Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
1bbdce2d64422ed0d58efae2160486c7_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1bbdce2d64422ed0d58efae2160486c7_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
1bbdce2d64422ed0d58efae2160486c7_JaffaCakes118.html
-
Size
70KB
-
MD5
1bbdce2d64422ed0d58efae2160486c7
-
SHA1
238c4de16d1c1060f7decb95af1ff488945a0142
-
SHA256
c3ee1ba3f831e75680facfecd099aeeebd5dd6d0c6a952b7686a4ccf48efc7f8
-
SHA512
6004646026a3bd8484b477a8aed8183c617700d683b295fe8de33feab889df7e4e853389f1f4779b790ab2c662eb10ba8a6bffd63fb27ba7cedc8daffae36280
-
SSDEEP
1536:gQZBCCOdH0IxCORyDfgRAzN7ozRzjXp2kldb7246o9o2QZlEoVkwjfQzefCX/rmq:gk2V0IxGbg+zN7ozRzjXp2kldb7246oB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000089e8f33d16762e5670b57972dd6e7d8935b4a640d1c40dba3f7acbab801e5df000000000e800000000200002000000050172f4eebf2a91c8b50adc59cadb9c7be2bc7edbdb2068efe7bfa486a6b2c362000000042f38f72272f3a5073da0182aed0143b8b05708d01eec8171f2ab35708283363400000001e196cfafaa274f40a8b256bccf700284d4d9fb16d9413bda3a28d3d729484d6ba5beb3330077148fb8a50f4e06f32302782d078ba4c733344f9757dd1d067e8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426007796" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6BCAE331-37BA-11EF-91CF-DA79F2D4D836} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000000bdddcd7b73515b6e3df53c7a108eb17d504e3700eda4d3d65bc239b290e3ce6000000000e80000000020000200000004ccdda4694b7a7d0d23ed55fc03544b502e80a8b58085a45540ccca9ff3af52490000000e07f6e8db9c9223bf2a16983ffd4950b55b8babd2d99ba19f5ac38ae91df0a79b2304f5359f11c557e4a84abc9b462405368641cad89ee7b58db933af58c55c915cb734d6b15db4253e6c3f308fc834b13377f846f55f3ab1ec959bb6efe435be4e803e5cce6e2d61b4b5c9542e7c8eb875b699741e2af5556d32418118efe6fa3516c8616fa1c38fe00c262badb54e94000000073d94286c91a83951823cc7a5ed7ac41210a6818bc8773a73da65e968de8a4954c0b1262901878934804ba343bf117b6e6df84b0ef9f9b394d3a21dfc763b8fa iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50889e41c7cbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 1076 IEXPLORE.EXE 1076 IEXPLORE.EXE 1076 IEXPLORE.EXE 1076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1076 2168 iexplore.exe 28 PID 2168 wrote to memory of 1076 2168 iexplore.exe 28 PID 2168 wrote to memory of 1076 2168 iexplore.exe 28 PID 2168 wrote to memory of 1076 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1bbdce2d64422ed0d58efae2160486c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c11700885c0e873dec99898a7d450a1
SHA142b0607c9f6e9ac139afd1d6aaa7e42cf1e4211c
SHA2568921371015352fac76a739b7583da7c196a607ccad42d06d14371936978932a3
SHA512e5c07a0f1ff221429f10fd6cb7335e6e1b9939a4d0487b1b2763a9d7c5a1a5763b2e86779770029c32fcf17fa50adb6dbbd6a8314e89be9de43a9670633c7881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5233cc000abd782b3527d57a11aa7e679
SHA19a4c1cec2e49b76c1efb7dde7c10f898e4ea0669
SHA256a0ca553796db36cfdf0bdf995ceea0f8139034dcb782c4c0f408e964e55319a3
SHA512cdc4b1ae9d75ec876b19d0ef92a188377c8968e6215cb0d94ac8a6a584c96a277029341c140438aaaf71a5dbdf40da0e98c984db6b54fe6c5d070fb8d4ee078b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5011e53c5b06981efc7834c7b834e1958
SHA1ca7f0f5929a2dce89804c46a92f40baed25f28e7
SHA25662d14f2cf0ef2264d79764ea011f20ac0d714722a1ed17436794594e6e9b9a87
SHA51261aefd2f823e00bd40acdf6574a68ec03eb5d9e009839ffe9bee95e677af2ba300688d9d42dd26f2130ddeaa050cd1307a08f5d8915e6f6fc514add05caf4590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc24bcbaba294a93d7345a0f7f76d161
SHA18d0a0c32dd5c293a0a4900db4d70015f381e41d2
SHA25614fdac4e71544dda22e09186227e842961b045caae32f953e446e27826228cfd
SHA512db81f87f4dcc8134add175a93d3f6a8983d709c491bd60683b40f13e3ac4effad16185693417e9cbfcfea796d59672cba07632370788cf6662f2fdca28bbcdd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb37eadfa05bfef840d16ae4959ac87f
SHA159052ae500c393ed8f562d937c90a6f82d9543bf
SHA256e05710eeb09223e63e9f10dd808446d6feced52b2f523f99180ff21cfc58bc54
SHA512325de4f5808f7c2929fa7423f4776a975b619b40d4b173c8b1a851fef1b995f8754457a1bdda1f474079813a773dabe8097d70bf0b406bdb77d86f7b908a576f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55932c229cb2473d02109265bc3e5c2e2
SHA199c7debb36c0c4e9f9ac1baad6ca24ef9678352c
SHA256293c168c1f344f5d5f432825c137a2696c6acaf081bcf7cb64ddb40457947427
SHA512c3814637650821acb3ca233a02d0d26c8c30c996b7a8f9fbca1859d80dc5721c4765f0690f7b87c0a0333d7f794de33f8449b349d2edb0ec7d6e641257aa21f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597bc7dd48558d527b46f1cdb1c369020
SHA10e79e40e04d9c0a9b1602e002f2c7c92b14e5b64
SHA2566778b198490e75e5ab5c1e3c1094a06543d57be1dff3942818c7c21833477b5d
SHA51233fce1127ebc2b82a2de24988f5cf700c6a979e94373ddee8dc7159ae38703a6f6d7760e704e106dc5a94d059c8d341f7c6fdc6d79eef7b0d26f5839ec30ba02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c4666cb47e936a328605d7f0006384
SHA109be37d396f66fc0e0c59012fb341c91bd4b762b
SHA2562e9534988a0262007c37e3ff1ff38cececb37efe4947a7d7a31ef101abb178bd
SHA512a6b3a69dd82003099f5d31ee4884d557a1d50df41e5e73a11ee72e2812604a6287d327079b92f0064a46ce82998a43a72025e45b87b14cff04d1bf76f822a0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50300c65c24200d1bbba917f830f46679
SHA15c796e14af0f72de6eae897d29534b1b053fafea
SHA256cadb432cbb1fa463061317d0c8067c211873575d053366c025b0481ed7a216d9
SHA512576d5df4e6c4f40259bbdc9081ce4e131546463961be2fd57c6f8343b0083874670c329b8d50e944f1ea1d42d4f594f1ee87d96089e5baec9b856b0107bc0c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba8090acc22b807b202d6e0108c840c
SHA1c0271658b86153112e268c090bfbf50784e14039
SHA25607d13b192df1112a23b51934c656c6575564a020b880d62479472fa7d6d8ccb7
SHA51245d0da6429988ba6b9175312937bb8c0d2d59df1938ce943523165bea543ee8edb061f4d56d3c04e55e098fde4c4e2b15009f61d6c2be888acff6e3d1ae000f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574cc26b65ae813c94f454d46ba665c9f
SHA1756e73fe3705ddb7302190a7b8b50cb94b1fa528
SHA2562c6c2344e38cf203452394c2a50e34960964f01f1284d3ee2cbcf838bc671b0b
SHA51269225b2fb64e608b126c1a8539b69f7dc37137f7653befd1574212ed385d8a526ca2067e4b12902b3e53794006dc2a275d05bd7073a87ef08b3be5b2de1eff63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ade18279457d1258f8ff56539d9772
SHA1d500d6db167582f7e5365485e202c651e2103978
SHA2569d25f47e0acc231d986cafa31dca2525a67c804e33978d49a82ea7b3bc3a4385
SHA5124875494332ff99b9adf4246bdd392acf5da1acfc8adddcd068714a0ab2f18bc5c337974947dfe874fb0c1e3048dc11a1d99ee620a6ccc4736de2b82ff387c5d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea5b7fac16ca0bd6d874eead10808ff
SHA1847ec658a0934e7a1666a2d3a4dbb4edc10729a8
SHA256e4d9497ca1ba6d39de23de1ff30800c7b16de872b67922988979ce5f5cd40ef5
SHA5120f0a1be1bdf27afc8a4ed8ea5ef3bbab1bf303d346c6297538a3a8dc255b56d980a3a0d052d7cc943b661ec2bc02976db176c992a4ecfa5ad13596e681881fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a3e88bb92f5c5908035868a7bd5f52c
SHA1485bb09fc3b63ef039383c2e90c27b9957079d47
SHA25601a1e66c16a6ce6a2f0b23a49bfad5613a32513babc16f6463a5c2aca46d09c5
SHA512d36379d6b47a6a1716c835bdfab4364c5647a8bd5f4afad521e8c7b8da11f6716312ba32248658a861f764382bb444fd0160b864740b3b54734ebb63fe198444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50daf5bacad4411cb9c02ad4f9d8e9d01
SHA16e3589a1c4393acebf0b4528783cce2d3865e883
SHA25668a068d6806febf9d8c719edf068818af37f75bd06500d96fd12a6b5d1409d07
SHA512c6aa5c920da155daae3e202145a9347324052cbd4fe0332d0c1e6a3c9e545d074b17a0c50c7988839f069e588c5587f54507ca42206123b06e7bff5913685c0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a62dade009aa856c4a9154d56bebaa0
SHA1f8286538ab2714f42ceb399066511e498f5dc786
SHA256ea477ce5c3f4173309b29761b58e67ca4059452b048d420a54dca7a691674fb6
SHA5129848b646309e814e93ec898eb8e9c7ccfb55686f24e44e9fce347038482ebb8b5f14272ed179f4b8cf9f9aa5ce36640944c73587f5ebb1684b39ef5f284839e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587b963633519e75ef74e1fc39b5fe6ec
SHA1ad0218c8965a743143bcc8ebcbd565b3a40ec13b
SHA256f6e670079303ec3233c1ed622d56bd6b463853ee373fad82d239dd2601fccf53
SHA51228a2ab454d9ee5b8389901bef42b8c0a719f85ba92e6b07ffcdd1ca4e2eaff078e7c0c6df06f6f83c216ac998a1071d5bd3e9433b2378af32be85915754a77c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b3fb8a89b31f85b8e863ce73b0f726
SHA133ede0adfac8c7fc65ce77c09d467fe9a232ba26
SHA2568da87dd8acd20db2d804650b0773c1528535b488dba3a5b91e8edffeccefcfe4
SHA512d00e85043896baddbfc36db2efe40e0245eb3a7935f19bf34d197c43db02e77d038957fd9ca77656fc5ab9828a805a88df1c07cae3f8dcc0acec5e757320f45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d6cd5b9017aeea1d13f9e60aece7f83
SHA14a253dc4e2777ecb99dd07a0e10a824a642867a5
SHA256b60dab6e9609ae8f3a78e7080fef302e81c6976bf8ce8fd37810dced488c73cb
SHA51259bcd495d67f94ae2100ab7b0ab072a7a307b77ae0839baaf229af8fff4f49846e3a988820fcf110924d83fb939d179f98c224edf1c31028b04ea7c1aca8712b
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b