Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 03:40
Static task
static1
Behavioral task
behavioral1
Sample
148d2a7d0c3dec69182f84a86024910b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
148d2a7d0c3dec69182f84a86024910b_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
148d2a7d0c3dec69182f84a86024910b_JaffaCakes118.html
-
Size
4KB
-
MD5
148d2a7d0c3dec69182f84a86024910b
-
SHA1
57ce896d99a9fca8e2fb2be8fc1f3974b1b20898
-
SHA256
70fe0feb17b927deaeae58f2e507b936df389d9e6d781fb9887343c83b4ecd01
-
SHA512
1a4b910d5c902a1f0f7731dd4d4ae36ee239593cd5ee3c3ad2f3960ef046505987c285e88c170ab8dee9649badac7e6d0329dab5b70bde6343def561aacd19af
-
SSDEEP
96:ODaN/d5S2bkjmNzwdf/+FEqZRHnKqYs5KcdqOxZUgT3GSRD:OkF5S2bz8F/+pRHpYsUcdTxZlTDRD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA3D5AD1-3436-11EF-917C-6A2211F10352} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0cea9ce43c8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425621487" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000007631669a096a5dd9069d4b8ed3d67a4d46d3df5ab381f1eb7ccb68bca4c1d7c1000000000e8000000002000020000000fbda7465f8b2387be86cfe5dd76cdd0eab026f980c454d66353f8acca396cde72000000088fb31bb5929dabceaa64247ca93035daf4ba16c4f66c597279c52a247da6723400000003ccbec6e1bc2cb42e536d69e430236ac84f823a5e300b09da7c5bc714ad49794039fa05d887e23ada604bfa8240426c2e73c0f82d830996ca0e5a5282193c6af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1260 iexplore.exe 1260 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2372 1260 iexplore.exe 28 PID 1260 wrote to memory of 2372 1260 iexplore.exe 28 PID 1260 wrote to memory of 2372 1260 iexplore.exe 28 PID 1260 wrote to memory of 2372 1260 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\148d2a7d0c3dec69182f84a86024910b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1260 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56094179c2de43b797930e49bf62fbaeb
SHA1f783c87099963a35576c8c214bcd8a8e7426f0c8
SHA256c59acda945093cd8e70d98d9cf630106fe9dda0ed8132ade0c5ac1bb3ce3bb50
SHA512192680842db5f755c7a029eecb0130b5a73f3dfe77563be95f6b5ff18e39436b93d151d336e21c87b5a226cfc1802ce9098bfd960d2709a16420759b04dfe401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d83f157963f02fb1107dd9e9a8cf3881
SHA1f533c5d653f874ccd27c125aba41f07b73d1f2d7
SHA25641bebeed14627f59eed1afa3a1740efab346111e0772db67bcc64989963b46f9
SHA51261edd5b382fff214051b70ce8348028caf52ce0be4f7ed6b4d2ccecb89db536ad603072ea0206c8b5f83fc2af286504eca027a4c182e4a7bc1966af6605606d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f7a9d6ec2e53608f87dea838f7c3d1a
SHA1ef8d52854599647ebd478348d9180b3ba9d79330
SHA25669c05f3c7e5664687714a281e6487470269472c679e13e33e0e9206c44a52bbe
SHA51236314199e2bfe100e8aa7ead79d839431e42148fe0237ab025b74d2065abb1137b1130252a55d8572fae98b40e53e213aff9f0d50a2877908e153841f927dcde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aafc7ac8eeedc0079b18c476975b6acb
SHA19041f58ed1b53b7e675074f65d9e6052aad5df22
SHA256cc641850e05e88033453e458ec428b2b700c53525a3fd4feed1cfb5fc0027a72
SHA512c6c778dd26b088152406c2c4a7180a6bf57c85dc3fc6f19954e2f53a2b0e8318024ac4efb9790c4bee87700effe1eb6008c6156f600781ce1c8952e22f697754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5881e7688faed20e20c36aaeaee7fb957
SHA1c031d2165939a0f21206576c4f4c14fbd6c243f4
SHA25642d7ee3bd7b65313a689133411d2759a614b308e2909274812b7ec9b01468f96
SHA512ec88aad75178d46a66887b27dd8d7a59a1b7d5891f725a08f15cd4c4e73e69d4efdfa7277e4f735abdea539af3b0bb1ad84e8bf1ae208193de275175415df73a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b4c3532ddf84c35574aa90c80d8bc8a
SHA17ed18207a178740fddbaa8fdb903332dae8832fd
SHA25612eefd19198335189ec59bdeda8bbd7ea8f210868f01d7b49e6cf8dcfdfa05b8
SHA51235154a214d2716382dd6e565531bece931f60a5e155297677d918774f92e85c61d848f497daf8300e0e1e7e565c466e6610177871b6e43aa3d6fa4fa621dca9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb028fdfad809889a25ef7ff836e534
SHA1d981423ed06fcd4363cd7f90a6f6372292656b42
SHA256d3ed7e082f42765c28e816e780d66da9655182a78f32a656167d1a84cc72f614
SHA512a4a6f980da6b652292b70afa6a7dc8d7b9ac14e96dd2b74c01d5b5cba0d228ed910b006b1b13726e668b90c11fb40ad3f576483dd23c1e0f42fbcbb9ffe2bd5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5970df394f2d937a3fa4d279410a01ea1
SHA1a864e82c9d4c839d113bba6c48a131a84d270a63
SHA2563de188c4299bbeb1cb1d3ade1448e7e6ae905ad5dae15a448a68bc3121a60dc6
SHA51298d92784b27a9fcd2d410b43867ee953e2cef9632bbda377a168272bae3415656d6a3e1b1fafaeea9ff409f2d6144d45eceed7f75fd23c9e3007a0ab73fd6d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ff93d81f0de7aceae6b99e2e24526c
SHA1dd8a47c234a3a781f07d27eb18324b8b44456fe2
SHA256b60e7d8df2e6fe7e52748918174b984655c7dc7e344010cfdeb2ba10dd6f25a9
SHA512ea02ac460279810c3283536309bb1bd9640a5fba4bc1a09c1a88991beea485b5e7b39f6e94761d9ba9ff1d34219986cb7374e880d19de599ff4852dee63d214e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8536c332ce7d52127811fdcfb06eda0
SHA119cca778d9f3c9980bf54332662bb2825bb1d0ce
SHA256113be928bb5232efccbc5d3117a2d41a3ae87d4c4a24524b6c3e68ebe3167303
SHA5121c05223faa2f689646c1ac168d7a56cbea9bff15ee92fa3c65d4e58943d781502057218c9129f9c296c6134e0cd9ef7b8711414d33026a39e3e6e3f100f2c60d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd1846ca12e76090877053e12c894b13
SHA18acf5d1b15ab13cd573347d4570b1d01f2e578bc
SHA2564ee2c0d36bdbeb3d288071f00619158959d62d374f853997820f49c95606ee63
SHA51232ff4e8ab1f0ddbf681ecb24b9acaa0901a0c0ad05596cf7d0c7e0093532e1adc3de80709ea06a29bb68bf6ebd8a30d15ddd0f1fec74561fe78227aed2dac2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5602a008646d411ea5c64bbc54747167f
SHA173210a560c6b75ee61f737b544637250b7349154
SHA256ba7cac281d585366627eab515a7bba8c9c2dba8308d1836cbde9b03180b1feaa
SHA512176a4ccbce288449b2d60355ae706496ac29cd144ed57e11413d5b216af7cd91018a57f99aff544f8c4268d0ff068331f386eda7644b6491e7a1e21b12e238bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52328d1a6d744b6754392d92d5113dcab
SHA1f29d9cf74716c9217887b0b9989b74c50d61b3ee
SHA256bc14e284808be886e8be294fbcaa22cb0808bf61c746c9fa288366dc9e1648e4
SHA5121f67b7e6843dfa03e5a06ab1fb17035fba40f9933424e1b8c379336502aee0251222fe066b2198647f94e8dfe590e437ef14c76d70949b965228ccb87e350672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa0f0248a894de277e0767ce306e1d2
SHA1a6b1165b78e9e7792adca9db7b824d2e2c0b6440
SHA256781d655d38135fc7c92456a766f33b4d1b2eb6e0c14cdc3e88b6094239ff16bc
SHA5129a8e075ff15fd29e58e0988dec978fc4cf881e3156a65c61ea662082f13e5add2f8f50839103127979d929c35abe77cd9f25221be5fe2f024152f702c1b0018a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aa4fa9d91de31f8f610a8243a5d8525
SHA1e7805ac39004a0c1312d6ba8be4785f572ef9c4b
SHA25627852ac6a74d395e1089f021ee970ec4bb4e81919aa8afc0399ece5dfcb743b6
SHA5122f68b851de0494cbaa085e83d18b1082b68ff3bd590ba2756485d08b588fccae67ba98e5aeb1c76054ad8cc8a02b3e94656f6572052b3d3bdd995a81509ae911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b4832c6ac4cfaa197057486a728cf0
SHA1ab0b3d87b9f1488b865ac4680149d1df63717bfc
SHA25600e7e1cd3ac7712ec1feac28abfac590e74b089384ad11f1b9806e0f4cfbcb12
SHA512d1d945f1ab66f0ae60ccd76a91cdf03a6399ccf958396de6fd1c8905129f7e9e506aea3fc588693498da39bdf8a62ddd008f0a7031600f01c77cb17e967e6def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f53f786d2d1d110dc12f47b5f8c75069
SHA107fae928d121339f2c40050f399ea58286fc08cf
SHA2562c885e42f06a8d7ab9b4de1b6d03ac176c419f7caf50aeadd71646d5cbbf57f1
SHA5127b8c866a467681fed5ef27d372026fe4b61a09095aa215093258848ebe9f194157620c1bf7414cf73c1e2abc5ff86703eee9f85d23b38f535c7e0fb922fc1234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56054fcfcc5b11d424e024fb250a1c850
SHA1ed7bcb52007e9a77ec0186aafc7d531be4b3b1f1
SHA25616d096ce20622f3fba02a0422e704d7bbc1b98098b406c042c946b0a1b0c5009
SHA5125311788dbe5c88ee2752f91c878cd953a3ae408a2f78040b6198b4a8a0414a3d5735a8fe28b0847adb1e4ce3c7692dad67c4ccd8ee5c333fc216260fd228ac18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b0ead7183ce921acf1aff417bb3462
SHA13a3261e216c7884c7e0004d17e1cf47675f99906
SHA2566c6c593e5ff1bf24eaee115ddab23c4ba8bf53f1ca916db3a87dfd0c5345d41d
SHA51296e43f86cd2e62899d3f0c848ca84dbfac3531e04dd4983ceebabf7c6a099434cd3e2a5b22c5e19f2579f0aa52ed025843f2492cbaecc50317372a50c196c294
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b