Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 15:32
Static task
static1
Behavioral task
behavioral1
Sample
42490b72031c4c04d2477db426e77f09_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
42490b72031c4c04d2477db426e77f09_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
42490b72031c4c04d2477db426e77f09_JaffaCakes118.html
-
Size
82KB
-
MD5
42490b72031c4c04d2477db426e77f09
-
SHA1
3c6b865650bdaa1279349906f7638e5f65a882b6
-
SHA256
1dbadaffe01ca1ef855a3a35e01404fe7bde988d1879b4605d6cda5e139dcc76
-
SHA512
b0993dfb5b7e5e4b50e275f22cd56d4944fd242cfe39b284132edf3bb9a065c42da49daf5d2087e4dcbdae65bc96df74307c3bf79206090196319803474b8601
-
SSDEEP
1536:SmSV9zWTDmwCszZ2wQzR9kFZWJRigGEFhH2csw:SmSwiwCvTzRUIigGQH2cF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204e451a3ad5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427046642" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CCEC1C1-412D-11EF-AAD0-E29800E22076} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000013bfb64a2772dcaa8eb72fb0146f8f16ded31a37fb88d52e4edccd313b0a560a000000000e8000000002000020000000eccaa2f87351bee9067dc7ec20b3caadcb5b2658c61404b607d55414ceb6594f200000005010f79951ebd12d854a5cacce8712f5a386daf4abf7c2da0d4f4bb73479bf4f400000009259afa616a496593b07724339a3fdafd384604c58a3c6ebbf91a92ed1eca45719fcbfab65c038b2099f00ef43956d8f95dbe45633c90f32bf6d167011676c64 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2672 2696 iexplore.exe 30 PID 2696 wrote to memory of 2672 2696 iexplore.exe 30 PID 2696 wrote to memory of 2672 2696 iexplore.exe 30 PID 2696 wrote to memory of 2672 2696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42490b72031c4c04d2477db426e77f09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f71139360b4a1bd655b97d05d237b2
SHA1c89fc3fe5950f768517e7ee15c7356d5c9f8c704
SHA2568b2e049f2f5a3c0e627a6f4ebfbab59dea05a221e3c73e0de975eebec4e04ad9
SHA51226ca838b3d6c08049c627178fbd0f6020dd9bf8c41230dadbbf5705fda5165c1c8667d4c93786aa22280561d5e4cc87b56c6097aa81942e68809e05683296305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad16dc26045f1b1c68d5f6d7f4959872
SHA11f07e156443cc424b9ac019ce96ade224a377c6e
SHA2563dbbbcac8517c75b8e023a4f8c444e051b46413b6a0ff89b70a232bbc864c4d3
SHA512be7e271b9952a23f359c09b1071c069236d5994976771c82f42f1bb5b7522ccc9b8703a61e6de768582d6dc9100f9160571608bebedda4633596c67fdca0006b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50da43e9f80aebffe1f80865c839ae1f8
SHA1c9c8d23a4b5ee3d80ac136219127925134bfec68
SHA256e0de5b136a1c253ec1404c9d7a8a9b3fef456883876d38098b4e91ac20dc978c
SHA512e42f5cf43fefe08e2a22dc777284d08dc040c840c99038027f90671a6137c55d3cf012bc65968607a07b5367f16990070455b12b8026d3a95e3f12625ad8bb78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73f57232ad6258c19999be891be4b87
SHA150c3aaa4852ff9a29cfdea92aee8a23b80f6c0d4
SHA256634b12028e3d1374fdc16730408d5c4ec11239d3d2af5de47ec444ea39609a6d
SHA512eb725b2b14cf90b5d52c12736739d968f68059e4e9e56acf354f8768bd497d36e6222bc62990676901c28e5b69002c175790da35131bbb72639004b03426844f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d62e6c597ffc9f83842511e7ce43757
SHA1275c2fbb6e3eefa1e9f3d22c6dfd13fbaa982c4a
SHA2566454b56fd5e6d1ac6fff605258a27138c9a76af0b77aba5ea7764978eaa9e75f
SHA51223d3863ce8a50aea65d1695c10fcbe2220de8488bd5fad65a39b29575311b9bd619fcd20db1cfc02b9e199e1ce84d75b98f6d160639e9fa5ce166eaa89bbb68e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544005d551aa9207cb45fbe79111ee02d
SHA176f91cbe666b72d46e0e790b9f7b41329b4f5e0f
SHA256fd3b0d07e43f7668743868349ac99395c38753dd6964c233ddbc9aa468c0aead
SHA51278c8c7842d1c91ab9336ccce7f4d142b88f5a28afa23fa33f65ea1c1b4d47f665430d24c284379749cdb4ea2144c057a869c5152d21d974014455ee5dfad5e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd15c66fbdd9b250cdac5653930e28f
SHA1fb81e1f38eecabfc4088d099b9da1b1a5b1afac6
SHA256dc55efead98e0da8972eb5a0f91be2bf7ab7a82f20038fe2799214810dcdf5c2
SHA51209c3fb54bd8d22511767f4121a29b849ec7ba1c2155163323141836577644329ea0b0ac3faa59401ea1d5a5037d047ff277d1fbd46c3eaad497746c10be5c7d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704b9d5cebf7140d589fa457bbc29113
SHA19e91043169c760611b10ac564728ec3f42186275
SHA256bf148dd2bda2b98a55769ae7185cdb3d78576a10de5a59b0a6a6636e1b7cc349
SHA5127e55f041be1e219e9386cda9e12a5d6e2b8abb29494112522315da4d589858bc8324bf204e119cdc4136bebe00bf335fcea83573bf0f3e82f050d248cf911814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df85f80cfcf2aa68c35787e3fe1f4707
SHA1386129e43f24954852dcf83ce9c7b37264783d45
SHA2567cf99d6be41cc0aab9b096c1c51a28e3d9d6b07b01d2762352c4b71480210d6c
SHA512e5444c436eab00223cbfff80909f02061911c0723a7263a5bf2ffa3ed97713491a6f0d13cbf3b7b0351cd23d314f472eef44236a77809ac96c756fea7d1ae4bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df4cbc81e28bac99089ae9947fc944a4
SHA1bee5394f3f17cff118a67c78f5bef66504e1a9a1
SHA25650e4ed31a082defd5ee812e01e54814056e4d61bac33cb7a043fb0ea0d1c6639
SHA51220b3aa61fb9322b26814f035992a30392d9d2d9d62473e21911aacac24fbcd0165bda11e1f938a7912d7c3057b7ef4a36f84c8b496f1c9703da8aa29f57a3d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb0045bb8158ad016aae563c38a08df
SHA1f3593e2315ef5e2924bd1bf14a3410c845aef076
SHA2561df1fae805f4cf9fb59a729bae40b57e35402df36636dde73cbbc10efa08b52c
SHA512cdce8e45e859bbd1a266986104089d72c0dcf630f5beaf0cd44d3ccfad55dfb6372aec1752390a13083e62e6a7ea494f457f874f50c1fb9878f4cb4857c93dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edb1d89cf8be852c2db8c4bed3d9f802
SHA16171268fca5ccc794e77748423d1eab72a3331d1
SHA25622b593b930141e403cdc11d659f6248b091d3b1cced19520ffc073bcfb5bd469
SHA512069f5003f5d5ce9f92c663916deabe7af1eaafc3a579b8e8aa20b8597c2fd8768a641b6743d30a71e593d0af940c8c3167feae6833327b0093adc20de7099bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e780da82ea7bd6b1e787f09c03a2def9
SHA19642e0df2bedd8c9125f3633a37be876d5d7310a
SHA256bd2490b277b4ff2d36e0835c28bb48027fc2e118316b9ff88e44cedfd475a67d
SHA5129b6ea9af839a67a2c87a3a98dfc9452001b66e03a301508e13f1832c2e1212f71a15ae0f07648f37854b157bc232b27d325581f9470f7e0df1cbd2fe7f3eac7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56997f2856dbd9b47c6337b436232575d
SHA10e7fd11d4257cdf34c928a9124b70374bacc49a2
SHA2566a9a3d229a7569a6f4ccf9fc1c8a46447139a181206cd59ccc76c92dadf3d967
SHA512a29f8c09bf679c3c2f208606b335ad1ec33c27aa1ebf238448cf9c3baf58f6df110cc38b316c0c5ab1b662a2347f541cf8ea88679b8299f8a18cbc7e88745096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad76554b242859f2a10e8f196b1d2c65
SHA1b4bd0a662a9a41ebd81027bf684fdf1498e2eaf4
SHA2566a3b83c8ec9f9fbd59c9673d1ac27a88c9ec4ec91e9e70ae2854ddd35ba33162
SHA51219d1c93b7c3a4b9cad534f166de058353dc4314d84a3309cbe8b30f60837ad57deee48de07c210dc4df6b95247dc7a562e6f4add8b3b63ab9c5d26dfb20acacd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cacd50577700283d9291302b7199579e
SHA183c05292ed15323d89ffe8522ef629a7ef738fcb
SHA256276a81689ee5185702e6f4dd7fa764f0a5dc8f03c8c6ba8154ac449071d7ab7d
SHA51225f712392120f8e2338842cec07f6353ed2465bb1d94b46e77ed600ded51cca9c39590a25c3cc80a695feea9d440d2f7c2d9c621fb6fd568f71e9b12449ff48c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5775807373474d5a98cc8fb102230658e
SHA1971ef89e0d66e29da503edc33ec4861f819bb0e7
SHA256306633c70476a255fa4de06a7a03761779d84382dbcd2d75f76dfce8f841dbcd
SHA5121cb5a99fa4947c53876970b5f37fb9c3fc14160321c670ffb0e84a5a58352805f80ae50728947e1865c90b86c09e63e05b72cf6944c4b7bf5ddabe799407dde3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da1d6da6ea70c9899d2397dc48a4aa2b
SHA18712e87007fc92dca9ac089c64daec6f6a0be3c8
SHA256a3d3ae7f282bcbef0475ce8807730bd9770f65a0cc3390ecb2ed5351b3ec6a4a
SHA512896a71cadc71e3ebd4aa5e469cb701985a3be882fa27260d9803b36a0675abbd80b1af13a5dd71ca5243f1b93f51828ed75f84f84ccf5679573d09adcbf6d25d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b