Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
305d721aa770592c60f7e5b10904d692_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
305d721aa770592c60f7e5b10904d692_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
305d721aa770592c60f7e5b10904d692_JaffaCakes118.html
-
Size
11KB
-
MD5
305d721aa770592c60f7e5b10904d692
-
SHA1
d7d3bf2910e5c927412fd2f3fc31bcaaba9ef4a9
-
SHA256
c10af1dfe88a501f3e9816d95646098de590d4a302aa2f6f1e23a835336bd14a
-
SHA512
a167aac24818659edf6e3bf5666bcdbaeccb6edf513cb419fdcf91850f4d9b239af5708d70f4839d47279a4f8344e9c099dc01625be288cd07540d53685733fc
-
SSDEEP
192:2ValIsr0r57MiTxQiT8yd/w1wvqVkt1LauBuLbdU8d:salIcIQiTxQ2d/g8LaguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17896A71-3DFB-11EF-9CBD-4625F4E6DDF6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426695279" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000031c955513260e56cebf311e44c82f06290de3c7767a47147272519145146f01a000000000e800000000200002000000015ff9d07c6659a51e8de960d0fdb76c1284ff6f980c636aee287495e3f63194420000000bdaa59b0d0e5a664af44dc3c421a71ec6f7c5f43ee71f53890df69d010f2e78d4000000045d19e2a38885c9bcdebae2b681b72b75bad7f01abce9479d9d6b435a0e415ed69e02bb8711fb56cef2f7e1faa3aed33993fba8a2e1e6d5f706960771073e4e6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7028f40c08d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2564 2420 iexplore.exe 30 PID 2420 wrote to memory of 2564 2420 iexplore.exe 30 PID 2420 wrote to memory of 2564 2420 iexplore.exe 30 PID 2420 wrote to memory of 2564 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\305d721aa770592c60f7e5b10904d692_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2126a9800d91ab794e10fa1e542b762
SHA1226bc18db0f46ffb3f47d47b10bca03e31417127
SHA25692423d954e3ace83f34c196eb4ddc766b606d6270c1b06806faf1ae5cfbf41fa
SHA512f8236d3c3ac9d832b131e20bab816894e1adb1108c072291024160ffc27579c9770f890ec445bf7eb401b64df5c9d71f6f207c2a608e2bf47b2ee2da9b97e363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e28e7adcf22dba536c0df2be6dbd5cd
SHA1052c220a1ead255bf61accf719eaaf2675fcb974
SHA25632f1df36e05c582d83e1ed04d9e83b443b05d6269e23027e72fd1112d560e656
SHA51211bf12763c937c1c887aa16a73182fdd04d66a8424fdb10d3badac959bea351e77a14279451c9c5adfacba58b0d16640c7b3bfc1c996aa6319b2a76bfe25cc33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fbb0ab5d4910e5282a92880d2e9964e
SHA152ec0848c8bd0c80414062c7b2c9b5cb2f8df476
SHA256d9844df579a9e9f843351e680f6f99ca2e840d746faa80a9491a9778f7922373
SHA51266590216d638910dee5b5c9bde89be7687e3b4e78b1d7bd8e874c8c365b9b981a2e98f7ae411bb4d1f9fd3a61af23080abce25db23c8d5b075c20fe28a129ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5be1d169b415f0e43e2dce8a8dc9a6
SHA12d0e324abacf9c9d3b58c05ea37520e6ad0c03a6
SHA256d10feb20bfd18cc6d0eb65f718f9bb282645aaef52f5df4371776b31d3f633a0
SHA512a1511ee445b08d09847f75c9c314011388740eba13c7abe5e4175f4c553f79402437ea26d8e3215786b99d084ed9048a3c91ccd62de9993e91fc1c4ea770b3ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588a5486bbb3c0f4f94a7dc9631542bc8
SHA1669df1cf4a692f0e957f463af57e575908c32839
SHA25674023f418895eb23c4eb5a54f289ca04dc6c9a7d840577c7691839bb02f9201c
SHA51223d9998797a4cc05b2aaa59eccb35f1c3fd04b0ffea7b58054867c91a80e552e5e4923d2a1f951f227b86bde72272b97ec0be8fbb490714a2764dbb1cf429841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd5fa9d6f6413f47707d43db2715db76
SHA1f639767c8be56d7f7333646f2d0c39e61ea8f88d
SHA256b9263efd9e276ee37541a379fe6156452cbefb99c22242f01f72cdd5b46ee4b8
SHA5125d0e5570ac92e8f6f5c0d512058b2a978496e19ebc7be5e3ce94a6eff4fa9df13a2b50aa46724234173a91a605abe5a18b699ea8c262edc57d9d02fe215f5710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53599defdbea43047f95b960eebe91d1e
SHA1b3240d1d079e77eac58a1e629d744e5cd1726aa2
SHA2561199bff3c4c662f5fc335eaa32b369d70bc5e6f4e76c34992a6be77e87f6ac81
SHA512bced823527ee15594a3f94deed6da128da4d2b259efc1f6fd6476ba7ff4c487be6253a4452e38e4c9d8a4ed6e2b5c28625b75aac11967a0cd1f85c1f11e0a0c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae37645bc66da7d7d36e2b084b232a6
SHA1a7cde6d61034687368d0a14e8e8e9c3b2bdff769
SHA256399ebc39208c7e8c93008d6076686d3c79ccf21ce9ef951ddc20c50a90bebdb2
SHA5129a71eafae4ee2772a5c6b57b0790f0fab0ec6035f271c54e906b22b5a11ec7a4b72deabff010e5eafdfead15dae9737a1d002fe2cc4c86a16923d882c28ddabc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9401286bac2a079c0e957c3fd6b9810
SHA11159227994bd25f2bfe0cebafa78ac2e4f0b27ac
SHA256e905ce5fabae923a250d986d3feca1bd85cb630efa92a97fdb02e5e2c5800536
SHA51212416309f97f894add16b4acbec92528e4582e38f44f692dd1963ed60b98ff90365d076d8e939be3b64852e944cf1bf1d2b285fa1e7c5705e58b8c635c10e7e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56681e1e4db48acba02c065b223883887
SHA1bdf0fb9c95bb5fd32a2a4bf7da65d2dd559b8f14
SHA25683d76ffb6a380a7ee125504c769356b0010e5dffee949c78e18c67eebc9ceedc
SHA5126dc5ad17432757b78edd59a27bc37aa06b39c4445ef88158026b5f4fa661d067a3c3f9ca6b5e78504ff3e01d8d2e2cce5236ef929a618672a7b57a4450d9411b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5785b5bf743f1ee068e55ac055821e70b
SHA161f6e8bb3093e9885b14c5c7bd873f271d629903
SHA2560ee506ed154a8e7e222c0e7c5857b5fdbf37fb0e3e1d568b27706b0dcb971b12
SHA51222c510d1423ec2cbcb2752bd6586970077db682cc2748900d7fc0bd3ded3bfde617ed54057b9c304d26c2a98a294168b82d48150a65b2a0ed0567585f4ee5d8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae59db844ae3820c7956837fb87dba4
SHA10f8479c27b43a17e67b94460a3d536cde3b9c8f0
SHA2566b177bb1712ed444e9cb1af103611ab539ced34cbf04a566b67e553dadf027fa
SHA512b8a9c633c8c96d9120b87f5835bf3d1daf2004ed89ffb877bf9554d2ab795481ccfa9261e843e3b54b3955025c944d160fcaa4605cafe5e54d18cb825d4002bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5da17d736eb8663f36bb0778995b8d0
SHA12a734717adc4553c2a504200b541dbb65a5ac1d1
SHA2569da0fc33dfe60be878cbfe3315ee4dd73b243189c0e6e6538522cf0b60d2be90
SHA51207b788f6c01fe89f21269ad24931c0d9702fda4ba559627d42b7440956169075b01f6845bde5a5a4ffd708aecea36aa3263868f09069abed27f182733419385b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5197bd8a17e70a6ff5b91ba648c39a3d6
SHA173fe140802d6206edbcf1e2dc88c37155feadfdd
SHA256f5b8ea1306d38a7231b988a53ccebc3c75cb9b3ed00a5944007b16acdf352779
SHA51259d5172a8f7da60bd8610763f8eaa37d39279e8d4f685a0614b8a1571142dda42083694b0750b9c655fe993d9f77c9cf57211e9485d5fee30f627367670f94e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585410531f62ae1155373d675a96f4465
SHA19e398b40b748fba28e1049d04cdbc716e1c97c56
SHA256519dc63d1848278a4549094a4ab84f03d8521a17be51c1e69241cd10a0642b54
SHA512676906b6e4fbaceadfca301f6bbe9fac17e0832f3fc9d59afe68c0c4003e2e90c626da00777b1c9e86aac6e3c0ba366555e00e2f9033af48dbb2dd1c8599ccd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f65bf546c2a470f7eadf465e769d7a56
SHA152c23477ec2cf74fce02c54363defd35a85975e5
SHA256e94449810ed2a80f3d2fa55f3821e407530d843544d258cd131cd4395d7574f3
SHA512d45d6d781cd9fb753f459bc116decaef98571940fc9e7a6038d204e419e36bdd5172b926fea9a062fed4e5eaa3ec20a2bbcefe75ae1fa8f9c087717a95e9aae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814c558ec3031e034857cf9a753a101b
SHA14cf0496ab9f86947334e0020c413a4cc106109dc
SHA256236a0f577e24dd5825cb1cb0a981e351a3a8281483bbd3edeaef6e027472a070
SHA512fb37caee1ad0fa5e24ff6b069aa877e4579ccb4dcf5304ba3a14deba2623e7c11bf4e0cff380cd7326251de7041686648b11ddd4e858e8e51f6c743d40c08e37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd512821b715aee23f93ad2a542ccea5
SHA17bc42000a9d1a4055d7a9b75e900fc028b94b914
SHA256a260401faadcd638830db15eb98ee17149da7cebb7aee29ceb2bc085f3b357db
SHA512ecc47d2868de4d17d2e9c57bd584db75554b29c351adc11006ffdb8c33f8557f2be6fa0bd3b788ab13540d00a2ddecd451d044a1aa9f4d8ed42d78a77d441e50
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b