Analysis
-
max time kernel
133s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 08:07
Static task
static1
Behavioral task
behavioral1
Sample
40dd66829930c2f7db0d038dc9865aae_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
40dd66829930c2f7db0d038dc9865aae_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
40dd66829930c2f7db0d038dc9865aae_JaffaCakes118.html
-
Size
123KB
-
MD5
40dd66829930c2f7db0d038dc9865aae
-
SHA1
5e9e44d7ebf885974b3a92280b52faa519dea07d
-
SHA256
6200bcd971475baea9246f3c501632d07923b039651bc93b2292c9844ecf60c1
-
SHA512
3a34fe9b1e17ff076249330030374094e31d66bfbfa4c726f2497da8d221e67402fe51fc054794ef0f464afe3fb33fb628210b1e51c9b2d58295452d38f0d30a
-
SSDEEP
768:dx1vPea/kTAUkDvCyGxZv53Gnq/ziMxH4C4Dg9lOBRIq+VV+wYGh6R5ATR6tQ/q4:dLuaWY6DZX/ziMxH8DgbI/wkR5Astwq4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40bfc8dafbd4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427019926" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000094ff7aa1ddadada21371eda147de8b516d4a87d8a3a3a93f46c4bc2c25c4e020000000000e8000000002000020000000eec43b5bb63122737d8e7ff76c2a026148802a5f486e22afeadd8288816158d92000000017cd40d243ef9d7bc12ae47cb3edaadec6e0fc25cd76840335b512f21a2a05b54000000037e1bb0415c0fd181c48ce3fb9bd82d2cbdd2470734c73136f59c4a04fe570b8aeb57cf239654561a8ac8a308ed6e93fa4202e96db173375ae0c53cce7ddfb50 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8D622C1-40EE-11EF-85EE-5AE8573B0ABD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2836 2244 iexplore.exe 30 PID 2244 wrote to memory of 2836 2244 iexplore.exe 30 PID 2244 wrote to memory of 2836 2244 iexplore.exe 30 PID 2244 wrote to memory of 2836 2244 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40dd66829930c2f7db0d038dc9865aae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bac1287d16dff2a0a0f542e346363734
SHA12d8eb78ba6dff75e37c084782eca014df8b6bcdf
SHA256510fbe164a54e33e1a4715cab0890315b1f27e4402b4147181e4de19dbee95bd
SHA5129cece8cbf96d05570d59c4f2f43c0a65cd777a2d64771a872c535579fd59bae6d8e5dde41ac9bdbb7e89c1f3d0b09ae41f28a27d6180efaed083b4eb493a1107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51579af83dcec9bf6f45d54d981156c3b
SHA1b863f9f49d5de0fd331bc1e06bec7f46e7a22b07
SHA25610218b5a768862cb5b1138097ac1373c90daf828c980b4968eae57213bbc813d
SHA512574cbef13fb04d888965038c6a67e03a8d24ad0b643f595e255fefe44dcd6aacf739b1b2068e94b7ba67b2139b7925347daf944a0fcc2d30b263413027cc2414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5111ad48bbd6e970cc7b0ad385ba3b6f9
SHA17832fabcdfd61854a5310552eee6e3b3ec3c9af6
SHA256a6ff066b465fc26d563c15f535e5d8202226fc021323c9333ccfa6b485734bec
SHA51216f4d99979d039ba4574f99c45a0ace690106d32b8394f176eeb14a7cc47cfa7c8e5e376bdc44f58043d7b17841add65f655262b51ab1425f8c1cfbc40765940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc77044ae3f28445914ac3ebff34e8f
SHA122422f0789d811d4eb30f5dcbbf38960edd69ffe
SHA256d539833f2a4e52a09d25307c0727adeb3d240c45a7102335b37d33d21ace71e1
SHA512ad4e9fac809f4c195949ea2ef768d3feece0119aa1fe240e2da0c2b202d80cad998c125349c333b08b39232843fc4d6bd692a035c8c164d570a57675ba59acbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b2678360cd98d097346ad8b251f63f
SHA1fbe6b0617873fda53213db8aea3b51c6f639e2e4
SHA25692fed822f144f2ad6c3a242b99769ba1257529d5cb987facfeb18d358e6f9860
SHA512536a765a51856f647f646fa18d91301a98d06711ef8835a6d457c7158f4b6bc7d84364585121f95b3c5bf04a052bb1ac517a666ae1aec51881668757be06c4f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513374507ecbd27b416000c7f9f0f07c4
SHA1b4a704c0639a166cc19ae8bd17af235c77584260
SHA25640f39e3d7ed93fd1d45fde755687df6454ba7a48595fcc7ff6ab889bc7c806dc
SHA512761126d2eb5f8eebdd539ade31fd3ce97a39773d1fa0ed0991314eae28f3be5dd5bad4f70f2b7d1b928362086bebd76069614c4865a29fd7519f9f471d55dbb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b387276b26b323056a025c144dfa0495
SHA1ca749a0b907be9569ced404c9343d9f338f334b8
SHA25614ab49dfa476886197e094032199128141bc80d3ed24c83ec58457a3c9ce70f2
SHA512b73853b52b0641f858e138973989ec779bf4767c46b151980fc2bcf6f4dc2dbed918a243de153c789ae09258772acf95efbad7aec2bfa5bd0fd54f36a2548f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d129a482ec1b1823bc1d530d819328
SHA1eaafe3805a866d6814f644e7ca4dd12c47f40fd9
SHA256d4c4fe553c1268603ec656168520e4d51d06cf9128b0b753d5581bc92096df7d
SHA512c690227768c1ec5c4a30a173dc5afde65c008b589973dc5cb7a5f6a280cf4b180f83ab02820b7eb81ebf111b85b86b6c8b14705ebc0aebbdb5f44833b7053d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ccc0f577066a99f4e0776318192c824
SHA19c9aaf9a1c110029998eebafd4290cfe391fdf4f
SHA256d21c09f8c8841022c6eada8e45e046a899922eb5b96f2a9d19e08ef8e92a38a7
SHA512cef1813b5fc06cae36320f24d7cbc0fa2f147d3370a0db0c001c6cdd7f87212b3740cf61120c98ac4d1097eda273288373cb30138a21cd68d56a3e0a12edae83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b58a52d91a01e8b5cd1c2320a62fd7a
SHA10f02997814473d8e4473d48d75298de2ee3554d1
SHA256c0f3b1ebbc8bb9140746eb641c129536b598ea530bd66b96935dd34320fd9313
SHA51231ee4db7197b972dafabf59c240555d4dfd4615189a6f305ebca4d70532adbcee7003d047784512f7ebdfd6e05508f92adc2b8ba2465c3a677e25f8ea71c4630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abd85805da23ca9a199389ff78c3d0ce
SHA15e7bd3b4c5a4d8e478926c6945947f34f70e5803
SHA25683aa8b770b6e6cbd562e7dedd34d7f776e3e34dcc70382beb57102177ce81379
SHA5129d8efc08fde1c187329ddaf5def73b8c9efbeabc9d55f2f7971cf241eb616394a4f273bbc88dc4a983d6c8159a087f1b9fcf348b3437697f31b3ac1dbfcbcf69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa30757df7364cfb5f1b9e0a69121b6
SHA1e9ca5829c56b59dfaf841595fbd43344118780c6
SHA256303d221c78d99381a08714b11cbcbcf3a7890a2b502add50e2d4d0b870584812
SHA51269cfb554ea3820fb27be5b2caa4a9c5cbeccc10e4d340c2d84df71ed7812414ede71ba1bc1927ea7601a9602e034cb2df16c3492d733945467928a4e8daaf89a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af95d5cb9de1bbe6a3d0bca2c5eb5fe
SHA1c2d92a41ee31db810c504b77127424fe74710d99
SHA256ada9545e3a1211b6f6d4757006016469eae3c2601aac4f5f8d75ed55589d44b2
SHA51205a5fd72cfa1268a53c0adba371136e8b83fbb5ffdd412fbf6cf52bca270dd46c55c4fba1fcc82272f38cdcd0006ce7bdc95632690686bdfe4746a1a4aed0328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c51cc91403b92ddedd05bcd63af79f8c
SHA10c99de079b1c08297d2ab6ceb6864ac95c1d3e12
SHA256fcbb567da2ac18779fab6b0b9c8db97b64a2532e2ff9c47cda637f5264175913
SHA512791cfe73078f6f928470e734a3fb4f3d0a5d1ce0cefb34908ae34534e90c4cee87c40dadea5e729bcf66719977073768f35864e801a03cf8914fe79ab8a1ebcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf0208fe386d8a1302d2a3d0ad9d109c
SHA1b383d913512c8f20a01e5ae2af51dbd3ffe4af63
SHA256f3efcba86861299d33fc981eb0cf0dfb46e8d545c8d0ec44c71594bef624f26c
SHA5122237a17a6bcdc07cce3ae627048b8dea2787d229955ea1800df774985978465329c266e335bec4872e2caac1b7446d6b5e124b874b6898173e65375dc1fa79b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a6f96634be962bef0a4f8e84a805c1
SHA153af80f341711ab97f3890af34a640fbb869f3cc
SHA2569d23fce3522c3693707eb5da4e2f334a040707d76225e91054e9ce03f9bac6b5
SHA512fa05c255fa13c480558fafb9f8174196206b4fbd2b2872578e6596b91d81e6f269cc617fbae8cb7785b450c403fe8dfbb4ed9ddba32d501a742c75784c0aec69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516747ef3a088c8e534e8e7a4f2f5a01e
SHA1d557bb82bec79a3862b951ce250a0e3ebb8acee4
SHA256ffc7182732e31180c2aaf70dceedf65d8b76828977547c86016c63bb2092a009
SHA51278896fe73d2b8370b092ea1b8e8f649ad942d3c9d23137dc96aeb2058bfcbb670aea1b906d370a04d8e03420c3fd40aa786fd66de362e09415bda130a6cf68be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55405d62dc2145f634107f439793ab224
SHA14da861dda8fb5a044ea0091bb46a628a84f7d291
SHA25645b99d21df47041f43708126f2de975053a2b793d553fdc17837906d9946c9c9
SHA512dee26bc5f313801844859d7ab4d81781b7c21873e054528ba87a70372e5717bf0f344ebaf70e48094a4dbd950e8bd01a408c3de53f1cce270b62883ee9c8faa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa79aab2e1a22519aedbd49fef755aff
SHA18859cdcf6fa1333be473f26bf380d7eccd25fc78
SHA256bf2f9a1bb7d33e9f07936173cff11ae86cd4ec50dbfbfdef8e76fff68f7f80ca
SHA512659ec9403f0c59d54063e0027c4102a3397f2b0149b8745a58a3506da42c6ecc47366d6c262ae6663dc0caa1e947a5196934bd3f330969e9f157096ed86f1ef2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b