Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 03:44
Static task
static1
Behavioral task
behavioral1
Sample
acc7e21b4c6b55d31156cf66c291cb0f_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
acc7e21b4c6b55d31156cf66c291cb0f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
acc7e21b4c6b55d31156cf66c291cb0f_JaffaCakes118.html
-
Size
2KB
-
MD5
acc7e21b4c6b55d31156cf66c291cb0f
-
SHA1
7a22776497eb6febb912da364861b4bcea4d1ce8
-
SHA256
d31e251f443b0531747075f593932a118444afde79da64bd6609127adc3a5d0b
-
SHA512
ff04b60ba24dc8248a87b7426889fd1154a61188ed0fa24969c80f7e7ecb06fa2d7899e39165c5a0123d2cd6b897de482d1214b90a78487374f4a8a744f77a0d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9E3CAB81-2AC9-11EF-AC6D-CE8752B95906} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424584957" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000e8a0631961e1a599910e80c83d5a7889cd96c3e8983178b2c4a2e36fd3ab0d0f000000000e800000000200002000000043dde7eb09fd858600d9b9ff64dfb0b22dd75a69a40971db09837bc3cf5f2c5220000000a64a347f284f59a9fba71bed846ac41ae6ebe19ae9fc15668f2581a2fc99b6b34000000061c74858ab625213e3a44c1d987c471b3d2efae907806a788a988864055da7afbc3f4805267ce56f6614db3a22d31d430a90366b80cc8148bd97493f11cd275f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05dd472d6beda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2252 1936 iexplore.exe 28 PID 1936 wrote to memory of 2252 1936 iexplore.exe 28 PID 1936 wrote to memory of 2252 1936 iexplore.exe 28 PID 1936 wrote to memory of 2252 1936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\acc7e21b4c6b55d31156cf66c291cb0f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5025afd1281239e9d26edb079b6992278
SHA1e29d921b294f77cf714c5d3848f6f68daf7c9d61
SHA25633efd1adc723d78ed69f290e8579252b5e226ed2e53a5ff76bad2d1086481071
SHA512f0a58dc625ad4c3a5b54be5c23c9a1a7c91b13649568cd555d14738781a06b2d3b722db81f64d762f2304dbb5a95cb94c08ead91479fc5bce4e0a81da919e6b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bbd2d8ad1d41a4f0f0e19a17b407b10
SHA19ef755c7fb3896f5c997dbde7d3a08de1163ac62
SHA256c74292239e0d7b865bbe5e484a936d9a9f5c169d890dde6331ab01f1009e06c4
SHA512b305f3cda6374d2ff32e550f8f69611a07aa5aec9ec8dabf7d377252f12681c96b2cb39be2c74df028e26b4bc12fe310c6279bc1932375fddc6ab002eaa1dc30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5893603ecee4ddd24310d5d6b1ebf05a7
SHA162aef58d8fb136ffdad323ed510246e61cba1a86
SHA256d7d4dbbf78f0be3822aaa21503036a7f746b6ddbc51a9065e40365119521b024
SHA512ecc17fd0ee86788c428c0c591f33c19935b3cd6f479a30cfd44660b8578c39b5b930c487799a7d63ee6ffea17c9ae9fbe498f91a1febffb7f871bd85505bf421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b53918f7733d12a9f8524e46364bb121
SHA16a32fcda7f279795afbd0c3298d42947d942f91a
SHA256a509fd399aa3d996957c01b0aa833bf0d4da95540ef6297a0741a8cd55f20107
SHA5124a02e7e18a89497934a9435479a9a4f82acc2170ce16a517a3d01723882c57b20667ed69a8e43fdab4ddcf7d5ecd07d861f3ea86a6f7cc019c384d0f1dcaf0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e26f01ff63b689193abe4a6e84aa5a
SHA171bdbf6c4649f151bafa6e27cf2a83887a63ff17
SHA25698f51d4ac33d5f4b1bd25486b587ffc257249f6b46de50cf3e5909a93a05910e
SHA5122541bd4a6374818f831c63f6289d5e4ffc0534be396f04b379be5034945bc528c07dc1a62e8bda73ae1cbdc2318c2f855a28a4b7149ce97db660caed681154de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c05536cc2a02c199a2c67eeb1a1b702
SHA17170648199581331128079c0207672df51dfc3b9
SHA256dee153366d64039c9f3024e01584233bf7e66c1bfbd1fd5b359b6c7c14843daf
SHA512b4f15bbb02476aad61fda925d00f2337282b650e3324c8ba9e7215e2e6f0cd4904e565ebd939702223488a90a9024364ed3cf82956b8593ade1abe2e9e7ef70d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0da73017fd0e580c6de2040825b4923
SHA15216d8950a0f357ffb5cddfe8d9e004b19f35159
SHA25688e14d865bfefbb9e2e53ae769c1162223477e73f6c8eeafb4b7b1483770f946
SHA512cbb06ef663f52024edd156e4c7cfbcde4cc724f7b6a12f6a7df4ac935af14e62d8315c60cab52b87ee1b451fbff73c9c9d0a68d5c9628f9cf00adbdd2c225fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ae4e3c2bf5c97b8fd989289c097e00c
SHA11bdcd44cb6dd2b87b9ad2a557e5fe9df2bdea010
SHA2564963d702a774df36b82b6c9ff28e2165c3c7b3529c73597372416d474d1a3a2c
SHA5121ad84785691518b203a1e303e891e1dc2d76dfc36078dbbaae4d61bd3d5b469b16f5c412acca3ba315cef9e01e7c2e569b82e55f2164585e0f88eab4ee406bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59afd1143dbefb836b2f652dac04f87ad
SHA1a853c06c5506cb991795e386e3b811e6f65dff99
SHA2568c09e4e3b69294d3e749629213cb94a3e0cbbf69b9cc4561c3bf73c3f74ed606
SHA5121c93beab36cb5a0e29af2c5755a8af58ff3de9aa8133ac6a771985ec68f41260dae700d8b1dfca03c1cb4dadc4eb0093b2eeb4c76af734c1d81023d75c931fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5171caeb017dadabae29eb12e8186acd1
SHA1d969b016c8dd12baccc8ac0e5cbed77e101600e9
SHA2563ca122977ada00a87b27b734f6340867f45d7bcfef179daa4c84d92c5b6d6462
SHA512d1b17949ca65176768bb878e8553dacd30acda7bf3aff81c6020364994746b728b39d5eaa0c36fec09de507049da3a044212dccafcbf33c646c00abb59937c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0be65ed0e3e75fa59ddf298ffbccfa3
SHA155fd3cf53922e47b3b34c54c92e24034d399122b
SHA2568100be3add676a7e04f68cc4fb017eacb6fc01a7e4f9cae3aadbdda454057bb5
SHA5129a60c1ec8338eb82cc130483c1a0a0a07deade338104f0f491d0fb97b9c092e9826d235d47bdb2f3116aa1d7c1cca80d08c6840a26a73b0b4bd1ad3c5c13c8da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1421d72be5d574e22ccb921df49d06a
SHA1e50bd954dbd48f637f62c1d4c1b452b4028d2815
SHA256ae4b029877dc30a55f04ada29e22d6cfeaf0a4b0478290c01c0eb92d21d0c203
SHA5126f12f6551bb72f1a90e88e7183bb8ff53e91103ac1cbe3c39d0f09d963467ec6b85132b67e5be487fbe0908ee1766de22b612fc98eae9547f568988d5981bd78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5167eaa131576a02d776a56d763c0fdb6
SHA149ced7e907bf4e77cda196760a83ef66e99c7044
SHA2564d9c75616b54c7d7632030f2c5932bd90efa244f3fb8892180fed2dc69020e81
SHA51210c01ca959698442a15560558822e9217efd33833c64a3d8709f74de64482e17eb55bdc68e36be13f2f4e6785e2a6a6d08ba8fc1f546d4036a42e39b92c88da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f72fbb681e23a2879ee8fc8ff127f88
SHA1e2d0746d21354a0fe42ae88da3c790cddcff92ec
SHA256cb29c23691a8029fae4a9b3365a2a7924c68704f206c75d8394b4c02434fe629
SHA51250ea8c26df12f43bd6536fab4621d929464eece2b4d3056ed63de51116b1f2bff321502be1132eec52a60c4cfb0bc3ff0d21af0063396125a765eb7df0f266c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2071a7f4002dd1230616b9021c856ac
SHA18f3043f0272ec03bb28b86108824a9a2f306e8d5
SHA25648ab14883ecd44e65c6fd8d28544756eef2610fc00ed4d1d89246af05f7ec01e
SHA512facb6ad297f7ecb9d161cf62798cba1eb50abbaba273519fafa6c93657d0b05f111114644bfe55270f2057926d12487ebfd463d12293d906a334e26ed0566ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c842cdb432970051b8aec71785af6cd9
SHA1c378093d2822d56a2c8d2524f958e5b0cb7b3964
SHA2560622a45db8f6f29c769dc4baa843b86cc1a75b194f7fa94bdba063caec0f59e9
SHA5128af800c2e133a57d7217ea6c2543a0faa01f4cc8edfc4d605f76d0a883cdc354718cdd10354c3354f94c9055cf44fa3d4bcb6625b0009c11aa8860fd12663f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5405de64c1e5b3e01801c4579890881f6
SHA1e8fde7af179c901bd82dad0cfd66caac53de9f87
SHA256ebe91ea0da94f730b065fd854812bef08b5e7eab258bd9190d376955ef1e4a68
SHA51222b3ed8b13ebd51010ba9cca5fcda6adbb9be686ecd4332a9782a1ddd7b1c0468076f58484865fcfe93083eb66d1471d93e9f7a6ea0783eacaaa469b2f9a6e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5addc0dd754081e14a86872b3598a3b17
SHA177df286a70ba4819866d9be981fcfb62b0630c3a
SHA256291d4959555d0a049609cda4a9e54e97517d55ed3f7e35996e84581550bb8cc9
SHA512cf0c801e7b44900acabf6aa99867a8ed566933f2270c9faba5022e56869aa8030e2359c508e32d05f3cb40144bc9785c678bd37c8348482e0bc4aa58eb509fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abda24fdf420bb8f231b9fd741e6e4ae
SHA19cd89d24867b77df642ed07711a0c7e2a21b7f23
SHA25682e3cb59cd88e1b36c38c4dbb9ba27125540ae4563e3e03f2870245ae2a1419c
SHA512e558df231719104d9b74195efd04e47a7d3217f1e63b4de98b518871666a93bc01e607ca4e92f0865ea06b6445beaddb42bdbd680c6bbe3124243ec5ed79979e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5058b028e50b3637dcdbed806fe743cb8
SHA1d70ab562dad94b465ad246004ebae2d2d11bbdb6
SHA2561fb32da4bd2b83ffd3eb81b5369dfef257d1f1fe8ebb4f989a5de941d5fb87d3
SHA51255cb4cc1406525d493f4f9269c20ff0aa13b7c09a35bb2d6d18548d765e20a2a42f330522992af5abed36b1e23f340349370f933dfce866cff38ea962562f63c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524874945c587de44e584bcc6012b2789
SHA1b8f9748bee83ebf4b136c4d2fd038a65900d39e5
SHA256e922f7ee1eaf96193f419536ee1622e367fdfd8385951f4e0f0f7d37a16a1290
SHA5126150760df63d6aaa49c6e0b82fb79e210d7d9b99f25038941f8d5552bb85fd1e74fd4d43ed2a27abdd8638f877dc98117d0f538a9fd39e47a23a77a2bd1090cd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b