Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 03:45
Static task
static1
Behavioral task
behavioral1
Sample
4010fff24eb50be0e7d6e50e2c27b49c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4010fff24eb50be0e7d6e50e2c27b49c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4010fff24eb50be0e7d6e50e2c27b49c_JaffaCakes118.html
-
Size
67KB
-
MD5
4010fff24eb50be0e7d6e50e2c27b49c
-
SHA1
3b2a87af4b0fa919307b238b574649ecad1221f2
-
SHA256
4d50202f10577cc2d6d1e24f5eb479fe7edb00483d06033dbee9528188d8129a
-
SHA512
5fe137f1081bebb3b6f3fc53f2a59b8b20e583c61e18fda18b22d5edae653a02d015c6e90d8c8f7332e8c3428cdba63a9f3bb04af27c63042fc3e75c07f9c25c
-
SSDEEP
1536:g3p7/VAk5MDkuq8yF8WHHPBHaBDEz9kDH0:0Vp5fuq8yF8wHaBDEz91
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e1961fd7d4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{485AE2B1-40CA-11EF-90E9-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427004168" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000006d5cd4454249f4308e91892515ff6bbf710557ba820e00afbec8790d1eb9cdd6000000000e800000000200002000000033e164f3ff664ebcef8930331a49f8f4741e6eff449ec341fb81cadf446979c320000000ac068a075958192c0599e2a48a9cf4e6dcdf6e35427ccd6e11ac4c94faad15164000000090b5040ca74bbc7573ca5c9f55ee1ed66adc652f1b72b83a49f4bd0dbe8d879738b126ca6d77b049458066480b51d25bf0954ec8ca12c88465bea14dcd41b581 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2500 2088 iexplore.exe 31 PID 2088 wrote to memory of 2500 2088 iexplore.exe 31 PID 2088 wrote to memory of 2500 2088 iexplore.exe 31 PID 2088 wrote to memory of 2500 2088 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4010fff24eb50be0e7d6e50e2c27b49c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b77af1787430407d1397c394d277fe
SHA1f9db0c4ccff580488e769845b54ca4b40c903cc2
SHA2566740d5e7ad3cacfd0037e17fa552978ecc1ece94af308591b3516cf964bb9740
SHA512fd8d0adb3c615fb9662923e03531f066a8a9738074e5c1d308a91edbe994aab12c3a53fc1f0e537913a72084ba78e7f93b5231a47313889ede7398271b4e0bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b81db97fee35dbe542b219d7755130
SHA1c837428c1ff915ceb881c55e00de47f66df2cb3c
SHA256deea8e348addfa10d3300949e48be39ec446bd3a79a6410594772c8e7177e68f
SHA512e924e89d0eab3d53305ffe9b5136e53174b2b8f4f76b7bfccc8db2fd96f8b3d45d2a5569808ab4bcec6f767245628284b509e089ef31f7b21d35f48a2a86e5fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3259ff0d93bfd4c642855e727b82667
SHA1f49f6d003360af254cfdcc0762dd7fcf93c69c50
SHA2569d58264c2b37df8b3f03059d3e9bbb03aa98162609cba77b658bf7157250172b
SHA512cbab0e50be1f137cd770bb92e6a8d14c279842ba5b568ab8584fba2e4dd9ffe86bd2cc441ef7a320df34cf8ebaffe70bee28a19843ba5231ba28296cf49368d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63beb24a97f2502e57dee391333ae16
SHA1c26c4257a88dd34729f517b86defeb1e6ebb701f
SHA256906573f3a001d3bae1d8668a2d99613ab90ec75297e90e64eb57be2f6a3cd008
SHA512f78568cf1608866f2bb8012f90ec987e471bf3637d2f94127d9f8cae96ec1b51bff6c7a41cdd2002d2f8df56421061805785e71ed036b0b182a36b558bd64664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adce843b373228a5f29a2b437e2c1875
SHA16b5d399c7afd223a18c55850b6f16e3fd413725f
SHA256266c361fb4b80e405e42bd6e624586cc21edeaaafccfda2542a0e735259fec53
SHA5126d95f92ef11edfd5e8cc2217dddb67fa2ac78df0efde5d1941b462dd73732664fa6f4df898cb2b8cdd854cccd932c83e60f8330aa28d87752eb7118e341635c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5536920a7a4093a52258d04c60ccbffd8
SHA185bf1d5b246a6b1f6ae4a04f102556f79174a08d
SHA25678050f49630b4cd7eeafb487b955a0c60149d22e68df1e62b82335a4da1709ae
SHA5126e8fae5352aa28bcdefd1007325e74f6e70fc7d0eccfeae6bda89a6f06629199b4d84aaaaa5811d2db4a109070408fc3bf6337f9cc6702be0c441b66fa0ebbfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c7e8ca3a1eede7e844fd19f0f3a8b58
SHA192d8ef30cc272349175780bd18a7d0d99dd80271
SHA256ecaa54b7a775fecc0d1e9d1d8af1f56379e8bf299c7206395fc72ab7ce7e69e5
SHA512d4ca2220d00de24bf1f6db8e251ae5d8b09330286186406b32257e98cc974d168a8054aa4cdd8ed6f82485dc7c24645ffd7b9be829db828af610157beb0082d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572a2ee2c5ef7eee5ad7c80126436a6c5
SHA12c8f8c2e461e28ff92e2d200343e72ca40c3c104
SHA256eca2d8429082cf66d053c71dfd8d1d924340ccb4bec1d2b66319de89bec94503
SHA512d940eb5a4e049606f09dbe03e33f64bfdeb2e6a46f0fe839dd0d33dbe3fbf9410accd5afe3636d35276c54428b1ac87117426880d3d3d5b091754a14d649eb81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5938f65dbfc93c4e64d29171ab30d5f43
SHA124ce392e574297c1c8781c5e6d0c469dc6163004
SHA256a6dd952ef84766e146c119144f2f8d24d99401756ae0f6e66c673a9d3521e79f
SHA512ca9052b1e42f3abc80ab0c17233a404174020ecfd12de53bfa704e01ca82f54008014f065b6a13c52e06e77b80c8cfc6b8103b9e6d9672c8e01887a1839a93a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56127a5d66d30b03fbd6c0dfcb2d10353
SHA182461ef44c88e0e01fc79323fb6f1efc497ec6a3
SHA256cf803e487fcd24719f2e92f45f3d38cbf897fab378151bf96e4e0edcdc12060f
SHA512f45660daac62d70104e50fdf61f880720f75142b941c22db303d31c4a9ee864ec5101c078688ff4384b2bde5f5c99591b3de5891421f4b3a9744ec8bd15de76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf34ee04556ae79dc15b2563d38b010
SHA14f3b6f2a0a6eae45ad5dd641ee1de54e05669b9e
SHA2566f5f875897637f7bfc54f77114be0ce093a7b539c173c4be3194e7d80ad05a77
SHA5122f071d2cbd7b2d842b1a2ac458dfdabe8e097b5f8f165ba6eb429639a579d736008b198932e3812a52f6d5e5dc90854c10792444d9edf452890c8b1259779dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f9342deeb3120a5287553a9fd2278b3
SHA19c77b10f57d8b7eb91f1ca4e33ca8cb7cae074ee
SHA256f36cf687ad1c99d63948c7ad64740631fdfff60f9adc5a3423aefa8b847f1f58
SHA512a8a9551f40473935cf92363dff855e1e651af0e2bec5a6f886ed1acd2198acc98979c05232218c056c064d6d9732228ebf7686d9278ed355b3662a1d15a1387f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3b6aeeddeb77dad631a62bd1b115a89
SHA15a8d507836dfa12e2b86f1b4423d62fac8dcc47b
SHA256b434198b4d4581b3c155ebbb5e29f1596872f88813753a2c3373afb915526fa6
SHA512f46d61e782c611a0ae0448716127b191f6a92b76d13559becf85af8efb9a8112837163951557f24bb7c7f4848e27dbdca889e8efdd8baa24619e08c5efdf05a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5955b490a98fcf62bfe9fa328c7678c49
SHA146f99881546070c3d44158acb601dbb268e36dfe
SHA256337c12682aba579546c4808e8fbc1d102be7d56cb056ee1a72c9283a6f640c25
SHA5123f58aa79ead301ac01c59ac8b60115e0d754f1f1bdb56a92a65f8c49ea6d1d86f254abd4aa3a73875af266c20352fb17db47258548d0f292c15f7135bc6c0779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570e7cf605847e87ff1c07f7fa3376654
SHA135547647d5c949604ef117329b1f657dc1c5e813
SHA25607b839c20d7df771f844ca57793fbccc0a670690b7ac21ebc2b7e66868995481
SHA512acc8cec04632101af8774f97c407ac685c5c3df842ebc98c75136bac26e809df74a22bbdfe497ea7667e7b8394cf42852ef0873b8088149e868dddda953c2f0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f7edc08cc855146ac3bc4bcbd17f34b
SHA108e0f6e4e4b196cb1be8dde920729858928fa450
SHA256cbea927e1d488ab96ae12072c14aeab718633d23ccb3454c219cc40f41ce7d1f
SHA512fc01b44eb8ea32f5848cbe4a16ff5745f3f6e4edc3ea72019ff857553624572ac1e72015c8c473b9798c1e5fdf2794af1f21762104a991d08b1bd947e5ccf132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547c6ae471007d7cf46f40bfffc487a32
SHA122aae04cd92d6030293ccac13b727b6970f6ecad
SHA25698b3ba1a5054795d7481426b857b4932459cd5cb065760b2fe72bc5575bcabaf
SHA512143b8614ab97146a94d990a93da4402fd6faef839e19f89955f380fd93aa267b321a8bfa2b62690e87c0a6c8bad5ca3b1a6870722d716e6fb2ef53ba0504b17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba85203ae3c8056e7937cf49fd07540
SHA190165bcfd5b6675a5524edb37a284393d9c6ee74
SHA256746618388dc8a164647166b98198cc89fbc35ce8ed679d4a03442b3f776788aa
SHA512b7fe9128673c08380c2ac0f75376fc3df81ab79677edc26f39aafbad4b0e72d94419344f8e108dc4660b6dfd17c1ac2380083d27621c010d0ba0a511ee9f0529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d3d575012e33cd7668c4c91480e2553
SHA11cb68a9e758218fb1a51e79a6fa35c09f04ef189
SHA256f8f8cc3c2096bba71c438bdc7c2559fda12fe6a772874cc98cdb9cf3b409e712
SHA512d2ce7dd1f7f57b9831c2356c3f30b0f8fd8aacdf23e55a4024937763bd092dafad0788cdfa8c8e384c8d38656d37fd07c9360107766a25e1591de8b8313fbfa1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b