Analysis
-
max time kernel
74s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 12:51
Static task
static1
Behavioral task
behavioral1
Sample
30728ee8b03963dbbbc67ea848c14973_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
30728ee8b03963dbbbc67ea848c14973_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
30728ee8b03963dbbbc67ea848c14973_JaffaCakes118.html
-
Size
932B
-
MD5
30728ee8b03963dbbbc67ea848c14973
-
SHA1
c0606a5253177c9bba367d91c4ea57307954dfb2
-
SHA256
2ffa4edee109427fc905ad06100b995f82f7fe7fb38a1f64dbdf0188fb416eab
-
SHA512
21dd68222f2495a150541402ee831460c304682dff128e10da533f927310af4e72467a49172ef37a1fd54a6f2d7a81d6f8e774f0060e33ed418e056a262de44d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426696105" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{03C86661-3DFD-11EF-A74E-76B5B9884319} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07d45f209d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000f642afa6e95b19e8bca8046c0ea6f47abc881449dd1b08fce9ab7e6f5d51ccfe000000000e80000000020000200000004257644c085c63b84eed59a060f115468b495b369f63de6fdc7e7293dc91ba50900000005288d171924b83ebdb1090cf2b88409f72e1f37ebf9f897f07bcef83a28567051d3ff5306ff205aee7032a245875bbf156eebfc7d4dfc2d77fca2528a6249b6ac331d8d9cbb8046ed528add827650bb3b3f9d1a592b84ed825de809b6d460e9ebf128eb4c344c6005994a53b094e73d587271ade8010b831176f957102664d9a3a0c5f8ba35f233d3551b28759a7879e40000000afbed3e3a6a0346c36acb58152e80f741e64de5d54f30ef33ddfd3632f8260e65c2acc924011b6d52d5a89ca51d5b12938b449c2f8cb9803b67dc1eb061e4db8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000f808ec0d9f4d06be466046d929e0ca7e62e64b0b65018283fe5be8d1a47342e6000000000e80000000020000200000001b6c855e85bc2bee2bf75d8dec490f423ce82dbae6b3810e3bff1702c05924c820000000f4b5cdb588e28a05bfdf41d4471e0d0e6400cc537a35aea271296cdbbfd2480f4000000027a2aba49520714c4a9ea59c9f7ee4a451f0fc21303bc496c4e19c973d16436950799db67f1ba2b94768d94f242e4df1ce8f47bf4ba9ceb64160563999e9e9ba iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 708 iexplore.exe 708 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 708 wrote to memory of 2832 708 iexplore.exe 29 PID 708 wrote to memory of 2832 708 iexplore.exe 29 PID 708 wrote to memory of 2832 708 iexplore.exe 29 PID 708 wrote to memory of 2832 708 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\30728ee8b03963dbbbc67ea848c14973_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a12f7ae6199b204d277f49492d628c
SHA160a02a321bfa9f58a7783d4c77c5b41055bee550
SHA256f4dcc0715553d1832062dead566319f3c65ae525bf98f998f11185c8b38b92f7
SHA512b8e0d54d760acd49936b144d2041e6562bf66e1b2114f72dbeaf3c170e8cf476d83dba4c5e6c6900b20cb6e8ebd040caa6b1df9cae7f3063c71be696cb88c886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7fbbacad3160696fb95f4eb89fb237
SHA166639e15b3cf40f87bfefb15b79b7f745613613c
SHA256c126e93b6411743eae8c50a6f2d210d06c3f6eb38ec60d4f6ad0c32cea28ea70
SHA512681a8007a48ad8f714b9d9e5b6c91df89205748132d16db3ae4c6dd1da398b9c7bc1e473e55de2b93ca97fe4dc693a440c44ad6d62469c6ad3b7a22253e2cfae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da7f1a3ea73e8b24795ba42097cbbc4
SHA1bec74a31df661214ec44f5c7258f03b6c3c8163f
SHA25601d847396d616b5858d7df7e8d0ada0ed43e776a5bb9ed9d25885c4b48d1250e
SHA512feafbfb7680ba4d3df09fa27faa3742998a67f095c5d58747b9236bb35230cb4b78a5698721ffe930fe02f96dd8132410446512486c14f7480a780b6fc0db72b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57878733fcfb554ed80c6af5c0b86a0dc
SHA11c7f2ef76be9ff733cb6a429fbf36b096d33b59c
SHA256be79f7e01c4c8691608f129be93d0c737e2ce04e907ddb98078266120a0ca492
SHA512d1d4ce59bed0ec4b88e11bf417207b439b80011ed52ba2faf2ddbe92b03ea8647eec57b463c0d4c067a527c47724e2c9feec08b8f7339515bb6ebdb166d88015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f947b1e17730fbc95a1d838d0b730c
SHA187b7c74f3904b767c91586606286ab1d47127e4b
SHA256921fb5cf92d6b69dcd8d273f2639cbf8828a10c2391df57f15ca6ac1dba97f27
SHA5126a2d18c02d543419ebd93b5dbc265cb49e8896de7fd8086cd80af0a8b37203fe9db2b32f061b471f87c554d76e805e82fe0b0df90585dccfca7c35ccd9cc411d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa8c74a1df436bbd2e28044f7d60539
SHA1d471359fac0dc56b098a624bde9bd0e426433b45
SHA2568732203965e1089aff3ae626d288bb67bbce002936439ac8424e908f50d724f9
SHA51203f7435f9231ca2a4bebbc75f7570bd6990e8ba219157f8e1cdc1274223e2b164f3eba5c3e8efd5f2d4058bcd9ca36a776263fde4620f0d02ac8905875d167ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d013bcea6cec9a9b525b8e061d473e
SHA1d7212469cd2c5cf6130f6a999835e9e55876d2dc
SHA256ff1b90737a4f19d0d9df62499c474a689cb40a72183c628843bba4c1eadfcf5b
SHA5120a45093bf967b2fc956c3d291ed74c71e386e344d61a1540645506f9c9ee050d6e1caffbe6857f7acde6d2835db52957dd836e2e1432686cb19e4e77aff35770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8f3baa22bbb56bbf4134e396bd9ab9
SHA1d1ab25e8147b95951fee811128eee90de8de9430
SHA25628c0113dcecadf59c12866976a4e51c02f34d5d4d88754b3d5442353798bc50c
SHA51211a1cc597ae04b28d0ed61d61c52919c0eb060d937a937e03e01912a92e5aa463f629c4978a2370a9bf48147cd2201f27b8ef9485110f7a65d6c70ea0285d98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e187db85e3cc1ad61ec74507a143df2c
SHA17e02008a6d16dc5e52dc1588ad95542102133ee1
SHA25699023369322129e20ac9f0e512e4d0fb2ade709fc917c07917ae68be7509a2fc
SHA5125708f9c3d9d2fe53c2a0523c43ba9d7ae7750f03f12c2013515b80f133f2d4874b4894a4405021fd9fe9760c209e5a4215b6e92cd23748c02466691f4f363b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db2ec6fbdbd42a6db3e73b44bf2d88ac
SHA185463d48259d69ca7cfb3e2cc3c05e008c6a3253
SHA256ee9b18e40c80712f3b935b04a978e2d1106d1476a27074128a22343a6d3b7aea
SHA5122751998fe69fe3cf5a76fb47a590c0f02ec1f51a22587367eaeb01a917bcdbb360d248b44a1ad2a1931a0d381c21277b69ad37f04448af8584f417fef6e6ee5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50326d7294d436fd15e0b2eca1de7ef43
SHA11893986c6dd2030675d8a5975ccedd2f7d531e4d
SHA256e392007394db6a4e11f9969a2a5c71bc80b79ee0acaeee9d627fee85a40ae16a
SHA51242cd60d22e269d62f7553f8b4386b52d000305ebed61de2997d4d9daaaec021a55359e3e731beb6c4dc2db74cc6a44ca1e544cf02c715bf80b6d72cf4f10bbc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df25ff2a7138410f67b01d5ef87a9c5f
SHA183e2bb5f63543e3900e497f139f8863fae239d60
SHA2566005dbeeda9979b297a2531a2e26bf5c0763ad658baa6eca8925fc4bb39a365b
SHA512857600992bd6af338d7596997d23cb3c8f13e5f76ea5b23e99b2ee51461a2b0784d4b76b4dfd5d1cd5c679343d3bc9307a05f6986a048111031ced9060082a7d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b