Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
b4dac9a7d29ec0240698d2dbcd66a31a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4dac9a7d29ec0240698d2dbcd66a31a_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b4dac9a7d29ec0240698d2dbcd66a31a_JaffaCakes118.html
-
Size
4KB
-
MD5
b4dac9a7d29ec0240698d2dbcd66a31a
-
SHA1
69426fd1ed03aef9379878694126b66e1cf942d8
-
SHA256
f06cbbbe905891c20e2001a25aa1fd5936fcd51d4bf00f04855a5b5ca86677dc
-
SHA512
b0a2bba137feb4c10c4aa06eb20a1f79448e1a5fe58872105157b1089dd20b7ce682ed807b36a85dd0ab12e796c6a36cee7abcd704368b302fe4b1d6571677b7
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oiDlVdd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424728526" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3642DB1-2C17-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507bd9b724c0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a0ec0b5bfeaa294ab5a9987d3f00b37b0000000002000000000010660000000100002000000039637a17574fb0c60b60e64b5d51c4441534c3c7965eb7bcba848ee27b835f77000000000e80000000020000200000003a49cbd71c506b89f0dc70e30b5eef87dc7ae7e72da2e30e3fc2bd1dd3725e6c200000002c8e84984e8541c16e0078e7fce4decaded5bea93c2ac628fe398e594643a35840000000422262b4b242bb073cebc34650c10ea84b4a09a8e36907709e0e1abc442a0e438b35c3765791dfe9a0acf4d0d4ad35403e4de8cd117f23f95abbb8ecd7c85511 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1676 iexplore.exe 1676 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2080 1676 iexplore.exe 28 PID 1676 wrote to memory of 2080 1676 iexplore.exe 28 PID 1676 wrote to memory of 2080 1676 iexplore.exe 28 PID 1676 wrote to memory of 2080 1676 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4dac9a7d29ec0240698d2dbcd66a31a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58749e58f7e5d6fe70e06d916c0eec27d
SHA10ea4abba027c3aeeded60e3602c8c3890f606e5a
SHA256e90aa472ca7d3f1230634c60ffdd9f43744d140366b35cb26a7a9c2c45c23333
SHA5120d5eace04d9c96ed20e53a25d276db754df36b7b4fd5ba9335baecf4bae25a892330605e3a5e2942ca9f02ac1d18b0b721a6e99bea373b4f37b628af2c914550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56132ea5d08cc1a2c33e1792d01c76686
SHA104c2348873c44d1d71bd16b1f7918fbe1bfff199
SHA256947f6126ec7740bba47423bede026bdf26ea638edb41a96e7f31e7a47fe74b75
SHA512018565add1b06500c14c6eaaac16e68646b278ce195acbed2ce291beccc40a689e19025c6dd697c0a93affad0e4df6e540cd9feba00dce1d5e7c696724278be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd4cbc7b29beb10fffd09ccfdb44a4f7
SHA1673c1dbc08a5e3434b81117e34cc6da239076d9e
SHA25649a7f8eeb05b4423f1d2de2e4b188541ccdfecfb1c6a0f337d856a405c3258ff
SHA5120207357ce71df2ff5b5da55a184a21acef20062479dcd06534eb8c854ec1a9a0eb2bf0727dde8aaa1e8565fb1db4ba8442203da526652bd483b83060084b7297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4f76260389eb67f4f9b57970ece1114
SHA1be7496f3b950d5e43b7055dcac7a1bff6a962d0e
SHA25681176dc83e31cd6e612c7a9a39a53a59cd01171861085e8ab08c7d64da7e0c2e
SHA512e367fe5ea0727c083765b557a531b7c7f68cce7859fa42d1822c638dad6e61e6827624706e2bc1e5f42104d1dc99f797415430a886ee7df27ba688aa4eaddcef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af0089c01c00589e9eb81e2770c1d0e3
SHA17fe964b558b0ea720e5bd69036c67fba31411779
SHA256fde7c9448b17f9ab6d1a4b7fbe866a476320e594eea8c79df356483d395dde37
SHA5120b8cc1d1f0133ff0c68aab901f4e3bf2e801efe5e92aa2c9e8a804eb371f6eeb264dbb6e7566cd62aeb8da2d38befb41788eedea83bc19e569078c300e818998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6de75ccfddb2b512d0d934d7c5e3511
SHA10ed5e0ca5f5b5f7d0a187638fe6bd8e2319849d7
SHA25680a98de0a1ea910e0537454481495f65ece703f177b1bc9a894e9154622f62e1
SHA5121e7291bca601d76e33934e902f708f73677c3769faab85ee0b120d55f415ea8c4ddad180f17f3980e227098d5b0d84924f330a4e9e08306cea7f08b6a1e2d558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf8e989702f0f4bce660108618375ac4
SHA1977af88dec90ba5965f724a90e79cf7edff22677
SHA2568bed7d7968eee1e753770df409ac32aca55f554bc0a0e5c6b50e08d2dcc81ecc
SHA5124f6c7d6936502453cb8beb0bf8026383d6ddf0d1f1adc6e0f1588cc20e628a9ef0b988b1cd00b7c26d76b30fabc526e99ce03ebddb30ba9fe1dce575346d669d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e726c8bd0fe5a859efc8cfc472ce3bb
SHA1c25b810b99bb9ffdd48e3b4d69fdeec951914866
SHA2566f1220403e4707654a251e4237284d8806b1d4b3d09835b30504fa16534e09aa
SHA5129967a0a3295e41ccf68513f263f7cc044d1e6503ef28e79459509ee475ab072068ce477c1699a3cb6da522c1e6dda7f446c4c54875115cad6306c5b13e9ca6ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7dc47613d66709b4edbd9a3908c4ae
SHA1987530d144c8ab0ea1ffe784f39a698f2b576582
SHA2567e05b0d81ea9d513fe51ccfc32963cf2267210c1e947ae88fb3d0bf0d188328b
SHA5126d2978a922137f9bda70afe2648747fe2fd15c28353702ea9168e859510ced02890ab9abab736b84e4b2895de558875b74214df63316bec5d3b38c901163a874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5783dd514959207fb87010a69245dff8e
SHA11f16b30b98ddee03224c6df4d7705f8c138c8aad
SHA256a6e2449678bb17ccb61a493978cb28ba2d1b7d45be5a48469edaaf6964fe621a
SHA5127a769a843066a523eba879093d570b27e72f600013436b0a42c2c3004dc490feebad96081df2286907884e8f7c6498d3a574a500d8c7031a0a4349e78b6a137f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7248b9ea659ed5db47843a7e980d7f4
SHA16b8a454e0904ec91d2c7ac2a0ac6d8f2c211fdd3
SHA2561961199b1e30ca699b1da3fb8946b48f1da7ee8880352d08a54ccfd797a5c695
SHA5120a6e3ce2c5418dba23775413ce73de8ddb010e8374faa249237e8f9d26193e154f62dd891e51e311d9636332666dc43d5f22f1fc7649485cd18060f4510eaa25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4cb43ceb653a45bfca7169a3eb142ac
SHA1dbe6b13344b8231c7fae81f48bfeffff5158333d
SHA2567d0edc3a0b32f1f01dfcb1a461550e67a0e7099baf2185ab21822c095ab3ab1e
SHA5125908059422cd6ed75fef7e294ad13eccfa004e975c3d648b7fb8c609e18f664dc86d16b1b340db733c35553222324e4e3486bd35da41f9626cdf3694e6a4747e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4dda4566912a1e153096d7d3aefa22
SHA14bc16c4202be73e1a0168d2e2b308951019272b4
SHA256af0389f05dd9f7d02b54d1c26cfcceb73b6a1cf898dd49d717c27921402afd5d
SHA51278cb1e0e7aee21edced2b8047b2f22d540eb1d46f46aca5230dcd75422d996837df39a5e75a96cc6b4db091178e14bec6886cd5d61dedc4f3f0d17aadb94b59f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaa743fbdc6f4cf2098ebf912bd542ba
SHA1c556c84a133cf0d8b0eb3214c6bb71c3564b233d
SHA256166c774fa03a019be0fcfad063d6bb6e124cb94963cdd4042571ce6786444062
SHA512a718d16aefe1e28a689bc9e9056456c9ea94c1b283653d4e6c42334d7931ea5af801f6e7882141807278cd93fd68164175f5be5d159dc7e2d9d6d63f106ea835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531548ff5b58fd1f9c0af609dcb27a130
SHA173bf107b32d2c5ef542de38e04a3e32cd8b2c777
SHA2565fbd37c5e25688484e6d195e8d96d0ba1419fa9eb864da9825b21d220a4f7cf2
SHA5126fb03060e169454e810f690452c81c59dbe54b318bc84f3f7343537e95f7ff8fb567c295de6c62483b3c0b9228878a365694cd922c2a316820394b00f40dd334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a61b028a5ffb0bf36792b6c07fcfe7fd
SHA190560ea548b0c6649b849fa25568bfc7ada5c47f
SHA256590f190fef2b51f1fa97747bad8d7129825ead08de8258940d043e97d397a6d9
SHA5122813f9e0d26a0c37add87c3e67333efdcea0f20d04c9d5f68ff1f1c6c2d65d16bb5208945ae3fa8f4ac2e1d06edf85b2a6b7c95663a7b148fa225433f636526b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55da5971dd0d5b649af97d2a005b7e378
SHA12966eb693386f030647128dd8e4cf594261c25ea
SHA2565d59117fdacf923958893cedd070dc93a3b37bc4c9df3eda2d5532bb5de2da3d
SHA512fe7a4871e2a7767edd5abaf21ed1427afa241c7e63c148f5e67989d8e13aab72ac9dc85e2c99df2975e49774661f9b7f41e22bf3431ad3f8258b38c56d3e5e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d6b40ad81667a0d7abfaebf1b344656
SHA1850c4556390762164670ecf358d41f033baf1afb
SHA2567a288fd611045bbbba0851c98e1e7369fbe3dc1e349d69e79cd59d3329192266
SHA51253f81c3598f1ec864c0f1f2de58a3a4ef7327786deda176a786bfb8204f35a5f2cb4d6fd070b00c7153751455ca202ae7cce30484fc7b819b77ec2dcc5c7d01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f240d346c5f70557182482e2a3696765
SHA10cfb580fd7825ce9bbcceb26af0db00d2a045e2a
SHA2561b970d7a791c3a304b45cb014e530060de723763b371801b576d74382b71b578
SHA5125861f68fae24fca8a30b61cb95deb13263009006482b6f744c3f6b9a00785e0037ae7217eb8750a38c2a8865d110db012f30fc3ab812e11f153883719c6eee68
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b