Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 05:53
Static task
static1
Behavioral task
behavioral1
Sample
b711504a8e18c5f03d82b179ccd8d236_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b711504a8e18c5f03d82b179ccd8d236_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b711504a8e18c5f03d82b179ccd8d236_JaffaCakes118.html
-
Size
205KB
-
MD5
b711504a8e18c5f03d82b179ccd8d236
-
SHA1
671192c2579954e6553bf3c3225536a1537d7bce
-
SHA256
98fc5ea8942eea088e3e5faa1a541d2e9ad38d578c3f2b6486ca04d8a06a374d
-
SHA512
28bf54686b9efcbc20db87e99ab105a4a7e993e52baa4d34a83676e9ebc2a75f4aedc6ffd28cd25d307dccc1f61b6bedfa8f1ae61bb02d49397d5dbf99b5d1cd
-
SSDEEP
3072:P7Xm6oH7yfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:P7yesMYod+X3oI+YS1tA8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000801f4fad4bf4bb07a90f9d11ba28cf722595594befaaf6644917f3ebd34a77d5000000000e8000000002000020000000b8148043e561965e6a053e5458de947b33b7ae842059f22b198566e93562fbbd2000000039166830d7f9ca2fb38c65b0c5ebbff01e6c70cf7678a46c6dbcbe7501fec21a4000000028a212505c18d179dca344c5bc7beb618c3cb4cdb6237f3ccd48b6cdbf62f25735965809a5ff9dc0bc7b071924c070a4db09fc18df5f1e44a80c80e0f336a510 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8749CC1-2C6D-11EF-B477-E6415F422194} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424765498" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 902d1ccd7ac0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2404 2124 iexplore.exe 28 PID 2124 wrote to memory of 2404 2124 iexplore.exe 28 PID 2124 wrote to memory of 2404 2124 iexplore.exe 28 PID 2124 wrote to memory of 2404 2124 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b711504a8e18c5f03d82b179ccd8d236_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae9404178f1737f109ac89b87b786a23
SHA10cfa43b7c3113e777eaeea7b3ad75561df3fa18a
SHA2560d2c7d9c6657f94ae6c9b35a258b6cb6dd14fda74d952db27c050d888482ad7a
SHA5124306fa094072c0c016864715898674b2076e3a012c2904e9cd0cf89d35c0e35cd096248e82a44c8f5dd663161f2fe1476190984cb582673b2c192ec43356ddb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587080e67ea66a558fdd41ef62a56a0f6
SHA1164058d5049167d6a7465694e8a348f5eaaa97f8
SHA2561ff36088af3a34c7c268182ef5e2c3e29a1e262f66ab582db6cba93e1f866cf7
SHA5126c85b515f35b7b020df8077d779ea9583d87c8a544a8723a6c6a5a9f191ce5e00cba5911d37cb0c386bcafb67e996716f24da67dd1e4ae2f19f31d76b4f3f530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c406ef0c8ca346b0b432139d7a8c8c1
SHA18b9416e4476612081d2716f7f8b49adc58afb212
SHA25676af13518158201b4b348cdda08d7b056787ab85b5a0abede0e47de49850f8af
SHA512c037ab4e7c03a60f58ed1ade55f7ebef20623e1e61f44e30a1b740cfdb69d32d09a5b807efa8840d1ead12124560269e706b419d43222f58dd051092f0ab057e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cefd7b7029b2dbb4fae13bfb12a00984
SHA1956be277c0ff88c369c3379bb82da4b9e93fc7d8
SHA256813c0350bf75dbf0cc7afdcd68d1ffd2df88d68d7b4bae5e9f9f4ae77a5d2ecd
SHA51223d3f614874be6a4c839cda53bc5f2bd2a1a0b782ae26b2dd62bb1432fd81cc9fa7145bb33c8d7fdbc84500d84770069ae1dacce2457261a74c0d55739bf5ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5546706b37be4002ff32ff5b5d94cbe69
SHA1968da0be0de332722c40d66fc8992234f5382de1
SHA2565f089932ab92dafedade56c65342ce9e686cd38341d645d7d6fdfb5a3ab1c6d7
SHA512fee3d55286f51bc0c04a42227142299990aec0b7c7b8ed1bea2eff8466f140306fcc8ecf9ccdcb1fcf8b70d4dca796f98239122583ede62ca94b03159fe3e868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e36f0eb3ea6538923e567f986d7b6bb
SHA17af3c8f32e01fa87f9697e8442af8d22a75e0b9e
SHA25672c7209c319c18a2f24757e7dc3e5d3e1a2ffc92c6e03475b7691693b87d6a99
SHA512d589d92be39665aa53ffb9e454d33c2742edddd76f4c63fe2a38c0824fe09eb3cd5aac2ad1612de48a6355d341eb9278dfed444f939035711b336201cbde403d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e00f3a516b210f59f474a0095885a08
SHA1de567b8c518e8eb9592c00c36ab3a0def8014c1a
SHA256041bb875a880f7641c9000751b0e58d518acaa371af530dc06dd666cc4e1309a
SHA5129c478ca46e544811aeaadd1fbb0d23ae21514c1618de4256aa8d243a4f3101cf4e75a868c1463014f63f9651e3bc6a183ffe3339ff3be6dd33601d72d44f4133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313e7357c27899f113c7c05feaf3f3ca
SHA10840d94b2c686160326bed1bb76c9090a1fc5a25
SHA2563e94747fee2d5803d60557b46dd6ccd7dfce1ec19dcfc649443a85335c40acb4
SHA512bbc74e4cb9309f660277b82ae4e7a323cd220f3cdb6610421e0508b09049714d8b09acacf2abd146197f10de04f8b8eb870e06fa9fd87c4bc40f7fa846017ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55985f8615e9a2a08e1582989244ca01e
SHA18fc9407ca96e62a59cd41b4be79bd91aacb0e463
SHA2567df757348250b2ff567267e41dc3f84845ffe0793d3dbd653128c785365d3b93
SHA512fd51cafc53013550daf558dc21ddc3008f583536a454158e9bdee2f16079d0b0096b215e83694b4393e87d6a6065b01e0cfa6055176e8768629251ee981e5710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b926de0b82963767b009aadb1643996
SHA1155a52a42d0b986592569f882628b63de8bfd01d
SHA25605641f4a978e3b49ee107226bfef12f2b64c3d078eaf08a01718460fa308cf9b
SHA5122792430b68a4ac19f8e92a7ef3384e2bc52a80ca8324ba854a5ab9e8dac71a07e97817d28e687f39e0407ada0ea5a6ed57285336585dd16ba92d9177263d725a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5017a8c3572a76efbb0621c0561e89d1c
SHA1f9d9eb318c52f50485a6bf45fe8b958001df9062
SHA256d9e5c6f761fcfc71a45d2109f8733f8ee36c4476a0fc8f1ccec2bf575eca59e9
SHA51244bbee3391a17623b95f873a3df3499c4a7940e8745c786b66eeee796e593da233bbab4c40b7386ed6908a549b05ecc65dc1418a6f8be2c94c89702c538eaf99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee671b834ce2f3fa1dffe68489d003f
SHA12fbee3c3b2a514c8048324e87159bb0a5b206803
SHA25679f799c46e58feea8c8c7440ea0e4bc85e15933fa582c2a07ad4b65d34e1cfff
SHA51227c4fff04058e5874285b4ef3cefc4e7412eeb77d5a5ad6499dd859f422f01f2da1987949da68c5588eb9e12dffff5140a6cfc53ccb277170dd1e361c00bfa7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57de1ed93c0013d56b8aab477a01c02db
SHA13210b99110e66b7828bb64e7ef9b1528774800f2
SHA256d3eda2c132a2289dc0de3652a38948412455f2786386d0772889de199e949cfc
SHA512efbd5806aa9ecb615a0ae4b2b2e020c2dbf946909bd3cdea3d8a1de3371f646db6e2fb252b50983b0baad7068d3197379edb02ed33d75dc9e8d6cde354d12129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d449e9446101cad083bf19aab6638098
SHA1a77da58e87cc880adde80953cbad899dd89cdc26
SHA25640242d1dfb0e98b69cd4e8747568832e1565d233f8b40de370a731cad73f6b96
SHA5122724072450f6f191216cea9456c2c2709b32d3ae541621ac64b90a0d17a55821e6b172dc919f6a45860e488df75724e5439e0c0b55bf450eb3468865764a7a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3b35a87fe35737cd7dc9161c6a8f03b
SHA10409261b969cba6b92d0375ab442414369eb5754
SHA256a882f7d12a06e396eec97b89b63944138c44c68f778e67682160cb9c12335988
SHA51242219523d760ff0e46769065c4cf9b6157a6d3824cce6da12c4039a532772e87096c83d388ef24aa66af76109700c3f4aba3c89663c74442c20efbb0940721e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508c5254e803b76ff64d96b4c4b4637af
SHA1e0c5dc97d0c82dc8c3877d28813d4a27f59fa55a
SHA25688977511c527673a2631248355b11a70120aaae54e684590dbd485140e03f81c
SHA51270ce1ac3efbee9cf751780a57c7f6bdfa11bd606edc94c7096642f6e10d719b5b20ef171c49777db7193e8ff6223b5044467483e8f01b0c44f4dae693b4a8ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee5d2fe7f8d67fc57978f3cd022c23c5
SHA14504fd03bbc891d306bd06e3160b569a432e3e98
SHA256c05ce6767509c71b49c2c7c32055cf66d5fe26801e7b11d0fdf6c5b7808001a9
SHA512412c1b3ce562f3a87dc96cb0eed04fe9d051c25e542d1454eb658d13f29ef8c17d9c8ef031903a50943da10ca5d115c8e6c97e2743bd37d79b62d767ed70e8c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e31c45f2b4908b20752198183e34c69
SHA100e379a9b78266071d64426b1574c3e9b18ae0be
SHA2568f8348789b40e1164f55bd59acf03e21772fb84b5ccb7bbd4a1bd52dd6a28c00
SHA512b32d54ef86ef81e5a75cee98e4a8c34d02e9cc734f6f817f3fe41e4b44ccbeec1ab21a7440d5c114b44840e014c76b4e12cfb4d0775406f2567e7dbbbd7df327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5830663e27bd9e6481ed472d0cd1e0abe
SHA1c859efb1e694846b8b2818981504c5e9c300de30
SHA2569e788f532ee6e493fac21b305c5bf6a3ef91f2fc374c69df4501bfbf1523e92b
SHA512a48ddb2d2c8129da4cdb9540243abc0298ba8c58b8634ba7fbac32bcaef34491b2f8330738f0cb2b91725800cf817f58e51eab5b7551882da65855ce4f0fc051
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b