Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
083f749074dd36064f3d850e2476a22e_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
083f749074dd36064f3d850e2476a22e_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
083f749074dd36064f3d850e2476a22e_JaffaCakes118.html
-
Size
23KB
-
MD5
083f749074dd36064f3d850e2476a22e
-
SHA1
0d41892c44fe0e3689cad68b57c9dc741719a05c
-
SHA256
c8ecf647f8e2b84e38566f748d393736c5e413ac504932f8a1f3e98c5c9b2ba4
-
SHA512
0aa523ae74d740034ebb887e7212571af58b5db147076349b73b196bf962a61339b9ec4a537e9592fe0fd946b5464b9d0a56ff0fb99959fda0b4b82176eceee4
-
SSDEEP
384:PU7JcO2yzmW6Ovh5hnsCLzxsfOYb9G6MKkq2gTYSJ9rt:PQJcOBjvt5CtbZbH1rt
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000006bc5c077e54ad4eddcf92e38fde900fec456339ab78d52f5ef251cf291c246cb000000000e8000000002000020000000466081d6fd54cfcae4251c3346582ff7e6f0af2ff96526bf7fe499a458fc3cd72000000093cdf9a0190d610b25c29c45438761f1697e61a0fb1cd1397afbf9ec2f89278c4000000032c2800712026fb06cb53e3a1fd9f38f9c04786e2fdd49a7929c4e8aba743e552c619d31991919e345928a8e69eec8812f21917c9187e8f87394b226d7e3d472 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905eec9337c3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425066478" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF0F8521-2F2A-11EF-9A0D-7EE57A38E3C7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2628 2180 iexplore.exe 28 PID 2180 wrote to memory of 2628 2180 iexplore.exe 28 PID 2180 wrote to memory of 2628 2180 iexplore.exe 28 PID 2180 wrote to memory of 2628 2180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\083f749074dd36064f3d850e2476a22e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bf0d08716396ddf846108ff3f84a1f9
SHA17acf1dcc08db90d99c32b1b0d71f01a24ee4cbdb
SHA256090724a5b81a422d19509a5821120db1434854600fb6515f4d2d770c0ec32161
SHA51260e22502ea3e8378e470fa39397616e52ea59e22ef18995cae10860300ee5fb50c68bdb5d4a72636f1539f15f6bd34cdf6ad4f2d1a453f52a8e678c662805664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb87ab95b3fc5bf454997ec14e5a3a7
SHA1403c461649dbd62b5011d05a3b4b2483368b723a
SHA256d07963a0511b204c5d48169cfb5d54039bbe223ce4f77d88d62dd03b64e2932d
SHA512d1cbd369dc20313e7523de21c1a911540e27167d173404a82eac53012274a64b19de38d321f66d383f9087e74855252d195d4ddcb9bc0d8219d687dc333c9f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56045f79910b32842ba2af098214c7ece
SHA1fba26d55e28c5d1a6a9e9441ff84ff422ecbd221
SHA256892860d8720bc37ef3a33055e6f76762b6925c06d48ef824a7e347c189d751ee
SHA512469deefb51d99adeed9d1a142fe97dd043aad20b97db74574be53230f5445d0557d9a7537ee35f3557c20a587a0f4c2fec0abed02aca10457db6858a0e86ac9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ea28f3316fbb397a5e9eea246f45e5c
SHA1cb118a56879bbb4505eeaa35ed9ef20c5f5a83e1
SHA256cfae4d1a5074df2ba0d90ed26c047b064fac1167180367a1277a277567274c17
SHA512fca38354fe6a0fe2a06ca7ad15a7fd8ce008da8086d03e7c04b325c36db60a747fa176a581d7a440b7d7a7089efc0d363867e7ee1a9d91f9d249e377fbe8fc03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f06aea1be1562cdc3c747d4f71c375aa
SHA1746b971606c47e0b1842488bc25ac166fc683298
SHA25607e037dd7e09dbfee4c2241bdca420ce3689a33c3cd9e654a7eb6da7ac78c617
SHA512d71c9cc7d81834504ae4dae4b818972927ad8f7427c9cf843f40d57da7148a60c4808f1faea0b2b747b914666a6b6ef062eb0cd0b66e421b957c8461e7828547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55caa5bec6a8cca42d8aacba53526e203
SHA136e12a05ea264669addff8c7a4de3fd14e8915c0
SHA25685df3fa9d9a19cc8ea9f0dd50aa7c9d4d1c56657f28b3334d2692c048cca40ec
SHA5129c346981de93f8ddb034392bf349f014e071610255256803750e77930510055de17c393abceed8808c1e09e9abb535e2f9d56c5c713d4cc19aa18e65f55ff113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f0552a1f0c9a5f1269a88c39aca8f9
SHA11b6906c75ffdf1dabf9b84cccf1c1e6bedcbabce
SHA2566d36593837ad0bc9065c5e1ff0b2796df5fde9e85f4a54ef42e15ddd5b81923e
SHA5128d4e3ce01aac2624fc45a32861a53c0968f339944f231e7a17b3d7c962e0875645651bbcfff0cf73d0161db75ceed74463831c0fc9abf032a3abaa400dc9a78c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed8c8151f00abece3296368a809b2536
SHA105132740c99c5a4bc81d6dd3be1c7580cb1c4199
SHA2565ea72ae2aae502065d97a2c06d5127918b79c98854d658cc0daf18e91438367c
SHA512d3b34ff4715c13522c74e488971dcd2d443e488410e043f4bce59f3917c8b04edbcd3361165ce2d3f7343c6afb41d1ab0cb33400a7923e428814b4d6a9c9069d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4e109c22e4265dfad8cdc402ef3d311
SHA1a48a22b9d46b517bccde1eb975955ecd947a9ddb
SHA256497d578ccfc42cdaf9e81ba54f72b65bf12df31ed976d6221c6d9291e24a2aab
SHA51239c565573e5dcd1367dbc8070cab38d7554a07a857b5304411ff87c185ad55b38a8f0554f103742e37c04da284820b4877167457ad78e2721f73762d287e0a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff34c9717e9ff5cc311228b54e8d76bf
SHA1fc509eaf4e991a03b17bc721ec529a560a70a8dc
SHA25656973ccd38049894b68fa7c1771052e3a3d7f028dbf2a17bac459eec0280262e
SHA512a13376a79659ffc4babd3c037a53ba0b298face898f2238307737befaa18f0b663ecbfaf4b59f0f061030931dd31c711d0c9dfa6e538762f31e81cca5e0e6631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567f6949b3057146290114c4e47cd9f7c
SHA1aebebbe38494a14ef0ed719ab9299af65f9f1081
SHA2568b94024fd5d2ea16ecd5fde41e773b1c97733a8e8f3bd55a91e373d5d3e20d7a
SHA512254fe06cf8dc1d3d4a17a37417a85b38bdae1a93b6daf05c340d7b51c3cd8fb5ceb93d68501be5d02aea8665fcf9175ce34a58038db0b79185e64c12a1141f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5305ed0299002a8a82bde398f4e2c47a5
SHA15b0401c6a1a7f1f7bcabc24bb759d9c15660e206
SHA256ac28f41ddf4abbc1347bbe2da3c173e43e92989dd59b21fe767baa097f39b3c7
SHA5124e8d8200637a987f6ea3639c565501dd16712a9eb27ea8017027cdfc0c0f3c3e06f9e437d0fefe4b8a2af26ec0e499a7a87c9fbea7d407b737cae0f2a9c11c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a24604765cd9e41a5586500b6f99fd
SHA167a61d80ab9aac934a1037a2d4cbe1054bd101b9
SHA25697f6a57fac1555c0bb6870f95a136f3853a1b240d667d4e9778ade070f23ffd6
SHA512541419c093f44345ed493bbe5763dbcb7352af779e168b8ae3766db3a6cfa4a8eb0cdd748936c791693742e74290f0b500b81030814ded611e70b1c8c1a1eee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a836d11557c793e1736c0172312ae455
SHA1e032435be08d150d54cca65f29f18c3a48bc8583
SHA256e3626b6466ada26dfdfe3f858c6cff681c078ee735fd846109c0a3edebba3906
SHA5128b5a2db9b83d7271a909a959b07834ad94d79f32a9bf84862180cddfaba3041faa54147a1896ca2f5da56cb604b553f59306e502a1b718e05ddc5f76bd7d90a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf949ef939214ac8302efaf53bb42056
SHA17578780f9212dc0a7a353a9784d117c1435c3f19
SHA25638025bf03afc057f36591e4b0e48197a8dbc3c8400a86ddf1b43ff62985971ae
SHA512fd6ff79657ef78017453c8f4af4168e007791ade19123344950a359c44bbd0611394380cbcada429c5adadaf3e212de02d7ef0c6f68d35d182c4494ceb282a0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d73a0a46830ac57997f759b5fc9028a
SHA1b4940e22f4ba5b44fe69198df89e8df4c22ae62f
SHA2567dd8ae04a17dbf79f27e6e2650074c7a9abb034684dd8272a3e9e4be87fd0785
SHA512137689a067a939ae4fa382550e2c372ff44772850ea050b7fa73d1bf008bccc63249fe5cf15e04c2b7004f698b328ecb4bcf5e85491779b88441296e4f2fb949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5861500f4b70abc2d3748a1a063c329ca
SHA16cc0751af175f805b9070ade879fb233e2c87635
SHA2564e81b7377cfebe29866ff97cc50b1d66f8e68d23bf190fb9c40971375adc6776
SHA512572b7cd7e414d43ed2d21b2258099fcfe45b88a151b402304e4f0b971ef34afa989d16030e7ab54e64b988209fa671f6628551ce0d79fe5c15a1c844753fd3a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7ef610a0068700c8db1342d4e1ca042
SHA11713dc14ea2978b1639d4d9b07ffcb0fc3a2a38a
SHA2566032198cab6726afef5182176ef3ae49b7dcd0d90717f9437c5dbd3137e51cb1
SHA512aa7e60655ef42c7dbefc9e37d01b7d6ed792155bf95d0a01ed9ceb98353cbb7e9a831ae816b15fbaedf2b891b3385db5d9418161cf6b1bc9eb5ca04942ea3269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505612e2aed23c557e981cbefede137be
SHA13c7c6c03344d4c734379f9b68ac9936262a5bfb3
SHA2565ba478b8e40e0ad775fa0fc689eb2d5ac9117ef3f53392e37e2f872922915f83
SHA51292c55126f95072e34ddd9b3c3363f58755d96f7ac91ad03ef6ae57d304432d28fe1bc1de3045b0da805a1e9b46329d9ed0c40125797689aaf54045d862412195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc436c83a2bb96549905d078563f1953
SHA1fb70f70b796df1637d4195809a946823407389f6
SHA256bf7225ec8f40b2d8500f889ae8348d56f5ac3d691fbaa6f84783e2c04047db4f
SHA51290740bc8b5a9c8aca2b20bee438c5685c5acf7b08ae04fe557d85803e3307e3ecd1baac97ff14dfe22aeb50496ea9257c34f3412506482d7c059c927572ce40e
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b