Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
0a474250806e7a7bf8d9ee55a6d4cb79_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0a474250806e7a7bf8d9ee55a6d4cb79_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0a474250806e7a7bf8d9ee55a6d4cb79_JaffaCakes118.html
-
Size
8KB
-
MD5
0a474250806e7a7bf8d9ee55a6d4cb79
-
SHA1
450fbe2f95c1a09c1f0b59a4a90f04e0e5f973fc
-
SHA256
1cb9aae3eec2bc235a429902f18e54070ae7e84061ae757e6f11660eb3bf4037
-
SHA512
3dc805d16597368eaa50b488e13c8838cef4bac3633e21b3ceccfc71fd7d2f99e475577addd34f69ef64da2261a155d998141c0dd76cb8ea2605b83c863011b0
-
SSDEEP
96:uzVs+ux7opLLY1k9o84d12ef7CSTU1yqUhoU9gUdlBdvn99JcEZ7ru7f:csz7opAYS/r5hV9TdlBdvn99Jb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e005f8497ea14b9414eb5f60fe1cdcc853c1faa0ba500707dc0b7a3b29e8bccd000000000e8000000002000020000000afdff1eca161d7d014b26143b360a5464ba19526ba28cec6bee93d3131fb9231200000001fce2741e3074469ba7ec2ca909f6b026eb480b74f15b5afa58959bd15259c6e40000000e12c3dbe486daef3704ef92b54b27d13d3c807433b6167576d43435507a4534ba7342ff045cee7740f6a430cad7517762b0372a30fb64767a0ab14e9896047bf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425417400" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCED7EC1-325B-11EF-A48B-4635F953E0C8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906bd9a168c6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2884 iexplore.exe 2884 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2924 2884 iexplore.exe 28 PID 2884 wrote to memory of 2924 2884 iexplore.exe 28 PID 2884 wrote to memory of 2924 2884 iexplore.exe 28 PID 2884 wrote to memory of 2924 2884 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a474250806e7a7bf8d9ee55a6d4cb79_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523feb939c7e0e7e02162e44649c7f5d5
SHA1e220fe526839d7e553bb1381c5f991f02dd894f5
SHA2566d77e68a3a7f4cbb1bd978d627685c720b4dd17bc81191fccf2c23e1f4c2a40e
SHA512a67a023d52c459908656cb7b6ed40fb3385de46872b9bd1412ae05c569b0a8e6e044bde691c4df05caa029bfd2a7b19569ed7f233cc73e882beac22ea10c744f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5827991700bd4cceac58348be813df186
SHA1c77c6530ec43a49cd56996ca3b6ba8e4d1a0cb39
SHA256c5547e1c6dda5266477ef6b16121443e81ac4499b5a76ce7cb5e9e4f3581e2c9
SHA512ae1b08b117fa8ab6252732a653555f913498ea283b81c6491c0aa18056ad820f2b14bdd87a5fc2f7105bed94b8e5d269a1c043bf230f714f965f214a3e23e833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d93b2219a60b7c74987357f4909c051
SHA1799b8e2ba0d300e1ef1e0ebb1ed1d9acc7851f7b
SHA256c6daa8c216bd7ba88342b4f5bfa6c172907306ff30613b1396608148ecc9774b
SHA512d5f991b512cffd67b139a8cc3e4233a1538b957acb54205b16249822e8e0a18ecb5bbb976efe932fcb902ed2a6a0ddd92ec33c575753cb4a5c618e1bee59a45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ac56512131825f8fd36144d0d447d30
SHA1b5335a5818745a625cb25f8a2e578b413fed6ca4
SHA256f8158cfab39259f2e232665695766f66deefa9a2a627c403c331d7e0f718794f
SHA51247b397238eae7c8d2b349bb37b595aaf23cd9bfdef2a4af448d38d0643a96eb014346ee1cc2f244987fb039915e3ef4af9361e24d556a11829f3abcf5115d395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5146b2635f387db0303e2b152afcb69c8
SHA1f7ae3332f547613864931caac24eb7ff60b773e6
SHA2565eef663f6e7aa6176b781c9c0657774fdaa7660bda69082e0362d60542199a06
SHA512b43bd976144eb004a168b1b66fc9f7f05be4884b35629f9f8c94caf5a6d4bee15e20e0e26d9e11ecf392c7181c7ee6057df17b2896aff03db7f0e4b987dddf3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f1fd50cdea7657cb19e8dec21935d6e
SHA17f3b2eedb40b4b65688c7b4766f5389276f472d0
SHA256549eae40b99b558f1fca206d850a657e967b892a4fb7b88edc03e28b0966ce5d
SHA51210f7a837865ab899caf67c07bcf448b00953ad0e3f0167d029670dbf049a38f85bb31b412213690a3931012f35e103dd1f6d1e81c9842869464faef6febc8c96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521fe38a77cab1470a56ca32ca89f3d2b
SHA121906965a5b8e36b9f780062bc8fbc40f53dedd8
SHA2564d6d70b9e607b800a7d0e35efb5ae548bb1a661699497c06c288def0808a0923
SHA51241034277771ef1c33fb1952a10b55b978a68b8137a898da8a4bc7d0aa6ed19e6001da0168a773fdae3a1ef9b265f6155291e7252b90cac893c6f111e35e3ed1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d883a9d125128e0540be30b2946a6080
SHA103d18d28a4e2b838b4b6a82a853ae58cf2d6fd68
SHA25649edf231cf44345e94610c875729a7c117d5842b7287d17fca0158ad6c2f43fb
SHA5126d1f91430afaf07949d2cdd9563edd6b015570708ab9fc698183b5e7ca1b1d8dd3f3678b18319d05eac00d79293bc5f9e40b489ff3a6d5392076b1ed7c68a4b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504960c1c053059eaa4b9f49e1c635da6
SHA1aba2d34374591a9674050bc52b5d293048e82f1d
SHA2560d62311f91a41a7a5725f87c25fece20be799783fb05bbc3fe119f87dcdaee8e
SHA5128c9c606519179a416bfd203d25c172c51211cb8e9db22b74e31334195f778d856c80f7876d76164f610ff5d98f735e69ddd98d6e966375e9d7dc4bee120a6dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1e57024657819f5b82f70bc505a7bf
SHA18d17169bf897bc3bdfe653ad6fde70bcc3510777
SHA2563082f51ec47953da91a0653c6b14a7d412c6ebd0e24ac8d3a390d0740716f4d4
SHA512bdc251dc851f3d464ea7131f9b8297f14fb973fc14fc1d60f780671767bf6198378e69b98c54fbac77e32c909218a600ae7fcc9109ae9a3caabac04d2a4d8f14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0e63eddaab6d621d145a6e4650ac84
SHA1698cf952e19743f10c3a65ad4ea2a8adcea6f99c
SHA256abb1d2825029fba9d349800ef947ec6580695fe413019880ad9d71cd2aacc681
SHA51294800cf332450f22f838e21ae9ce2cf39b0be21022ad889e714336ce9b5bbf75b8fffa185f1c73a6a5de04b77546bd987e1bbfa57504a61b5bb8ab28afb0bb08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bec796bd6758eb36d2fdcd3b9e3224a
SHA1c36be6dc12d07b340dbdac94227b6012be672e7d
SHA2565b7d3b7acd7f6a682acc74ae6a94112aabc65d4312949438c46d047b20000d19
SHA512eb64ea1f05fdaaf7d33518c68c8d99defbaa1e39293a1a109de401dc07c798a34fbe8f25344ef806f727b7b63176b8e72afb0ba3a508e4af10b2b94063f95e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554e97e27a7a4d46221003a26299e6a1b
SHA12120b578859b1b029da5b6aa712633288c7ef89c
SHA25679f3ca80ce0c1c6da4dc1da826e9a106b181ef7c8ec0302d48c272082d33c0c5
SHA512681190cf22a83117e063248fa1db3b43c7b254073e17217eca3b1d33dab3f35a912252d6d05768256018f7b6afa870369b09a9de4bc78c909acdad169fdc39db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504a3fd32b8e83f799c0061c469304770
SHA1391a9554a1150b1e9759d77a8a20cdf3b81fcac6
SHA2566ffce596ded8113b0722437cc171d0d0bd71650c647c8ac19d44b05f2c274509
SHA512a63aa509843fce16be37e676ad35de8c23b6321c8837d7db41f53ba575ce101924e8462955a86b0bfb69cb3ba38cf4b17695e226f39d958443adf3fed351b885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c0c6a23f1e01b517ae843625bf80c95
SHA15ae4a1b0d9bc85df9d58e15c7079b0bdd834fbec
SHA256b5d6af0ffbfc8123203fad0e29e3d893c0f1caf5a70977847f974515b469243b
SHA5126a6227acf11f8a6576df1a050fa3e4601722f238322b40e3ff9a4138b2142ccf0217fe33e3a4041556e7da07dfcba1a3922d7b5e4f7c0aafc13ac2226e46da3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508b48d830e9d229982b0a301bac86bdd
SHA144ecb1af16391563f13f3cbadce0f191210e3207
SHA256c69efd2cc04010d684d2b86acd4bde3b0edee379b8f49d2dd320a48e5bc7a052
SHA5124be9badb13882dfaab72fe345ea40c788897bf65ada3b850a370b320ad255a02f7e6f4fb6f6475c1a4776c70e6f2db46b25049656331aec483210d181b0d151d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5265ef0edf677dfee3bb08ac1f0989cba
SHA1c90b523b0f9d2119fe292d34069ec83f92d163d0
SHA2564d3423038fcca8cd26deb2581ec934762d7c512dd7ee05bca6902279f3ec66a0
SHA512bbd0f195e8033ec64e79d0324f2ed9811805c756939a0157ed28d8fb2dd7ac6a9ec2dff62e82c7f3826071e16b594a4ad162b0bc72a01dc0a07259f1aea1a84d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e9196be2e5fade279787c6512f46d8
SHA19dff95717e60d387a507b1c5d4a022afa7d68a69
SHA2569dca57bb0b85995e5c95d31174103dc747763d53f3f4711276b88890b4e0e3e2
SHA512aba748212653d0e2072f19c63e4c069d4600176ef2921c29c3d68745afdb28d4691e2599671a8a6caf495b993af532ae2ec2f1a6cdc0a3e01d36770397e9293e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b