Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
431e3db32b6872a60f5ecfa9bc5d6d58_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
431e3db32b6872a60f5ecfa9bc5d6d58_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
431e3db32b6872a60f5ecfa9bc5d6d58_JaffaCakes118.html
-
Size
9KB
-
MD5
431e3db32b6872a60f5ecfa9bc5d6d58
-
SHA1
02961644995556fa08c1640e4008d81bdf9d0cef
-
SHA256
498b5b41ef4bb32367313499227054d02fc46bdc8d71a3b39d3af1ceabf72090
-
SHA512
bc50f3b130a0c1fe3e0fb5477afe2b403fe81d1e76564e803582aa21123b9d4460d50857afb2bb2ecd529e9790963c960df3fc868e64adde4c1dfdc4ed05bde6
-
SSDEEP
96:uzVs+ux7UbLLY1k9o84d12ef7CSTU3zf7TDBEMFTQEM85T7+TKIT6+TEjhTCoqTe:csz7UbAYS/fMHMDJhb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f467875ed5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427062328" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B262F991-4151-11EF-937B-6ED41388558A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000009c3c07a94fd4825af1868ba8712410e597a9b66b7b5671450e6616ea97e091f5000000000e8000000002000020000000dd7016012bc6f790bf4bba11c112df06cb8a3369db224950761eab240eaf74ce20000000f6575d6db837f820a7508a4efb1084104e5697bf67c3b5b5fd654eb87ada323a40000000a5f15fb417aa1ac9c534fefaec5297f032b92ec14aa84c555c3cc14ca5babf7d0a1197ae11dac30baaa70c329e5bb577cc66ac88f75cb44df43814fd2c8d6584 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2728 iexplore.exe 2728 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2712 2728 iexplore.exe 30 PID 2728 wrote to memory of 2712 2728 iexplore.exe 30 PID 2728 wrote to memory of 2712 2728 iexplore.exe 30 PID 2728 wrote to memory of 2712 2728 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\431e3db32b6872a60f5ecfa9bc5d6d58_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b0db75e6594c0c6ebfaceee81800e13
SHA12a18557b370779e5c4646d6903b75b6be48ce1c4
SHA25609070b1fe9a1404855d6333b84daeac104651bb78a4ec3da868243fa6c49afcc
SHA5124fe92a543bfad433407fa91ab02f115d870eed95f3a6dee3ddab9dae9fbf0d6d989485641f3f566172b7b89b9e43fb1109b613cfed7986dce67b32c00358d70e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2da8dc5c7b6221d633425358d5b62d5
SHA144a4bf89eb92c4bf07ee827d46cccf9ad99941e5
SHA256ce55075eedc121fd9810703ee5ce621c3f6c76593bd7269d45e2aee0e1714177
SHA5124c88ee3db810bf5ffdb56f3a933399f7794400c4dc03fda74aac79efff345fa7e072fcba279145f5eb16d851cb780dc48d2fb58399d397408b5497b691e2f345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a56e26cae9bf7415694decb799a56aa
SHA126a981574d4a8f6be5a73963fbb3e85febac0ced
SHA25607af876c480b7e9c8876249d95ef348a9d84d0dc326870acd1e6002f41d06780
SHA5126dd30a1eae48b3f65a60e530ed8608b93dd9dfe5744ffce725375c64e64c04bf05f831b472ec277ee6c5c8aa8a987fe1fe66a1add898b47dacca4eb80fb44e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2910ab736540c05bc1cfdd0acc7e1f6
SHA17a9d0195435f2db0bfbe4072051fc8233c0e49fe
SHA25604a1f43b5b498a464452d9f1eac14b408dee06113d1c232e31fc7a9cb36da081
SHA5126de26f70093d4bc2d8d05a94997384bb727073ff6bca2b7a4c76ad8456691bb852a31ed29be644b3352150880ad49685555de0f00a65f79bcd57391bace1d8ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5550bd43e861c16d7eb2303c210b202c0
SHA13382cd4c302c57fbf4790bc416435293760cac69
SHA256f65e83685a5ad7301b7288a700f95ad6b48f6d089b50c76f88d27310c77840c9
SHA5128913cd361487f00f58bce4255756a6d02a88f04e10f877033a461b55f422335709d3a05bd6b59a657acff21ac6542a2863b4b59c88fb8cf377e5a19ca6b35b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a0deaed040eb0a0a5f8df4d0f141542
SHA11f05d9f476a72462767fcd65bb3e88581aa7796f
SHA2567b34da47a70cd6413f7579772869b795fb37e8275c55dcc9525332ff9a2ee724
SHA51294c778fd7e06ab9749c0d0e1c35b785c45ce205c9edb6a68043e86166e743b30f8003d561f1fdb5d22c13fa9f745ab23776070cfb934111a96f43003e0fd11cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4a772870933c412043ddf1a8fa52a1e
SHA17b45d60500bd15260622f4ce7cdd82f87ea4e398
SHA256df888628bbedf465a417c635bb4190cb2544b485fd4f7f46ac50a829c8b27311
SHA5128976335fbce12930092a151f216df373cf4385a450512514fae98d6c6f08f49af70ad6e0bb508333954ef1ace671595eff5a864223e78bbd9a44afe97b7d3907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adc333e65c3f9b91e09655bc98e66159
SHA13bd65260bfaa7b790ff5dbb3835ab629b81fb6a9
SHA2565864d2b17b6bbf996686176136cff55595ec55098c199d89c9ec6800f45127f5
SHA512bb66b890c929586c19a220519758bd39e22ae15d2bbd68d71f5efc0371452ce51141766fb81cc59d8f6f0694df84dff4eceba2123db8276de9adbf4911d47c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5298516ec4ba671c70e2fc199f059397d
SHA1e96c37e2957c5777ae78184d7f7b8c6d3c5f5d92
SHA256c40cd9fe21db7dd856d997fe3eb1c55e7ccb1e0a95807f4fb3989371c1ffdffa
SHA51297f58dd7b55b84c6297edf8ebc521cb7596ab978e6eab4ed72bcc463ed7f7c4df7c8b56cec7072145c2e989abcbbced5d2509ac95eee9e37418df2d09ecddfdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ad7ec01923e21cd053d141d67fc057b
SHA1444f2a700dc5e09e70b0820ef16ef27ba9f278e5
SHA2561173c45ade898c0b248c5b0cc5d6ad6ab16f7cdf7606b19f196551a017b5deb5
SHA512b5f88791495a607b8fee82e7cb6d4fbca6b970548d8d6a2221da0eb13d37badb22c90edcf3c24f9c0dacace2b48a57da0e358252f60db70822eeee735c181c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569a5d0c96f1711b64ccc323eff6a3582
SHA1de4a5b6b54cbe55e617fe47fb36a591b0d9d6aca
SHA256dbb8df35ea11a4248d79316ec46f6a2667800b6921e2bc6c7f2a136dcaec3ced
SHA512e61aac241f553f48a4396b16a43107adc5acbdf6c3db0c8a64432e617b78d1ebcbd763a01d333944cf500a4b89dfd496bf134ccbb1e38c51ab2004dfc606ec0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5532f162716c7659970058335dd3e7531
SHA127e51baa977b22c9deafb32da0c48a4c1e1507e2
SHA25650aa12e2bdee034043ec55b481afc056a254b2fbe0118656df432f32922f190f
SHA5124ac8cb452f0ce77c750139b90294126b81c268223af2c1659b39c4bd486a0d8964a19af1ddac1caacdb23294859303ad873db0063d40d5d9f5a5cb11bf5f1037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f09d94f3e141b62bbe4bb08b388e228
SHA1b562f6b16413be7fe309be4a9f5eca3e045e8226
SHA256c422d82a625a2f2803c192f693e6041972e649aa7c59eb0805cc180e27cd8803
SHA512e909e8fac5a30ad0d56d4c438a0c47f8a517432a6417a90d8ac58775aa4749a85830f797ba45145169b985c2d58526193fb9a5a4e03bb042186864d80ed96110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa6e427d3f7e32d78d1df667315a6878
SHA19849c083afad63d32e05d4a72f20869b6eeaf02c
SHA2569911ad1cae4c344e44e591a335331f2f75dafc336937f8bf1f1d125e13d68539
SHA51251f4f3e135615c54186c05d5679be3dc6cc82d04c719d4ab85e4cc1b4808a54fc1e2a9f19f9b2aea9e8289a0078db96eec3422855f83b03fcdb56387906980bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5167b5d9efa133c3d175f7e60411e21a2
SHA107c1718d91e44311ce86252f06f9e71ea064fe41
SHA256f71b89c144a26782074d18bf540464f988257eff69eba243f6c98ca0092f4105
SHA51291bd9d962e65247596e0716ee8bddccdd49cb47ca38de2735a85715ebb13eeb5d48d1dd484b8bac424d9732a6a9a8e002f8121f411ca1cd8f8a9f986da60e7db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d83f344f94e65ced8cd77a37dd9afbd4
SHA1bcdb7f0ce03056eb0c5033b54f44c354c4b33614
SHA2560917ad7b89b733db689f17a1cf51a79f43ccf4cc4a495ef4095dc098cf2b34bb
SHA51261e67527baf2b7391e10e24f3b6c7be3e11fabac1ae9d9f63f99eb4759cb04c31e3a7e870731fe6873c3a9a7baca83f09ed77e20e57346c695a0ccf7acc8a2c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5f3c0d9c2e340eb8d431017d30f93b
SHA16134f74ffb2ba5b5685e673d2d2ef20ddf5b0cb2
SHA256186243202bfb8efd8c7bc8155bdde622334e1e407cadaad9a0086a3231b2df8e
SHA512a6e396e567894f716ad3545bb2f7d6b07a377eaeee4e761028c52bfd68070cf471f09cde90f75a062d3ec176c6eb84c8d95e1ab5c129bf5a4e01a39f0f1fdbde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d469acb1eab3816beb8c76dc95de485
SHA191f34555762acb22e38b7bff279d53c67a053c88
SHA25666e6ded5b424cd11bbbe6ea886f048841ee937f78e1e41ccf87a745516aff29e
SHA51238aa6707c9afa36380d02a17c6d346c9f67d171c10a1e875b48333656c5a7bef98c96fcb093eb613a65b74f97bda2256a4d234e600b422314cab2795434f928b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548530f4222f0c4a7ac48ffd4afc2e278
SHA111b9c994ca6592e0bc3bd5b89017b8ec3a3d0a27
SHA2563eb72bba87de3d9be9a186e411d31ea03a3799525776152001f229c046fcc3ee
SHA512fe13a0eaf682e2b7f7bca8a3672bba17cd9cb4d0cf3578c47861198eb535532c8f05207c60cce12aedee64f723006c39156cb129eecffcdd67cde81865167411
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b