Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 23:08
Static task
static1
Behavioral task
behavioral1
Sample
325b93d05cd14f475ad3e23b23a1b556_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
325b93d05cd14f475ad3e23b23a1b556_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
325b93d05cd14f475ad3e23b23a1b556_JaffaCakes118.html
-
Size
122KB
-
MD5
325b93d05cd14f475ad3e23b23a1b556
-
SHA1
ddfcfd8cc0ee61502280bbf0243a299171b7b9ee
-
SHA256
3756e5844143aeb0bb4f4477583c8c421cf408592ba1e0000a1f6319b711f28a
-
SHA512
94f43279b60225e6462b5889da2356bca7332b36bb652fa72e248b84c5eba8bb5814ec87ca24dc923e126a9734c5f121da17cc9d3dc19045b7cb81e781dc68ed
-
SSDEEP
1536:jP0vAYGMF1PEUc1NKVvG+sZ1mKMXOKN/ikj44Uwc91:49GMF18RZAOuUw01
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000b4198f243cf8e8a8d556f82c6d3b486f18906c547fe8fb1b4cdede454f3dd960000000000e80000000020000200000003f358313f40055e9f613704127d67d903e8f16926754b136ddfee1e5522aed2e20000000a94f56860d9d2758a0eb15fe8918d1d28750861b8ad2571101d56a1ad4d012db40000000302eb97f97bcf9eb2dd279b3f2e75a5cc2eacf93ee74e980551519c1ad45e9f70bd93f8c352245ef57f3b0fd75528ca63d818d7499321d2d745898e1237257c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9365DAA1-3E48-11EF-A251-667598992E52} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426728559" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208ffa8355d2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 iexplore.exe 1900 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2804 1900 iexplore.exe 30 PID 1900 wrote to memory of 2804 1900 iexplore.exe 30 PID 1900 wrote to memory of 2804 1900 iexplore.exe 30 PID 1900 wrote to memory of 2804 1900 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\325b93d05cd14f475ad3e23b23a1b556_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b997171454c4d880484f4228b9ff9cc
SHA176571493ec0f85768fba292f58f1d3eed3e930ea
SHA2563fd3749ba41d714dd22e8f0c25a5c955d654e5d3f797810f4aaddf05afa598a4
SHA5121fea4a42ea168fa2efd33fee56f16de75f79f0f72d6b456c193553bb26e4eb38637c2928c891cbdc97ab23c29e075c963e8335df296a20d6eaba9ab9a7eeeb5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1cc43e3d4bc1fb479613890d05fa238
SHA1a9e532c6dffdf4fb05e0be7c20c469164fbf72f0
SHA256b7fec4d9ac4114d7c0dee8a9efdacf1a221170e4eeda477bac68d59efd9831ff
SHA512ab3ac59f83c24a5e4064b277975bdb8a7915ac2e85e5121f4e42933bf05b2591c0f50e8084bce2b785af1058d5d65e7de52762684623ab6f8fa1fd80725e7ee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57432aeae447cd79cc1f738575552e442
SHA1eae53c67d5a7b3cef2c8d8ea22d039651034ad20
SHA256740101c12c85a054de92b02a7bb8842b34b893f91ceff20150445b7ead154d72
SHA512cffcad88fcdbbbbe79be097e28e8c2fe0cb5e254474f94adb4a7b0cf9c751d4b53c97e7fe217cd980cfa8fc50449c4b370c31a1c38906d607c7e8c7b0f0bbc9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e05bd85f3bcef8a4075f2f6eaf6ae143
SHA13d8cefbcf70ebde7d5424e0ac87b3d7e85b51f33
SHA256cbbfef43656e0222925bc8524cbf0f132088b64b3503384891fe92736ed31ac2
SHA51211e58604ad6ce9cd72390bcd60e1503f8d8da89bae6314431c25b4dee64d60df90b747735619ab83375c7e927637564ef3ca53cacedeebff2732c75d91d4f14b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502f072d990464c9a283342d8ebce862c
SHA185dafc86ef462cf11f1a7e2b757197bb3b2599cc
SHA2567f3827cb6ac6796f0be1a43fb051e0c5b4b7e40df09072eed52e5dd5181809cb
SHA5127041e14d07c7af3826e01877aef53f88c8a7757019c51fed19a889860412ae4d3c17aaa2ef6868c71b88593e2e3e205f2e1b05b93cd9ddd38ad0067024740d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7af55eb9421f04b286e2376bbbaa85d
SHA190cbcdf32345909610db808fe7bb599a04255c2f
SHA256f78fb4f4c3001eaeccd40860bf4e6526487562c8db9547d7e1d7aedf7a35d74a
SHA51249e4a6589470eb444e410d9c49185e3d2bb31f44dc4fc65638b13ba04b86fec25862b707d4f79e1971e4a7b5a92d280692c6f37bf7cde64ab6d13ede015ab79e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567ce7bd19fa93293fefa60745a66b073
SHA1f4b94cd63ac7f211af7fd5d2181c5d0081fc4fa3
SHA256df4a157620abc7926b45d18bc0c428b0678959fc3e15fe573b8a0117020d64cf
SHA512a700b4dc939425d714da346b010db625230be51a91a5b3704be0a35de6aac9fa298723d0c99777aa01b42ec73de90b9072e269baebb48ff01492bf907079fe0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d008a5936d4c7def40b0f0a69a93daa6
SHA171aa75d7fc6b557060f3fb31cb1bb705881288d4
SHA256f810864067cab86d2c82c6f0345a47883b871c79c6b02fc7a7bd19759c68b64e
SHA5127a2753ac49d21cb257e8ff0acc37d9c2e28d6bf62f041f1ac9c9a635809d157eebab39a23ca4dd6334abc244ad8e1c67e27975949095a12ad2c2ff53effae47d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50805e705968b6b2ca17b29f2d9752c4f
SHA174a68eb7e7a7b7163a15843cf3d8b96cf2ae6e92
SHA256d4846933c898d7c91fb8463b670305dafe9d5fb5f539f9dec7cfc6b722c636ef
SHA512f27e734b93ca60c2e5b26e9c2fcce98d73f9ae10410f81a8ea436bdb9421b778fe1fc100a722e4b229b248f3580b5db3bf98aace0c6feba2c695b7e1dd45b1cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d9b4c6f3abf121d1e3356e867eb737c
SHA1d3b37c60ce06a1139575554a8277d6348bb7f55b
SHA2568c6dee50853d0f897d10b69d7082a247fb888e634b1e099a9b463200921f672b
SHA5124a986cd0ff7ea36fc5923fe7be9ac5b2e6279c858601e90be941b4997d2e92badbde44619deb0856b0491dac817de8b33015864745ab2314d6a1f2115bdb7061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5990873a492c6712f0de1b0893372bb59
SHA1382f79ab3daee28a0b53027013b222a94122f592
SHA256a05a2e14acd9ba8b4adab915bc1ef34ef09f970d7b42c2001f07c4d8f463dea4
SHA51200b7daf963021fb9f3d41633bfc9a0ae00f717a7f26345198526d35dd38e8d2794135b75fb7888f1946790afd952494b6e63173150d97588ae8267e3f3874fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b695d1cf836f01fa08342eccf7245ebb
SHA1a96f51ec6c5ad56a021d5af80e4b28efb83f75ba
SHA256faeb18ed5f82efc403a8a914f2f6f489329e76e9f10131ff3d14ae7f2c53a4b8
SHA512cc6782862d18688960e817c26b4106aa4c73ceafbf26f51a0a28a3db741dfdeca5257d1b51729126d19fc1d657420145ec22d1056d1f916f0d3cff9ec7ba4d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6037e58ecf48fcd5dc5826bede6a33e
SHA1411339eced92aa130d39ab4c7d367a3c2b14eac9
SHA2564a0d85b87a5d59e68ad725a7a9604bf9b573d6ea51f9de24a4deae0916340cd0
SHA5122a306da8612a5eef2336ad199fddb8e7bc5c0075ac2d7a92e76f4057a9f3c3c5d56d69d9125ad2fa8803feb3bf3ac3941f0e98d81431bf425316a7eb519d254b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad5172abc0e4f4355cf066ecb564189c
SHA1e053365450915817f3d1628274bc53752e0796f4
SHA256db95c6aa6d3cc0af64c5f539cffd37bf68cde62c2034ea548a0cac24f047e046
SHA51281e0a313af20ac003c40a2d91266bd919b38e6539e2143ff405d98ae6e2b8c264393bb789dd67d1d2ac77a8db799b861eccbf4e483e44f8a8adb7a2145ff1dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d6639fd50e585061da51d85a4d4ff8d
SHA190022ffca3f42571d4cd481e6e9b899bb02f3604
SHA25666eb282dd7b5bdccc669b901671a8fb1dbc1fd4c10818b43bcaa1a6d1227056e
SHA5127adc267d4d1e755452063685c06a836c67db4ad9eec2e7542039333f44c162526cb1f825665c9b19743d8433db45279fd655a2ad13935da227bc83b8fc2ec137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a31a617c42205b27607a71e7e8c790f
SHA19bba8bd073ebebaa2613fcc36615216c3a4d26d5
SHA2562bb103a24900f6714d55754ccc45406b96aecbf270fde6e6a0b6a2ccc812c21b
SHA512dd191475219b23928179c5f0d75f9f468315b9e35a21f8f2e305dfe6ba47dfa146c34e405cd37df9f404856959bee1a73dd5e956fc624482ceaa49d8975fb96d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552cdfe2cc04c03f27189d65faca7cd8d
SHA15e0ebcf000e5a5116da0e8246a85d8f82eddfb1b
SHA25649da11a0a9297b269310003567739739c36d763b0c40cf9ae68d04b41b1cf14e
SHA512a0b4a14896b9d47ca26ac1238cac08d1089303ce94be7eb2e494d67f481df58cef58bd41192378291c263ebb05bd8ab25907c18fc83404b5f61643a16b55f009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e18d3069ebfc5d44222ae7cdc982b6
SHA10ff7bc6b7aa243c831882fdae3a014d66a27c64e
SHA256f78d9ff5380081f04a280b466db5d65194a4019857744d482e5c9f19dca83e9c
SHA5125b6fc06357027c6a271260654726b4749e2bd8c0b91d2eb5f211ac63fe7106a06c6803e42cf3085ece0189c8c8aaa81b73826025bf0917b68231d00fa6f426c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f7ca4ee7334b5b3e69b02b35a84daac
SHA14edb86c769be88d1453db088a2e74d207576a068
SHA256e89c1a76852ee142f95d9bd9866a0a1ef99046205cd64f69f6acd15c01efc5c0
SHA51255619b7fe6fc38404bbb8b563d3dbe64e403f15cd48dc417a2bd2e961d3fd14009110a1a42de3df9af4326c6b77a1019b68f5862f547e2d1c957f0bf496ec9fc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b