Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
af8f8eb513e42e3aba63ce7a38959469_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
af8f8eb513e42e3aba63ce7a38959469_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
af8f8eb513e42e3aba63ce7a38959469_JaffaCakes118.html
-
Size
67KB
-
MD5
af8f8eb513e42e3aba63ce7a38959469
-
SHA1
3c3d14cb1d5424aa766ceba15ab54affee000f51
-
SHA256
8a7a9e0dc6aff68a475828b2f391bd88dbffcc73a3a39e4cf7babcd995c6009e
-
SHA512
76d9dd7c48373d333547b65be25812fa5f1828fa9c0939a9d2bccf75634da02be7d56d0613dca95b847c1248c922b6826520cbddd004429726feb044e705534f
-
SSDEEP
768:JiJgcMiR3sI2PDDnX0g6s2xioTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8s/k:JH0TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424634461" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a04e1cb549bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E059AC21-2B3C-11EF-BEDB-DEDD52EED8E0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000004a95ad4033560fda3b37f0906c47fc7428cdb4d834f01ee55d86b700f7dc6d9f000000000e800000000200002000000098d57fe20afe7b7af194f481f65183f42fcb3b356cd9460492cc08e91127081920000000a64f86fe6dffa262f9705926a04db6813867e403041ad9dc0df48b3772df2e9740000000c8b73e38d5e0e94b3c44df071e3a40330bd3f5a3aa6e4835cd94c4b51abefebf9feae32a39018d5907cc194d991efd9dd0ed3404df52c4be0a3c7195ba294638 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2776 2136 iexplore.exe 28 PID 2136 wrote to memory of 2776 2136 iexplore.exe 28 PID 2136 wrote to memory of 2776 2136 iexplore.exe 28 PID 2136 wrote to memory of 2776 2136 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\af8f8eb513e42e3aba63ce7a38959469_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585e12d538720b38a761ce6969d60cd91
SHA1ebbb91042b01a32e9d5f76660a9d6d0c5af2affb
SHA25688cf8e92726402edf7640d54867da71779c0b806f6d9c1329590a3ef0bb98f08
SHA5126a586b08a727531d3383db9aa46fd742d3bdb731649bdcf3bdccee39d2677d7aea97f0b4349f3cb9606fd9aaf13567623fa6bc9dbb105d6861f1917b957d066c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58947c54d4253eb7b593b0760372448e9
SHA1e3ae2d154828a43ab61dbd489ca7e279ce354a5d
SHA25616f4b5a417ea8ace342ead7c5bde1875666ca94cf5b2ad9320a70a5008db5165
SHA512c6d8c8deacd042761ad3c761bd83c718b802d3b85da70b4bc795defac1b3e477bdaad642b2d9885d486ec7dc548c99291a46c9b37d9994b00e03c144e93beba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1594695619b20a55d3d911d2c3ed36c
SHA1458a5124601f19f02dfc2666ca75ac9bb654bda6
SHA2564d543ce9e6b5f212eaa10dc13d83ff3321f430bda2ea1571da83f3e3fad69a77
SHA512d856e38b14aec33bbfed420f88186624090f921e8a763cdfa91ab31b0354be321535d4de71d7f9332931ed7c56704a7bbccd368707c169138d120a9dd902586a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5732b4e387b69206f36ff3147faacee89
SHA1084123f5d2d40c928d572627adcc347dd848d93a
SHA2568352492c91c459ac2be69eaea70dd187c764feeb723af82c647ed669f967c51e
SHA5124a8344f3d675d87093c81bc40c787f9009b420d485e22d0fbaa207e3c794eac35f171a62d90a84dfe7a64e39d4716bd74809510c53fb3136ad5c9d7d3068bcd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c8ea38546775bab5fab2fb2c5f6a2a4
SHA1f77b5dc23e92cc2162982bf8915988c11017d908
SHA256dd37e802a2218afb599827324aeea09f986f2a4681f1b10de796cb1d16b2a698
SHA5128f2b54b77a2cf073a4d24b450549a8e1f94b01bc7e560dfef4f704f3f5675bea0cd5132b9e43a179b7ae345817f5eef4fd8b164f423bce5af5b2c630e24d821b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ffc8bffd590bb5e3ea33d1f15434d0a
SHA1f65b78b98a5669a68660d14ac8c6f6fb140d0096
SHA2563da3b6a8671952520301f40bc376fe9577acd429f5e577124b8d5598a9daae4b
SHA51211f1aa784100608441c3868a388d57f328385ce6781e690d57ca0f6dfdc0cdfeca5009e990bc1fa5139fa0c045717749a03e45a391d8ce29ad230837a9c4a95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c20e7bd262a3a72fdb2018d902790e
SHA12640e7e1cc10d1422ae556e1f29656418be9b3ba
SHA2564e1a7f69982ba8d43bb370d0e3e420f788fc15b3716aa37230f94fc920ab2582
SHA5120633a321d93e3fd0ac99947e002ae8b9ee1083c89bb61454447528b987c166ab3c75e1a088ce26864f2e896042fe82993c1db6ee37a96d485c1ae39e1fc3ae4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f836767cf2a5c95992f05e3ab987f46
SHA139aef4bb4684efb1a8a0381c0be87e35753d2b63
SHA2561e0f59b81e7be18a4d1ee8dbea82e92247db37a90b27927e61f11cce6aafcd02
SHA512a9beb3385aa171e76adba2faba0bd8b4108132b9557479f5584ec1bde275147f1d55cd7fdb9da74358f4bbd317db099c99c0731f2cca069fbc4d7f24545e8353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c09b29f56eaf377b8785643b9a081ba
SHA1afd093b907c367e8c683d0b2f232e53d93b69c6d
SHA256aa011899d585872d599531c49d67e8ed693a5debb40aed66295cb0fb5c602a23
SHA512b9e7be74bc53636d3754e54a22384ddb2da0e022fc08ca43033bcb695baac221bea489b6cbf9131da41f78bb142692e5a44dadb3509ec1ba88ee9410eac201e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aad1aefc9c40024dec59ff3d7a4b846
SHA11f2b1bb9d5c34b6c06a469e169f548358bef8b78
SHA256029595f219c714cd63b8df66c478b5afa68f58727b5e532f211e26238070e0e9
SHA512597e267081122cb5a4fda1abb9a924e995ec6ef310a2683b171dfe10d26900b0089fe5c7d3c7c646f26f3876e329e298f41a2ac79ff4ca0033ed759f74c1e1a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f7c03bcb73a323469ef45da23cdb1a
SHA1e9162e0be170500e17086c0eb28f301769c270b9
SHA2565ae631780ece1b3a23ef70eee2f51c2b4a290379fee367bfcedaec7c1093db65
SHA51238a60fd1d8af86e655951856bdfc3c0fa4865e34881a9013d8f7af829d1b5b3294bd7bb002578567c54ecf03b5a6ab598574810f46eeb968dd7f49e9bfa95cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b16649c8ee5731c4da8b85c23bf0ecd1
SHA1c97876c72b496e1ad0727c10cf9b6f1301fdb50a
SHA256fa2eb6e476dea7c6efcccf506c965f742e2bc736b5e3a0efde0a33781f54906b
SHA512495fbf5f8c55ee1da8fd1cf6ce07068a7f6927e92c99a4b9cc3bea03be844a8849ac1891506e689d63a57d281003b59059437d5f448b0960532a2521c8a7636d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cca3821ef2ca5b97035baf3c897884b0
SHA195e96ccd09636dec6756f68d885be0c47803988d
SHA2566a2de63007dcfe67e74778d7159d542b12bd07f5a53f8dc48b1e9fbd6794c641
SHA5121908380bd3601e7773fd928f42d8dd58b8c5d1e80e6f5b4ba910d8cd8453cd1679fb0ab109b9c1c80a9e01e6da82e9895e2606332b0aae5ca36040e4c356118b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b3bb6d5f64ea10c2d50765eb08af8d0
SHA13a15e66a86b2605cb8e5d2b752098a7c882b9d9f
SHA256f9a3f825d4f4bfb7a293fa7d707e8921bb18447be51de5408970eea2370530ac
SHA5125946af9669aee98179647b31bfc6269dc5a68c19fa3f17a4d8cbe6371d91e25fef0026715059cd4176caf823f0aad754207310bf4111b371211a4b324b7a7bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a127ac3a6686e0513a072037dce163a
SHA1778ec70aa411c754083d2513cabd950647d03e6e
SHA256ef2a6e88fb2d2b8a23008620a587ff7ab7f91bd8dc78f79015aee8e25ec723ee
SHA51222101f63b56b5978500a2a1aff6039bba4989d208db7902117e6e3494e17f7147c617ce82494c1fd2ad456c2b0ef79b352036a1615c0cef6a13736aed5f94c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e769e829677b8c77cd6099973d5ea42f
SHA1d8672fe08195d4e5cd1dcc62ca77d4de127e3049
SHA256ce32be2404e40f37cb73745a0f1f868310121b6aeaff2ab080e568e4295c75aa
SHA5120bc8632ad5f7510cde785b15c3451d3c3da0836dbb29fd4469a29ea30f08c87e2f537b08baf81bcdd49a9378366934396bb1785219c821e635e09282dc10bf93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ac567733636190ab03b6bf4879c7cf
SHA1957ff99bd6522406587572a4f232d99ac568ba25
SHA256e670611f9e9acf5706aebd4714b1666cc3b76d19cef1cfafc4ad7709dee362fd
SHA5122f1212599f76b433ffff730f8d14dcfaa0876bf128d1eb3f26adb76623d3437a4a8194ce02988a3a4c82367fbc867a6d76c7cf26e35dfb47a4766a53cafb927e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5943d844954be0712a764f1ba30cb97eb
SHA16341fec86ebd07ed87682dffd3de045bf78bb862
SHA256dd9c340f97ec8f1ce5b94a9b11b8d7d3b6703dfd88365c5f48e5631d197637fe
SHA512095b11366e070925e1d1919382c3568923fd0098b4d7241ec1c6c12d7554a2d43203976a27c0e338fed44bc7947b2c70e3ae052d11f3076a3242189a5a102474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566e13e0b749d091a28ed8f8d7c11482b
SHA1669d63cc5676b8c36e13d2670bedee7dd5419bbd
SHA25683628f74e61a51807592692daa8d0e1ff904129a0ed998dc49a5015edc4c1e75
SHA51210c087f29fe8392aa8af4dd7743f32252497fce1197040aa810408464ccd91226d68f035e4f861c0d699638325d23ecc988d21c7621f4a3f0094c2cbea5f91d7
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b