Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 22:37
Static task
static1
Behavioral task
behavioral1
Sample
2e12d9ec23a5585447929742ecbfb693_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2e12d9ec23a5585447929742ecbfb693_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2e12d9ec23a5585447929742ecbfb693_JaffaCakes118.html
-
Size
53KB
-
MD5
2e12d9ec23a5585447929742ecbfb693
-
SHA1
bb5157cca2fbc6689b56c14fed49fd939c31883d
-
SHA256
c7e6c410c4ae163f05d85a097958d450b1e4b496957155bd955098717d96b1cf
-
SHA512
99fae2914cb76d2560616639bb2d0733ddeec10b11eb7246803760e27e6d072f4c87ff0ed505a04768b0f38552e3141d16f973a619c7f47d1369154bb11eb4a8
-
SSDEEP
1536:CkgUiIakTqGivi+PyUdrunlYG263Nj+q5Vy0R0w2AzTICbbCoP6/t9M/dNwIUTDI:CkgUiIakTqGivi+PyUdrunlYl63Nj+q/
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208a5d2dbdd1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426663172" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55CB2DA1-3DB0-11EF-9E0F-4E18907FF899} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000002af4dc0db11a706e8fe6f046ab2e05734814e4c6c1086b883bd03cd590c8b851000000000e80000000020000200000002b6f2c1acbad59a65c38523d0516339ea5994868d2af9bb9e9e8c4c90d90692320000000b2efe795afe835b345593daf799c274c41ea0e93bdb7264252b9ce462fd312a840000000695ae076e937f7de6f87a8661daf54d756c3f4bd3291570cef1434b20881438255836dd2d5d2d8fa3fb90cad9112d4d2e82fa0e30df19eecaaf1c368795f1b84 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 840 IEXPLORE.EXE 840 IEXPLORE.EXE 840 IEXPLORE.EXE 840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 840 2220 iexplore.exe 31 PID 2220 wrote to memory of 840 2220 iexplore.exe 31 PID 2220 wrote to memory of 840 2220 iexplore.exe 31 PID 2220 wrote to memory of 840 2220 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e12d9ec23a5585447929742ecbfb693_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c8085fff505e0e3e99eac79a0a434dd
SHA172fad3bec6b3464182b6c91605e5bd385fba401b
SHA2560a19c7e8bc570ed0a291943867d1beb04e40a8c977a01a040f225ff22fe0e872
SHA5122aca326131e4a08309ff24473d639b4ff4888df66f7a57a7efc705320b25be4ada19f4787e77f1c4226421feac3f19afa218e9333de4393e1ca9d879e0facad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557c44aefaec24712b2cd2744f3c437f5
SHA1cc775f978a41e276a6d3f5437fcb57275e53d06b
SHA2561c2cfc3406f5d037344c214aec2e0da6fe2d67319e93d858aecfaf840a50ec1a
SHA512afceab25a3afc5c8073064eba2f3998fb391c031f19c34a20359a10321b7f1acc90d0947b47d5eae35739291e1e39435a81318d013a1b4944e0b0dab251e0608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5477f6ac06f3dc7ff2c97cafababf5049
SHA149cc3e6d3b6e9ffc55574e34f56b07f752460f27
SHA256f40570c1428c61b7e10402206773d26a2eac17ddd598e9cfbd626659ff3ba97d
SHA512583c9195ceb81fc7a2c0023fa51fb6dbb8fbd0f62c86301dc33dd2186c91bcab384d54f335acf3d571064cf74c492b0a0114d31c137a80c4a1b2ff8e14ce946b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ec679a85c8dacc352c1d09dffc2e8b2
SHA15fd32565c9c9696c3c09c9d5b8690d3e5369a389
SHA256f2491303b328fcb716d864e57e6c035f86a6c87c3a5469387476513ef73d4e5f
SHA512681f87b2070e4cffa216e6aa25577ca278e4cb37453e0f0df4b70f86b993f28cc6ce9bf9b734b3e2b82745f67fbc8e03210806d58d751167ffa8fb83e6e3d825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500e054a6c523b46fbb3ea604f7cbcd8f
SHA1face9f697c12dad558c3c3e2045e2d22ba6813d4
SHA256c2e9755e7d649a621c1843201f47212f9b10d1cf547a6dc3fe51982ac3ed3a31
SHA51209a69658b63ee5e590ef1344a13fc90b2b4a2c8ee409ee56153f737ff1760e82efbf97b71f0ad76884accc68346d202b8de681ab9658749ae9dbcd1ad7d06d7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5394a9d870cb86347bac0d891b449f07f
SHA11a7970153f428876fdce46b6c9f8380a26063ac4
SHA256cbddfd543a9481fb0c577691ff7d4d784e282579b61154b8214f95ea1740b53d
SHA512bc6bd1e803909170b0edce319c39e0b4c7ec1f15d775672c94185fa2bcd39055101132b7295495f841f828d731e824d798e901ddb6c3a7f032394d5a77320874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511fc96b757970ae0b717bb2875688b31
SHA1498866c453cff00ad57d5548628e739fa1a370c7
SHA2566950192c9f5b3db41ed0b4faf632061248ee5be55b6123fb314c2ab2848ba231
SHA512e408ae4d5974784dbc974dadb189b101c8fd4c6f9e9211b97fb014d6054235bd328f9633a9707396f408abc3065d3b12a3f80acbbc7d57dde89fe37226654166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520985346ffdaf30fdf39b1d86d7e2be8
SHA1c6e919696a49f9044770a95654a8fbd235d7e674
SHA256af6edaf1ec0f2c0ab94eab3256a82a3ea189029fa304673e14f552b9738e3024
SHA51258ebc26a00cc2cd3f17f2f8ba002e28071dbf4459df37c25bed97f153531517bdbc5ab1f475a1d6b7b52d67b3ac4eea2fb620b42744f3d53ead00e9e7370a13e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f33f1fd202b4a7986ff08b93153d889
SHA10f6cc769899868706d558d103df3af1cdd37b8f3
SHA256ea2253f9802e8230a813c0f275c2e8b119b6435299241f92f8848d0c62a1093e
SHA512135c91a7bfb982f93b5a198cedf5464b514278292234d39c2778347d1a58cdc2e236ceed56a1f14435ce4f872ade0db8b98720b8d2be477f14d16547e5f1a6c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5949aa3a055575d389ab668005cb03b08
SHA16083bab84b271465963e0fb8b8da2d8e57b4d43f
SHA2561fe7408086ba3fe082f994b6b72dbc2a9387f746611b235b8ca119b5fa0c6dac
SHA51275ca6d3096bce3913b4865d864f3bc95ad90bee2fd487eb3efa62ec29f2905b1a681be6fdbd95453ecf09a9718e4927668e9fbd2ee74ba29028b2e7ba594b6d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521907e0466915c73a23d8e378d33d511
SHA11717c0a6cfb26c30ed15715dff5655e806048939
SHA2567a20f3477eb873ab74c81d4d7696b19c155cb9cc443069ede98e31355818a042
SHA5128e7b4863a34925a64b92b10bc7ea39590d37068e7186e8dee760b80321f897ca1e7dad24634d2564a2643c2125e5fd194086ac511490b1a6080dc2b4998e1166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1bc0190b27063838b37ba390a33ab89
SHA10b33a8d0a06de84f6e06aa222d87051839c82c56
SHA256fcd2124be0ce935303c53bc50e5d8c18ed13923b9623cdf29423f948b7583308
SHA51226bc9814f0904f8a6986d00f62455a16968d256847f3a636ceb17db7c3e81fa324372b70c7feee69857cdaf3b2bdeb9697e8476dacce8b6a376f1911047cfd16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6b67db13975bacb5ca0f5a7e9dff4e6
SHA1c4f59e3d6ae15eeadf003319bf73b11d8376687a
SHA256528e7c32dbaaa135f6f2da4c6f78290615003c50fa76dc7feff7bdf80345a02e
SHA512e3c1b4da2c91dcd4cc2dfa0072e84efc17bb4c84373227134f9675c52026c10d2455c1d90aa1ba12a50cf1b0115fc607e4b3c9e8eb347c76ac1f665abc9f8a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546f8f2198c88f3c9f3481c9780dc2440
SHA10eb61dc10c0d62e1939745b2f617d7dc01e7e59b
SHA2560520ae2fcc04ecd9f4b66ea80f5ad40febaeffc1d16af9440e17b4b154e76dd6
SHA512ec9a304431475c82c291e342f067ecd355bbd1de209dc2051c30148769a230fe8b8f05310f97bcb14c0559b5b41e019d8826905d5fb3aa311f9283c3ce6c0d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502ddea5a678bc322a73013c63958c621
SHA186a9f58feaa65deb7ff6d80e73b70fe0d52eb94f
SHA25635571787c36a6b3587df9a850db2a4b85e4cf0925894732bb4370521e3b19923
SHA512eeb4c6df3564bc46f91b29a0781b3eedba132233696e6b65ed5efcc9bd9bdc60271cc5563f296140d20cd7d0364d32a7fee6dd7d9dffe2062536ffe02f67113d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9f510d6b75f8a3597a5c3889bda8173
SHA1ec7567a6ce404bc86e7c2330a22df81e69843793
SHA2566775f9ba67fadaf14a1126a9238ffbf848dd017671b3cee9b5a81dc20944c610
SHA5127a36000714d7d317ead2856ad53dce4c027de0b51c5b183e398f16d811bf96ffcf8959342be4804f92eb44595be2f31d824fd76e0b32edb1c35ab6098036ed0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f59e8f5c532e8153f1343e3b622a77a7
SHA1b933c884ab135dee55ca73d19cc2e7b0bd6586ce
SHA256ed6fbb1a4f6a0456bc2cbd3594cb4e5f8ad060d459077537f8e81e6a7e3120da
SHA512f7871e7f1e6fcf89bacadc3ea7a6216bc5bf513209236fccbf005806476029f70c80d61d9da69535cc26c89377b07f6a58b4e75282226ceb2186c36b3c9968ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a92180a6408ae523b254ab7b165a7e8
SHA16988187065435800083531d4141d911efe63ff12
SHA25612ed509cbcb077639fe2a733de5a74cee4693254f86bd4fa1b76ab7655518345
SHA512595b2ce3b83864b97d3024bc79c2769f61b480d505a334a3e36988d693027a20b3b48776a15ff34706c7a5844d16198637c69f31524ccbb7b2ac2e9a42511f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcc83a9ec704be9a287a42a2e8774205
SHA1dd1a09aefe4c4bb5f589c9b4a176c909b30a6b8f
SHA256ab1029c6b1d918a71f5d9b269794a41055e4c0c758a4b8021b0992a44afa27ad
SHA512d81f6266c334704269640951552484a10d3c19380cdca079c1cab4ef532cb13f4b4cb34c8d9a21b99a7eaec70f9512555db24e2c1c721fd756044adcbc3c44a5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b