Analysis
-
max time kernel
124s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 07:17
Static task
static1
Behavioral task
behavioral1
Sample
072426a8cbd2dfb39bfe74d6e8042bed_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
072426a8cbd2dfb39bfe74d6e8042bed_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
072426a8cbd2dfb39bfe74d6e8042bed_JaffaCakes118.html
-
Size
11KB
-
MD5
072426a8cbd2dfb39bfe74d6e8042bed
-
SHA1
8116dcf5b9955fed210b8948b171d7224f3e80d3
-
SHA256
d3d279c7723296c3045dc6001b712af1260e187af829feb7cb5a5d32ef257413
-
SHA512
da43669573fa18eee8efe00a5535d937f475194d966b6844145e1fcdd557728884097cb1130b59b0383eada9d6eaf3756316fe28c82a281dd881fdcbaa7425f8
-
SSDEEP
192:2V5lIsr03QR8k/w1wvqLkZDBNkn9vdrIT01TmvLuBuLbdU8d:s5lIcuQr/guDBNkn9vdrIT0TmzguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF2F8591-31F9-11EF-BA09-6ACBDECABE1A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000570d4a75471c3ecfeb10ddfd86845bfa68d00ba4965a9f97a93bdbe7c4060f30000000000e800000000200002000000046510dc84fc8675e852bcec59b0ada1c8f9058ec3727de2fef6b147547fc40c420000000e0f7cb545e73cbd296e5eb39cff63bb5ff86d8285f64a4df82acd955da12b90240000000e4fa6a316a3c370d63213876952e4318c49b7ca7638657384ee181ad4e1074e75f43314de5a896478332b7214a44b301c9d23a124d40ba22af4e8036770e5089 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b1e8eb06c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425375341" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2896 2024 iexplore.exe 28 PID 2024 wrote to memory of 2896 2024 iexplore.exe 28 PID 2024 wrote to memory of 2896 2024 iexplore.exe 28 PID 2024 wrote to memory of 2896 2024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\072426a8cbd2dfb39bfe74d6e8042bed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d510607deabba0cebe2f74c57abac993
SHA1b470aa9d2612d9e0a9cf3283a039ed3b28bfa76d
SHA2563f1258404cc2829b45945fa7bd19e53a53c830fd90859dbb9e5a55a6bac32b54
SHA512cbe6fe9d4474d87c351d6e20307a77e9165a61396d64158491e60859115a1db8d354e15bf2e28beb7d416e46f63f7b51d30f72f0f562c70d56e48ff0c7521e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e0d1f9845e07b15b8b1c3c0a768c89
SHA1f1f4f3cb148eff4c19ece447ec1a198d33d73456
SHA256e8d6bbbbde0ebf17719a5b8ec16fb8f055094e8828c22d61e17ac24091d47e20
SHA512b552c224fc89700b5f9e5339d36ccabd740233068818aa555134101b763d0596ff9345f4c08627e708af9c9c728fb422287647a9aaa13d77888d4ad8ac5d173f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a150145dad9f300bb98c5edb7e855054
SHA1b784352bdd8e22f731fa9031c9529d34793f59d7
SHA256c45b2ea8e0cdfe07164757513c92913b6865cfcea79a23c1a6df92136667f557
SHA5125d8ac074c9647588dcb9ca2b7dbed1bbef1798b7cc6b8ae8c414c183a415326a87006fa520e3e3425fa6cd999118429d834ece15f1876551c4a7fd7b4b23c5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a81e5f9c1c2061e194e2d120a47017f6
SHA18f32067bb391915ee31553a33ab7f9d5f5b8a10d
SHA256022a3bd499da69fcc34ec4bfb34a05590a243df42f0f6aa5d8685d961608c3a5
SHA512fb889921960e3a0d3bc823a97132f79c6db36d1f5635ea79df273e5c7ce592957c6d91a3b5d6bd5b97ef7be4e2e7511f96c7dddabdc673acef4e237a9a47ef1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53147e002ee80b47d8842c581c5224bd3
SHA12a6e66a0b7f6be6b3d0e560001a2b61a36f8fe22
SHA256bbfa8b620ffc63aeee4d56cff517a1826c9015d4549e142c2ae252a1286bedc3
SHA5122448028a0072317cf11345fdf1a7f3215aa489b4f693c3f284ccae69b1a537ee0e616285fa042317384f97925b2eb55f4db51a07d5e24fa04d5e75352d4c332c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b29b365f2eff54d426906741ccfb7967
SHA169b7d8bbc42d8254081249d437b29f6066676ada
SHA256d472b71711fde87ecaca6426c43b0cf0ca2617679d2609c324fc19a5994eb445
SHA512b6ac3de8520d4b6ee8eebf76e299b51f5f936000028925c7a56792474d1b3a00ca6b352e0d2455991feb3ff932101d64f5c8c9eebaa2890fac3c3be6120a0321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427ea9cc6b6ee919b4a87131728d9c24
SHA1645005070fa4560d6f7fa7bca368300296d5f87b
SHA256eccf36faa2d67e20f0366ab31ee9306a38b49c3fa5d997615c03ee4ee5afaa47
SHA5129fea17bbe72a84c032f8a19efc09a4b62025dc206eda6cf3ad9fbf9937c31b0d8481af5d26fabfc23bd6f5c3bb189ddd56742ded8906df4a04929662058fce25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a10c674dc0c2c5212f6769b629055c
SHA1607d02aeff5b59eed59871b1bfd8ebe64742742e
SHA2561b13ad89d7f767715e8e089e59d1f819c28b8805a5ee6336ec7d0d38d9bb81d2
SHA5124126eb3da5bedd366e4308062fe329d384fd4f88714ad9e469171a2b19968b5de1f63522a2211e47e3ee308ea5903d41d8e2b38d118c31f301aa7db09994ef4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59684f7f5338a5314b58dc5bd4b633bf2
SHA16410c654c90eac097b3c92cf4ec1121675accb50
SHA25673154d9ca65306f44b8bb679b611628ba234224fc862777ba19e6b06a950a958
SHA512d07c009a1ce22da517785c799cc197776774cf7da44945be67f766dab1b977f901d4ac4324a49c44f05f33c6e406ebc08837459346a481d8024e63ee232ead52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c6070ad9d531f5e55ff1f13966eb74
SHA18380960dab3056ba443bf967fa82a06a78b3bf28
SHA2569cfced448b1534d295609c033cafb5dd2de95b3e817ea639a93a888143a5585d
SHA512de9fb354bf83c8dccdb2481b6e71f23d6ee7803acd56541306ba0fe412ed8fce1f9a747407845bee1efe04698899e92ae15e91b5567a73bd38794107846a352c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba34d9b40521597895fbdb659106440
SHA114f8de0fd0c8ecc623cf6624fe5fa8d19d1a7596
SHA256e5377b8f8f5a5f10adf4910d92a317bf6909620fe0d934cd633788c170ebe842
SHA5121bc7bc4e381ed6841c2154e6cd78419667decc3c28ce225c99fea76e5b041bf3d8655ff013e9b799bffdac4be892adbfc5368c2ccd42dbbd10f0d3c6dac8142b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9d41edeec53b10a1fe69629bc9e08ed
SHA1ad3c7957900cbc6b07e668e77e40d91b189b841d
SHA256505fa17c633e06dbdcada0c639fd34edaca51a030bec2fac0a26ff37f4d5aadc
SHA51283acb1e624f4cd831eaa883d78541fd4f5597be56e006cff133b19abea6669440f3f74899a84a641a5c33f19c5b8485f95cec3fd4f8a4a3cc0931c6f68501229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff2b0d2b91b84ba87bb6b0635f3a1180
SHA19bc19b0a245833af305bcb17aa30e23d8ff54554
SHA25636a884091096e4377e28e64d8a47ef60d22120ff0189cb9b40801c1f031dd84a
SHA512d81860fd7392a6d8f04ead38acc1127b5d2e876ba5a3e07b105102bfdd7aabdc135829827a3898f5cad04767f45a50afb55085df935312d011252c05cbccc751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e7d81e88ecbb00957492ce91cdd146c
SHA1f647627712be321557f4f3ea08eaca4683d5c50e
SHA256d47b7272f3d4e1eb46b590387ab7c6a770ad59b146fe903532e1203185477630
SHA512d301455f03ed50052a37e898f9390c17a01c4e7514dd080c53d9d6699b0d0e813eca63118ffcf52da1a7ea17d5f32f436676358eb23941dad5175c406a61b7a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58885878aa7884520ecca96d5a1091642
SHA188d21496317f12757715b212f92f05cebab90eca
SHA2562c8db1ea460a54d661d4e845d5054dafdce78ba62c2233a8fb42b179bcd3f9d2
SHA5128438b9e905a3bc9155c255d4a54765a741ebc2f37e2149e66379a22528b406bd4b3acc038419a49b2910ffe12624619dcf6cd629a70992628efd72f71aea5a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ea61e0ce21ef86861532363f5c13bd2
SHA13543e87c492692cd1cd6d09a46d8282edb6ff803
SHA25635170e2db10e7d990692f866d868bd3fd2a0bb7e7e534934fe530ae8553d91f9
SHA5125700574535f0eea38bc096b3204c4757dd783194f38a4bbd5dfee34d5b61c9bd056c6d493a8cb49251951278339827e8f8fad1e2104fc42a43d65a32b05ab45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b3126ef346a964f2099fef5763cc8f
SHA17fdf8b75281489826fe144ceda7dc1c901f3532d
SHA256c9d9c68557fc4557ee7f2b54392799f6253c783feaa97576c5196897e482e3a9
SHA5123659fab45de35ebaf24464ecb17288b7a906b2ec45387e1e7b29a325ffdfb61eb4360df9e8bfb86bfb6394ac5c0c6375459aa08909591b07f83ff100cdeb7edc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e7d872db872794ecc689f508ca5a05
SHA1c508529345250313134aefc1250790f9c31ccd21
SHA256412c7d74171c198b8f5af0ff51ff86dd4f2c24066c623c6cf0db0eb56edb6381
SHA5121f730fea2ea2684010692c804742e9d7d2c7d33344f4639e0e785b948ffbed71d957602e33beaf0afef6fb74a1707c7a8a47235365efcf8f2be8f4af01b33e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cffe84dbb988e5bb7c102c45139783e
SHA180086d675e0879ad1f87673c565befcbe8ed6878
SHA2561ae1a716fbc06f426d13cdf0174a0bffc11e4aab2507dbc4a4156649245e8017
SHA512ff2f64dfdc2b35db4c8d2f833757f87c4f61654986bd8c2227c4829d7de505b6a61121192be90bdf5b0423b95aed4411cedd95b0ef8ab4b414a66af2790cd943
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b