Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 00:58
Static task
static1
Behavioral task
behavioral1
Sample
371b2ceb5e5bd9e10c51092c05a64497_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
371b2ceb5e5bd9e10c51092c05a64497_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
371b2ceb5e5bd9e10c51092c05a64497_JaffaCakes118.html
-
Size
10KB
-
MD5
371b2ceb5e5bd9e10c51092c05a64497
-
SHA1
5dc0cc5651d88edad4ad05944c19e549e7448aaa
-
SHA256
45bf123063371fa8876a12cd4002e0627c0715bbf6a5fa5d748959b576fa4c12
-
SHA512
225bee23c3aee02f3b5ae3b75259174d4ea6919663c8310302fcbc704b81c7fad4592b2d360053d5b535c5a52294d7b67b531721be99a49a313d0e5f69d25d9a
-
SSDEEP
96:uzVs+ux7UQLLY1k9o84d12ef7CSTUBGT/kEppSOR8lYR8dlR8cyblVHcEZ7ru7f:csz7UQAYS/I+LSCSfS1PHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000cd2541b8e885c808e5fb0c580642fa6a210f4909c6fcf422ee510f8056649872000000000e80000000020000200000006f02d96daa0fd28df52abde65544e1db0e386c44d150d3d00730ca76c7ca169820000000a66a87729ecde7661aa9842d363e93f3c99c2c7688da9e487ce9dd99b9ca7a594000000094f1c27eda8f5ec38ff3148857dba512cca3138f761dcd3236151b6817f073b0a359da6c50a976c2fd25833259cab68d042fecf85851c4aa0d01553863090273 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5008b0922dd3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD7A7021-3F20-11EF-A74E-76B5B9884319} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426821401" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2772 2432 iexplore.exe 29 PID 2432 wrote to memory of 2772 2432 iexplore.exe 29 PID 2432 wrote to memory of 2772 2432 iexplore.exe 29 PID 2432 wrote to memory of 2772 2432 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\371b2ceb5e5bd9e10c51092c05a64497_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d93393f31357db24fe472a76297c8f98
SHA12c53d03abade471388a6e55d90a0e6bd6bdbd2b6
SHA256bf2d2c5617525c9af4895ba7c8d95fac8fdaa5a06597de9724d26c7b34804dca
SHA5122483d4119b597e0621a280d21446f182f5561b3eca6e4f44419f75649a74cc3bea211e1e8b13c7b0dabe067e88ede161a41a0ede6f7c35f302566edd4fa0dbcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bd2819304334fa5f18c18d4c463a0ab
SHA19557d2cb5de77522f8e349b17ffb18772e3eef0d
SHA2567df49ea7319cac43e6c974d8bdd1de965a4dd41b839b794b40fd173867e00448
SHA5126f40cb1a279e8eff81f7274e9cb9db595748ed6d18c16d43b6f46a3e0a1b45cde86da866744ddb72b87a900bd1764cd54bfe11f4bf53cff1f069ba66afe6e1df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e79b94963e945822f5f8ba58dc79587
SHA1197585f0414bb046d16a52542c2f7098d149250e
SHA25649431fb7c5c3aee1b65942c508688e9589cd539908736249ad90c25d12ab826f
SHA512d0ea075bb14597fd119e01b650ae60bcc39fcb3b87e72c94d1a998be871917fb20a82f79785bef837433b48f0ab58464e1f887365ecfc2b1a04248bde611cda7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5489fc19aed31acc64e37541ceddbce9a
SHA16ff592c8937e23e8ce65feb3337ec02b7846adbc
SHA2565ea50d18d82515d59cc375cfedb686d4669529e76b397df0125bbcc57c68fde5
SHA51223ee7f77486ddc5cf3ca288286d0ebd32d8d0aa984db955cfe95699ec47d908b86a9557bc6e1eb7f4ae00e0abebadb80d86b3ca8af7fc4d5cca999cd859e810a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559dd09ac087b27f15b5d069572aee0cd
SHA149d1b3cf437e27cc360bd7622c50050a9599a1cf
SHA256dd73a85da66f12f311c861930e4f664cb87aa23767ecafb1d549e15b67577785
SHA51224c64e06b312a6c10d6a8819a0014fd4aa68d38c96eab5d354752b8a4c717742c9c3df5a39ebc0125628fe3a62f3b539fab1ea63681e75732ee6d69c5ceea592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55026d0c23e4e4bdc9a18ab6ca9c38183
SHA13ba8c3017834b6eb562683b34754bfc2045349ab
SHA256020259cee5f0c645ee46ff9eb31f49aea18bad272af9700fc29239279494d572
SHA51221895ae35b04443e797ad7c3890fccbf480764f34f919ba011e2c60606a98b85bfd455e9b4a579ec3fd4fd246fe4488ade013d31b33899a0c92a53005fced45c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b2954e40ae3c8e96092e123cde6a36f
SHA1e8359b53d2d343ada534918df0c89bbd04415a18
SHA256f47192cd064ae62bb9d6c1d34b54e1d32cc37ba252639619c611b5e3ed5f6942
SHA512df1ecc72397c56e3f9b26cad86a68f27e3da9622000e13bd9d544011f308bfbff1bc79ad2ac35d69926a7b4c8b8005c3d538de8344f46503eb59d56d33c5a92d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c992f92353eb62eda3a852437ca45b3c
SHA1065a59e18bc1cac80de558e294be4b0896cc63bf
SHA25630c9c957125416c00a83eb3a8e902c53f618a85e733c228eba0afcfae63b4e24
SHA51247b6cf4898d98312440d1aabc2ce66aada3ccd43a6baa4d39cd0d04d228f174b016fb7fafed02148d872362d800c1e3540ca99287c62a78ab480a3eae972bf04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b14426a7597aaef43df7b35934193a3
SHA145cc3fad041b834c861d298e9877c479aa69e076
SHA256fd01445e15dd69e79f5fe6827efec7f3274b7b96f5f9a76b8faea5c2a0772fae
SHA51207a2d85176f72ac2cefa59cf6f1b5deed4af53ae9dc17e418211b894bde1174b0f7fa53666736c1f7d1a2f190af51194eb3eb2efec671827bebdacc8ee9c58a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592aa7b42410700b30a0b4a331625edd3
SHA1d2b03523743f67b9653c724229827b9500a17a8c
SHA256d64ee8564e59b9f066274ef953fbec86068dc41635d433704a6c15b17f24c918
SHA5126f08d0a9f9311cfbb5e68fb7f2e65d344d7b9e3ce756dccd0ba9b3baf4a4195425f18ba119ff02c818b82f7057b85f057f648bd8c1cd73dfc8dafd4b7e356f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a6fdb8c6e9765479f8bc5cdc8bc26d0
SHA14f103515000106509be427961d3ac6c48aac6d7b
SHA256b90e175975706c5d667b2155204d136e296a65f918beec5559cf4277ded2a699
SHA51205fb395ae925cf9d2b54e7119172f011a7cd55bd044c294e59415ed1826c9ba3609ef964a10c900e53f677b064c126848d97761096fb889a5dcdd3c137ae3988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584bc12aacf98d39374e16f0cd937ad33
SHA1b59fec60c4beaea51b86b08f7dc606d190c9a5bf
SHA256dbf72d8444125f28ef4a59263c45883bceefa610564e9a1cae0637bb81aab05c
SHA512660a7472c7bddc4d7944ab7cc3cae3f65db18baf64adc1715bd4c7fc3ebbb19b9df952d6397fdcdb75d54c88f1feae18478dbff88b5d4ac3f21a66d943e0b131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5513052f5513ea92f88aed1c13653109b
SHA1426fdb809c5afa2d32fa6e84d694b012e781360a
SHA256003ed9703a9922e932d37c29aab18de9d95ce0d32cb2fc80e7debd4f263761fc
SHA5125299b6934d8a7cf8f4d06502956d73f51e5d86b0dd5b1bd3a436127679f7658a894a24b0653a195c739f2a6ef387b6a8d6bf969aacf18abec91cb5353a2c145c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570743aac0bbe65b2eb829980751168b5
SHA1744e8987ca9049d8d75fbd9e5eac0b5e6d7ded03
SHA256d035ff7e6c1ca375093409269f089709e36408a7a39e8d8607d7911f0fba4e08
SHA512b8051d3ad2e97e94cb4ee6fc7d3dd543de12681f77feaa95f67870a6b588b81f0bdc5e3f10e520213b13133c01e7c45a4433d22919f89a187ccb6836f5064ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad35487b49b47456b3aeb2b90246a6a6
SHA11cc6cd5e7f0d533d31eebc7e0ca660d90c651fa6
SHA256b2e33306905b0bffd4e7a9ff3068b21894d2ec66ca96cb46c6a2c04235dc2da9
SHA512f30540a36484f237ee574293a478bda42cf2079e4a88252dd998415f83bdca0220ce2ffacd9513b1446e4e336dc9d9da030328c008a872dedc07be28f43c683a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542fb1c2b73f33f983edb26f5375582a0
SHA107a706756193775bef3dbebd96bf51b980cd54d1
SHA2568a9f94634f9b7de30ae4b9272d8f9d83b249f980e16a7fe942eee73a4fdf6b74
SHA5123756d78ab281cc00557314c84ca700e0fa1794a63b07dd09326075ddf06618c2d285ea5c7a54b6a2b96dc3ab074a997b56106139973f5d057b138fe337616d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59463d115ed648e841e1f4cdbfaca7abe
SHA12291cfcde2e4b7f7c8c93e504b61fa7e0d995d8c
SHA256c1cd693d9a57fcd19e20a690deab7353ddbd4272acbbb558bfb8b4d0bbf9fb4c
SHA51218b48b3e357f1658ecf664e8d23fa596abf71e9a983c7d8272a7d7b1508266dc648d4a24d51ec8525eea880395924d20de6799f97f2d5916a1463ef5cdee6b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a70618e37db61e0a9ed269ca865937
SHA1afb00d3d91e91b48492079d49c2a3bc939cafe43
SHA25697b72ba4d7bec1875afac885f497152c7bc568558415ec09df90a1e183b83922
SHA5124a638bfdd22a62e689bc2937c158a9a1c9365357bac7e60fada140c55da62a92d3ad7bb9e8c104dcbe29a014ddf17e809cbc2aec907c193125726deb47320d36
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b