Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
0ac225599aeacd790880eebbfb5d297b_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0ac225599aeacd790880eebbfb5d297b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0ac225599aeacd790880eebbfb5d297b_JaffaCakes118.html
-
Size
9KB
-
MD5
0ac225599aeacd790880eebbfb5d297b
-
SHA1
aaae14076e20cbe17f7c87116a9d5cda6dd12c5f
-
SHA256
3cd5923f2f41258a3d1400bf8d6c73337e28af4c05ab15688c6996e910b028e9
-
SHA512
9dba56ee1967769261c0954c5c2e51bf82b007dc71b808edd25d8079c291d0ec49ae60664b0d63f32cfb589f01696a76e361d2d16e63d80d0f89ea89eb342151
-
SSDEEP
96:uzVs+ux747dLLY1k9o84d12ef7CSTUcGT/kZypUlVHcEZ7ru7f:csz747dAYS/taUPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CAE2EA41-3272-11EF-8875-5E4DB530A215} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000a7556432be547f29c0e2e76429f08e8b95f90be5e8989775880b13a490462216000000000e80000000020000200000000ba37db91f2889e20089d8d30bf65dc6e55683da16bde06fb20bcf53f86b8df520000000b04eb9e7ee566e6addb04d238c51e3350ad64c30e9e37f7ce5dddc39b2ffdc7b400000006a00de37319fabc0c1583ff8c363c9a92afcd2edf4b6f8d4a11916fcf89d08326a8be09c0af623a947801517a5a29437cad464e3ee3e0593b934f13d76ce606c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425427276" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803bd79f7fc6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1844 iexplore.exe 1844 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1844 wrote to memory of 2944 1844 iexplore.exe 28 PID 1844 wrote to memory of 2944 1844 iexplore.exe 28 PID 1844 wrote to memory of 2944 1844 iexplore.exe 28 PID 1844 wrote to memory of 2944 1844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ac225599aeacd790880eebbfb5d297b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578f1227d6506c0050bbab1ddc604a65a
SHA18a08af8eee64ce560cd322d0572555eebb101a7b
SHA256925bd226007b23b53bd6f19398a3d324c93f2f2858492539515cc999e2b152fe
SHA512ee36fdec604600f999fe1bfdc6e100a9ba6f3da70bc2e11251d431aea4614c25910f595afcfe67f8938cfc88a115c7167102033125bf5301b20cf83fe9cc4e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef209dce5d3619b71b9c26d61f93ebac
SHA1cba71542beed74b6239f59000a09c31c0e687935
SHA256e249b5c67325e8c9c4b356113441df73e2e51e5251edfdd999ddad75eb550cf9
SHA512ae49eb4f3d1f1fb7ae2f65a1b3a66b725b3a607c7e9590da4df3babf4185abbc8deb3f4b0568c2f55a62527331da5d1d05273da2c9eb7a5895c9f97844d2da26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c7f0b4b2cab279529e376d367ff932
SHA1b3b3d842b7ed6c8fdff06a637e0b63f7b94dfd6a
SHA2566a92d92b06558ba89bf48a7c4c200596f1820a1160c1bbde32eb3850e20f40f2
SHA512994cefdc2fc346d0471878872bee6dc5b07204bfba2a4bd77cc4cdc5f598b67145878a54b2256b80cf008d9cb0722b43fddf60627d54d4479fc0cec561d6603a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0f483af4ddceaed2e6d040ef9b36cec
SHA181fda181d3adcac96b16a26d400e1057aec273af
SHA256b1c467b67acdaba0fae1a66b8aa7df10c344d17b7ef08e1d8f773cda207bba24
SHA5125b07043faca9d9199de38acef9c94f4d820718daea7f30e545beca59a060d5ab273f8a2eb12a072f8ec7427a87dd191b1681f02ed7f7c4c85af56635553bf101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d875073b403310d8f175bb523ff622c
SHA10b39127b3babda749fa6ad6668c0059ef6fb147f
SHA256cb6635d4b01009178779910995e05df2c7e432c2c3510b75c28c93ccce621f9e
SHA5127424a8f71feaad32bd24b3f4bfed9396bfc611e9663cb4576599f24ce46acd01c2a70db65ceb4456cd298e852874d6083281c6727a7ec9cace39f3c579ba23e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539440d36b6e7bf3fb6513c7163791d7f
SHA10afd2508b17a0cfe59c032cd23ca7c58396c49df
SHA25604a80255a7d8c8e52e5d6864ed1bf0054617b1b358927224b3b1e41457715a46
SHA51262fb43a4b68c77b269a07ef2dcb5a6aea86e23119bf6af97aa3dbb7034a3b323c21918959cea0b14a8189fd45ee823a05ecfbfcb65de25e413c84ba900484549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc31ef89249786db6c6858927cbd3d73
SHA1b226d2325c90de328dab3f93f06486dd663f85ae
SHA2563f476070e32e1ac1d46b05e823de5ae5a97e6d346c36d74b8477ffc9ae2291f2
SHA5126ddd9ab13c45aaa023d8deb8f6fffc876a8283290ee2bfdb10e9c7722d8ffe846e49c94c1f2e25fc80bcc28fdc9b5f276015877e2da676a6625580cdada9350a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544214177694c58a572e3438723904c62
SHA114b3a4b5600f1907af8b6bc334b633d794e55fea
SHA25683e81477c7cb2a82101ec1c126a0cd73c017735062a1a787d77a679bd0042861
SHA5128a3fb40d71e90f84cdca64bbe6d34ccb75a3f0140fb63862c52d33f25c527ecd9c44eb38b5a0a32245b72dd056d2389e28e13bc37944b7efd6994540e25406df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd97a9d3a0ca9f0d90fb63afc42825fb
SHA1fdee2e5e2e29cd19d0e467b56acc41abebf6617f
SHA256be1c6a909ff97702fa9858c9f1fbcf8790d81313b211d81636ce0cbd04258bb3
SHA512bc1d7c1fa212a8f8bcf091fd835489322678e269bc4edae0e5a4ec359795861906e761f2fb6c0724d86995ce59225247d14c9f6e8f3d2d0af1dc2d16f84e3510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cf13994bcbc4cd1047027ffe9e164a9
SHA181ad39069531e9abe317ecb6ffac8057eb5c9952
SHA256b42cec2a8a808e175b79b94399c6fb1eed3c4077fc5fe602a7835e3cdb8e5050
SHA512580562a4951c2edd28656ed5b7be621c32b23d82a60d92762d610a6e07b7b6d1616c384897e58f72726b01f5e4aac76926429a70f06e5a0cf1069f5869b2486b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d8a9c77cf049dd5cfc435948adaa3e4
SHA188025ae908b765ced010c2ed1bc7ee0ba2b301c4
SHA2566df71140161cd34227d5ab94a833d5873e4ebab173a186817bc55d75cdffc8b8
SHA5127b2d388673e18730b4fbf564d6e20039f30523bead4a2e737a035e039005af0fe0c54dd9977ae1bcf14a26f493c9c126c0c00c9e73fc962fef18f6a48480748b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6f31d0c0e98b40313ae6d62744b4a26
SHA1d8ad6512a23717949e55b67bf6d54226f45576a5
SHA256f0f669a9eb6e8278d27e60f43ad2b7ddaf7a8f551e6266dd38db307b6958e3e9
SHA512855fcecb09e93b04965135f5e21d8e54bcad76b84b07a3d08ccbd6f6453b47e58c8ecc682ff36efc2730747cc2aa6333603d4c8ceb08b4f74c44f4176daa5355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a65055ccadc31a1a6e84425751345142
SHA1d20b2e54426fd95f22248d02fddba710cb519f70
SHA256eba2b592585ee71f18fd83143008fe91f358060762dcc4cdaf7ce697168a4e0b
SHA512af98d871287e0515e1531a4538676adc0934bb1806d5c40dcbfb9bf618ae6b0a803bba413eb1536b528779e2f24f1f5cefa9dcff0d3ee258461e4acd2e9bd9a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c8cc89f283c7e6707a65f61a29907ec
SHA13527604fbb348c54d1809782d3432ca888d7e0f6
SHA256cf56f23e04cd5425ce747710b7593ad48c7742fc259b50abf315e6f4ea45252c
SHA512b9a045e7f2695823696a1eab6fb7cffff8186d64ba7d95b93d5d89c48604d73e73e5aa859b6e008136dc7c45a9edde48271c045768e4d21b545f67642fa469ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f717a916d214b6d98d12e6ab719f6fc9
SHA127556c789ef47ba7d2a160c11a540e22dcb1a115
SHA2561553756136711b04c3d9976dee8d60e39f39bf2f73da79089fea07f1f27930f3
SHA51296949ec394e993ba1d78463a9bd8a4f11a7aa11dfe78ce3bd81cac5c265276ea808b8cba22501e8ea4b7aa5668a264f69ef6a44f2f0c95e5b22adda799a8e03f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b45e39866829696d540fd71b3bec8d
SHA1447d56f61fc683f8a2d27b957701f6e2edc12600
SHA256d89e4b49c7db6d58d37091c95790bde5bfed31d0d4f8a0ff16e3c9261e109947
SHA5121b6345429e2cdb62f9ee3d1d16350048c2a6ce2483f8dc659d8cb71501e1d343186e7963ba62b29a7fb5843c2e24d105029d76edea5ad4e620a15b7ae8cbb694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4ea38efa41d2ced7d0068dd511761ed
SHA17e9bf2d79ae43e968407deee1339270c185149fa
SHA256625a993d96887df59ea56bbcaa5e7f483a4c6b71312e126bad04df2d5e853038
SHA512365dcb88a7548c9b51097f71fc1b671d9347df9d502fe66d9374ba12e9a76db861a1b7ef72fe30822aa48807aa958cafb0c54ea7dbc29e2c99f3ac8a2e7e6107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0936ae41e1d965edfc360fd3ce38e84
SHA1fdc4646cc07a8b98be3cc55ca5ee740a64e43bbe
SHA256645c42721d160090f54ddd29245ce7ee09f2aa6a170fb7d649367edbe972245b
SHA512eced898772b2d2b30626a3f3d62bce85fc5ffaf80637b97ad0a5292e10d89d9dec490ad8407b3db90d24ab1d8e43fad0652d62a3c14ffa229b33a3177e5b3caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561c32d975ef68c94be7292539daeb964
SHA10fa0ebd5a0938a9027ebd6c33adc161899edaefd
SHA25642f4a3b76e85329f685ff17200c37db980a34cc8e91c996f491b30b1a2057023
SHA5122342e3097744fafe0ccf7c9fd73912cba69df8c1033719013053765cef26b0d7d3097b70f1ae23e902a050fb4c87b108107db1785a8073adda8540ec1d3e0f03
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b