Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 23:05
Static task
static1
Behavioral task
behavioral1
Sample
472b5399003513a0f387b7af1b80339f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
472b5399003513a0f387b7af1b80339f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
472b5399003513a0f387b7af1b80339f_JaffaCakes118.html
-
Size
53KB
-
MD5
472b5399003513a0f387b7af1b80339f
-
SHA1
6fd5772b159190de310a2f7397e9d2f1572b03aa
-
SHA256
2e3e7a289c05b936615586710b0e8447232d47ff9d8418593414f2ad5128ade7
-
SHA512
6b06b51b4293eaf90a78eec6885f4cc35a1230131b59860fe2c31f5fca4432a9e84f902aca35bc630b44a834826271f5d20f84f209490f1e72b1bb386340beab
-
SSDEEP
1536:CkgUiIakTqGivi+PyUjrunlYk63Nj+q5Vy0R0w2AzTICbb4oR/t9M/dNwIUTDmDV:CkgUiIakTqGivi+PyUjrunlYk63Nj+qU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0084456942d6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000a61d285d95db07764c3ce24608b61ea075e9767f7721e9b8fc946589b448769f000000000e8000000002000020000000e2e50230ef49b0e13d64697945f44876ecd0353828443df0aade3964809312b020000000e96f3c133197904f63c599e43580fdd42ce782d4f41642eb0eb5f98923ceafa14000000013158141ab8dfd7a675a7c14ee1ea81f1ef756d846c535cfe0c0ba1fd8791fab82168d3f88c94bc4f8336ac19cb2f49ca66fca6dd214ba04b2cf650c29ffcb71 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{935D35D1-4235-11EF-9BF6-6AE4CEDF004B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427160202" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2436 2080 iexplore.exe 30 PID 2080 wrote to memory of 2436 2080 iexplore.exe 30 PID 2080 wrote to memory of 2436 2080 iexplore.exe 30 PID 2080 wrote to memory of 2436 2080 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\472b5399003513a0f387b7af1b80339f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e9c8a05bebb8081e469b7a935374569
SHA1759edb3c9afc33d798a4a66bb9d033411279f6e5
SHA25680888b4c8e003a0f73b64f448023d76073eeb6ec7eb8f36631f0be92a44ab72d
SHA512bb7ab337ff04e2fb343acee62e359e48de78e671c398f4b80da981c2e68a5e2aa8a2e3f97340d24238ad0f12284339a445efae80e30730a6a95235cde404995f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d30ff82c4e3d84cb0a5ee26801145f6
SHA1c3cb26b5db0f358ad79e07d275fa95911394a4b3
SHA256dc60870b389f71e5536d9ea3834ee7faa5047123d7629257a84fd783fdb88915
SHA512773f6565d8f13379b66ec18792b90331511397fe2f6d1a36435253cc18399aa8a8422966b122b654770ed3ce6cfda4d19ca4f7b6b595f02267da4eb62543b172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e6705122418d1a30a68aeae876108b
SHA1ecd1e2b0876c0050a7bddca7c5f650ccdb9ef5fa
SHA256083a614addf682554cca6b2824c9e32f0448d64a03c4ae2162a112c302104b98
SHA512c468b4c79ee82652372c028786ab99a1fe50174a156aafdeed712feec7701b393d1af5e944ca61c81491682a751fe84f6172be20841c5ee3bff9985afbc81dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7927499821e781d101e62c1c9e3e56e
SHA1777a3ccf700b7899455ef163156326aa200391e5
SHA2565aac2f65358cf8cdbca41e0ed851dd06b49234c905180324e2b7d99b06ab13d4
SHA512c54c2af341dc8312b74dd8b507c16e814f65f917cb8360102fa3f356a683a07abcd24e01579cbef1faeeeece0f6d35678a9a6b3fe0e81bc2582f2cc84e451e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab970ac4df9314470e44c88bd41b1430
SHA1af67a96d5a7fb54d1e9870fd79f16cbf13fbe093
SHA256e07ced18406d3d882d49d5e3b00042040f2b2703b35b75f0cad34d0203e851ca
SHA51272677f67f122c6b02219b72c606b6a27b5357348b4f5753e54dc995b0a9487b9ea6fc60a7422b75a186a3118c9e8f8192828081952bdcbaccee6f2f3a77c95f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573394b3439f228aae9967b6be51d346c
SHA1e1a8609433659a939ea2f1da97eca5df495ab9af
SHA256b116b914a6980536507a48335b939b5a1c44afe6eb6b7f09fa8833f9e827c79d
SHA512b52596e6a122503bfadce7081afafde164e2705ee7f78c94e1dfe4eeeab05c467da1642ebe8630f4f75ed8add13938960682eb79d957c9131a797c767b426fb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a08a7411a96c452b5c5e339658ab2384
SHA1034ad584bc39e3d2d0906b72ed9305653f76db55
SHA256f2f4a145297817707010c75604a4d81fc182749d6f1973adbc0c35f852fc2435
SHA512c7b9ac7dd201df545a09f2c19f96bde2ab51c0cb1160eb37b0231ecd5867cc62ac3626e25b8e0a3516d0397cd62b66990abe10c7b6be8f626239b38cadf30e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530f85528dd2f4710c1be0a92a320d0bc
SHA1eadc0d9bb6a3bd6fdd0bf64607e04885321672d7
SHA2565298bee4cf900ecdef0baaac14b8987573aa343a0dc09f182f0f1eaa47e1e6ae
SHA51290a951ddae4394c2a569b342ab4b4c8c0be90c86c905b2f373c6f5ebefbed21ea7a0408c955d895147d2f8b3e85cec0bd81259ca9cb0990046911648d7f19a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537b96ccdc4de8e5372112f9dae1be5f8
SHA148b86d8f50bcd5ead05f6ca9f45ce79f36cbd190
SHA2568f2134516eb441ff64013f7d4c300dae1c98047afbe2157cd5426a2d4e5ad0ba
SHA51205eb3f657e23f8ee037a9becca8a6a7237c9b93669f28d0cb30c1bebe66ed02ae90f8ef8e026f9f2ba189bd8e8387ba915b0c6b8146fd2a7cc51e334dfd73124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4a13d4ba949d932d8fd376c189ba429
SHA1267192a41186fe88530dad929e3ed19022921abd
SHA256b797575cb0562a7fdf81a47e935316ba20bd458bc24a9bda9ce74568ac27dce6
SHA512951903b9b934964e1c3bd6a19e42c01695dbd018a6e40889836768b57a790e0e278d96e284c87ba749b7272ec4a8a07487571cde9689d82943a26fbe2ac49f14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ede17ff518b257db498cd90f0f3d0299
SHA18e2756420e6da455f39812f8878dd9b76b243076
SHA256059cb91b00cfd3df4ec84dc3a574652445cb4b1d664489d03645a476901c7816
SHA5127467657dafbd9103ca449795e6b5bf324880672c99f2b3fce01e5ee918ea544646747c6d23a9b942bd691ad89b741e07ab50d784500c38c4487ef6456ba02f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5045c81c8cf2e1b392344863723d67de0
SHA1cb675c722aaca970725a29070e1defc80c6a31b9
SHA25685ff9f631198631708234d06a6e971a60a82765b23113f8a214f9bd179ae6bb9
SHA51263abe1e3e1ee23fa6de3fd60f9ffed2021c142c278a7d694f064df26e85e7021846f88831aa56251ee34150a10abf13b47d27bc542912da071fd6e9200efa2fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59450b561148ec8c45b19da9d779a5a45
SHA1318a98f445acb7d2d27acbdc52f8a37f08a7845c
SHA256f886dad3203042d95d71242d3662eedab7a0380711ac78a2b4d010bf2486a2dd
SHA5126b4738f4e20aacd688b401e8214f7ef0f603a360e12038ad49da48eca6f8cbcb90aba069e1c9c44ef9553d1a3c2c0092febe79f9c14c28a6ad125e97f9822fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598879a92ffc9742c160867aed8417183
SHA1f59dde2183481ee71e1b19e84f4dff9a23ab20ef
SHA2561a9415e39c0e6ae6c68faac530a4351baa65c500f6e366461259ea40aed8ccc7
SHA51200845218571e57e1f238e382f1ab406bc5341d91a401efa097b54d2bbd38717e3c62d0ffb361688c8b8261bd7b49271dc01e088aff433f96e021fc5b50907e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593e6fb1ef7d8ee61e3371f1be9cd1804
SHA17d4db461e6e5066428bf57f6cdfdc2205c7aefd2
SHA256123545be4cfdc43e264bb1a67c351efc3158b3b7d101a75b081f7d90154c5f45
SHA5125469f73ad82aff26af160948703cc4ad0b18acd47819aca70719230e0a0ace39cf09b1252bd17b64a34db0b16da9e039eccc23f37efb2bf9930347cef4052e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879b1f449fe2cb9a18c27e8b65ae21d9
SHA16f9fe0330e93b74792de6b38392e6a93e3b5d7aa
SHA256160a885f8799a8b4fe2dabae9413889e3d2205234e8427cc0f319885142b372b
SHA512cb0f6136e7d32923c9aa522a13e00deaf1e163b048da30b0d8a6d98576a2c7ed29d1749c9aafed7474dfd6160f6f92cbea623997dc1cdd029c78da76a2a250c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d9e3e330205475b17b2bde572c41c2
SHA170d2b620ab8b2fa6c62f6f457514428d0f8ca358
SHA256ec9b752becce4d342c8831b95b4b1ed718c5c182ce3f667746a38d2c80ad29a1
SHA512fe5dd6c03c6f81d5b19e3bdd1c901951699d12e2ce614c3d68009d7fd9c49dea6ae7b4327c4bdfd53efb5fefc6e56bcefcf2c10adac5d08b27f3d7552efecab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5397615cbd6a4115136cf9a252db57b1a
SHA178c12351b7fc0a3d006f953e3656ddf41b5679ff
SHA256359a7591ae81db68c36cf751d026c9079389df84c7ef6950ece6c8e3aa7ac73d
SHA512f826f597a1bf4865fffcff7f678eb0f0dc878f098870cf543eb9dec654c4988852877fe1656391f3d0cbbf8cb1c6afcecbbc6f014427ae8cf4edc909cd67f328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e6f0166ef767cb3ac15cb826ab1f8f1
SHA12dd77e5c72c2a9e1210174a23fff5167d6a01150
SHA2564bb0c15d0de17c89d87f10807e8eac2ad772cedc81d8fe4625039e4771546c73
SHA512ac36dc00ab6a9bfc5c0b4da146608932ba228ffd1227453efdb54030e44da3aa7dd64c02c44e358f61f1dba25ab0177093ec44250ea40f3a7bef274e2007c1b9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b