Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 07:48
Static task
static1
Behavioral task
behavioral1
Sample
19568d16aeb23548251ea312151e4220_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
19568d16aeb23548251ea312151e4220_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
19568d16aeb23548251ea312151e4220_JaffaCakes118.html
-
Size
53KB
-
MD5
19568d16aeb23548251ea312151e4220
-
SHA1
6cfe93674db9c1386ac3462b6184a7be0e03bdfc
-
SHA256
598139ed5ec120bb352a8111945a4eca4e351ec066ef0e2ba847c047618132a4
-
SHA512
a0294f1f90660383c0dcc7a76a7ed07cc2dd2dce07be80d4f17470e865e5a0bc6150d1a82ee2d14173fbbe4e0756ca4d03d06095522a86d2e7b8675ec6069357
-
SSDEEP
1536:CkgUiIakTqGivi+PyU9runlYj63Nj+q5VyvR0w2AzTICbbloM/t9M/dNwIUTDmDu:CkgUiIakTqGivi+PyU9runlYj63Nj+qK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6453801-3522-11EF-81DB-4E87F544447C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425722761" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000049648ca337f91e658e3d11715858c2d5fc6877127a90897aee7c8be8a59487e4000000000e8000000002000020000000fe528594ebbcc596f86ebf6f273447a398546483dd89472999d5856b900d65f420000000ea2965f909b81ea6bd9752e80b78ed8f4a00bffee593bf7d962f42ead256c68440000000b2c3f2ffd9e0c30bc6c00ef112ea8f2ea96f32e758f1d2165d7ff0cc38cbbd23e647eca12bdc8047c4bf1b810356f82853b49044c027f448f7b5191ab0dee945 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f9849b2fc9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2448 2176 iexplore.exe 28 PID 2176 wrote to memory of 2448 2176 iexplore.exe 28 PID 2176 wrote to memory of 2448 2176 iexplore.exe 28 PID 2176 wrote to memory of 2448 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\19568d16aeb23548251ea312151e4220_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55038b3fc93d0c4f7fb9ea2160c30909d
SHA101e6508f4422d468ccfc20c63c4ed7b95ff6f527
SHA25642786025ab0490174d11c09a47f8073454ab139b3d42756a668ae381ba86655c
SHA512a818db24efdec35b256f7bcf68f5075ba87eef921f0d0cbdf66039a996813785f72652311a38d8792baff82cf56cea019b8bdcde9a14951e6f1b2b31ce59ddf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fabe58592588496217e262a53b5e13f1
SHA12033dd9fa036aee9d03da7ee82b42f8ca86df132
SHA2563c1edd92eadc784b87bb537bc61bcbd1389712b85be13e6eb9b5c7aff6f6f350
SHA51240f5fd76bb3eb2a0012c5f70d67cd02f92019e08df940c73b83a13e90ad74fdf03681b8cf4c86515fd1a6ef1e9babcf7942f4ff22b0f0d6bace66b7383cce9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcbe3e5b4deda45f1159d168a20cc911
SHA1699abae1b49e02538a4cdbc4ba313f71a354107a
SHA256c36c25275330c6f977a9678978a0ca70a871864c5b21d67da6a17e949ca3594a
SHA512dfa3c81b94c33ab2e411710558aab916c640f6785e8107077d332c13d10e7caac27dd0dcde4204c6d5805180d7d7db72ded83ce22496ddd0cb4ddf06688b9e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54692369f40a7e4ba37eef7e5d49215
SHA1ac00ba34f9a17f9aad612c3920a53cb433a90680
SHA256e3e9d1c7445db667fb41e6a344503f091d1d26b91152e87a8ce76e098e728018
SHA5121b3df24d7b9d7fd6d2cc71299b6eeeacb49f514adade68f795c40a3f0eb0d93f156c912272e86897fb8d91caa3e105390b3d0d57ad091bb8a095d1bdf168d683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad276e02bcec8c32690d0ca5bb5e0390
SHA103a2adadfbc594829df93eda0d5154d705fa5f83
SHA2560ea845731fea2530a60a632b204afddabe63466b10bd62bc3e826f8dbae7c33f
SHA51260ece20cc013124a8618e75671a1da04964f45070ed11c762c61a755ed2b3a83202ea6c83b65089921c7b1a91da8c02796720e69f42f2971b61d1d4516ff9812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598bae6d34d3cb7daa3f368f24a24e3cc
SHA199a20e22fb9c99e5e487c31fb390c8f5147999a4
SHA2562059f3cededc7e26db1c289aa7dcede5bb8bd54e4801a7b800cf664cbc847e64
SHA5123435c65ef13a4b13d16237d5fe6b236a9159a2158de816e86157c34d70751b221ddf4787a6fa319d1c7e390b12142041847764285d2cb70340823d89203c6115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e84a1c52ffcd8460bef935ce4db8f2ce
SHA1e7ebbe0e70d81e3a40192ffb997ba3f1e802b2e2
SHA256ed7299697987e985d291078ad8309f7186547fc8a9220f1a4559ab90316ca9a7
SHA5124ea0423d4d2ca6ba9299d22e18623ac7c25306835b47193ad2a52a45efdfadbc1f7957ca66a65023df56001dd95dc568cad16f480a1ae39706ce664ee645758c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5856815550892535aeede790a06c5a7
SHA1c34d742f9d856bdeffd9c874f87f11b21f3781aa
SHA2566582715106326f2cf35a1c0e4548e1c4a8d1a8a766a01ccd3f3a84a2ac4c4699
SHA512a39a7f50a15c86a1030c7c4f472e2f691dd7a58fd80f8cc4dbd0bc64449f2577d3fcecc4822b6c9ebe597c068a51dbd42b3e8ba0bfe70aa8d60c8323e36d95b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d44103a51692bacedf3e35dfffb1f380
SHA1d86309013e6e48cdbde2779771046c55fd5f51ff
SHA2567f6ec870087c6c56a9c759c1dd4ced15f9acbfc56f59f5d317938f4ec1656873
SHA5128950c6e561b73f0ea5524ae659d49b12ee37855285ad97a08bde838ff984b1d5d97bbb35d80e7d08b96d4aa018d4c82a03e45cb2d672b8df6ca217b13c779ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c68b3567ec12da111dae8d8a4195b750
SHA1a3b078965df617120437bbd3ea517864365454a2
SHA256d17a8723af03f580af20051ad9d652402d9bfd489cb0da25112af6bd1195245d
SHA51234db701cd73007eada5ac32dbe7913b8fbd1a60b0c5661835fa7845ec2e23903f05280af6111b705a36979a07cb77144a532dcbdb55326b7e6ffddcd152b1609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a480bb3a9241f6f0b11f92d5967989a9
SHA1fb7b24701b701ee23a828a1b2c2cb064042fba0c
SHA256070892af146ef0cf7dc8271fcd8e7191f34d1a7eba1a9daf7d3e4f8a74a339ab
SHA512fc2387aecc1ef1185a5fa0eafcce46781a27eafe237f6f7a2000bbb530f17e91a5fee2e1cbb9f5808d251da6b6a563f7e97c72005f35c64bc2627afdcb1c78ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59256d160bf87d9121d38734557cdbd8f
SHA138c8c9b153a181f34cd4e7b105a0e3829912d8fe
SHA256fa51990a6f4c90714b800b5875c9faa4f1a4824ab6d0f4c1a301fe0f9eb1fa05
SHA512f83dfebc247b04a6af9acd1dd4d84d1726afc3ea0a7c1c8bd959976205fae9eaf1b48d974ff3f3ad64298158f4a04e0434693b0d86941e1300c6dbb5f5d7838b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b5bdf7e0930c4cc32c516633f20b7af
SHA12839c98d2e507e9be0e47d8753447cb04f074c9f
SHA256a0ac5cf7334fb88d20e71370d84e8ab59cb0ebdedca2c7caf47a2c1c588257e1
SHA512d9e8517e0c8e7ca6551d9371547544749b0b908c2c9d4d6fb2c3c6a79881163a9f9b63f1ba29eba38062327bf86f2a768b310578caa6f9baef0786a58e90118c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51847dfdd4002258df23f69e1a4c51b01
SHA1ea51f728dae0d32d3d0ec60ac48b0fc9183d8e27
SHA256d228e97f97db06cb6709d173d9cde617f003e68dfd5653efa4444f1abdd1b39a
SHA51247758420dd61b727a4c4224a8ebbc02e13eb1818be5a66d45bef35764184690ff53c1e32a52ba5591981319553a4b9fe9dcbe54f1121d26bf986368e30ae0cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52530751b514da01eef508b454f798757
SHA1705baa7c7bac8f96ec43d6efa3c2a9796caa6590
SHA25600e06ec58da674399c92b756da0ac29b1b5b035a6d045055dc44692e7e230b66
SHA5128dac966a14bf1d3aba3b70077af135aefe3c90a395013b99c36cb8b09fb735c7a9e440e390e80402f5ed9df27fe2bf5933932f1fe95f878d6f1f0864aad57f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4f38c088565e3014149e3b5c995f20f
SHA13b6c18e9d9dd870f888bb451fa06676861121340
SHA256cec79073f50129570f116eb3cd085ba44c139bb765f8a479b8dde3e96d4edcbb
SHA512d23b6b87ba529e0969e82b9b42806c619c571e2f1f8f5ca6d3092a513d3dc54774d89312159fd65e3fe34cbef6b32b0c20584d7e4e8d26347f23adc0fcf4221c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5233bad7a59e7c37ed65911826d6e74b6
SHA1ba22e055be1ccd7fc888761980dbe8cb6707562e
SHA2568652537de30ab7f6a74f591b5eadf0f7c662f6a4e16ba7c6c7c85d5477a33cec
SHA512a71ee24c7072a32fceab73be4f15d8edc3f5465a36a3dbbd5fb521ad1a322b1877da2d5dfd8fc802e83fccf8d6e4afe01c6421fd02c6bc3385e2c7078d1b5c86
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2XHJXO3H\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b