Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
ad03eec5cafdcbfacfcda80ca4204c3f_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ad03eec5cafdcbfacfcda80ca4204c3f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
0nAcR7l8nt.html
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
0nAcR7l8nt.html
Resource
win10v2004-20240508-en
General
-
Target
0nAcR7l8nt.html
-
Size
263B
-
MD5
5a4c8732267e83d232e78e702e29eef0
-
SHA1
a9a86a932d1c870adaff5bb59b021868322fd7b1
-
SHA256
01c83555b9263f52b94e19ee706c33de8d31005467a405c9c2b8510a781cb545
-
SHA512
8a6f5749c89fb230dac790f62fe72bc855d60357d9cf01180d5677ccac962905661e4a4cb12a9db9f25b73af4b6dd38d96606d3dbd5f648d042d3491a1c12354
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000006e0c0f1ac420644a7471a7d1a718f3900000000020000000000106600000001000020000000b03dc42520ddcb7bd9a546eaa6516d58f57d147c8a633b2ac318a0d6aa9d32d4000000000e8000000002000020000000d5bbc25146da03db3a029a777307965e999c94ca52a03b511ce3945e024388b220000000d13bdff1d5b0cde184bedcbd549d85da4b93b798007a07627ae4404c81681cf140000000464a0c01129baaa41bdee30012bb9bd6e12dd421522b10e85f539d7369c7fc9a4de2405b8e4647e95e28a5c208830ff8e2d48d9fe31f6fbc7ccfbc6c336bc1a9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424591452" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BCF40D21-2AD8-11EF-A304-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10dd4d94e5beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1812 iexplore.exe 1812 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1812 wrote to memory of 3004 1812 iexplore.exe 28 PID 1812 wrote to memory of 3004 1812 iexplore.exe 28 PID 1812 wrote to memory of 3004 1812 iexplore.exe 28 PID 1812 wrote to memory of 3004 1812 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0nAcR7l8nt.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f52e3be019a7494dee45bc8bfd2cc41
SHA18c28c432a2d8c0c7a28bf722fde89a5ffb2ceb6c
SHA25664e6e0041284a6cb40a0045ca988644da8fce099dcb49af276ee39297f2df175
SHA512eafb3ec5dae34a9d1f74db46f2590d332cf1491852b9a35aeebcfc59b6cab457246d2ee74a8c3201ee08ca48125d014220b9f3cf37fb0c96724c7793051101d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a4e488985f0e438d6ce1a8e2f865048
SHA122000df007ad8355e3b0570532512816c3961002
SHA256290825bb4a0a579d20dadadc568a7aca4efb1baa82ba9db8b3e02a0f53bb418f
SHA512156705dde2255a381b567ba4b45bd106942c8f4cf73edbd0f5eeb37aba674c0794bd5174f035f0630ad9fc121909553afe3bc2ad609874b58f12207e9633a103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d6b6db5d320df3743f613637c12913
SHA1949fd0858c732d1d76f3f5ff5bb11e1b2e07c5e1
SHA2566d553f2ba559f2d7127c9621014e80c5fa0de9dc5e2678554bbbd3fba94cda71
SHA512e11cefa73da814876cd9dbc9750af552cf2462ce0f66a0b5daa38f73a5faf76d35c77f753c2fbaa67ccba62190df1801086fe85cf2c558a252eebbfab928fda7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4533be997fd2d00d9bc2861feeafe73
SHA10f6fed6d30eca331af7bcc7e84186db77a273d4e
SHA256123395abc8a9bf52ce7a9d5310d30f202b2f56ad79c2a1602691c3fb500f7cb2
SHA512f25779ca75dd3a74ce03bc7af77350b2bd5a76a66c4519407e3fc993d1bf15dfa3352fc3d75bb874486310f0707e4ef3f7e325cd835d82bf7e57b931b22369a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58afa03de140032ed1fe0cfaf754f3b9a
SHA1a9a5e63093b9bda663dcdde899ab5e4a5a8256df
SHA256af3e66b8e9650ae85a430113ee4657ae7e917e4b93d57a5ac011bd46a5b148ad
SHA512cd85885b0b8ba5048c85d7d7bbbba8f0fba532821f1cda6bb3af5a9ecf1cd343f54b8c6aa8fe00f979faae689b695d73088b1804549c88aaa93a8fc654c923d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a17ef81b2677a7e3fb6278206a66064
SHA1317f664b0d995dc40adcf3925626473555189b3f
SHA256da21b68fbe9d4c149e4f3ffc8dcf59e6f44d0df67e39cf4dee4918047c1f4e56
SHA512d920a810ad83c18eb934bd6757a4784d0d6ba73b17084d89a3cca7701bf583ba8ed27f6fb517330cd6a714e22f68923c3af56e65043b43994d538a5f61f7d21b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eda7153a304b916c10ec3c71c55a2a2
SHA1b916f5f9894983623990f4ee01ca02ef3c083d84
SHA25678b0467da52aaad2ce11d41043f05ac1f4aec9ea5b7a6113fcd4d1e3ae8a2558
SHA512d60182699cb240a89e5a15288cd68501400ac2a8f3a53f38ccab1086cf4fa9cf35b42b9d4f5c5533eeb636c7f913bfad234df3aacc679f27a9c644837834ee42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546cae853f2f1b39e3059982b29acbc97
SHA1e52892072a4f61d54847e9f0c15468ab6d05a001
SHA2560c12e24032cd9e0ca0b3bc943b1c0a16334ea65b6332f43a79f5be6b87e98782
SHA51211b57902a3c9924ffa99219e660a612cb294ad1ade02b9d9e517ebaa35b2bdc21a7604188b51457f7e96e61f1f83d11cf17ac49d0b47e181d64eb1123fdbf57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540cdafd22ae5320cf4ed2611991a3b4c
SHA1870b6ee9faebd335e376f0ee11e88d7fe763c6b9
SHA25600c451a77d8251423e845a234a9634809d58aaafc866ce70d6a642dc1a3b68e7
SHA5124a38849a8e2d5dbbf3c90c037c43d22f4ae5dd05baae5277363b1d3d85b73b1541f421d429cdd6b8e94fe31362ed3a9f887c8536ca300a0d239515dff6d6a331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c2cf3a2ecb528854de886dc0c9c92b
SHA1e9581f55d3eabf3ee62dceabc940665ceb2b3911
SHA256aa8c0b392efe9f7374d1566c661354973b297c497fa8f7083b78ee30276e3571
SHA5125c99b78dad90aace4d16ebf31249d850bdbf44f0963f53186328774ef113443b95e9c5dfa29517a6b57eb536d2084ca209e5e28cd236113b3128035b3cffb005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5067b93a4573e87dbfc49b40397146cc5
SHA1fe3caba19e8e453f8064ee85311cc62959bd1658
SHA25656a7d8c7844c4cebfb8d23cef6c3ff90b895fb49b6802e34ba4417ad6322cc04
SHA5128b82d57d1c5419d698e74aa64818046252c2276574bdaad13cee795dd91572e80391a82ec4c322838652989932c54fb9c31421e8285eeef3937d9c0b43a33a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56767a22b46006d4816e19fe5c09bb542
SHA1d3a64d494e36132a1027fc6846090bb48e964b53
SHA256a417ec71ff8603cf15ddc80214b1a48aeb0ce443a3c1c42d0fb5c394520b2c70
SHA512d9ce6a98bce3b523204843414a4c5f0c20dd2f2478f9aa47824d83c614d28baf0df56d7975615b1efd89c773974525f2f39daef12d8f51a1ad71b14307a1ecd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50725b9f303854e121b7f356a34420ed6
SHA1a65157b85ba300d6738fa04a9722c464a97aafcd
SHA256dcbc4dce65860d5d9332e2549839680e21d83493a77fbb0e312d9ad3c35842a3
SHA5126568fa6bdc06819ee21d949f659ffbc6693aeb7cc7e0b9dc355db68590956c1fed60f7cc747c995f131b69fc9f388ea4c17686bf73bb737d4190da3061ff3f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ad225d42be6892559d6e523fecf499
SHA1a6fb563ea3f0c5acc0391a4725a292658675fb34
SHA2564aa415c94d89a0e50060f7b0506a49e9d0fd573017606d8cacfdb1728b80dc3e
SHA512be8d56bb15e7cf872931760c4e104f3e7332b331cece994552fee90398385e934c0dcd4d3d38bb7339d8b1a6c80a621ac477f95767254c6679fb5f0ddbd0a0db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5071e4916a265b7e01acf9f6724e6e305
SHA1eed1cee36fe22b0c36c9ebdd2d05c9928c76fc72
SHA2566818eb3ff083c5e2b0a2e0dc45dea3220490cb55e959e8cfa509ce95c47d3754
SHA512f19c568fe8b9b4cec3e3268791f777ef00d9b7d98aee810b43552e6231c0e2f3380950193fdedbab78f1533f6d9151e49ecdce31e2ff225771171e9e99607500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0eba158a062a01e67e15d51b806771c
SHA12de798ea677d4ac3be47e5636cc636edcf6778de
SHA25682460fe3e335ba4a720a1c3286d45b0b91f59204c6cf019fc0e2b6d2c164face
SHA512d832a603acb2776111b5e75d21efbf279b122ca2626e995f8f5c6f56c31d7f3ddc119c3d3335f6c5814aa0c382dd7f7671f737917f6a1302c66744b7746206dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c1fb00f179e84f58b81056984c44fd
SHA18e0c05845eb04817a989d58c9e812cc45e11f5a1
SHA256355378461ae9a55b9cffb87cdb961d911bb7c2bb294b1a653d12eaa659c86b96
SHA512b0fc827a576b6652b609be390485a8dc3455342699a133071ea978faab8268800f35b1d23a471771e6435d9c42fa2c1458971cadd9f48ab144f885b00f7aff48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ac53af2bb2bb2dc15f291ec70ac32cb
SHA1ce3f18aa3c6f49b70b063828dd5b08a1561db52c
SHA2563b0d486f45757b96e5d19b66c60b533b83461007c5eda5f8ce751ddb5a28cff6
SHA512e97cce1e57370a2102ce3f496a6eda3b4c92370186f3457d79b9c6ea7a4f8b41786ee04a851ecd8251074a719f873727bd8f55285e1356565e249293f5fb8b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589bb2c1584416480f5da458c802b2bdc
SHA1b729b1c3f40a5170bac7f8c74127cb2c7bf931bb
SHA256dfb558b0e89226439b5251bc0696bd515a674c84a1aff5a936110257c0b718b6
SHA512c07047e5096d4b2d1c274e30401d43e1422e5f87f5b815239ca831fa9ede4eaba3e2051186fd535b24120bce1a46bd0778b97e6257d3e00be50eb3eb27a1ad03
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b