Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 07:01
Static task
static1
Behavioral task
behavioral1
Sample
44c9581d6e14989c6299ad39d85ac743_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
44c9581d6e14989c6299ad39d85ac743_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
44c9581d6e14989c6299ad39d85ac743_JaffaCakes118.html
-
Size
194KB
-
MD5
44c9581d6e14989c6299ad39d85ac743
-
SHA1
7032a7f590619b446f580ac2e8f017bf589c7a11
-
SHA256
9f02c58ba4aee845b2c78c9be635b3f9d5712a436fb20d792ef7077932cd15ce
-
SHA512
79f326832c37f525edf85516abf5bb31596696994771ae91f808dd17f72b456d7a6cbe19d0bc74f3008ada21b549d4eb6c2717b2c416173ff8f464f34c520d2e
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fc66EHAb2SLtbPS2cZKNFlbp:sFy9Lc2f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D73B6E71-41AE-11EF-9C22-7A3ECDA2562B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000fd7c4bbd5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427102333" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000e129b139263fcbdca19b8acabc3e2a199342c0547472c6a0692f0d87cc75795c000000000e8000000002000020000000d3c4acf4961b578c99ea6e525d5f69ee8e4f6247b0463534c47e31b6c9b0fa4020000000d80c9fe5e4da517d52cbd0d2e9ba64f18842c79a8120e9d1a6f48626422579e0400000002ae79547682e22fd67a625f490f85cb3c083372d7eab02c0a9d232fb8b56fee87e1e61de68d23ad05a69fecd8649cff95444395037c930f93dedc49b15a673cd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2832 2176 iexplore.exe 31 PID 2176 wrote to memory of 2832 2176 iexplore.exe 31 PID 2176 wrote to memory of 2832 2176 iexplore.exe 31 PID 2176 wrote to memory of 2832 2176 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44c9581d6e14989c6299ad39d85ac743_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad4456d2d8509b4fee22ec561f9e50fe
SHA1425b1febd519d15fc9594fbbbd47f9b2eef45f92
SHA256977966066b6c5d635cf3407b4be611e50024957ed55ce4aeed46a500165c1979
SHA512342528e0af7b2a26f83be600b008f8c0ca1dffcba1a2924bda09d1cfa2cd762f417835534e58ebc19da89e158696c658d175487ecab5e9b5ec501389dde55a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf75d3dafac6279be4889d02d0af2ffc
SHA14453b270a06b41f1955d9438b682c71d222b737b
SHA2567c959d95ddd479a50727f3a74881ccf544afa38e67ab62e9d2ff70a588138476
SHA512dc196d386547b98b3b99c0f6082401dcf9a4451c5b9fd87498c8bf5952676cbced2eea46866ba230813338e68e5de3838c6ae758f31d5a334fa63bf9b736ed02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55df0fddbcc6e90a703368d90e25a1468
SHA100a52fdc4582fe791362dee445d18143edb980cf
SHA2566751d7c4e08c4821232ee7cd910dd7413ed89c1ef108fc8d7dc531df01c70c60
SHA5125aedab6e294538f5c1c9f0a647ef4dd86683aa9a0fcfd5cb75428f24f3e4059ce39fc9bb3844a0b718360fe167334f33733764dcb2b2ea191ece6c2a02ce06d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5332cf78fe05dd8576093630eb427c4af
SHA10827a96b21a927032bbdfc416d0aa2fd42d5a9b8
SHA256e32e98fd68911ad19c7347f227179a9491cef9e5722e3d9e5330a8f84a1f2832
SHA512ffdb7ac8b115415cd5e2ee4a1909aa3764397946dc652f78c9f944940dfa562691e515535589ccbdb6de5657e97768ce8cdfdc64919955c7632c3224eb3e4e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5847adb5df51e1ae1859e8787f747210d
SHA1d1f543abb3cd40434052f29ac421356330c90120
SHA256145de8eb30aa96eff7797743e6b9a04587252d1acf8b45cfd6aaab724b6a78c2
SHA512d3deb04d196effff666aa4fe10241526de951da7663d958df5d75c0d92e7747c63df69d2815168e710bdc7dea31695cc6239401e14878564eb8b3ab23448c7e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f579a0cc46a5c47e52671e5ca1c9168
SHA186aa363f97175c8ad55f98f0b2aee627d69ff996
SHA256e62144f963f481776f78aa056f10799feeccf8f1e64f31bb7db3d7eede031248
SHA512f664f0ce49d971f4267327b5e0cfe0e4c116dea6532dbeaaafac37500b5b651bfd589714f34bd93afcc9dbb2d6e746bd0ee9cc0218ae49dc16635e599f50393a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c82919bceb860028cacb109e78c1774
SHA1e4c3f0a0d24e0bd4d25211411cf6fa3ecf4b1550
SHA256540d61548a4a150ef005015c6029a65637e894974a7a0a8f7e4e68b70fcbf1df
SHA51282671ef31888345f96fbd09c5fa50926cc538202577b9c87d9f21c86b75bf9c2867ff7d99ec8349bed8512ead23c925250e4b2cabc84a85f7c9abcded801f82e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574e026a998bc97bdb47383fdf78b69fb
SHA1906e481929ee175b93989a84ae44634194f4620a
SHA25646fbc084d694b1d782234ebd60dae888cbd0ff5db5d779237c962f91daf8a8b3
SHA51262d19b082dc9a6c41f8a936fe95f8cee18a415b1135acd0c431ad7874299b4defc76b834e12206674abe04f3849d954d8ba755fdd5839f3812c31c038e6d110c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5893abf256a459f6a52f0754890eaaf4a
SHA1d08d828699e7b77511a5d1417d15a099bfee9b99
SHA256c6532e1772d894a0ae502824c837275901c7e86881e1d968b786f88f7490bad2
SHA512e1ce3e0ef3625e6c2235406956e1bd993888cb58c285c8384093e42552a2911db706f5346e0a5236459028a333bc3969347fc8b9280df40e033d25806c81c48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7758e417048268927df271d8741239e
SHA11ef072c410f821cfb954fcf474860ddca0568514
SHA25654f5e98b752be734fc604330543372d6751e40fbb32dc6ef518554b2e9ceede1
SHA5122a4cb9c714c444271b89347310eb5b18bec6a4c207a5a7af5904e0cab29dce061c5df315ea249e82f9a456a1825833f44de4ce0602ff87be58443b90a28e0a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e924a04273076be67ffe0d08db01b920
SHA10d9b9762fdf4e1fc5d53433993c9651779c889cc
SHA256e64ac21898106c534cddd76b30cd14a9357e187fe59f8d090c1e80b56d97bc0d
SHA5125aef85ad47f36c3b79adab194af2c1878099f8757e7f51b4106569ae4c8f4d5b5eee86fdeaa1d7295977f4b445990d5328017d9284f2334452efa1b4da2dca43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51478eba9a6d8604b71b6820711096bc8
SHA16a432ab29f6cddba932ab82526db7c6e23d02ffd
SHA2566e099bd4f841d1155c95534ff567a69a2e10b99afea1a3d95d431639a9f42383
SHA512a60399e315460a0ec9606d3e99c1fb32d3e60848230f24ba061b203d13950033f2169d0e0796e33db73f0a9c9d488c4641d69aa2fa66d5d6aeb42504ae789611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914ab92b26f7455b979f714ce41f8601
SHA1d1d292fd18fb067547bbc3b73411a5413de6c276
SHA256cd0644ea21c85fd57c59d60b194b5b0960b467e70cdab7bb03df0d289612b52c
SHA51284810a7853b031b93fb716690795f294602b17e8f2d08313f753aed1c80dcaee1d1588ac2b0a833e487dece81f50263a99bf106d4768e36f7eaa52ee634582ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6884b554560d9139cc5a00aef21fd05
SHA1896064e3015eedbce452cb290d09e28671be5ef2
SHA256aab82230c1187259a29fade85d1531bc626bb947d12f88dc42c04e87a6f8df9a
SHA512e29e1e1266bd6f964d46b3351dab00189fd298a564ad2ecb9ca5379297454fc6f2cde31c23229afe48739c48577e2c8ee8b1dfc7165290337842d3208f59f165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546c14e1ec28b7b10935bf393770c2c36
SHA101d5ceaf420fe848d1ef62bc09d7caf4e957f258
SHA256b9329eb0c32fa064ca5c529bdf63307aabf6983cf940de21d91ca2563ce1d897
SHA5120d4182b1b709c876941f88b245051391d654e65dc90e46fd37299e6c29ef5fe669428d3e91db32109f06bea5faa71a6db94cd69cd2f57341dbbc51fc196d2eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ade53cbbbd559b2aedbaf50640b7f7
SHA110565bee3ae911d103a85322e90a733523566efa
SHA25619159ff50dda87f69d41c91b77dce81fd283bfd3ec42a01df39827a732dcc562
SHA51261d44e237cefd4430ba1bdae170b0ebd6d7997a94ddc70f2961c584d898fdfb99cba6b711474569e98c6590e86861d64b2c731cc8e0fc53af3a4209c3abce9ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534d32c2b0ba04d3a860083a59baeff0a
SHA14397f42e3d2fa29bf556889d89d32fe12c6b0e99
SHA25695da3e83a42a015436f1f9a5863d60a9c3cdf9a014dc936773773a5d50fb91ff
SHA5125762f13d81cd30af9bbf2a5d622fcba7a2055ae63198ecf058acf898cf580325d8a2a71ffbc7a4ffa47325b9cda446e81cbdcd8aef8a94351457e06e1e46076e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c99e93c7d6b4817a231b42c62d48fd8f
SHA1cfcfb80e849426d11880781d36719e0a34da8a78
SHA2568e6eb218662a25c3d19fa182463e54d44e4445273e7c050c98b3e812179b8bd0
SHA51227e5730be8d09de8462201ecd7d3e6f9a11946964bf230481b3395ebba47abe8d91c5dfda9e1f8da96b7a45db792e68157903143e55a34bce4a254b1f2f39bd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570ead19a23fa7a4f72e3b9ff0c026020
SHA1da01debb6be9d1f3a69a08fe58dc8d662edeb0b7
SHA2564aacc4974cb0b26df17e03efb32fc97e1d9ecb693115d236bcf6425c0a8490fe
SHA512cd8526aed92c517761e8bd0a5d376efa44b64d8e00f1555ba22694e7425ae184da7bae217353843d8f78cc756e2905e1b6832c10e2e26c6483ef108e2f4ef662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fd207ffc1c8cd0a49058e273fe78031
SHA13f63cc7a2db949da6bb5143aaf9fb7e737b1532c
SHA256f54da0440210d88cf17ac5967d46c7a53ffe09b55c479512fd546c9c14f273b0
SHA512e72b2f6009424b3e019618fab91a6ed09f8552fd914de41e82cb87ee1373e13cf51a0bb2621da69c0de3ae524eee2f2bf141193ec90c1bfb9adf0e008098435c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b