Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
0a5f771ee0f65a7fdc2f8425a5e0aca7_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0a5f771ee0f65a7fdc2f8425a5e0aca7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0a5f771ee0f65a7fdc2f8425a5e0aca7_JaffaCakes118.html
-
Size
10KB
-
MD5
0a5f771ee0f65a7fdc2f8425a5e0aca7
-
SHA1
7eb19790928652f298edf1839a3fa9befe73a263
-
SHA256
7794aa9297758980d7d33f702a16898a2030b893c2f6e8a73993a9174587d2c6
-
SHA512
bc751da1c596b263e65713ba6cf7659bd5fee4a3a1d5e75a4d2eaee758f8e2663e672d6ee59181ce740af589ad3cc3bf7037151099db38e164a09c800940f5b1
-
SSDEEP
192:5w4lIoaNNHoftcDvcOmmm7mmm3Zp93G0X+cDVJ+HB//PnNwWww2hA9mmmdMmmmP:C4lI5NHS0mmm7mmmNF29mmmdMmmmP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9756B31-325E-11EF-970D-EE42DE2196AB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062cf4e2bb4780e4aa7f43a81c9ddb2e6000000000200000000001066000000010000200000002b227d22e430bbebba9ed2e1e3b5f5623d3ecb75b59e9339280a519563c729f0000000000e800000000200002000000040621b9e075b3f9762a19fc34f3e17fff89e7c658bfeb1bcec6398b61dfa639f200000001ddbe96c9888f11b95c51c81ccd14562b709b74aa99873e018ad588ef90c083a400000000b31534763757715ba41ff74a8394165f351ab3574dc6b61c286c92ab9c7dd1dca7b298a9ce32b08fb9d4964b433935d0d1dd14bc35c64f6ad2ec45bbcfb147b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e3317e6bc6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425418630" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2944 2100 iexplore.exe 28 PID 2100 wrote to memory of 2944 2100 iexplore.exe 28 PID 2100 wrote to memory of 2944 2100 iexplore.exe 28 PID 2100 wrote to memory of 2944 2100 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a5f771ee0f65a7fdc2f8425a5e0aca7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d32d22239927f22a21b61d09551ee1f
SHA19a6946e85d0c630f527183aacb7d01325d75fdfb
SHA2564c5482b8b2fa382c0f4db35ba44a6c9e2b3f6b24177da758b94610b30bf0959f
SHA51228bb329d071336a936853ad041213c3f4fe4214d158116e5bdb031eea92df7c1862206e5533b4b7185f2ba72559a7975b4e064a40962a3b8aed53e9095130a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2f05f02de0718b2a765f77ed705f5ec
SHA15fa9221b7ac7cdbf6c0d1d19123a94f51ed79e9f
SHA256753e910448f0243eb8734f430d612b20cbea3889607dd0e7d638ca3ab0633f89
SHA51256c55facda8f464f6b15637819f5b3859255c57976a40640857dccdea309cb519a48e29cf9d39ba00af4fa4e2daf097b0dc5185c7173ae5c4ba4677ff559a39d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc469baf1ec2d7f79d806840f7e3e811
SHA1fa55545edc0b42254f83919a1fad4bad88eb3f4b
SHA2560c27e554cfea686f1e0ac301f15e2de82aa0334f1f2d85c2e2029b3fb02cabfa
SHA51222c7a12bfb6d3276cc79f8177c147ea9c74eec87a075d7557f04a1d034bc3b1ce5df71b13dd97a870fe7d57cce2b309b29f0b274471c27aee066c4ce5b1dd02b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5766e56288e4f10e674710ab7f1e1741b
SHA120103fb36435ea9a34bc90e1b4ed01a9666d1425
SHA256206c28ef1d600832e24f8e8a3c6b2e59bf28fd3a96bf71d951781df453e10e1c
SHA512474a191dfd53432bf15bb05df5a22e5fd6048f5ee878059cb096b9f8b40a4f9d512e4e4d3d70e9ab858658ba78e07f5a67f572a3760d33d3d1e12109da2b8bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5550c931d46b46472b59154fbd3e287b5
SHA1124f4c44843bf032e2e1a8eeeefd719a68ba2009
SHA256a0ffca82c2e01261b8fb8229f525cf4ff6473f59f42081add39e071be918cf71
SHA512e66bfc30c4ea20f831b770ba1087024db6a3f613f63b9d4261680e34e5edd2e9dc0a4631f3517340293d03e289c945a15acc30ab6997481182d0337fc4ed23b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a424c1c89dc99ea364b3c24ce0d268
SHA1a24203ab31c1bc0519cb347b2cdde32fa75c6412
SHA256db22eec212ab6a128356332f47f63e7ea861820a892076d0e980c207c296531b
SHA5125f3ffbd3adb0e31912c3efacf46bc45cc2910208f63ce0aeb89d504e09bb9f4690eee64c2cf965417fd4f47f14c9303ea78abb9ed30a4dfa8438b103ec0d0165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e4fd9ca2d82e5d3ff14bdcf48c608a9
SHA1ec0aefebb062d9fa85592cc1f51072ff5aac142c
SHA256d6f090aa130e4fd43c99bed8170acd80367ee9113bd385f82a962045e0a58fe1
SHA5122e07c1470b3594dc865f6684c8478ab0fbbc8daa63c0f0168fa5ef5493d31ceacab77e3460a57a0cfc5465959c0337e592609739cc37377074bba75cd7255ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ef0d63463cea51b1c339757345b87bb
SHA129ed383f1292a9ec18e5c6c36b556efdbeaf2472
SHA25605c03de2b60cbb83f97c783e85f681e8ccfd88b6826bd3e92c42219b2867db6b
SHA512468d47322fe04e8689b8e3b22101583d13ea3bb6ab369c7cc1483245b7e42df26e3c2db145e4c501e9531111ed40140946ec28c7e934c9aa217e6bd17f5775e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5727855b28ddf0ba62de8557b35fe8210
SHA15fb96d3e5d81b3ea2f4821586575f55185675d35
SHA256a41e0f6e4356cd4ea9c13d41f2aa9ba20a43f66011033ce0ac826a8ebc4218d3
SHA512d1fecf13315bc3e49a9a5c944858f70d517928bba75426afb8aa89d55c53f950444e94f5c4014053f429d483021c5d9c4b3367e95dc67020fcaa189ff9a37b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57855a3f29ab63e7dea129085772e66db
SHA11d2ec49a599a73612742cfeb5e01e5397760f47c
SHA256e5aa15f056e174c49aff9e906580331afb6edaeea8d15685b0a2703a0c4936a6
SHA512b90943c646d9162d99f2a484e928b2d795f8b472de2a510aa49502b145e02d7447cc98561473d7e25559503968404c986465e4084e463c1076105ae864ec47dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560b78c483340027c6096f78aaf3e112a
SHA131d744551631fe6fe1fd41377b7f1a6e1c0ce03b
SHA2561aba911fa14cc1ef4ede5e7a252dd8a0c392364979506234690b7b471d8e593e
SHA5126290b3d573b599c27e980d5a31960c9b9a5c6de644eccc0be67163e26eba88f9d0cfb13774687ca783e4a84b860409d681d670d3dc2487772ecfd442d7150199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df669a65d12cc6ec81be83a9a0d99501
SHA1f31eeff3b8fbf0db80606f951930ab25f6446387
SHA2569779aa0cba8718ee7f8d38e225ed941ab807dce5b5c81e749126ac9a5f7d470a
SHA512697b98ff91dcf097fd9e8c63e86efb5620711ad1863ed4d7dd5b8e89dd65e9fc18a884100acbdbe9a321f592a9e45f3d4b0b218c607e1e0f1234a89f6beb69ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee2a9d00df0955c4548ef2e4c35a42fc
SHA11ca7db2b6114b3b99ca66ad193ea654d45debbf4
SHA25654d1e67f82bb66e1522361370997f0010dd4c8e158d45e3ac1adec31528ad009
SHA512c15965406b52cd54cd6bf8a20c2e90b1d4085e2412a3cdfbe7be6cceba5c7407e7230a5febed5569ebf425e7a6100eab3d3a09fa881c6ec5f3edd4ac876f2d08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a42ee78e58e367db6f97721f0f5332d9
SHA1dba94e3e450b9ae6e1863e8c11cb5fa3e7a6bbf0
SHA2566aeb8d32c3bef889f0aa4a25c1ffd716a956484c74712c5b0abaa634300c747a
SHA512a4f4375fbef15651d5c5e3e54e76cc9fd90a06cda58294f451d431bd11712ecbfc9e388da858348b032e6e27e33aec5d2b8b33fa67c1fe4cf6f8a227df30144c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e04c98fe2db918dbe6253524602df51d
SHA1d8a34ab0dae53a98243244ab2ec5211a69715fd0
SHA2561697bd3cd0d84369949e3b06edf2737695888f1d1d6968a0ad9a4d74917da563
SHA512dd6dbec594682fda0226da17763a49ee5c3fa91516c9de996cb67b50f2827bf7001af43873ab60fd7d893349133732be5b55ef9763edb7c406af5706fb40d55c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580c73868f497418f8e3024d108e483e1
SHA10e85b5d8dc35accf5dd5180a1e52d408085bc463
SHA256932c9543e5c7d064c9850c6a4ad267d512ed0de4854d7222775adff1de77fc3a
SHA5126fddd70833eb504a21d308b290efe1d6dd30e3be3352c69b1be569b6e36f48c418d32bad1c79d5b6796030e0ddb9f1651376814b04b4f38580dfb06f49207a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582affab925a0c745cd16bca1840a0618
SHA1e7a5a44e9af666b898246379b988714ca135e29f
SHA256a00a6c0b41dbf726b1aea5dffe45ed5d07b6861d1cff46ee5f2f2ac3a2618dd6
SHA5124d267c4d9f734fa1173d51783b58c0a72ac370fd48712453f7331d497fde0afbc50deba74577b93befb58d2e383f55ca5ffa71aa27836280a315daa172f3aa2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f07aa8422f209d93cceb6449310012f
SHA1f574602e70d22a8e289644c995cbe1ab8269b618
SHA25626c3f65a8e81841c95fe7476196ec7f16d340f22877a66d91f4bd3d2939e365a
SHA5128ad9b9d7339ecaf8d71cc2382be14a42005b667f86a35f8eb734aac958a95d3f1e2fcde9921f1b84c3904ba22217b60ba9ce330e282d1b3d4db3f6581ca3aac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313f14f094cfa750edf43cd217723bed
SHA16d1478fb930f98b618e75074d9454b899e19f487
SHA256dcec248896b86bd4eba9137da939375fa5134c1a967d42db925727741d38fd41
SHA51223fc4e2434e797b5971d1986e24c69c404a16dda2d56efe8ade83e665e51b907be6cf623ad6d012717cca186481e6e9cd868bd62b75813fa666e572c009ce39a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b