Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 18:23
Static task
static1
Behavioral task
behavioral1
Sample
b48c2647d43c1a6fb8a9aa4f7a11d9fe_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b48c2647d43c1a6fb8a9aa4f7a11d9fe_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b48c2647d43c1a6fb8a9aa4f7a11d9fe_JaffaCakes118.html
-
Size
67KB
-
MD5
b48c2647d43c1a6fb8a9aa4f7a11d9fe
-
SHA1
9a5998f383be6813413c4770b978b92c19aa9ec5
-
SHA256
8d641129ea80f67a97fd4d9b9d7d8cae39209a0e4401d7d1124c87d9de346b95
-
SHA512
1bb90f237a167dad2006259a7a8b0ebfba5d988bffd25d01ca4aef22a8a65b9cba567015c4c1cb29e8f42089d7929712c1feb2033b9a63b1634df24fe6457322
-
SSDEEP
768:JiXgcMiR3sI2PDDnX0g6sU6VyVoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8X:JDbTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80DE6431-2C0D-11EF-B98D-FE0070C7CB2B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000a3f8dba7243c99900b6989d459c39c1016b6658ae64705525e232a9fbf4fede1000000000e8000000002000020000000bcf6eab1ded7ba6aaa2228e48f5411bbe4ac4ee387066a8488628a9d13581c2020000000170fcc6d25286fa1da5db9fd4ec11cb9b51a1db9b6347ed0c1d0a6b1e89b9932400000000fd5204d4b056efd3a00ff4d69be916417b57d05cffea31aa68f38f9dd254e13dd535e1e51e8da3cf9c11131f69b55d60cb167a55b0e28cc9fdf3b72cb4da6c1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424724067" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 706072561ac0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2224 iexplore.exe 2224 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2908 2224 iexplore.exe 28 PID 2224 wrote to memory of 2908 2224 iexplore.exe 28 PID 2224 wrote to memory of 2908 2224 iexplore.exe 28 PID 2224 wrote to memory of 2908 2224 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b48c2647d43c1a6fb8a9aa4f7a11d9fe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a29d6264f2a025ef1c9e32c7a05e16fd
SHA1909ac586e2033d5ffe133362b2cd23561b944dca
SHA2565a5ac0fa6e11fdbef2af679f2e30269bbdb876e383791becf27ae41dc3c956a6
SHA51203e9d0eb60926a996a7e2004e386d4d5adcdabf91d1cabe9f3e90086f07c4bff7c2b844962a1558c32138336541b3e02157f24a670964b6c6935921b764e586d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a21c832c605bc4f1a83ea89ac08c409
SHA1fb3a8e8547f965c992ab23c06638ace8029fabc0
SHA256ac0e39408d760ab9e0346209a897d83a752af4fcd6d52299ee2119c796b9a25f
SHA5125682e8323de6627ac4c4b372cf5556f1d0134c4757413efde19f6c94017b254bc82d1ccc797468a06983e2570f152d19a61989436e5b274ccd204d1ce88bc8b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581f7573760fc354230e29109e1f413bc
SHA13b9bb743c8e797845f29ab104bae12904b0d8ff9
SHA256ae524dc74ce4ee62d961b7af98bbfda889e0768c57be653b94f16e7a69a1eac0
SHA512da698db444461dfba9ba85a0b28efbbea1ebd70ab0da525541fceaa4a4d9e004c78dc2d4e8d94f2ae1b99754006144518e70892faf72a162d0d2ea07aba94dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59afa2229d70bfd85f0a3a1a9faef88f9
SHA16e4863c7ae632563c8bfd87c2da9f19fbdf46379
SHA25649a1ff23f5d3c3fd86e2464138bbfc3811cd4a1d840ed7c935df3310d7f0a78b
SHA512621280a6389c6358c4fd0034cb391b011be88717959667afe7cc9cdea9e98ed8cff2c18f450c80a3b6a03e875de7979e32ba069da6352038d3559673bb8eb58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524bfd59f9e3ae1f5ad879fc3f6ccad79
SHA1db2e61e02832a07559fd2af6adac7a8ff36b7ae1
SHA256db9e926a2187663d79b88b5566eebfa8911ec96a853ee0b75fec8c0ae5358625
SHA51249e198649633da9fc96d8053c9d0d1ccf7717b1dafe608d85e2fda1a3b853c2e68ac842b7fe5e0451b8098d43ae3631112e4786fc4dda846d4432b29992f9f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a98ce57cc9d914f8cf1d056c4e2f442
SHA1d4adff3d38014cad3efd21da602859bf1a3161e0
SHA25690c19d68a785c0192bc209b08559dd39a398ef01744efe2001075979fa6797bd
SHA5120f57add386b7dac23a80c9d5707f4ae89aa1fb838de9c0235f2bb8c5b3b67ce8a9b4d95d90925b72b379e4227bc918d29db7d04cabd7643e0649261d760d83af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ac29e69dc670c87c07e9ccf51133bda
SHA132a33d99ac57dbf8cd10eada0b59ba15c7ffa6d3
SHA256d386764c922037084e11cb0c4ad4966f610ff3d0f998ed416b5523b03a931346
SHA512c451436cd38e1eb0602b28b0d19a525269eb2c852c0f9ee268de5b0a02dbcc359a14d4861b107c5cb401ae48d9e8f3ab1aab278c1a93f782f9cffeb6a2ebdb3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73ac77697a6f3569961a4992d5d5137
SHA1ef629e8fb0ed0007ea0f3827a7153f200601805b
SHA25653607eb48fd58ed4c118455c2ba25b78680587920b96cf4e95f4d393ec367f4e
SHA512431662bd2ac32f3a675a5b97eb6c8e403e0986603885bb114e9f255acbecd138ff40f77187b8049e993dad02c176a16acc99ad40f5904a669ed6a718b749ec04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c257e84908d86a15dc57c28fd50136
SHA16de5b9b0b7df049d4022bd19a7bbdaa2aa1db87d
SHA256ba202ffa224ac1c292b8c2757fcf5bc6cc762c8218633f3a3e82b1ec55916a3b
SHA512acc6745462e42e34c20cd0115f2583bc944f2b3722478501218a2b5633c0ce6285f52805f264452a53cca2caf04803408b0465655faabb112ba5eea27f02ecee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3120edae5b0dd2f5a913cded9b75130
SHA1293a1c3c2fa409ebb4a7644110fd332b216b7dcb
SHA256a723d5629f0951b5f16d10ea088e66b123a2ecdf4cedc48f82b1b2c7ed6d660a
SHA51231c623b161900b9644039adb3a4c6884c93688df424914a2b2ce749c1ba7079a9c033afbf817bc04a3f9f6b2643a77c76fe3424ae2f28aae66dff560c7987c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760c549c27bfe780b9e6e3f5188ce97a
SHA1768c96ba7840f2b90259360b7a59f2359b061916
SHA256713986140fafffe93123534a37d4b1e47c2422cb24eaf3c8f5a4fc647a7def22
SHA51233d4080e4a12d510d4c0186fc8cd1d9fdd5a5591f3ff70ce2b2e0b992acc852bcc8a5b8d8ea76097fc7df04d28dca01e36f96efd2dbaa391fa448d30e36579c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5134973038e3d0a36afadcf1c0061758d
SHA1c7104c67b5be787fef0f12963653b0cec113c2e5
SHA256cd362df9b58827e3a5a15e819853c4463dcf6f31e934967790685ae669f7fe9a
SHA5128b2e29ee6f0947cb9072de8b725cf0f9c2bdd190e0c4b3375ab43d57edffa371f45ded28f1b4feb1e4439c7b818002d10abc458ca3d0ba167c760c38a9a546a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b68ec5e1df7e0c88db59fcad4b99fa31
SHA1b3f06e799042129812f8c079de86fd3340c3fa8c
SHA256b0efef32f7fcc1b01382eb65c4c70203f0d084c4a934ee2946ae722a019c2053
SHA512dc984dd2c844986b4cafce144c4e49e2b4a7db8cee0631f8d630aa217d4b0c8a373a9f8afececaa3d0498e669347d732cb8b191b2c001fa63f15f0a6cada803a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58642b6a9324fc8ab0d916c59f108b6ba
SHA1c0ceb7ab386ce3ed6941204e9675b37d79a4d274
SHA25623d9e518ab3e2b345a5a0efb60e4701af37857337bf9853626e4531204be7df9
SHA512a32eefc0b32e7a75be82d8f7d0f977ef5c989df4b9617bc168e51b23da565a3be88af97d485ebeeb0bb778aa8dcbb5ee87956306f756ed2ec335c23a12a08aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562a5a9e4eede2dc6d521159509abaa2c
SHA17d8764d8a86b138543e96b4cf3d633a40954c482
SHA25632e04d1fbeb22ade7491b3052b3d960ec95f06398a96a3a0a4d2d11920166150
SHA512b99c1df876694a9b83f668f54bd1ccb4af07609206cdb11eb2dc797b1451197471e6d90d69b3513acda9bae003f32b8908394f151e3e510e56a6cb4ac7b7c18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acc248b4f294bded128a8c8c3d6702d6
SHA12468afc81ca2f7d38f8cb66a2f02bddb4d509962
SHA256157383fa400ce3d3ae6452a76d8265222c97a6ff7c57287c0862e05c2807b83e
SHA5121b3391904419bb03140b87719ca1954e0f6ac7c81554d9d47646961fb3e33a10ca400484b4e0ddcfb6d65211b04a5fc77671f3d3848b5b339dca9dd5770bc065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc3ee88e4da6c0b7c2b952641f7757b
SHA128db31902eab982db8bbbc9bf3a1b5ba4543b3af
SHA25690b66710e7304a4b8a348872e150bc2244d5670d8eef14900fca88bcf50f3a55
SHA5127417ebe962aca050b0f51115653fd3a922d2dfbc481097920f3e2b7733e2960f92db4614198ed0b4d1cd46aef76f539aa1827318ecdc929dcb5ad74b8a29ae56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d9a7ea9c363a73e1675fca145c578d
SHA18f03c6c1f33dac2399a129bed0acff91e0928347
SHA256b29e55c7b099bedea27b6202c8dc0d9a3a4388f77827c05b73a7da51c2b5fe21
SHA5124002c06a694707b890bd9fe3db68b27b74592db3d463c7e5439ce7bd04f60b1256918b2dce5c51519da706da212071570fe91132569e51353785686e9ff6df2d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b