Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
b67e2b3a0b5fec8c77dcdf7531668c38_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b67e2b3a0b5fec8c77dcdf7531668c38_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b67e2b3a0b5fec8c77dcdf7531668c38_JaffaCakes118.html
-
Size
13KB
-
MD5
b67e2b3a0b5fec8c77dcdf7531668c38
-
SHA1
fa85d964f5b2b6618d14206a39210d96cc4d63cf
-
SHA256
f53c20dcf1ff846c0579df59a1eda8c32f0cd3be62bc94169ab94dd0fb27ffed
-
SHA512
e710d2a4756dc68cb51336c3b5de7ac6a08a543495e3dd3fa4d57d394ef4dedb72d98917fa8b1da1516c2cbc350ed680dfe46bc187be0233f79477c7bad28de9
-
SSDEEP
192:2SywmOCvnKLcrxWSSjofqgMJNdIjxECGucZ5vNO5pyFAOoWIhYszlcyNfWv3NS:2fwmOCEEbMJIFECGucfNgy6ObIGbH3s
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a039050000000002000000000010660000000100002000000000b27292fb233f4d6bc206e50786f2625070f9e68648ddb5769640fb30efad3b000000000e80000000020000200000002ed492930607e9e4fbfe8250a3053d1386b076b65b2cba14dd4e232bab128a25200000004388d9afa4f6174e9c395f48e41d5656984d32718a29ede828580fe771abb55740000000e95e3903e2fc55bc5f4e82a6e32fa2dfcf7dd05ef8f09a31262d6c5a0674c940910fa9e682c95f76f49641e841ee89d29ae0fb74fe7835923ba6e16ffc986ecf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B056741-2C56-11EF-AAAD-627D7EE66EFE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50cf355063c0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424755409" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2340 2376 iexplore.exe 28 PID 2376 wrote to memory of 2340 2376 iexplore.exe 28 PID 2376 wrote to memory of 2340 2376 iexplore.exe 28 PID 2376 wrote to memory of 2340 2376 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b67e2b3a0b5fec8c77dcdf7531668c38_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f00a44b80cbd03efce4cfb1e0140a2f
SHA11aeb0eae2e60c04655df0e93e184cb24cfe4656c
SHA2568e944fea36810a8b783bd41f8e6c00d29fccda7bab29aba0cffd7b13ac92111d
SHA512d9549a12054ad3f1b5c0d395b99f48f0bf543d1e3a434d8a25bfbba07aa28106309f145462471e6e32a784507906afbeefb6ae24e9e095d17879d7bf4ccb0990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2e374cce485a1a7c49808c3611fc3f
SHA1326d061bbeae56bb62fddd1f766814a64581c94e
SHA256f8caedc5dd4425988a9b5334b5234efa8df45a049b8878d87ac8c5bbbbf4f029
SHA512ed1a8fcf75c8766349e2f6dc96a99afec30fd22bb04139419822b8eb8b9381ceb052e7d60d5cfe874eff8281dead5fdaa47c9d4f3e22183d011b9edca4039ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c41fc8d34843338532195d4c30fe08e
SHA163bf409ae70009126b4e1eb2a6e186deef592d8b
SHA2567442abdd1096f3bd58567794bbd6ea69af6d54b9c7728a3de78b8496a50ba828
SHA512d50ead25f897e6713286b81236ac5cf97e74571e40d52da34f7699c8b3681c19aea6cc331b26d00e0d33572353d2dcd555f96a1c6de2f828cbec6d9d27b9fbea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d4547897ec5835dfd19a7516c7abba
SHA1239c5ed1d61473ab785ed513ac6e110788494610
SHA2560663ea3d894d3771deed2ea39d885f81009709d8dcc478a8b21d9158caf92064
SHA5120f847c82cebcabcbf605d2e278e060faf22355d522bb6d3cf60b4577baf299e9ee39c9e59b203f5f7b026f414f5d2d9d4a8ae9e66aeb3a85fc2290a5d6475cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b066525b5579af0fc7cb5455c0722a5
SHA1299b83de661ff1d4d908979e38224ddc5e4221d5
SHA256334c644d0f9c7951ae1a71514aa32702fa08d6660c98b394c5693de6bcae746d
SHA512e5c681e9ac406d51355fcf2b3a50005b2a01cd955773d4bed213b13f6b26f0a2bc5401916a366c85ef4dfaea63a9fb7c6270638872dcab267d818821b2b91c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e26f4b63b6122c272e000300efb15d68
SHA12a6a17d996c6ba6cbae4c11ecaaf2787b62753af
SHA256ed15180b9b3135b18dfb538c963477cfaf545a6d8d3e89f938b627830aa0942c
SHA5123d2710c32b73dad8e68f4c1a89954d0484a19ccc0c0c032ad42b7ae9cab4e01b7ef3d47dcdd62a0dbc423d7e05b85136055f806a99c3198a011d5c94e4e74d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59480e9023490776802dbabd9c2cd0c49
SHA1caaab1dc05f876fa0449dd08396a8c99ce1ca913
SHA256412e218491b12a097475df56e5a36d0d0eed173302712c276f0ebf7176f9b089
SHA512fe9ae4ec063148ad84cfb2b58efa0681db74a472b0cfba49e3a38c189fedd0e4226a28176f47ce3d47e456be8dba338db3d4dc2e093dee6081e5730ad0665950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b33986b88aa28181748cd8924ac2a35c
SHA1e519cb37fe74662dc7005394597202481416e5f4
SHA25623db025dfc577de27dcaed971a896197d2f1399753f26280f5a797647444ceb3
SHA512709a3d4fa04f0feb5c6434c437a34eea1bbaa7c856ed8306fd656e9ad3b152889e77bc04c9feeda35ae065f341ba8b71f2102d0791498ee92ca884b981cc0758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2dc4d21df3e1b5504ba64c343ae03dc
SHA148584cbaf00ad20aefd44ffe0b7dfa998c6cf9a7
SHA256cb510b8484901a7b202bf4f05a24e79523f6719b28e622b65cdccf163b6272a7
SHA512af47e0a84b9f19abe9e84d8ae36eee9b484fd7fa6e9c66299aac7151e68badb58eb730de898e5a4319f36f8e7e792a64fd1eae5416bbeae2879364c5d86f86ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8f19b1ecf6b3ab59c3e804e10b9636
SHA15b71e3382da6038f1e01c18b7afe50a98bff29cb
SHA256a45f8dcbbae30c3f8412fc9b0fa721759dbf4586576fa9b79860bc61f705d405
SHA5129e7c87873fb249617988087da6c9bef0a51483634aece92ee61f79deba658944f27133c580c2a04a2a32aa48eebf9e01daa9b22d056b671d34665627494c47be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f8379031fdc3923b4873d1f41de062
SHA1a401cabbadb0e27ae14e7b53162bfe82038238e3
SHA25688ef965845ebf7f65f25a8859511b516528f254b6ffbc55cb465b583db1566db
SHA512f11026fa47b2666c2b24206153ed03b26c3a310fde0cef438de4d8303db2c1d99c018f1cbfc9531ea4f1ee5d756a9b047abcd08538759097ae766993679eebcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351ccb2fca544b48e63ca5fa1713f8ef
SHA1b300f3a40c4d603f51f568e20ca54f3d8b660501
SHA256fbf89f2a87f673da204fdd2dd1c51b639d566b1efbf8569bd75145d255a3a7a2
SHA512fd65ccff5f3da1d2a00ce38772a68cece4e223f20b11497e2fa2f0031051b08e9d089f794aef8b79620c740635626ae083cb7df7e323b72ef4399e495c235318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5928b02b5adb77db4f01934e8e11e18
SHA17af781f0923ad91534752d16dfe9108282aa9599
SHA256abd7d4def09a1c866cf0b7716b12815f83e8f451cd2a702fa48a593802b3be0c
SHA51252e8d4fd8247b48eae433f2c9e5f36ca2f7697e15bb512de2fcef7c980a4d25736fd95188a925a6aa94f996f92137758faf45211e59208ce15b745ca62f6ab3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e98e12ad0ae9f394ea99526fff79d94
SHA18d87f0763925570a80e493c0ff430d9a1ba88806
SHA2566143fbc811e856f141ba4162bcfa20e9d68b67493af75dcd56a39c44d43a1643
SHA51289321767a21006c667de5dd424cdaa7a90377bd100847c992a9da1b51031eb6dd834024b824f6423b4dfd865baaa1e79b812b37b3d38e444f09d15d3733cdbd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3093e35e8a59a54d5fcff105c6ac3b
SHA128323f06fe3f389553672b1b0d752649e73024ed
SHA2562d673769755daf02eb078479e4250695b6c5c203af8bba4f8c2901796a52789c
SHA5121e2a7fc92300cde2c5fa7bb6429fc613680fa647da766368b5365be94074c0974073375d22b21244bc18d9ecee5f6703c7c48d71b942f1e68f1fc062274bd77d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ae724e1370fad2e7cf936d74522967
SHA19a3734f78a47b1b0907cfb9a012629f4e8c1a8a3
SHA25619f5995aef7df2aaec07675ef992605877b8fbc608dfc2715bd45e6d75422bc6
SHA5124ffd7a89d766fa9d37e4aeca86d7cf1e678c37a1b5090341aa121197df16f0b799706b3a17031e0bb9843bdea7ad9e1fced4794b48264250f7cf0e42d46e5bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563841417af5e38413f22335508b9a477
SHA157b8eb995eb56af5ad61c24701ed2d312cb0a304
SHA2562a35da0eb8ba156ec450a2268cba700ea4bee8a756e91ca8525d87a7380c06e9
SHA5125cbce07bd4ee89bfe324c14f2a1f0d9aa0b085d5151b0058caa8ee9adf3352b7fbbec427a186c608fb3aa4fcbb77532f72e5a8a1201996778a6ee67c8fab6ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58546b3c12f07f617d4e565ef698e9920
SHA1f776aaa0b304f7051fbe2c31f2997090c846dee1
SHA2566762a7793ed1b6ece350c839bfb61f2b5ff4857bdfd3d348ef7ca5d719ef08ab
SHA5123d2548b6bcfe5d6b6c46ad07faa81df8f48c35d48cb4c8c56523367bdc6c291ae2ff053eafb2aa8e5093d5585a95ccf16612f70dbe0e00eb1b802ee29f44f8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd8ad7829eff025c75f3fe64c224f7e
SHA1b72726aa70c38309f0e0190e8b668c6b5fa85464
SHA256993ecedf955ccaaa31547a336cd3583d8f365e56b37c9624865a4b614ea89c61
SHA5126a57f9eaa1022aa66aaa638ca03737c04f2f6d79d86bf6abad588f9857f24f59fcea82ad087d13d28ba8d1d68fa1f086eaa67af24b77c0075ceb12d13e91751e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d0b0afb826e45af00c9ffb1967616b
SHA1437668b68fd03b7e57840aa698a9822e9909db3a
SHA256a8d6c72bf039f7e0d2e576785d7fe747ee450546aea38b4d8130eff99d60d021
SHA5125e2988299d1ec17964f714d94a32861f8bbb514b0b4e89f966d5fe1b4581b0d7b7c66657d0c8ba842cfd4faaa189a97bffd1b19ec18b8d6767ff5c3279437c0d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b