Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 09:04
Static task
static1
Behavioral task
behavioral1
Sample
1ab3f9e32691c65a57808f07913e43eb_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1ab3f9e32691c65a57808f07913e43eb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
1ab3f9e32691c65a57808f07913e43eb_JaffaCakes118.html
-
Size
10KB
-
MD5
1ab3f9e32691c65a57808f07913e43eb
-
SHA1
db547b311543e07bbe7860ad02e00b6c1af44a3b
-
SHA256
9a7cbdc8f5e9f9c16c219e3583220c1bf09893ee53ebe3f936c23aacd7f154b4
-
SHA512
b5796b23b6ec99ec66e79f84a310f0ac89d9e010886ea4d2653a69f339652154447a5757a0741e9e79f004e6024c1d754b782ed36293d86f8e4e88d8041b269c
-
SSDEEP
96:uzVs+ux7SQtLLY1k9o84d12ef7CSTU6GT/kocspSTPztQtLDgQRtQteQtQtWlVHS:csz7SQtAYS/LLSS1ILDbI9IWPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07effcd95cbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8F403E1-3788-11EF-BBA4-D2DB9F9EC2A6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425986558" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000002e4e84710ed391e84bae9ef49095a03bbf812615667f3dc7d7608a0927683802000000000e8000000002000020000000083243dd0e9cdd3e427979e8674cfd0c902e5e6317fa000960928f56666c6bbd200000001cd960e3dff6c0ccc5d76c35eab75060975efccd30c7efe90a7566a4b144b6fb40000000154464e0db0c48d081de138fc66d875bd31100129e50c3eae9437b8e4c23651ff35ee0f592227e2897f3943dbb923badb621aba014f6934f7733bd25488ea23c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2624 2044 iexplore.exe 28 PID 2044 wrote to memory of 2624 2044 iexplore.exe 28 PID 2044 wrote to memory of 2624 2044 iexplore.exe 28 PID 2044 wrote to memory of 2624 2044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1ab3f9e32691c65a57808f07913e43eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5838738aefcc003a59cbf28cf52f88c9e
SHA17ee6e0e267757fcbb25ac689b0e77d7f1fa6e63b
SHA2569b44ce424d3d3f54b60d507d35ca36e15b0c260d5d1a3e20d587a318be4a9287
SHA512eac4aa1ae5cd78131883930ad0891dc59ff0633a724f0b38dfdf90f7562d250876f0da1627c44764176a6ba845b20a7106dca2780f41d310e4d498be38eb8980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e96c8af70f5dc4bfade413015356e6d6
SHA1e278a31890fdf90fe2fff0edfd9d502ddcb728a4
SHA256f0151e1b94d73415ada11a22a4eaef9e4e3a9237960609836d0023e1e430f416
SHA512d183d4ad76c128d6996ac78d45b80981070ec6d6e2f1d5e1038870c92507b8b5347827698713b6d64bcfb0645e66588e7353863fc3eb11b293544fdd9a786e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5927746dd943d19fb34aa243a0c852eb5
SHA11417100133af750811fdeda733b5552fe366ff37
SHA256ff37f917edc197e8ff04f86e2c91aaf45950bc23edbb6348235caffc2e6570d9
SHA5128d8d0c40ab5f7f9e84ae2dc4737884abab8411571f1290e5f781e9933b812c3dea95d8136d26a87f921ebeea1be323c9f94c5a942adf55a7740ca60121a74ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdeb3118189de667852c8708012a614e
SHA1150a9f3a809fbf3ae7724e89091eab366533083c
SHA2569c54516050fcdad39c1133a917511e71ebf4b212401ab4faa83a5253803d401a
SHA512d487c81107083040ec89228e1b37dc4c2e9fe8de9dc820c8858cf8644c6e0665625aec6cdfb3e40cdfb1514f075e34de5569d7e442b9ae68fda041943d80dcc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbcc2e20d42abcf748dce431d4be7a9b
SHA1c6fef968127a92092b9eaa43ffd867c5cc89f0ef
SHA256dafe4bad8819eacf33f6c81fd8870ad5a6044ff65207bb19593d8b8ae21d1df9
SHA512a27a46f196ded755d47551a18809d73462fa2fadfc86ad0a36bf72a9f5a741c21ededfe0bce3047e69b87c27aa0e7c671b08c656e7042dd0793d91a50ecc6d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59969748691f93bafc31bbaeddf219631
SHA1fd71f2f2cfefb64b5afde3a8a23feef69055cb2a
SHA2564e199b5498cdf55e161df85b88c79b89148a883a07c8403c2273c12fd339a34a
SHA51277d4fb9cb9da87208c39f52eb225951283a909720502956851de417b7538379f83a5c3601c1ebc8a0d586d5dd011f43f4e6c01206a41148c0268bad7f6c0ff01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575934dc1fb420273fd0ee5255928ca35
SHA10c0289c210168c99ea4201828f7b81443ec432fc
SHA25603444c4c8b061dc91cb4b66fa7bfa16553faed459dd989ed39e8df38f8628e74
SHA512916f404e572cc52d88c899c7b688a732f37a021fb582e97114ec3c35a72d20165ea79d2c6144bd9420a0728ed6cc0f6bb1c06b01443153777df283c81ccec533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981b9bdb9964369104c49ffaddfc1c2e
SHA13160b125eb87824750d948f36d1554a98f778754
SHA25663531bb105102d79410a6cab3e7ccbdb6168fefc0d8a52e212889b923564db0a
SHA5127f9a3461425e05fa5feae8e130a05357c7d72efe1f99b2b3fcfc57474516c450a67001cadd690a2c36e31dce6b9388001159eca99431da2ded64a0fa0c1389b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1247be761da7def66244856fc652829
SHA1d100e6df07cea328b05df66e6ce2a389510cf355
SHA256d5166419af4d17729aba13de8a8bea7ef5cea2feec803fe46f9340bf0d4a1b45
SHA5122e441f407c6d7ab7484c1d9b5957fd54393ad44689f8bfbd44519249b0d6346781871bb27e8ca3831721b8002ab79571b8304c38c06e4d5491faadc400747b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f0f7467bc6a621975d8989f873d9f0
SHA145e7446b5797c1ff0f90e7380da20f3399981084
SHA256a9b5f63d15ee8039795f6d0c0c28dd0c95a7205a5f3c7763a1daa88bac3d00c4
SHA5125197a31e4f0f0bdd77778f0bb6a9b2dda2a5958db2de05e3537e45f4e9ccf8cb78b71c6f890358fc24e4b572a20d6e278113f5a8058d62db0702a99e3545f408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c239a61e932f57306a8988de67af461
SHA1eca57c7fe0780debe4cdf647110b573892ebbee0
SHA256aed9edf5eb9fabb4072141908e17084e52488e47a564b963a57bd14956d128ed
SHA512096b9c482c0b021b700cc3eb014709780dcc9af39c2314d02a59a05737d833a65a6f3702c36a58790280f61e5b70fb79202a5b268eb9cb36a75900387619aa33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b8a2fe24f4000a76b5e4cadb594cc8e
SHA1d9a9ea3fa25667a9f467a429594abc0e1e5bc9ee
SHA25639068476f2d0ff62d41dcc0b4ef9eb829892caccf564e43cec479b3b7974e23e
SHA5129b5a9702d8d3d22ddb558ae7575e0ea335b9d3720d03755d68b43407f1515490650880f4ac20b66d49a1133aee45d01562f01298fbaa06b456adc32de8c8c042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155988e00c40df7319cf5091f77b4ae0
SHA1783eb0b6e15687f246f3d67389b436991ed05db3
SHA256a81b3a4a221237faf1a8251417c016984dce29019d3a21842b4e6692dc39dcd7
SHA5121090ed7c5e1fb6618e6027cdb8d539927504734654ae56a791a6bc25bbf2c19ad24090740d1a879a2c40ba1b3589818d815e0a95bd80b36ad23b44f08d43044b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55521521a158bd62701cacd280e0db607
SHA1cb0969ca0184f4bdc3e40f24e6ce50aba00c1e3a
SHA25668de34439fd34f6c0ed820b49b30426138a5aff9345f2ed4404e55a4c80538a7
SHA51299fb6fac55bd72787ab03449b732e594b2f2875be956100f46564f3504c638d7593a3dcdb2f880d4f5cf8097419aa36dda9f3224e4a4c45de48dcc535432c141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b38af736e0b3c93682bd4db7a9473426
SHA1dc696bb16c72287590f3c541a83a74c339cc2c21
SHA2566a915dfeaf29dfc1b71e55611d0e469c4965f9e665ad81a2daf773de20a4203c
SHA512f4a01b2e7c4b698cb7d37ca20ec1cae426e5edba4755be61f83efb5ec7ebad6e4e76d6e20d51bf65b18e8ac39c722008b9a49f58b2d2ec77561689ebd958c0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a347ef0e577fa0a51256b88bb421502e
SHA1ec0ed152d0d4c46ca91e9257bb89429ba20bd3f7
SHA2560d6b183dd7d58bda87bf0f5c75e57da70f27cd146b9855cd689e598eaad70445
SHA512c70cf27c2f34639571d9ae351f2e04082cbbc67849356f2c35bdd2a55c1a37a2658b4463b3d27f5725fd105c789c0d0fb4fa02ca78f1557ea2eb89ef58d6c2bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c14bc427ed37d61e89fbabfc6985b4
SHA187b50d88a8263f5dc2f19d3b13e3582706fac835
SHA25622b6ad90d0aca4bfe74aca42896affeaa2355e852fe9f3b9f57939df2d4e0a61
SHA51213090c41db8e472c21c2005257e6fbc10ab1ea1e55b9f4384cfa34b1ce985b113b1d72e115c32202e3b5fd2276782e5a888a5dae1c10c3d7ed0f2e8d5c6e6482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569343cc9711163b838e3abb77fed3830
SHA13d52022bcfc0877120dc629d9947fd8818242fa8
SHA256cd1c48c9d196be78b609abd74a90535edb10c7dbc7b6c4e160952ad42dfaa807
SHA5127c641d20f6be50a64aea3253c4cfd1dd1bfcc2dd905a01e4d32743c031b60bd061404afbb942522f5a39d3512555959c73df7a2da22d1c5d6e3c2b063c3e34ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597d9263c3e9db31230a62dbef0b08c1
SHA1d9ec5e737733bf674488365caa1a6f305df94b4e
SHA256ac51ffbc8fbe949780a2dca28289e8af667aa914666439c2e61d196c4ca2a81f
SHA51244eea2c8cae9cbd2e1f7ed71edac878384efb6d5399f58d067953e87d639f9ada90d9251ee8ceddacff48039e8690af4071c39f36423df769768cd5d5743af08
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b