Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
427e1f6a48c8c89074b263e013ce339b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
427e1f6a48c8c89074b263e013ce339b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
427e1f6a48c8c89074b263e013ce339b_JaffaCakes118.html
-
Size
53KB
-
MD5
427e1f6a48c8c89074b263e013ce339b
-
SHA1
3a8f74acbf21befceb64bf2b7cd5988f6589bdf1
-
SHA256
918e3ef07ff58bf7a1a1ed4564767d26495a339a88ea21ea153e78e974c4dd6b
-
SHA512
ea74da393128556bedd59c55a0a9d7919f32842cc93242fe1afffe3a30cb4d7ab069bf506f1b6267c433e14649b583760df25cfc5650afbe5e02a7e5c3b9bba9
-
SSDEEP
1536:CkgUiIakTqGivi+PyUdrunlYq63Nj+q5VyvR0w2AzTICbbUoT/t9M/dNwIUTDmDL:CkgUiIakTqGivi+PyUdrunlYq63Nj+qx
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102ed83043d5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56255F81-4136-11EF-960D-6A8D92A4B8D0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000ade17b0d55ad88efa798e7ee1cd266eb52e9ce083f909751d835bd00437f4db5000000000e8000000002000020000000199eba0a683153d339619f1dadec058e8e5c933e95e84ec4c0a714d973b191ae20000000664a9af684af71853ea5e062b8ac5f744038a5aa7370926aabede10b94a0505b400000000da076897ce2def1ddda05afb2d5a3982f5cdc3ed95c4d7c5c523af7f8970cd756b0a819f6add7b4f822cd822cf9e11254006bedc34f92a1e34d87562df2766e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427050580" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2740 3012 iexplore.exe 29 PID 3012 wrote to memory of 2740 3012 iexplore.exe 29 PID 3012 wrote to memory of 2740 3012 iexplore.exe 29 PID 3012 wrote to memory of 2740 3012 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\427e1f6a48c8c89074b263e013ce339b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a889fc7a4aac0733864e2214097b0272
SHA13aa5a753a68fe88303e82752c8b3aa5f8baa4152
SHA2569de61a9bdc82914b060c1cbc6a717b45742423a31debd289871a4860bd1c5618
SHA512155b968100a4ba104d1da6396a6e50ac3e091411d1f6942e88475617be092aa3b81cc50f7450f52badc0fe06dd930c60dda1a5f39d423a7506f1db89927a94ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5115cf546f97e227672f0337161fe5925
SHA1ce49383b173f7b95c3da399591463ec2ee60d263
SHA256e4cb720d4fb3456446ee44838f800292b5dc203b6c5ff22fc42c5b8d1970bd3f
SHA5127d30b8af9a7137f25366405e5db0d77a1bb9b3c44a973250601f1780ada97a2e525905c9463f22779d98ea7f3d91d0b9682261a8b0d35afbb43712f6210aac44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54857f794e08d8c81cb340d02f6f7dd5f
SHA140901237edf8c2e5c04e4814ed53d803ce32d5e0
SHA25677babababe3bb6e06b066f51189e689a48d08e5028b913098d69479076d90357
SHA512ad97f08618532d05bd278df1aace07c8035491d7d13291041fc4d4216a67c036f61350a5c0bccf65b234723c492d6d6e1696977eae24bf3bd7c1462fd0bcc103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c4ab572c4a14ee692d7b08433c18fb4
SHA166152515cf4d0d8ba4f9abc27c9448c52f8416cc
SHA25618e43531365e31ef6cbda5eb321a4e6bd766f46ac244d46fb865b38c17a99b00
SHA512f963753b4ff412c10d8aae04303b2d1b912b5c8877874dc90cd2669516f9f23f19b18b80163778dbe42425b8ecbded86a441cbfb176cbeb4fa6ddd079cb8cf8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53edfebfc33abf68792049135f8754751
SHA1ddadb4adb346d0eb801d24f3eaeb06502fd1b301
SHA256006f017c9076f1684784f89cf5738e6a4170c2416355142c52f1d5f50f9f0c17
SHA512d97d291d90c729d2472fbcae891a7c4cc6d3453df76b9ee5cb05e8f94a54a004e909c42e9a87fd3c68b8d0a48ff906a5c4134be7e4991c5c3749c128a06df7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512f545201bbe932eaf45965debb69e76
SHA1757f486c76b46288df36e724911cec14b904da3e
SHA25669e8b7d7dfb2ff394eb8e97bbdb7b0bb35b6c4a63f877c6bce66af9ac8ab0d6f
SHA51267099d9cfb139362ac19cf4c2ce51749cf5e864cf0391bfda5d58cb7c99b653ccd91327ad2351e0ba4dceaf38efe4953dde2ff341b5d0067f5617c64ecb11c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b97b900130990a578b3cc68bf46f709
SHA134cf4f27e353807fa0517fd486c70bfd60440503
SHA2563a1458f6abf32997f77b0c2882d45ce2636a9f39331cf0ff34bc6e27ee0a67f8
SHA512279a3c0eaf921868e51aa3f8680a82f10d0664c088a2032212dea2d61ed1b410c030f2766167a7bc4a76770bed2d064882bfec1eece7d04c8d10ee8a3dd55c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d55753e9862b169c3f2955796ac080
SHA18cc398c05fc96b77dc22f2f01673f961bd9affb7
SHA256b5310f771f42607e4b60bfe2875ff848faede119f5d2a0628e13365a292ae192
SHA5127f5b6ff66f8b1b90e90bca6f8bb3e3e731102b09928ea57d4e078e3dcd0cfab8643f9aee303c574123be5271a280045af350adac139867db55a0266abf30ae4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a2ece054183e3c0dd4d456061effed
SHA1e09d96b7afd520440260a95e1e56ab591284e283
SHA256d919ef1d36a0e13e26e649500ba046eaec6fecd9dd1058c8e3292a7287e2bdb6
SHA512063e979ccb0a865dcfbc467bc8b1924ab61ad85775a447ea40cc09b4aafb75197efc4766b20fc5c948083a20ce13383805cd13f78e1e42dddb841ab328201f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f37f406fc330464fb958d86236399e8c
SHA1f9903ad2eb05b049e957afb0728784f3961616ce
SHA2561d201d5707e92e00bec42287aaad8a71f213ffbd5e319af3070d3f8e426f8395
SHA5124480bd515699a557245fc040d371f92dfb3ea309ddc2d5a0a70715496b5a3969cc9ea20cca96df48845f2c0c26ef93286d27b916a8f89c82cd2d384ce13f4db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5679ea478e5351763bc43260adb2a26bf
SHA15380dfbaad4dfee0859fa52b25376a454f3c9664
SHA256f889f7af23bd94bc0de24d762372cb4f1050ce5f7080830fa92a5aa9a7cc2e48
SHA512fde3f748c2377378ba26ee5ae9cb60e129294e10d1fa03cf0366fab7adc3792d15880403c0a0b4a11da1e5db2043eed0eccad4d0698ceaacde3ba4da6aa0c144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b62261a3720bbabb74198d645bc618e3
SHA1766f834250addcfb987966d6d041a5f72822f996
SHA256470a469984b5d2f0bd7cae9f6c551e1b8dea94724201eb5f04841fdcacf5e5dc
SHA5120f42dce24bbe534238da0d4ffdb37c84f2ef365ff32b464792a77ca5917ae13ab7dcb47bb02f3a5fc60b471d9a667866e0ecd0a951b3c6e0bf81651244e61142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5f0ed52e4c5737098424826f210aea7
SHA12e2b14c6682493809ee15b590e3e3e49c4d07f7e
SHA256f4a926f79e0d6e3fcf465e06fc2dfc5d70fa0a106e03fce5e3fd4bf5c06cc7aa
SHA5125dde4eef737d31980af5eb85e6656be59e3a5ea407d494bcbc7341e097c8ba8fc217f8e381cd7126542271be726192d0a8751bbf76a8d1ec958eedb8e46cd579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2529074b88f1dc10e8c19d49a1ce6f5
SHA1f895fbe8b83d69d19c60355c7986456b822799f1
SHA25603ec5b97859cd740515e9ae57593deeee3400927d3fa11574a34eb05108f960a
SHA512f7e309a296c81f8eaf9b2e65e9daca7a059da47678c4bb5c256b235ca2a445f3065353bf199b9b23b0261c42640265aef6dd1f6da1205bb25a3362885869813b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcbdd0993bfabdd8c1742ed41b529a67
SHA11c9a57682737870322a33ddcb9df617d4a3d1311
SHA2569f3f6f1662c56f99dffca3b65b804441e30edd0c011da644c55741292bb39936
SHA5127b1e1433c8d1d14aaf16d3801a3b7d7c855748c6458a46a84f596422f5b9caaff01344a3da05c4d06cd25725688d9f1f3c225546826178fec44ddd4a150c28af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bab1ead3dd5a6531b2674962b08d1ee5
SHA189205270656499105bd02580955c0900b11c5ac1
SHA2565dcd8c3bac14460f21b07001cc719fe47762c8601ea64f502467189892e65711
SHA5124fefbfa7d324e06048b656fcdc9343bd2ee7937ed064bceadbb8b36277daccac473c58316516fef722d628500201f150bb2cfe7f7ef4016129a1c6513624a8ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b5fab0a651f1ffba4ed3646f49cffda
SHA1469a0d59a5cc46f099362d4830b92443ba6ef6f0
SHA256a41574bfa882304d44becb8c9100a034cea79c5847b2ef429752fd59c6d960c8
SHA51260ae0b29f745fe0c174f89a01a64557e609d7b7afce0a6a615c3d339c3b1bbbf57c72b8a867586948f2fd81df446d1eeb4ecbc892b0c278ede9f51d43aa0b7c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cea63b7b3dafe725348a37afb382162
SHA160cc53b64f67048e1adb2b1e1d13de319c9e7eae
SHA2567bbd9c9be91cf436f84bae0c5bd500398437c4f594ffde99310c518133e400ae
SHA5120245b4e5953168d98b705c016c12ef620c86aea84ede774c6cf45067aba1effa2b4bd879561a944cffe2a4ceaf80447047c969d0ea7edb454c326d3eaa1a150c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b