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ac31eac3d07eba990a2860a29b505367_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
ac31eac3d07eba990a2860a29b505367_JaffaCakes118.html
-
Size
275KB
-
MD5
ac31eac3d07eba990a2860a29b505367
-
SHA1
14595c018094fafaca7094083fa156aa9aafa953
-
SHA256
3f9e042819f35624bd6e26127cf0ec15de4ece7918c59fb927a9150cb2cff22d
-
SHA512
11d6c630b50da0d1467d41334c9a3c3672d6e8103de72f0e110b27be229545b02015e909b546fac06c41f04acba193932415225b01b4382f2014e6cffc6c2721
-
SSDEEP
3072:QWjrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJj:lz9VxLY7iAVLTBQJlj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009fce30542ba8644d81f0faa7fed7bde900000000020000000000106600000001000020000000ba1f8528f47f4d94c94da9d2cd2f0e2f32a3bd6ef10a3333b17173150ebd1753000000000e80000000020000200000003b56cbf42e2cdab5f9aedc68b593cda1af61d80e8ab25e145f7bbe83de0261382000000051ddbfbceaca21218804fef26982d26eb10c285ba38269fabc536ed16233d6ca40000000db845516ae436f07524749d3afca525346d3f8bfd8ccf6c02df554af4d9ef37814477b72666fc0353447192f36eb04a2807a08de40742ab8a8015e38e1fffc56 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E69990E1-2AAC-11EF-A3F8-62949D229D16} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424572624" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e07839d2b9beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2972 1976 iexplore.exe 28 PID 1976 wrote to memory of 2972 1976 iexplore.exe 28 PID 1976 wrote to memory of 2972 1976 iexplore.exe 28 PID 1976 wrote to memory of 2972 1976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ac31eac3d07eba990a2860a29b505367_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565b76d50cbc19a9f445d0747ba1b722b
SHA1950ea2e69ca118accd2705ab1fa935fd97bcde0c
SHA25671490b9f42011d6435d58006fa8129e22aa4bd7aaf632b8b0ae498d780d3de38
SHA51262f3905c3409802580302748ca039de1caa79c243e98f19078021bb04f8ab9561062435f0d814147ed5309afb404941b6f42fb02b65019da2ba16137f79135e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d744817f291f2a627189ed985fd458
SHA122240739d09361426ea141cbca9b2a5141c87731
SHA256c7fb81ac3e21b1df28731ba8b36eea4654a0778836c1bbf0d0dce100e289b8cc
SHA5125e182e3ca7673d74f2fd4ac383c2e59560dcbbd932b32fad1bcf170e09812044b18efc057b8c89cd496d37c4979e9a2064d46322896f3996c7a57b08fae82544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5941774438cbebf419620f65ca72ec848
SHA12dd3bea335e4a835cbd424491362a430bed88da7
SHA256f39cbe46f2ecf6da3805299f4e06071638a1719b4d004c78d4cd1bb6f62f87e9
SHA5124cade1b414d8b2596ccb13be43a46def72e8e49d976a5aced113ea614fa59ad040517bc865146b17e792ed4f76be9ea3696ef52333f051d60ffa54885f551b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59147c609f59bb5c05e9edbcf6c35ccec
SHA162b173dc5636924a94bb5302b122c41993fc1a5f
SHA256c054e148f02cc8d3b978559bc8c542f0b34109e6059aca77e41d3de1abb337f0
SHA512fb37155f399ec64b5917063bf55acc0d38767a28a4ed397378c03da7ef2fef05bd38e4659a710ffdc872800508501f0fd1072092ccc09bc732ae73c96c812069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea02adb05fc063548a988c11ab53312
SHA14c620ab0e3920dfcce7489fd79c63f354dfb8e0c
SHA256557f5421687bf980b16e48ebf5cc6bba430f2d23590c45b30657149db7c20d66
SHA5122da0e83b5b8fb09166bf96b99da5e0644f3e134322164b3e4a541b4d4d742b9c88e8d91447e6407f50c633c172a08c509b7555722ed99f9ec268a1e34c620327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5545649b2cf883065f564a357e4b3a187
SHA12a04d94b12ee8598604ffce7186978bccec8423f
SHA256df249717577429384cc418345714f29e2bb0b7b0a4162867c936c5983c19ba6c
SHA5125cc2011e65e5baeead893804061c3b55ebd95b7f81904bd94eef5eac6b54b67bec851c008b41037337120a53d5a25c55b3005a2e2e608c42c80d6fe9c9687051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b5f130051228cc23df0497e81ea38a3
SHA1840f41810ec4e3ee21d579d7d162d4147fce95a6
SHA256b15281ab56732b003f593901c8f2d1978e78cc75b12c28a0d5256fa753a64a89
SHA512abf147e3d3d4c54e50e0a4bdf9c3ba2439ac3876b89fe0189d20d55cef07bb1c60af83cd397596e5c624c5c4b6947724590e856a2c0ab3004c817f2324ffb173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caedd8252240d1ffbdefe5f72305121d
SHA199d4f57189d193c435e0835a4d3bb640cc991fbb
SHA256a1dc91c7d0df34d4cffb794bf996c300cf1c6a2ad5b8ec54674b45f89af2b76b
SHA512412f3da5166934592ce75d6b204cf85548552c24d0fd4b2f5b35d31109392c8923c93b76c9ffca4f792f0f307f64e93afa516804fa6e103ceef72f013aa4744d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537bcb80fef290e499bd0c9b7fa956b0b
SHA1f6719433bddbd8242a6481afa72281b741e6e3a5
SHA2568194bc7fc8edd28edfda1a02a3d8a9a8734dbb3c5dae430e8b2b867c5442637d
SHA512f7e6461f6bd2bb688f0407edf06fd297d680f772203562070c991d2adcbf4dd5c0c0de257961b5b1ecf5b633d330afb3aaaf389cce73d75ddce562b5bc8e33d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502564263a8ee23775bbeda7d9ba7cb6e
SHA1db8d879941ee30f50b6d1b75c922985e8dab3dfb
SHA256f3e27c08a0e617a5b99bd35e1365e6a7db34adf70ea6b321419f7a2fd8507489
SHA512aea0dbdf7488ec2186a719405f7dec9ba63a79b930e8f7d7c738b0dff65eb47087d81c86a8aac3330e860d0dea841f805f6e5282f009c22f996802c0b2f689cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b07ad26d8faa67db28b3591727fc42f7
SHA1e340a2500ded28c5635992ffe872a212b299d60d
SHA25653ee5cfec57bb2a39dc00da736714dec5d69329b6ef0262fefe0b67080df1336
SHA5127fe8cd05949b4351d27ecea9b06a40b46c069a64028dc3aad37f1f5ea97b1bbed457832d91b9577e01c32a04549fe3953cf7b7a2558b5d797e24d9e74834df45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c62b438f3aebe1cd414c0de94a6015b
SHA1aebe5ef79d102c678d211c714165795de9b104c5
SHA256b640f2fa08fa53ea89937893fb20e57786fb8474fe680bdc2089392932495cc1
SHA512add6a0a46840464ac5e59174f3a24007f2f816f3e3b2e00e2801205453bd8f623a613ffa328de297d114c966cffd5f8004b02286e07e3c5f0a14ba2541751c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a5d4957421564fb9e6adb815a395ec
SHA1e3a4d884a58d63d7ab26e4f585d07003898d920e
SHA25608f056ede0b69bfc09e15ac796cd7dd206d07e9b316e3d85760bf650de1f9ee6
SHA512087f65b05f75473ccb63da1a62dac3fb37077ac01895979aa14b13357e15ce6743ae940b435efbb91b04271b116c1b1fec52c1dde41e691f158a249874f557c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f90bcd203ed73e8064490d3660f6a0c9
SHA154e6e92b9a66090868cbe7b45c889fc257612f68
SHA256936d8b02e274e2f27a10d64c8b9e7c70aaa1a5bd6b860118ef1d0c1ef43b58e8
SHA51252cad929a3edf1c682aa267a49b28c14d9dcfb9dde4a9264a284cd096adc6ebea514aeff9d48e2383b052df3b139548a2f06e11f84b7a3789ba8518f679a7577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b839eb8153e4f7f503e514c01b151ac6
SHA10621f690fe63b3f7326fda917f17703dbcee680d
SHA2560c0e2c81f804478e0aae461f5b2183567968fb9175af48d6f41ddb7e3166eb10
SHA512cf5344794d475c7839f235fcc7fb4dffefa11f716d5b0247ca4941c1ae6659b829b7ca4d739bc566d3927304ed133d470bf752072d41bc61c94440bacb99c66e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a73f05b0b7cdf4ca52d4c057a5b5f038
SHA11f072c3c5636f41cd5e7b7f9801b8a387f61b1fe
SHA256a312a3f5599a6d711ee4db0cd40e6a09af4689462772869e589fc8728de9a84f
SHA5121cdaa747adf7c67c621370e9571fc00f4f779ac4972c6845215ac3f067ca5b831a33f47d8d170e07c89daec8b879efc565e381876c843bb7fb1e6fddd8838347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5939df7a3e1459139b77ececa1d7be229
SHA1f49a2148e2533e70c8eb16bab9167433ced1f88e
SHA256f548bb2626b95c6ed61581bfe6340dab72412b76f60ebf9a1d3b2673bb4bf972
SHA5128f8e5c4fa4778cc324be46030b268320682d552a5bcf1174852f87dbef14ac645ac89e002292e4bd5cbfad63e64b0d4c0c93e6fb73b2d690860c51c8d66a0b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e4623591cf933506dac88cfb8897462
SHA1716102bfa3862d232208cedcb3ea81d38380731b
SHA2567cad9bacb0da41dc983d5482629206cf861b7d6952b43f7183f5149dc187d42b
SHA512e0964bb8bbaf7ea7bbff0e5486d8cefe7bbc52a36dad1e47579d57b4d2897252396fb8f608f548f073fbc1efb7e120704a5d5b7cda9e1791e5514ac94c804336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657fbc0a8cc8c728a71f344319c86dd7
SHA1c6dd9cc1bb8ef1c599ce0d25f61c5c19de316b05
SHA2562eb3dfbe5cb7822b09d4d42a98d6e70c9ec17b2f7e1c913c757a133435201918
SHA51277a465058ff965dd19aea9bf02c6ba9ebde0a988dd39b3d758e633bc4151cc190e756124f5ce725cf32dc101b55b5891230389da665ef28a5109b7064010e5fc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b