Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
acad07d2969f1840b123309e96d1f84b_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
acad07d2969f1840b123309e96d1f84b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
acad07d2969f1840b123309e96d1f84b_JaffaCakes118.html
-
Size
120KB
-
MD5
acad07d2969f1840b123309e96d1f84b
-
SHA1
d40d7c3c753ec9bec02ced6268d253aa69a7d938
-
SHA256
a82e9b49991fa4161259089b2c34a0a2143a0a4e52c68531046d4630092c18be
-
SHA512
5ec221fd80505a8c33dad15141ba2f4091e1b2c70352a8963b1605b1d59a42424e96e0d599bb0efbd42baddf8f479c9da4f5d74592343d861a96914a275af2c8
-
SSDEEP
1536:AsghyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCW:ApyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B5A2151-2AC3-11EF-A85D-46C1B5BE3FA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9083e31fd0beda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424582245" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000007b4678b37f698e1ac56fde6d413daec1fead9eb893397e2e5ae33aacc8007649000000000e80000000020000200000006733e45392799a3cf7661deaac0a7a0d91524176b98d25ddab74a0c8768a8a092000000054fb182394847f85b59e2ecaccb36c1bdea9a1ed69031bdaa14e0373f6da3b47400000004074bff63d1b73142fdfd1be016c72d286dc62e4d0e54e3568b3cc81295fb4ea9f865330207ea9b8cceb560130a1b36c717f16455abdaae73db02b06369c0943 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 1088 IEXPLORE.EXE 1088 IEXPLORE.EXE 1088 IEXPLORE.EXE 1088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1088 2220 iexplore.exe 28 PID 2220 wrote to memory of 1088 2220 iexplore.exe 28 PID 2220 wrote to memory of 1088 2220 iexplore.exe 28 PID 2220 wrote to memory of 1088 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\acad07d2969f1840b123309e96d1f84b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50859a7084028d28b2305aca2f011e91d
SHA174d01e2c69e089e6bcd7dc027b125e0683929955
SHA25699e2c8586f777e5bb962e2d1f5be8e365799c1c0777a6db30e3c37f4bc4c7d96
SHA512d0e06f2e3f243e0c47d31362495f2129859aef3bc1523cd678234bdb66148b1b67188675c8d06af8c06755d44118424dab56a46484f107e08b836de0fd57000b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50482fa8cc4f58d5d7974a61e0ae800b1
SHA16877bbb9fc596ceb7caf0ea93aa2019dae5b2df1
SHA25667b41d25676d8e70f199402eb54f2ba1b766a692ed81f06038edd568dd01f67c
SHA5124e1884133b8328b23eb4f0ca7b4800ca95415927f6e2d95c9c1c7186084aa8d845a04c97dd584061b637d330cdb4bcfbb6ffb53de1b61db4af3a1944db48ab6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa52263a275e56663c76125832275b8
SHA12ae96abb7474bd92275e8329ed88c46f4bcd0820
SHA256b5ccfbc15a3bdf39948d87b7770bf473dc120c2b0463fe51f9ed8f96a7f7822a
SHA512ad45628f4a2c41938a3e089f87d0358007af790dcc5f621f01bb63e39a31e2a217c34851b1e2ad7d5d7256f27a49124a5e3b9909ca9ce6bcae30002cbc4d7f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7568c37fd9b5628e71a2b42189b7eb2
SHA16a0177558ebffc2ee9c410457e14fdef735a439b
SHA2566a0f89869217cd728b7cfd53399a8ca49fadd3e1eec1cd7c6886faf31e53d2cc
SHA512fa1621e258d8938495023d669410f821bca5e39517b4b3eceb0a28202f78a82e94c752e7bb98bc93234ee15aa5642409b9854ce1f3764f4d6ca23dd30c1a2306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fde5638b80030134d1e4e04b23f7c648
SHA1a669d1ec949a0f5a24de9a4c7035820f16f4f39b
SHA256c280eaffb14499e537b75af7f59cf58d3d469c9a643fa16e9e132723333c0b78
SHA512f8406a65bf07a380740b7fe7b14ed11361f5c71af4811bac371ef5d0d32ce5f65cbddd1bf43fb50f3f4999e516faa60432f7b1de3147dc525b1901e330729809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8d50792b6ce81b2d5831dfd7694501d
SHA1d915aa98ac777c87586961b4c70df8e3dd85b4a1
SHA256208781dba376bb227e6db1a3e92879fdba7302c8f4e9f00366dc9f9bde58dece
SHA512e8ea0ec5d0d46c8c8e96411fa479392edebda0805e246e31cfabcbafee769fd6a892dbdd45fc1ecad71d4be95aa6a71e935ade52ba47256356e27addb3233f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596dc83b41c41b70675a8435eb2799ade
SHA11896d9679f824f4be8e77f5a22285208df9a0094
SHA2562bc4dcc1b79ec3bef90345c52d920944fcb42d80be9ff90c9e273a9358ad4c9f
SHA512ecda9264220c3c82c3436b20aee63209d13e2cebacb7b4469c984892742d2d53a3dc5aad557418ecf3b885eab9ff41684e90f304bea0f7912188eb8af04a2f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc40c9b228e3ed9ab8ee0950712e9356
SHA1f8550797d136412b6e7fa7241be7d6fefdc6e82d
SHA2563459b19ed9612a1b8d0d7baa02bbb3478d337235aabb691797cc5d6259b67371
SHA51211a41329126e696f4f17b484af918b6555ca3125e291e44750b78649a185f85f429da9e5212486cd98d76bce4449592b7ab5f9b6cfc0ae73dc117c6f25f28a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ec6f8f5e426a0f2b7868c232c036102
SHA116e44975b547836a78967a2351b2d7397cbecdd9
SHA25604595fdb566e3211eca07cbfa58b077f5eb68243023cb241fb8232003a9d0d64
SHA51227ec5257eae9c288050057be2f092c3b968c5b7ebd80243537636f46b61a2a0a568b09714404108e2c60c084b6cce222aa440e0ae70f193d71c2e703841161fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c4eb0d309c9c1519f59bc6779e246a4
SHA1a6b407c3245b40c3e10b4f1f0402b361b0850070
SHA256a5517daf825ae768df8bcc128c0bbcaa20dd3d4dafcf4696df73e527115c6def
SHA51284dea731b220f6acdf78e3b40a57bc4555b53e3430e018281e24402f654877f7312a0059bca41fdea7754069304250e45f9c939b33fb1908392612cd968e62e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522196eab509131e452fff07e2fd479c6
SHA10f2de6cc275d921a44ceb080314aa72f367ae18e
SHA256edb5a750ea8b84384dc40ec01a3ec8549e4ecc534438a689495130d029c6878c
SHA5120e5998d3c8144005c5785eb2407ea1d83ebca9ed4133d5ab12094280261470c906c3e6ae95d4b30d02eb2a865bf0ee40aa0c263e80035aff17a4fd8660e593fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5cbc41e8d9cc6a9a2799d18a7cd5b57
SHA1d772c36ffdac81c975a43d800ab601a29427cbfd
SHA256d3856f80e835cce22d88b54e28951a8d303d88866143844b455a62e0a4d031fc
SHA5128bb604a4856efb88a0ffdaa8f37c31e307acb418b434ff193a5925cbf5db5def2afbc2389d4c80e2939810caefcc34b47138b8cacd4fc9e9d36d434f995d8059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0f550cf69c23b9c55ef961c45097ac
SHA16df0193de21d3a3149bdd26eedf10618a1d21c4b
SHA256e7c0f5e88f1620a9dc71d2ace54a63b6ca55490b1432ecdd45ab9f6250b1962a
SHA51258863dff936fc4ff48e8b2c9b85a6777d56e9adb687a7968d814641f6975eb40d9015f2f06fe41c0c047bc7ea4d8f7050f2b6cc26a09ef5e7196c8963d610369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b30b9c1341420d741339a82e1c86b4e4
SHA14ff32b251967610d78f1fe9806978c850e826618
SHA2566d0b2837f17d0108a518a0f6debd5e8e131032983bf5bc9249fa4dc67629af4c
SHA5129c28e202b06e11eacaf8447e341e4620aa1ddd145c3b2d70b79a5a7eecbae036aadb33c2e12000f443e090e5952e5441b75f6b9aeb9117ae09a2840baacb02b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5365c3daa5098c399c1488bdde0738e53
SHA174b86a9baa4d5a6e0668b96f19659eb002eed6d5
SHA256a136af936fc2d8c5839aff5c13a49a11dd777776bb4a6405bd6947350ef53227
SHA512c550a208c0953922fdf5f3b4ca5b91528699c5a42cfe727dc0ba63a2413acee11670e9ba3e384dc34a8bfaf9ce61cc5eb8f299acce1f7d1548b76862005e79d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba4648c8344e8a3e66dd874759d6896
SHA1ff64a25f4602c45cb640be25763f0914cca903a7
SHA256a6c8ac47c0eaab86aaf0a407639ebbb9296dfa588489f20038e46ec42f61fa97
SHA512118847e009a1334ccb3ddfeaeefad370ec6fd5fdcc96907094870a40d67811db6b9e093f8945ca8dd9bdd5f4805893cfac773c4313b62aba6d8aead927762be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583393336ec30a71fba3acabd3c27d4ce
SHA12ce41f8414fe850aa95cd0c4899f5f553ef544bb
SHA2565747700ca4de98991d87da152483b6af6d4e87d153c3d04a647bc2f0a84028be
SHA512f392d46bd85baebd2ac93cd8c71e3bd81d8e543f7931e53c02c9a7724000da640a6cd51c8f325c7f52934dbf139b000a38411088774d9e02a8a923cd318a20a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a420476007e198f25abd9cf3962ce37
SHA157ba39fd03ddad68ca7a4c3583fd69e6a89a4d8f
SHA2567e43ec6393e1a41275355ca370ac6bab686e0745071346023137b026beb165eb
SHA5128eb4ac993c1112c65132d1758e76ded96172832ede715a1a4ff8c46c7f0f96aa623b3e673ade7cc06ed9d57974b5200716f215a332cb9898e908d704b3976f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc0cab3aee9a5a9063faf87b7c1dc4f3
SHA179265b26945a4d7a61910243de5ee8ce67609e80
SHA25620514d38ae5164c58de51ff50da8d99f4f101e7b5f859e1f037c9f2ffc009339
SHA512f327c853177bc3700e172901f1958281cb4168a36c1f39fe384d4e640405b181cca18e2877af424e1bf34d04d7e0883b6ac122c398512cf18ca6afbd08059ae5
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b