Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 14:48
Static task
static1
Behavioral task
behavioral1
Sample
42226b84a8ee8fd01c0556fc1cb148f1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
42226b84a8ee8fd01c0556fc1cb148f1_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
42226b84a8ee8fd01c0556fc1cb148f1_JaffaCakes118.html
-
Size
53KB
-
MD5
42226b84a8ee8fd01c0556fc1cb148f1
-
SHA1
7e695a7f45b6a2be09e3cf5b204bfaf9d21fefde
-
SHA256
461ad7cc1dd6a564f7c0e5eacac0d9c92873aa5cf9416a4b37c7bf8ae46818cf
-
SHA512
6653437529fe10671b90834ed874e090b730e87a8e69c7c6e892f81074140a4ef0a0586f6562fb7e0bb3eab09e6e85e649a76520dcc8bdfcb6ae6f65b296be1f
-
SSDEEP
1536:CkgUiIakTqGivi+PyUsrunlYR63Nj+q5VyvR0w2AzTICbb2ou/t9M/dNwIUTDmDX:CkgUiIakTqGivi+PyUsrunlYR63Nj+qM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0382dd533d5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE5385C1-4126-11EF-91EE-7699BFC84B14} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427043987" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000008347b8013ee392f796d5dbfb56b36d65159d3f171fabedadf5012900895eca42000000000e8000000002000020000000d6e05e0db5df18bcd8feee802dfd2f23094ec47a98fed1be14eee0f2550257602000000007269d6e35ce2c9ed25d7eed34f68143ceed98e6b5c91a196ebcf2e5c13f45df400000005fe7fe9e1fa5b3c49cdfa5be9bc041f52f9e31be661c0beec96047a980f087650988ef3808888cc5bf39e4be5b5736d89ebb2578d94ca24f62d47e1728ec78dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2312 2552 iexplore.exe 30 PID 2552 wrote to memory of 2312 2552 iexplore.exe 30 PID 2552 wrote to memory of 2312 2552 iexplore.exe 30 PID 2552 wrote to memory of 2312 2552 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42226b84a8ee8fd01c0556fc1cb148f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d615b80be974df0588f4bf79d4ce926d
SHA13548069cc96a134f9ee40f9983f4070d345ec736
SHA256133f0706ccce156060f77fba25bac9afc704fa83bf1aad77e09fe0f998ac6454
SHA5128718f40ba58a314e60f9c8df6dd1ab0bd7e865f5b8428b697084f9588858dbd1c0554a19916ba05ee8ac6875aff67b5d4b2f93c3bbe33592c9ba83ace1468818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a33cd785d7c2bf2d7d2290eba9376b5
SHA1a607a90ed58075c42145e9c51f66123d43341d3d
SHA256cdfe56e16c47d2d6f57f52a2419c3b128f7a48288830da862cae63678d4313fc
SHA51261b33a14a19639b2af6e7d5ecbabf9ac3b3bcd27f14f425177b8fb9b0db6a9505d1426abbd4df78a226f5057a47d5f5cbbaa1dd652866e72e6eeaff401eacb3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eed5468ae9218baa6e9b9b8f62e4cfbf
SHA1a99a1ee304edbb4d734082d5b2a2a615825907a7
SHA256b5a29080d40511382e74dca8dc6786aabeb29dddd88b9fcaed06bc577be1a016
SHA5120e5bf244d97362c38aa2772c34b7bdcd5cab919bb6cdae2a99184a28899771e5cfec45da65f4cb691dcaad75afa0648e8a48ce77913e7c3bb80f59ca98aea6df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43ac8bf3a5bad74833eb2fe269bf421
SHA188efabd203039b87296fb73d6e0299dbdd42f0b4
SHA256f2ad2091cfb057691e405ee79ee909a559c5468fd53e70530c1f1eb96d00db83
SHA512d9deacd5b75e52259776f90184367732d07dc788feab97066946bb87ea76a52074107b94dfd80091ea6325c76fabeca466c175c29ff7983bf46cc2518efeab42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c0b193946d1149ea86523cc9304cf3
SHA10e75fb7b8c455c631ef8ec07565dadffdcf1f3f6
SHA25656ae3087b9bb58c5ad453c9160628fabbfdbcf5867fead2955c21633996c4445
SHA512bf10d1e9bc1bd1fbba7671bd75d480af44ed403d45d8766e36237c01965847e3d9315c9f012ccde1222071b8b4f62ee9f4f3eed7b05119db09c60ecc06909af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee8beac3f2616c64d05c8747009759e
SHA1996dcc0ec6fbeed6e19b950795afef9812eb956a
SHA256b937e1fe62ab8fcedcd09fb469862a89a66a1024d9e3516897e8dd3f7b28878d
SHA5126b745740b73d9e4beea3f1cc0f5ef8b11c971580a10cd93e71886079db2c890d0e4fd8564c93da6466461ecf792ded9d94097110168212672e6cae904e96fae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597f38dac49b35428e3c83fe5e28a0a3e
SHA12f4a936b7a69795b49d65795b8526ed12e7d3470
SHA256970d31417d9e80bdf51535df5c443d9de02126c05057bb1460c5d3f6eb121618
SHA512a06effdf8966ba3b6e0dfefc89d74b8f8fc3e5c300053c8d2d3771c65472293650da2726472af731f4638066a3ba333c3beaa129b4a4c23740153fe0dc34be42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535957622ea8a34c2ab1f275c5d55bd36
SHA19c606e208dba8ccec3c23b6ad5793464700af8d7
SHA25691afed395154ffaf992411b6453404c6c5ae49040545b860bbf12e2870ebfa68
SHA512e3e3343e52f5c127b9e85b99025317016011fd1fb41803f7a111ccfd6d412594353b2c566499e71e7f9161cc4b040e7ee560cf8e5822b09688c53ee280e9eae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f917fd1c5cf22711deb2ed056a5bcd14
SHA1decc41e7a90d725858b9b79c8ed89754537be333
SHA2566974ddf44b02c85a0d9a4eb0ff64a4194704a85e6b9a25de65464a50588c27e1
SHA51251f14e2dee727ff54f7908a1317d7bf778ed2279cba52d2a030b07c33ae54375a70b7e2a14666b82c0c8c4c4a87d0ac84db835cfb7272ba545b04fdb93a24072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e9839a86e686a06a2b94c60d4f134a7
SHA17a445b671bfe64003b5001be725b935a57767edb
SHA2569e715e00a753e6f3e23e2f0b6cb567343fd39db18ed4869f9cc6292050f00367
SHA512c0a592071f3bc7dbd4401706ad41b54e45b9f0805c57c241e7b79c864680f3493f081d324f69ee231596632dd5d71937f648c39e27d13824b8627280795ce476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc9832611a6b03df1c30fb472d122d98
SHA138c3c2f4b761d25b8cf41a983672763462468a15
SHA25653052428dd95bac9e56fb1c246fb19a71b2ff6379e77fe78a08353b64e3bd25c
SHA5122524206b5da57a10e292e8d74de04f2b7377efaed2226d154ef84b26e76a5dc3bbfdee32a07a85ef00b798d77f95cbdc4d8f6b1a90ae3df547d00fd9bc16d437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e34e9a935b280d450b25d832edfcd59f
SHA1b967ea2c489651a33266df4227a2c70a6e5fa927
SHA2569aa470073c94724834576c22920febe9c09ee782702918c4fd1396a8e7e263ca
SHA512559bfc5d225c9da38061f48acecf69809436f97ffc2508fab9e5974a031534d4b6a22d401f52b1a926db9fefd8ba051c33e11c1b42e8028e7a9ff16755eeec43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdc43ef82ce44a7dcf539e056869eb66
SHA153588f421bab5c850d0021ad532ce9ff11ba3a0a
SHA256847b39bd8874b917e18708702c15deeacb83b921607ecda6f89eca5b659afeff
SHA512fe4c7cebad47301f32e603199c25bcc20d548c427c6c1e31fec2aee0e9fb508ee20838b79c0367d02bd3e532665beb6fa4c2d198bc2d99ee2473d426ec8ca2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfb46af0b457e75b4237cf5c32775ca6
SHA197cee7ea375794062e3e09c9b3c4036a9dce76f0
SHA256fe4d5e4fc66bae659720e83b36527ec94f0b465a9b1257d3bee63a5f1963f6f6
SHA51256581b16e5bdc2d98e412713a5c4d7409914877bd8b333c0ad93e10040d9a48555e4c3f66073bbdfba19c6669b8280e6b250f26b41d322996fe56c810be1fd2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca1fa7648e3e83bddadd0fad8d41c1a4
SHA17af82241264e91653ed38bea8f869261ccff0da2
SHA256bf17cc3a37b193cc8679f41e5d48d4c5f1bb8ac248a33d44671d316329077c55
SHA512fd8a293367cdbfd689c19c599261e4a52582b4dea2081b4e369530e5bf6b1097b9d9340a683811da0b929ae2a53d30d4ae1c94ea502a4ccefa70f8d04a50228b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57226ac4e9c76e5b6d916a57e70afba56
SHA10fd77a9f2b740cdd3ffcc68d9f35427b1c1efd9c
SHA2561bd5fdef157e79514e12a5363caabbf354192ef9d05386b536cf9b77f3449c24
SHA51208da943ee2530c186de70fec28a380306db69fbe1b692300e6c6500ce80ecc0eef22a8b4756c6ee5b3cb513440deb9d559fdad051eaaae278d38bc026054a1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240b97148f0c0debbb5b57043317d24b
SHA1e6418af517ee2bac231b69b4f6a02343af44aa01
SHA2564316fc60ad92b964607315939abf06c79b0efa29e43c0b7c8e80bf5b0588f81e
SHA512f647479efef73e3947664900e45861ef6066f20147e7d53dad2ee63ae0a4aabebbaf8d2d1c7fdcd8eae9f39e1c8c6df8795e18ca687005752ea7562c97cc9eb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56119887bc409ef93d95a915025c53f24
SHA159bdf2f9e68c9b983ec8b2d144c40e2e72278517
SHA256d2105c70ea1579b83065f90f3816199272873032006083bccd505403051022d1
SHA512163ff9c313d9ff2ac6f8a665795700671aacefb66f9b3367bf846c9f7022bbf6a416c2637e3c4fbb95e11645e6981d02afe7aae3feba8f7ae723b7b56731579c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b