Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
40f610784db8537bb3069baf9dc51daf_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
40f610784db8537bb3069baf9dc51daf_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
40f610784db8537bb3069baf9dc51daf_JaffaCakes118.html
-
Size
1KB
-
MD5
40f610784db8537bb3069baf9dc51daf
-
SHA1
66087e912cdfc8f2bbfd536cf0b705d5ab415e76
-
SHA256
37a0da82f5efc84df9ac653d205f70ff97e2d3323c7cf908a3e6c46759529d3b
-
SHA512
994d8ebe6a035dfe5c09b4087ef03c5ddfaceec6a27e0f13fe192d6bd590db2dc9b0fc2238e0a5e540e582502c5bc08993c3ab6a863ba5e63b901269b7dffb5f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f057cc2000d5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4BB41391-40F3-11EF-A1F7-DA486F9A72E4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000046029e5d1e35442a3cffb8b186c07a9b56137035bcafe5f6078d155ed30c8bfe000000000e8000000002000020000000f75521ad388daf8b7b7f3cfe908774a2d4f5081313a2566aeaa55d0e5498b56c200000004bffc375b8c66e71492c019d4624600c0e244e6ded48ea730167a172b14d14a940000000975f8724901f0b8b4abce5bf8632cd137c45b8c6ee3c5671e14c0fd7c84d5d854d7fc5e247ccde691157c34739826f1e7bcd2c982b2d11ef8301baf51e2c7aca iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427021783" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2760 iexplore.exe 2760 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2368 2760 iexplore.exe 31 PID 2760 wrote to memory of 2368 2760 iexplore.exe 31 PID 2760 wrote to memory of 2368 2760 iexplore.exe 31 PID 2760 wrote to memory of 2368 2760 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40f610784db8537bb3069baf9dc51daf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef58654740976d307701a0423863e8a
SHA1ccd67208aded3f86102e26f066785517b098e69b
SHA2562b26eff2e8ea1a43eabeff7c8e6fd18ad70e26679be615e39c72288aed53afc5
SHA51212ab307bca691496dc89e801705a0c3992aabf13a8d98f39151fda04e28ae4c98941d65e43b2a056578670fc87e2f19e936ae9b06bacdf8a9b183e1250437102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54573845b1cf12ad1d06a65ee55572350
SHA11cd08f58d39ed71712d2e5203c7e9837dbccf9e9
SHA2564df1e7a8ffcaab0dca6393ec6e75cfe2a2dfcbc75e3131b999704ad3aaf6907d
SHA512f9200281011a5e23e2254ede37f60eb7246971486e16167c2d426048127eaa8cb91e259979f5881381ad6df68ec8c048d9f284edf5938a3f6998f47c8d78045c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591dbb5d80e4bbe2b235abb1dd3f2c7be
SHA1bd018251f4f04b651427c94277fa253c542a2f10
SHA256e16c6781ebc48cb1194146aecb748ca25d264d46563a3668de005b65ff0b9dd2
SHA5125efb1483179536b475b68ab3a0ebbb337e74edd7df73ed0b08faa658b89c56a30a90fa9a38a525bf1d785a1c718517209b20a6e43e157c29ba50ef9d1c374bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b05dd85f3c55c0ae2a2c57d329ccc410
SHA1c67fe0deb56454e41d32829b24f09244c8cc02e2
SHA25668fd899efbb0c83f905c001fe9270352dd51391da8046858c9edcf9113a3478e
SHA5120142e20d1a3d11d3ac5c3f57578365e7879a7902ac72b67466b8bca5a75fa333b3d58573e0714029f1681d2fe173ac1535f670e974853c7b81085b7e4f2dec80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a00fc12c83a3e57c2bab9bd9740950ee
SHA1e328f50844b8cca1c39223f2014e099021dbfd18
SHA256640da5e31647614c7a8953f8a185199bec59d9211da98cb9ae28fd32d73ad470
SHA5128ec16d3f3c1047487b0536d27cbff0c294a2e903a503cdc92b4fb1122003db0189a8d1f27c9e945d82f4d071ae1f7e6ba3f75b39c04858e8ecdb60c02e0d41e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bda1011affc43ad6290ed1367b46189
SHA142fed4d626ed8ed31a6561594dd41794d00bd132
SHA256cf2fdde36c8f87635c15440b6b232898e91f5ea9bea1ed14384f108d02bdafb2
SHA512da877a65bc6d7e92839255ee964d87dc69827456d10185e79f9b54c894bd5e0753f1cf6911595d3327614b6eda2202d50f4f9fe1a8da865dcea64c9b45231234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56649ca0a490d0c47fe75c9b4c1e8a033
SHA1b78d05821e3c9235a563814b85526ad596fd5573
SHA2560b056fc7c92a35bb4322f925403ad96204f1364296890c84dc30fd4f786fd964
SHA5129db5f45f9b73dc5998d7ed6ae5a9f4a2bcc669f8448a3abcf04cb2bc98984a0c7e0a3bcdc7375ef4b00c0f2c7b0bc528b4fdd9c68aae602af65fc9c7d11b56c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500c906a53538a2ec8a4a39f3a1a3e2e9
SHA1fad06d78e1bf9296e068665286172209af8a3faf
SHA256e53c56915f7e00053de776cfc9df4b5369857b1e648dcc85a48f06aea9bc4317
SHA51261ce63f2aaaf94bc493cb564e3c518964163af6354b99ef7ffa3051d8afd22d321765425196b1d72ba52d5fba88d73ffb186efbea02e1db0af1391aaab9017e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58632859e57e0421a65f87a083a9819f3
SHA189e168abadfff33a1e14121310a7ac21d6a2e010
SHA2561c60abb98672fca97f9cfcdeb5e1024fb9b53127331d5ae7a20885fa772c7374
SHA5123b593ad60139ac385f59b408549de4ddd66dfe8e28a429d800d62a64a511e9256804638dbdb33e92dd643b19dfc69bd6bdfb94b7310f78b638a84276951be8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c29d5775228b98604a0a4fd57f398b
SHA1e6db0f359cd657ab7a24893d02584057873f08ee
SHA2566641a211ac69998211e4aea57b00c6264b5a019432aef9284c22c12654de7e0e
SHA512c7ce022e8c2374206bcdd22ed0a7efe62ac7660eedae336f3d8fd9c647497dd93361be3eb83f342d391232c73d8d6ae7a3d4ffa486ec0c2cd59dc04f5b912c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a32b460fb069dc60942f84b1c1586334
SHA151ca0062fa8b8c4cba7d59126e6bd671a56d5074
SHA256bb669846fe2840c89d96fb4fec7b99f0d914c273a3f3d46085ace218f48f06e4
SHA512eb4d38fe0c466a0f2f4be324e7ad0ce0c789ac6d10b38ad7c737c43a49106fa258cb37534d3e3d17e63c39cb1af21dda7892fe58fa29aa695b97864296a8f182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd04395ceed34893598d4883d2c9c93c
SHA13638820333bd4d39a36a31427befb4212b2741e6
SHA2568273bb995556bd778b7cbce813b316c4bc215a7477a4070fc7e77892a2e35f1f
SHA5126803f2196c6b310e5b5b69705424d7a3f54568b9db8c0fd7080af8a14ea286866e9e64bd326316e8ed7c5e63f624b92400a7424141b5c3a4075506787588e63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eb06ee1b08d951e95d3ce72d5141c42
SHA1998323eba2c036ecd975e3953735f13cce1194d6
SHA25626bde74af71f0ef159c1bd801202f4f611839c223e8173ac952e7545a63b7fba
SHA512a0ce20c90c09d80fdb3780d41bff8c645548be53ae0c51188d7a6006d20210365193e1f72bafb36a00cfa8eba57556c428567de02ac19797a00175912b27a7c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4a68f15ea75a364ed44c599ec78a6ee
SHA191c117c3186251d34ff12deb3acf635f31992d23
SHA256333d75e619759ca21422f47bc674acf0479ca13ca12450a49ae72402fd5aaff6
SHA51282eab69905a89f317227d9036543b71d074bb12fbb98bb95a1b0b432360518723a4ab8be2d7a1cbc1d39cd8f1c6ddeb8ccae315f5a3c080d17b949d382339470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfaf06eede43499ee4e296717f70e508
SHA1ccd60e78e011d64fb7e0a38942809474f45172d4
SHA256ae4f7b74fb0317b94b6fce8b25cfe1e6d86b9b28b98209e977fa81ae399c4242
SHA5124d92b1a19fb4bdf4bb8f7a6fa4233f67326341f1202c8d5b9be65fa38e5a12f3cdeec944769fcba650a201477e991b1415b2bb10753290b9a0fadf508ea3f3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d49c857f09e57c180b3dbc836da92bcb
SHA142817126de64420b77a78eadfc11afce909ec555
SHA25690c4fb1051031b22efa9c6dc033dbbf436f008a3c0a9bf38a64c7f59b3c2707f
SHA512c50c10a488216b62b49531491a50465d8aef705d12d91ed5d63fe6bf6bb24fb0f47d085a4279365b6e1858477b871f779588263bd92c2e502701b7e8150854f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505418562e5067a77578ceba3551ef0a1
SHA1203423977888cd01e99f01ca123974a7d5405991
SHA256743e70bea9c8f105109ed55bee624badbdf107b6c938e4f38a1a2a586530b8b3
SHA51290cae8dc420617181764adc1728aad41faaa00f4d57da89a8b18afdc73adafffc9364283db87d679357eac9d3f6648d5a8f02cd58319d5cf7629c056b41f2481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547af1824b9f943ebd9349581ccae022b
SHA15a103011658172eb26698dd445eadc303f73e1bf
SHA2567ee97e768c57b8ee654513bcf30e082fb59783934280f5aaa8f8e1189027e53e
SHA5122828a76aeca6da4250268be5f0d4bf72b97429b9aa2a7bf49c40091910345e17d6d27096b5baaf82d8895fd2b2a0d50bf4b02877257012063939be18a1c88f9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b