Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
ae9267f0e2da1381f5a05edac358f44b_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ae9267f0e2da1381f5a05edac358f44b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ae9267f0e2da1381f5a05edac358f44b_JaffaCakes118.html
-
Size
27KB
-
MD5
ae9267f0e2da1381f5a05edac358f44b
-
SHA1
385e413c2fea12b749c28c1652c5440340a2b402
-
SHA256
66eed2fc153c1ab166e290bb5c34caff87f79d68ad8c621b1232d4259a6aa08b
-
SHA512
d47845e53e3003a33fa5df095f34c8fb42bfcfdba7516663d6027ca4b3294200fb861ce9ca6ac14371e1bd16796246fa0b871ff346bdd117753136984185a207
-
SSDEEP
768:zi9b0fUr9Dngcy3KK7comGP4ywKJZTOfd:zIMUr9Dg13ojGP4qJZTOfd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000009a501b63beb3f8a9e08459e58e57e629aaa57f0849eb550b780026a9ed9ac9b9000000000e8000000002000020000000a7adc247b36e9cf977d01f2dc954aba4f1deec125af5965fe962ff892ea2790b20000000984e2b750ae7726a8622ee519e7e2a73a5e75585e1e3d74ca564680d79ec977a400000000e63d401d4480a7dc8afdb6ca53e9a1c14e1ea50e782ad1f429158df67084636a6747fa7b98f796e40ccc66d6eccaf3a1b751f8fed233591b2eed637cdc5f723 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B84C99A1-2B18-11EF-8875-5E4DB530A215} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509e278d25bfda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424618932" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2016 iexplore.exe 2016 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2928 2016 iexplore.exe 28 PID 2016 wrote to memory of 2928 2016 iexplore.exe 28 PID 2016 wrote to memory of 2928 2016 iexplore.exe 28 PID 2016 wrote to memory of 2928 2016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae9267f0e2da1381f5a05edac358f44b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5805c293c064588c8cb61240913dc6448
SHA11223b7cfe35aa0bb93e370421d38473894beaaa8
SHA256f67dd723b241cef8465d4e1761c4e1d399f4dec8e82c5b4c07f2d23f43dab677
SHA51295871faf1009c2835f97a24a935a96a32b8f6a5eda65b05b666566b00a5f81ad16162931d477edfc05acdf80a90ff313e1dd93232be30760f9a0992fb970d65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566e066a149e778107cdf9fd63b2b4c7b
SHA19468840b2b86029534dc1327f47a79f34945459a
SHA2560bac76ed334bb944a8205f5048551926b343718d17407a05a68cbd4829540c67
SHA512477fafff7f1970422b22bcda815ee27a70b227598a21e7079154f156aed2337c6c6321c367b7149d8a68c18794cac972d91ebb7943c61f3ac7f4692c19a3798a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf18a18239b3202aa3f098a4f797b71d
SHA1144d6c2bc0cfcdc345ed6bb560b9345c929f557f
SHA2563f92d596c173044419aebb51ce0af461602dfbb8acbbabe8e64369f72fbca4fc
SHA512e0b47834fef1acf5390789b7d95c0ab273093dff5f695d63b2294d115f9af58b1c6de5c68778c5284cf807647201efee9acf8272619a6ecc2f44a5ac6fced499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5733b0d650960a81a34b6a543d4104d00
SHA1d9bbe992e281aa5b6ce01814943b65e853c45f6b
SHA256fc8d806e997dbcd8224611685e73cf022f97b2f640182c2591b620e65c7f6580
SHA512c29210f6c202de46d63e371c5b21a4fa8e1a57f7c4a45314a05cb5ee53c78c8cfadec41650ef4397d2f45c12d3d493c5013f1854aa97778f42e4858c374a9768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd35ddd2244d4a48ad45e0bb2b8e772
SHA1dbb461cac598b8334a2007ae54a21a3b6daf1c95
SHA256332622ed062a290d2835e12b38cdb431a9435b540905ba4c7fe456eba608ad83
SHA51231d6749f59911bc6b8f0c77fb3db5b1832ff3a603893c982ea06e2e1b0fb8b6e3980983882bf1fbf80aadc44609f7e34a21f15be5624ded99413b767a872cb1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f545926c9bb459f1b1e8098b7ff41f76
SHA1f616c2dc2ca238532fb2a490a538d1234802633c
SHA25638968e6daf0bd431aed1cb91303303081f6dfcfb3db0a78f941dbfbbdc747e6d
SHA5120dfe763f79aa09f0adf7966c65fb2407724a066626d902320e5bfeb3f86742ef0fcb4931f6de70047ca4019dddbb0f9e2a0e3cb2b9bc815a2210d820b710e612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5895751ba4b5442bf24be69d08aea8ee5
SHA1a12f056ed145b181b7febbf1d7c9204975b05b79
SHA256eb1517676b63ab87426447e3413eb689eca2ef7686cc7b4c2719d40f06c2e3f3
SHA512157631ae620829a27106b399cdc8c6e5fbce9eb738558c9bfce0427bafca701fd3a7b44c2c93f1d219366c9a6c56955cceb73f4ed3d0d86c579cc4e9efcbd174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa88d387c21ee41deaecd4d6c1a0c6f
SHA1fd12768cc54eedde1cd26f6808fc693b0f31e4a2
SHA256723da4bb0f51d3993d09705766490aae9bbda8cf14b870d9fe1ea788aa7a6f12
SHA5120ce3e6c1ad8fc698d1a4b54f73259ffae66792cb3edf4759eec535941e7bd6f6abaeffeaa9b12ea308b46e0cb49e12f12f1479ec1af87880cf00b8adb4e56579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4de2430d665fd8a204c625a475c9b04
SHA14ef5474284b56af639ee80c1ca13937faaf8b567
SHA256e98edea5c35bd91923e857bd10e380a7b7e082483045af80438c8d3d5f88552e
SHA512884b95f318477c1cdc3b5365562c9e348f95e3c294c30d0bb125ee8a22f906a2c01333e9ec45468351b7e1aaa4e5432546798938d3bd6ffb1cc55d7722abbca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5841bc6ea311678afafa933e9e26896c9
SHA14540b90a0d46c36215f07023939f1710c6abebe8
SHA2566cf035587ee416098a5093e29837a453f85b4e53d3416d6d7b66c901a93818bf
SHA512f06ba917071a6ce25319ee398a192500e8ec951b7b1c5dfdc641bd39153e47db34bb35660fd557ff0f21593f5af5c236b8ce397e5d42acdb541ba4ade9c0ba4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56755632943443dda31af3561a23f0de1
SHA1e8420eed14b069fb5d2b8b3f64045ab66a6d97a5
SHA256993842ec8aca41307b4f5b922d1f582cf57430227cdb5173e804d5b062645af4
SHA512ad1c6b3c5a1952f30e01108e3387d7940e5d4353a66a56dabd3beb5e5f399e037567effe255da0b159a142359056d5b5c07e5563fa2b5feca5788f6d562ba47f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d15654292d830c2e96a7303fb6d12a
SHA1fa4a4a9916fe046f97c3cbb397883c6196d17b17
SHA256e058aafe281295a5c497ac846cc5b2c7665fac756efe71126010931c0507ecb0
SHA51226138d28b8c9f62ba2df39787e19e85ccccdbb07d466df597e23808c777b7d7f7ef548e23c72f0c0c46ec0511de35526b29321d23b4ed97f33fb2e5562e11c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a20a7a5f02a8a06dfeab6c3bafd74bcc
SHA12b6b4576e15bf6a4fa4309a5b3def4863d8a8d61
SHA2567c228733bf3eedc5098454f099d562e551be46172f809789e90cca5a11640f8e
SHA5129150e19be6f3cefba4d49c649940b0a6a43a49493b09b45ab1d7e6bb4bf947f798c9c0a323cdb52c9e4fe43ac4e81c98b39707c0c4b2fc225f9a40d042662323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597f1c4557319ece2461563c78ffa470f
SHA12381f4d536a4e19fa21a3e47a7a4e4b0df8098df
SHA2566412931babe95247fd3cb182f28739dc9ac1ee9dba400d9fdbdec57883508a08
SHA512d3dcd4273252a02c6189c44987e9d869ab91507b0f0c2574ea355e0e20944d25c5fc2f3a04e74de662fe8dc02540376501f92e2b04cb22cd308df91f8550b986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbaac7c6d5aded28804491475601e2ea
SHA177d64c862214c7fa46c62a5a5bdb9a20607acaae
SHA2563cc8b2552db879e3bc34592667d0cd8c051300828d632d549c7a9090b9c95bce
SHA5126d25fa5bef486a1e4abe796e178de3e35a01a4c43ff491c06b33d4421bc71e2ff55b7902f87885a8b58361c0aadd9ded6d43d53054fc42a27111e6ea06a1bfa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450f06875a3803ed2ad55252ca736e4c
SHA1ce33808789fbf1fe8944ec11d0f736901584a77d
SHA256aad7585d39ebc4525c61b008cd2866d039df5f8bbb2960034e6fbeaec0043d7f
SHA512c45bf81288355ee083b9d8fc3868220804d0a06b8db054f175022cff22d550a62c994193c098f4ab4cf7a1e3c56b69ffe7aee39fcf06c14b0ccdad2a1ce1618b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f378cf60bf4170ff611fa5ad7380bf70
SHA1600ab71529907608cd505e78aeae1bf5c1797b7c
SHA256497ee5b7c7fb72e1bcce0a5cbfdd11e017cecb191dd51646803c03459381a138
SHA51211bd9c7f56bf2910bd951d515f37ca46b9da43f0ebb33917ed253469ccc902263bc8c4ef31c77247519ba9c4fe144fc20b5812667251c3885fbfe12735b48f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e068b4b77c53330495a7e4c304a1e70
SHA18666e6624eee921975448f002ab3f9e7f926cf5d
SHA256952a494d8d1e2ca861e6da65c37d25d6da6348e15511ec7ce33f2b1014a239c8
SHA512906296be9eba1080b282fcca1d8ab1b3879cb64c99fc958f35809a6638e5a6be25bc42358c11866e0e8cd12e0735e10a766d631059912a09c4742cc5d6636229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1fa8d5bbda0774bc8e9c50cfa7724fd
SHA104dea7f545feb25660a161ccf22edbffeaf47389
SHA256d13a7d2ccd5d3c072d50dba24a5c385b108aa09a7bd9d422a8d6932522db83e6
SHA5124f3a212640105ab0409189bbc75e08e92c9c5be3320abbc0e7822d5601202d10fb1852dca11c3a49efc43ef8ff1dbee2251a2d804312176abfcf259b76eff52d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b69a48fc7b087f0c7b3dd0d577df5d47
SHA1fc90ff83dc6d43ebc00d43b1b42fd639b1f8d2ab
SHA256e027aa35be446a27045097bdcc19bfb67343bea34a2dcd3a9e97351d03242410
SHA512f0fef578680f228bfd6dd41008d85a05471b82710c5fe0b233712bcd5be8422b702ef9a8772954f516f6dc770df7c32b7e97bc08e0dcd9f412ba6d756a3b9ecc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b