Analysis
-
max time kernel
138s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
288afec190b80c06e8cf5343e6524f13_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
288afec190b80c06e8cf5343e6524f13_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
288afec190b80c06e8cf5343e6524f13_JaffaCakes118.html
-
Size
58KB
-
MD5
288afec190b80c06e8cf5343e6524f13
-
SHA1
a97eb3f8f1e8180984a1d40431c1b817edb620dc
-
SHA256
978e68496763e59ef3e66034d6a2c26499d9fe89cfd5a5cfe5d18e1132367624
-
SHA512
4357aa4bab912ad61a6fd58567d2c13edc8bd8db1e59c6579cd5d53161899125e6ba95aa02d0b358389c6bcd3126faf3af52e97a03111c0fcd9e9225ccc8418c
-
SSDEEP
1536:gQZBCCOdK0IxCM5kDfVfQfufHfSfbf5fEfxf/fffHfmfpfTfof4fJfLfEfofPfId:gk2I0Ix4t42fKzRcpXnfuhrQQRTcQ3gd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426440566" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A5FEAC1-3BAA-11EF-AB71-E6140BA5C80C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 003558e2b6cfda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000e334ca686d0b8fb4facda24ffc23e4400230c31d0f0b7a97204587007952edd2000000000e80000000020000200000009f7c0d14ebad7de4fe5bd21a699263e34d1c3c3a47b528bb22a1b4d7a261fd9320000000c3194278a7fd6128e3ab04f48a547f93985ca88e842c56bfa17035c6b3a7127e40000000df3750dcccb47a5b61871dcbe06f99ad815607095ec7fd6a9ff490629d04123f37b673a8f1a7373cc4a3b6aeaf71bb03c976584feb770f4b3deb546ff19a55b4 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1412 iexplore.exe 1412 iexplore.exe 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1412 wrote to memory of 2620 1412 iexplore.exe 31 PID 1412 wrote to memory of 2620 1412 iexplore.exe 31 PID 1412 wrote to memory of 2620 1412 iexplore.exe 31 PID 1412 wrote to memory of 2620 1412 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\288afec190b80c06e8cf5343e6524f13_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcaf1e4682ae4e9f144a6c8c35d123c5
SHA16ef7ca119a3fa348fdc8dec5d85ff11e72587719
SHA256cd074b188cb38208699991c8fe1f6ea22ef352cef3835a417b60c007623251cd
SHA5126a2601a0d3b82cf7ada905a30a697af6df9eb53555f0045eacb6524af7f0b1a61e3b12c8f2f6011a773f35c9a1d52383030c75fcccd9d5abc568b971eb112706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec8a7fcfce14aba2dc288747707bd358
SHA1cfc08c46f1725c171bbb22507bc8bf96dcf30c0a
SHA256c4b8141349a2513102e7ac7617df6e8872dd9e7391c1241fbd1300d9a84f3d2a
SHA512ac75004e685da48a974e70242bcdf41f8efdc585defe4484d21afabdb743974b99348281af1bc9d386acfe2bfdca357d29e8285f825337bc7590ae2f8e16b48e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd46e0e2b3cd4ea5552bafee0df0a82
SHA18ec74c1ce6eb657d5029ee452a05a19013f4e435
SHA256beea68b43ba79755ffdb432f5dc2ff45d5f91de7c814645af83103a345f3c9c2
SHA512c6831bf67180bab6e2a6c72f773d37b5bf7c0a67badb0bf3b867e89edbe73524b6c183612f3e44b0e0df5fbdc09b926b6313597744ded345946fa29e777bb718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e2e29990a21372c9aa9e9f90d29619
SHA1ff5e5bc1adbad0bfe9bdd60e6f49926ae43b9815
SHA2567fc6f7fda5a3026c91a4cd283dce547196616062185723f45ea1f69ba9c66965
SHA512c1287d505672acffef873e5f5b24a33cfbe380e9fac5981771ddcd90fa2da5c89dce2301b24b2d2aaf36e69a21a61b99782ec567d227db3f23a23aae2d275813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bbd0735f3d71e33609b219d9667f5fa
SHA1fc58563f493aa2c343d46647cfe32f0dd7362aa7
SHA256d744901a2505869bf870cfbb9aa7080360b6eb551577149994ec0d64b1cb283f
SHA512730c34f43f0b87e08fdb380498c423e7d9a6d77890966b1d5655ec0a742f0b35e11663a1288b4d660aa078a96aacc79756c3fb977fd02a822fc72aecde841f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e94234bd925e9b2354525d9c64f9eb3f
SHA1201e20979e8f42166edcdaf5ca16968d8d3f0a7a
SHA256c9698c06779e9cbe038e65af3ed1056d7ff823c8bd2dc43d9de20c1b217a185c
SHA5122f081cc0b61d5dfbc62c845ebf80a979d4994c6c9425f8365784b706a59530d4669314101c0cf597db25ba7375c7d98915d930d2ba545584f1d431a0b57209b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c5a8455377fd5d89bda1a665090153e
SHA12004987a6a882af6f86d03a0b7279f774df93b21
SHA256225f2056b89a215aea0c5c3f7e8dda1f0c264758978986a2492a2dfbabb16234
SHA512df48df151ebaa087508a5afd82b6ebe636d66545b6b0e06f8d01437b4fd3b4e942b03772301db6f745ff99c4b0ee7587476dc2395f9246cea01428fd24f0288d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ee5d7c4bcf15a5acf85f0e80a9e5d6
SHA1447197ef6c09eb9864fec9f76b4238f28eba8fcb
SHA2563743774907b6c12872b07af54458f02e9061e3d498d2f4000e7db2785024287f
SHA5125041f9a05084fa63239c74ad09dbe36a377b4b98426ae3bceb3b856b789926ee0dd74cb65e528ffbbc6155fd0432ca0ad9027882401cf9036fd0a2b659a24668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403b32a1bb93a42dc75316b991f434c6
SHA174f6fa5d8a2527a08e886d72984d38a4d6509311
SHA2568d76c45c5b3ebf10b6f6c1c21c665ff7086a3b3701e43111a4cdd9f0fec0d473
SHA51254ea0218508e0a35ead9452115dfccf10d2c09e65d983468f965a40dc2b14ca081fc00d68fb99a073e9e50b8137067b97f8411b5e3acf71145315e362bbb8628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c9fdf7d09da7008866bc7e6d07f415
SHA1481c5122916d86dc01514e2e013b3f2c23fdaab8
SHA2562ea60d5ddb6b5b5acba532729db09d41b17f2d909406261cbc5cecdf27e20d4d
SHA5120bb006c6a34350f272e31d3290e1c950c5a078fea6ee5f1a367ebcc076d350687a827175614372c92428e7418f5ce33e7a769b46ede347247ac9b8fdf3aa8431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ea92b7e542c369fa593012fa2c38ee
SHA1d7f304e2c554ef2100ae0a6ad08c1691bd3c0d07
SHA256502868bdb17d1f0e60131ae207ddf253b31f45a829384fc32ccb3fc685b48df8
SHA512fa2dce4dd4807fb2c172d57ecb45604751030248f7dd833109d515362a1770cabe186b23a494c6121ada9af0d494b978a3f0019e27bc8e5a0b9ad41368bbd037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582e339a4ec4ccef695a19f71a536dbcc
SHA1eaa17abc52bc349a6dec56ed2f37f361d08a53f4
SHA25630ee128d3cfd13765d649df4de2be79f10310800a6f842bc45f4f84634018726
SHA51233c56e56f5f065ba9c6544977dfd539188f633fd99acb525baeee535a02a021ab9a796bc394c725a5d24912f6b2861295d4def19d75136fc28c2a7efd20ca1f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569e76f3c61639f5ae28a97cb72aad23e
SHA1c84e8d13fb89397b67a3755f88cfc55fc0ec9082
SHA25648e290fc3d8f3fdee6679e54c77edb2036999159bcc9f2688ce7aca45a2ed4db
SHA5120296fbd2eae2c67e9083aa0489dfeedac2ea917d667e061b00baedbbc3f50b68b622180452fefa8b0a6d6ce2ebb514bb7b03fea7553e276a21fa0a7619281723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571435e2a7102767852027fba65c4d027
SHA1a2e5c64b3ed6d88d15e9d7e41b6b87c183021399
SHA256da0e14ec90eed2f62072a8ef4d7f51588b1dc0c1fc074fe0fb14f1d805565e6d
SHA51243066dcccbad0936c48010f0099b7f48210073bda7e94905f8cd0ccbc3c1b559e687af180a8a1bc94de45441a97d8c0d053203cf39a8bd6a6ea93ba634755eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb5417d27c34ceffe73899d115ea277f
SHA1016f921ca50fa27186dc39d2faa2b1532152adb0
SHA256724d9ad7db3026c76287cb4e76f078961edfdc4e4094ad24b3bae34583305a26
SHA5124486c04989b53a307e672adeb2f893b7de87eedf9c6b9763eb1b6416e695ea94a405518fcbbd006d08996260ff3a971363f6e1a04d9c843b07668b3e4ac56396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c47dc5499583fd09e5f8acba638568e4
SHA1390d952c46ed09ff066e42fe0f3e0770bd1b3d30
SHA2567d86fb0c3767ddb0fa555972fb64a9aee9809891f14f9aab448c312042fb3c90
SHA512455e65ec2bf270a1eea0dca20611110c8e124b06f8850cf8002e87a51919dd44641ef86e5d1a2b811c4fc0dfdaaef79112f4ca2c0a75d45e19b6d00b50d6f6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c628842c007dae372ccf08388c4e7f
SHA1e42764b98ac92f5bab27fe696c4c0ec2376cf551
SHA2560279b8e1c1b91c2007a442b0539f24816498998b789e565c932faafbc13c1834
SHA5123e1da2518ffd58d83737489bfb16e37ebe1c6d3c577d7471e4d1ca76ea7c8f68a2421f7d71ead7f166b5e37c43048b71bc59be8b38b97619aa53e0b8dc86082f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56638d51b9cf7a32314beb6cdea5d451c
SHA15c87174faa5a8b71b8da264d2163dbdcdb8199d9
SHA25690096e9e1a264157727622cd75b0c5065d21cb461cd2bc2e9d7c191b28f23cb5
SHA512f19b6cd9afb70cbe6fef8fd91fd15be9fd4a6bc9226d4f0ed7b1741da35eded7443e6faed316b917fd84531ca4badb50f88ab22176a21cc77472cd35adef5f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5465ac3f154d814803a54609c09cf29
SHA1c54df4e68d2198dfe4b2efcc396c4666cc27a037
SHA256a85d774dcd001132182c34e608001bc566902882ee2d822af7a23646c6775e84
SHA51295b58752a7f84f269bbe95d9407384cae726c3274a4280cca4cfed2f7678357c0f60de831ad98d4e8edf43db5e86d50d1a9398657a8c625d90c7f3bc60e6f776
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b