Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 02:41
Static task
static1
Behavioral task
behavioral1
Sample
b1614c28909172d8f14d2e9dc0ddd1d1_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b1614c28909172d8f14d2e9dc0ddd1d1_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b1614c28909172d8f14d2e9dc0ddd1d1_JaffaCakes118.html
-
Size
52KB
-
MD5
b1614c28909172d8f14d2e9dc0ddd1d1
-
SHA1
a27aafd888940c707f06beca1a1c190d18803237
-
SHA256
ab46e9fddddd240b3e9d8b25ea1c96851f20c7d6e663980bbc9b358f33bbc49f
-
SHA512
4c262b603e8a001219070c9c16a8d4651454424ba4f571be0aa2a671f3cd84f9a383043790ace0dc3b98d2b87133d30552c68a875822095abd67867ef70585d4
-
SSDEEP
768:S2hftoN40DDUjlqMFSM6TWbR/GIXm/TpMuAxDuC4A1:S2hftoN40HIz/GIXm/TpMuAxDj1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5A13F11-2B89-11EF-9CF0-C299D158824A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424667568" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000e8c3c6832b840835b55841607fc3014c4cadb20d61901133b70fe38be9a1a8d6000000000e8000000002000020000000e0ea4feeff254ccb5f2a9dbb8c0a0aaabc1973287372636ba19f2a24a9e472892000000091db4fb14a28f05a67392eec0525186e06c203d1adda126d79ffb4d113e22c074000000036a91ff9da1503234719ef6ccdddcc7834e2c004b5602afc6830df0336590a563890c9f40d14b04c35be68ad10d0316e02db722c5395b668a2f204e76065ee19 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0ff65cb96bfda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 816 iexplore.exe 816 iexplore.exe 636 IEXPLORE.EXE 636 IEXPLORE.EXE 636 IEXPLORE.EXE 636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 816 wrote to memory of 636 816 iexplore.exe 28 PID 816 wrote to memory of 636 816 iexplore.exe 28 PID 816 wrote to memory of 636 816 iexplore.exe 28 PID 816 wrote to memory of 636 816 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b1614c28909172d8f14d2e9dc0ddd1d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:816 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593e5df11d9f415695a9e95241b75bcb5
SHA18688ad5bfea371ac43f04c2f4b5a5a943d8d30b5
SHA256a94df037298ecd0d7d913a21952db941d8f6c0e1d9c0ed27c2899e7ad52b1312
SHA5120051ef91840291ac3075f5bcb5c438e9eb7323f60c4b37e931c4f73b89c9986f56abe9b83643461f9f1950e14755d8b73b0a7daa6121d2771d277baa2b42e7a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561ab54e10d82d3273939f4247e0d34c4
SHA10565ab1daa635220e01fc91cac232b9d8ab1a738
SHA256257b0b244069778e45a5d438c4b936bd9dd5ee140e0c26856533d6853acf79f6
SHA512391bfad657460524f18671b6820937793465aef3f310dfaf3de2cc0d133a0eda9090a2f7ada13f8c15d7e4614eaf3b1379853f8ca61d7a318a97e9763e18f094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f1e00518b2989d00c0162b79405cbeb
SHA144e9d44119e895654b05e90f2542a5a5e2aef91c
SHA2568c310b02f5abb1dfecebfd02010cb051372e9804b5f37e987b32a3baee27cc0b
SHA512731bddd538671ed924cdda4d8840de4ed0e4e1616142b536e9cef6157f88b9113503c936690e932f148eb5afb80e08930fbe0f52e8450df29f130512a7e3613f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef18ed23e555577a46bb7c063ac1788
SHA189270b2884d3e1132da50d9c510283fd8d0d5ff7
SHA25654e3f79d154317598cd1811825c857fb5d3da4daf343fd242dca1f8e2e8ba7c2
SHA512c30f33a0cfa968d21437f1e2093028ce12475b99605dafb5a926f5df3dc2a757cf22ca1e06cca3cbe02a97348aa1dbefbcca3e91d76bb72e8eb16e1d6b8ab944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc78cacc233220936519c4972369db53
SHA117516ebca3e4cd54ad34ee6bfbe8ad2e2197f1e8
SHA2567243c783334ce94d6a1054f05c43000086a2a1f8373e4568be6fe6508e3b8c77
SHA512c1743381a4723e4af02c132cca3f464e2bf90b75fe9b8abb2dd32ec86346db5e3607157f52daf52f8f09d11ccd12af7cbaff7a5c0b5236a92bf855244c49ffb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdfa2d916827e3804932e5deca7a9f91
SHA16394a3cff883718d76ca50befc5262803124104d
SHA2567591e1f7a92c3ef8fcb9fdb481582a0507e5d55d9fd41cd63d5ffe4fb3fe316f
SHA512f45691d585886a191ae64a053f3806677941b805fe9c1be3f9c0374e09c33fa9b9ee6faf4fd1ad3cf583325571064043c2911f22817889b2e31899070cf3ecf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f9d815cae6c1a4bea4197e0db355506
SHA1c629ba72bfe2c689b124e9b3ca20af475247e1df
SHA256f6f83b15d63e2c7d7673105d63af69d0fb49d6fc3a2ba5aa03ba42a59bb58908
SHA512dda711ed76e957bb9625980bdcc5c1a7391c0f4c93350ba034da269ea5be80944b1203b49e8c9702e39c7f4044cc74f09891261d525f090f874ada057e9a7dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebcba87436c7b0083d4aae4d22ebdac8
SHA1aaf24f9248d6e99d6bde3fa79a1a2dcc5bb220a9
SHA256b0ce44d5a898a0920a372e5f1addb5c166206d3b08709430361b61c8043f5859
SHA512d4d919e31354f2f0d2ba375d94a761b9af918cb8a2b821bbca47c61f20eabfe8ee4f52014e3f5f9a2325dd6e95590e16295d3ef5ffca28b7ebbfc6c74a6c1670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac36bb8bb10d196f2bfce494f0186d6a
SHA18a07346a7cd4a6ff144ea0b8766bb2db593c9818
SHA25600c8a927c65057c15327a640f198ec1a1749a2fb7e199a7511cfa295f760aca3
SHA512e1473e962fb0da28da7b8824a6191cf79d7dd0bad4c7631276718e6275d022b71e902be0733fb3a301d5fc3bdc891dd80f7d0feac0ef552b51b4d52743d1698f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5540a6c1c08c3aa4aebb2ccd7153905c2
SHA12379a3e12c8952ee8bd15a66d8cf09f8a77d1529
SHA25672f2350d7982fc306f24124e7b0de6ee075121df63b1e9bf9c1c42d21168ef29
SHA5121694f49352a9e40bdab34adaca015052b189721515d5617abfb1bdc5aa5b6fcc2be708a49aba0c1b610abb57aad6be6d7b1442a1249c5692d0797be7d0902af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af60222804e3557b717182cb683b2ec0
SHA1e2940c699607349548e37537f1c5682a4c766f21
SHA256e31feb6511be12eb536d601c3e80b98c95dba9bcbb7037a49b4c8aa7125d4c11
SHA512c076ea77454bcdafb67f8b6928a9320e467a6a983ca47772c96e46cc810cec323b48716c94ed4e312717c920fd0ec0c70a066661c1f3f40bb459c9757d8270f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9b4e13e099a3efb7e835a89f46db84e
SHA168e17f1f5d3565e6f50e049f0f232f00ae36067a
SHA25643dbaf49d4c8645119b75d875b13fb482629dfc06fb5a3c53bbb8d29e2f988fa
SHA512a3da32adbb6b0a4b09f6aeb7a7f6d076535b142430f26cf47de715429e4211b72daf2d2ca644367946a57cc280ae8734bf1d45f132f067149995df265edc1ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a759ab32175d34c7a3df67f9cd7b2d6d
SHA1032ab7fb8371496f4309e53b82025f771fab24b9
SHA2567300fa9c0b77b2d719c23ed73c5c5e4d86eb480ea1546d915a2bcd0a9d3bd4c5
SHA5127372bd93f5ad09eac6bdcf8774a264e95cb13d69b3ef07931af4966b0db99788494497c7f2372b40f64ed27df8b58e9966ac76498658d6b9b0a6b07a4e519c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e2deac3261a73918fe1bb8288caeb9e
SHA1729f8bf4ca1b86f54da711a11ef643e958594b3c
SHA256d53e3fda60b7bf27fd0c86d4d5780f8cea60514ae65413556668a3fc3065a51a
SHA512c42feb5c85a3cf8e35bea04830c9f5f20b5d2a3492f3a0a669789254e7ba1f62ccbef122c33650ecfb06d0217e42d2c4b92e31d6396514a75d9022962140018b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519c32c3277007fcf995e39ebd092c21c
SHA1a904738c73f618eaf4b3df0e12ffe550489945be
SHA256b06b81c70e709b4c7b1c26d025974304b64a154b799a2ce4e57e26ac21a64cd2
SHA5120532a8662c36eda650acb2fb84022f822d5c10ed56db9900bcbe47423529d029b66883e68cc3ce1473952414cc1572d7cf2400fe52bbf33d24318985ed8450f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce16ae856f58450cc0f1f948b1c13186
SHA110d5047334c5124df62d219be2e38b505665393a
SHA2566e76c1dda26b972474b573a9c3f341ae1df4cc24d7ebf611f34e8d0f100ecf9c
SHA5121609be07eb5913c7919d3eddbbecc0c4cd2b82415604fabf478a752e9a84f2fce758c0ff8197d51a258e5c2da6fbb6d950dc66c35bdf03c9599c20dc169c7f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9d1bee9bf9ea519d02b944ffd2ad105
SHA1a820196cfdf1b1a2ff70137454a25af793b97eab
SHA256c497dfe99fef1f218c42c0b7bd4f5cc4ca0a1819ff45c34af3d5a177245c5e51
SHA5124d782a1a504ea42b96f173cb5075488cc8b6f9c7dd5c7875be438cfb18dc8522cab7ff291d97d62a9e08a05f23805e13f9f76ebdd3927935571ad71e23076ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5485b9bb2c0f6c84388b8f6440762b128
SHA126a5eabe3c4c9b10638620c42f97dcdcfb092129
SHA2567f7bbed74f63d3d548bcf27830d229c809168173d23e7d819b7b664a354b4619
SHA512bd17e86f7b0d397dadc800061087c79b310d4e7292d094568e4fde28dc62fe058f500ef5a85085a1748bf44c41e387bd1d4e2b98be60c3780b4b250a5954afb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a595ad4ed9b96eb5b84ae901534349a2
SHA1bebefbdd9761d1a791d0baf610f25dee3987859e
SHA2568651bf57862fedebfd904d5527cbbf48f5371a4b7eb74cf06e967e05f7e9b0db
SHA5120f14a325e392f429038a8b8161cd45cd8b0f4600c34fd442beaf42e90d833d0429d40e7d32dfc895bb4f8433ae320c00e454e1e37e5d558398f3f520a101ca38
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b