Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 00:24
Static task
static1
Behavioral task
behavioral1
Sample
057eb5b54230a0e2e4636edf2ca05da2_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
057eb5b54230a0e2e4636edf2ca05da2_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
057eb5b54230a0e2e4636edf2ca05da2_JaffaCakes118.html
-
Size
6KB
-
MD5
057eb5b54230a0e2e4636edf2ca05da2
-
SHA1
7b296b4911f6e3690f36c142740acb28c4129f60
-
SHA256
cc4ae29088ae42a0a13582dfd3afcecee4b1a2b2f07501297709126577f93789
-
SHA512
8c50232e7fb19856148cd1b1ad88a1b112137081dd22b263c6d78d4dd0318c9e67cf74df51ed79a406d70a7b66cf643842df30ecbc6a25c53670dea10a6a3f2f
-
SSDEEP
96:uzVs+ux7kTLLY1k9o84d12ef7CSTUpp/6/NcEZ7ru7f:csz7kTAYS/M4Nb76f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425350551" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000c256fff82520840a6a0ce9a36f4c0cb90c018e55014d2fbd4491f052df98abea000000000e80000000020000200000004109b6ac98a1be1fd991dccf387612e0e6c7307776ef137b5e60ea33bbec2ca520000000a2982696c51642deaa8536f095cc85ee6a0e388dcf524c0c9205ed2f6d5d98c340000000cf5eacae425b92f3dd18044fab370b4d66dbaeaf30470a2de53f6ec357d188feb25548c0ff9e2fbd3ed4917de7de0fe6fb2dbb16dca17cdc221c26ec7e0697cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8067a413cdc5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2602F2C1-31C0-11EF-9DC1-C63262D56B5F} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1804 iexplore.exe 1804 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2244 1804 iexplore.exe 28 PID 1804 wrote to memory of 2244 1804 iexplore.exe 28 PID 1804 wrote to memory of 2244 1804 iexplore.exe 28 PID 1804 wrote to memory of 2244 1804 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\057eb5b54230a0e2e4636edf2ca05da2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1804 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a00d09f1dcb81e064aa6b642e408fde4
SHA19145b6473bbae424aed55b0ae948c044c25d9660
SHA256e2e8e19cc59381e3182a24ed7d34954860264f48cc821235e67437cb92c95137
SHA512d19c2f4eada1ee078d9ed8f58078e7f2065d6cf446912b436dd12862dd4715c2df3493795b27ea78004710a6373543512ec9462365f26601bf264bbd8ca555b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551997412f3ed55b4bbc93262625dc143
SHA124cd3f504b13e8cb4cc7fa621f76940dc28cd716
SHA256dce3dbada68b8e598258c08af85d5c32a58c89602ab76893a67e40fc4cfa1c61
SHA512ce805e8be0d320ce579fc1aeea7dad728df12827db8bded98286afc1d5ca87babbc21b5e31091c465fbfedf7993eb4ba022ea04544647010c572798dee65bcfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeabd862da19818153ffe95e02faf1be
SHA15136c62c55b139b5d82f460c4b54012b1f6885d1
SHA25645715401769d485a7043f98e429f82fdb06891f218c9bd0ce739e45fcde61ff4
SHA5125b29b4f02be48a12458f46c30ec073e0c700f6ccea626a8ae4827d8651b79748ee7fb93015c4aa3e6207cbb0c4429d3210ab262cb36670e68a9a339c01b1e71a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0cb09a054790fe031e8d33b07ade25f
SHA1ba7827e6726d8c22c8d76e7133128d5aabf76bcf
SHA256c8af0d20a6bd4907af3854c9c2895f4c14396ec26b40ab1f556d96192a8e49c8
SHA51244a43c79ee034cad83117960fbc9146a9251674872eb0a5f5de869bd3e0541b56c602fee3aececc9f3f38901c2d52519940c2d94a1b73e07e82a1afa1e48be35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569a7fe3970b86adbf6c647166650fccb
SHA163f009ca697f5a747767a6c8edde97aee317abec
SHA2561bafcaa560b194151890bcd2a38b586fc7c7f7c08163eb8c47a4099071131685
SHA5123d1bdbb1639379c57e706f191264998a49fb7461126ea13e463a92e1fa46af46fac56fc68536adc4be5b0d5ce6ca2aae8a149a63ff6ebd3dc0289f3dab95dfb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555cfb9c5f4928ddff1bef480f7a492ed
SHA1e2c9074f6f79e1aea77083689959da2a95ac45b7
SHA25677f34500921232f47d4886db2855d2df59598a1b2f2e302d12f1c7f47734781b
SHA51200c9607c71cbf1052b958edcf91c0b18c698cc2e5c06dfda2d884db024f8fb7ef24e9594a17ff22e71c286bba6c799ddc3d403261b9bbd9cecec52f44c8db92a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ba1a7f9cf823dc9b3d3152ac8bb3fb
SHA1a6f8684f73b8dfe42a617bf1b382482a7972ccb9
SHA2560a324cb8b653e1422ce304dd607555fa59b49d2228de37f9c9d67a7ce36ecaec
SHA5124b26b60f78465725e4c5e574567d693ee8ae8e550bef809958cb86af2d53ecdc2f69877ca5c74fd5a4737aec4f3449f386f533278834dc282bb35a628eaf6c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0588af61f234b6c4b5ccf0804f7bc4d
SHA105f04f424c5b58dcad8642a5e0e56eb4f1389e79
SHA256789413fd5c4db38260baba72fd72fa8d9d2f1ecc0070c5cb2f189f1b6d1a26b3
SHA512f9f5b29c7bea637599bf0fa7e56600cb74b746513d06b8ba474cf0156b3106e70b13bff84f0a514b06f87669978505b9477384df8fd70fab11f981533adcce72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7953f1cd1670210342ebc039f7765d6
SHA1152cdcd10d87a214fb4c096ca67c366a4524cd40
SHA256a4581bb37ee67b70a80d3fe9c58aa30ab4d86af9c4c36555caa098612dc8e0e8
SHA5126db248f3489bd7421a662638dcc90820bb41692d715f8628375f55c26d25a83d1576feb1f831b84ec669a0f6d838591bb4952a941d60645f01aa3b935f3e9c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebfbccb72a83de07f2cfd11fd464c2a8
SHA191c2e0e52222c0f5009b57dd05109811b74942f0
SHA2566d044d85c9b7c22d95c3692ae7f2b84938ff93fcdb810dc796a203fd53743b3e
SHA512fd8427170f5a656eae6a2bfd6d849f7f7c503e4e59db342a49308a16276e1100eeb39212053ef785dd0cc7a354589c5c21a0b813de151ccd2aa70a209803ac80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7dc64b6392e6cea689fc2b656fe5776
SHA1e0d5f9ba20b3b8d8166531a23240688622264231
SHA25678e8c97520d429bafd649d13a192e37bd96e3884199f085aa940f9618ad71ca7
SHA51248295ac3e8ca2ca013751e109580d7ad53b970b6269b2f5b86b3a5f789f0e33fcef2d117b709fcd182a8df2b064234aa3e30b1d74ccaebec704e00dfce9c965b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569ba3f1548bfdcd056970d58190b3aff
SHA1c6950a20be9b175a2bb18fd4fc9b74d233fba465
SHA256aff75779b1e991d18a452e42cada02064e429b1d91fab0ba79b85f3ba57a5d12
SHA512852de1cc2f787cd851d167b3d3ec73f327c53591125e5ad534d89d950069a01e6a1c6cfc5818ed309a1e653a5f9e05f1cb432aa22fdb106b9fb6e31a0ee8d374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5923ac5d033214995bb03c831a0cef5fb
SHA11b20cc216ac75cf7e2eee117d8a4c14c4600d7a6
SHA2561acd133e156cbffe1e798c8694386418bc44ee74de578ec90cc3600f0cc9554f
SHA512e5854e0ce74ff2535c999246f88da3d12311a00e439cdbf8368005f76f7f47982144da706ee9840d4551c3d44caba4491b4f967f9be9ff0f44a03103b1f42e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd216bfd119fd489cb411eaa13787e2
SHA1cb8abdd4375c35299a6a8109be65b7a04fa823fb
SHA256d57b21d787d5554ad72bb9daea0d8cd20502832ca81e6b00f0194de2e82175d4
SHA512d676c48df888a580a6550733f672b94e17950e8218f3b63af2feeaac02532cf169ad0c4366e8d77ae51f9479049bac8ace51c43b8412cf9235b68f8b85978146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c76640bda2add9e1052a9e0d592ef1
SHA12ea2fcf3b04c7e14d55e9a2bdeb8a733cfafa82b
SHA25658b2be4b56ea946ce63eb0b8fcc731a80477ac4d45fa1c54f8fd786cd39e9477
SHA512f5f23553dc03ebc56d337341cea05ac0ea9882288ee5fb96d6fd3afbf5e207d30ca329b15cedc7fd946ad410a66474f3799bca68e044113a2ce98a2409e4e40c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5116c625eb77cb402185c61d7a71ea774
SHA1168b399f987633d4153ea0b128727b4fedcb3906
SHA256967b0ea706929188c1eab3c9ccdbc7e09516a866512bd72bfa71bccb4fbcfa74
SHA51228f7adeba2da0b346abd4d847bb539684f0b11a9f977c23fc6d29ae12d3ae975561f90d52e37fc8641c2841b726d17bd2932a7c8c01ecdeb3f89e083fdb7ef04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daebbaad0205d87eaabfbcd84d5ac57e
SHA1e676ae5a79276202ab1033db642ef37a1e09c294
SHA25635001b73ea9587bef18c98de88be672c5de882f32ec4f1a763e94d1abf0397d2
SHA5124c66b7c1738dba9a5e4ee746a13dff81f10478f83c28e4d9b4d3572164604cba8cb32483ae02aba4445b6c3d4ed314557aa6ac06186889d7368c54a48612a1c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e969300e7b44a051501881c92bdcdacc
SHA1d072eaa177257b62bc77db410cc513aa4af6b5f2
SHA256c2096fdd73513f606c709f8649a3cae7c107c6d01c9cb57d77190fb48f9022ca
SHA512561c065bf43dce190c0af1dd152053cef0bcfe261207be35fb10a8f386ae17f97cbaa25585ec10895a5379c16aca2a1a21d158a6cf6975be75a2af02c3cd2d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542c6e7911c8bb5cc1d92bae9e1fb15c9
SHA1e041c8e2f3e6a60c3b1e5c3d24ef8678ad09cde5
SHA2563f3a067b47f8cc6d049d3dfc5f7458b85c92573a34c4ec835c6641af113362a3
SHA512042ea70dda6bc7a1391649109fa46b539c05ee9802515d7413a56349d2733f251dcd891e07772df07782cc4a070a371d7bfe609dc33ba31ff364ebfc238c939f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b