Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 11:03
Static task
static1
Behavioral task
behavioral1
Sample
45887280d6f804c698551702c0151541_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
45887280d6f804c698551702c0151541_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
45887280d6f804c698551702c0151541_JaffaCakes118.html
-
Size
9KB
-
MD5
45887280d6f804c698551702c0151541
-
SHA1
c63287931ea3510b2cb9698265a4ab0cbfe595ba
-
SHA256
fb5616f8475ea9297168bea6b79387871e74668144ba387d53be0ec709e464da
-
SHA512
0c3b4195f8d151d72c5f886733f390c815b6ed35f4cf3f0da2bb9c507fc5df9a18138e24b0aa9ff7a49184f7ec7284e61eab96df5a86edd7c076a08a64662a9b
-
SSDEEP
96:uzVs+ux7b2fLLY1k9o84d12ef7CSTUBGT/kMZIUp/jID/MKsSqVclVHcEZ7ru7f:csz7bWAYS/IMGq/jdNcPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABCCFDE1-41D0-11EF-9CB8-C278C12D1CB0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d35a82ddd5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000010f00621f7c34b61d94df423ca8dd0af45828081ec49fa804aa74114254868a1000000000e800000000200002000000065d619acc872e55f8e9d74def831f14def3da3532321cd18f7ab91a7a4b311659000000070665e8f930cd26235b5792a8930b0727f51449dc0dcd379bbdb3d808ef9c35d44c22f7c1a1021d2364f7440a07c74220ef9ee40c8b9483c25201a561a0fce2dd796afce49efe38426c9d247be52b131e8e9bd39ec35fd1799fd17a07956dc26a6d9fad1913018b6c5321da4def24f9b650129741f3037ad96a663d6eddae45f0741ad40ee851a0d20791e42140b7f8e400000007621f48f87437c76f84015231b1fa9adb7bbad187eeb6673e0dfd7d75bdcee61d942ff0f86d48549030cae248da0331a5f677ec559c552bb416540c4a3112650 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427116864" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000006ab2a960958f324b98eab18e02aa3023177488d4b1664dd18b7ffa7201de28d9000000000e800000000200002000000098a72a7139e050d3ca238e42bfc69f05b96cc8138aa199022c8e2e1d2be9696a20000000b6c35ad3f9b961dc0fb223e1cc421b59d29938ecc5dcc9ac528d5edef67a00514000000008295c99899058a23f5b988ffd2c98d072459026397c2d9a4d68c2c3f6f9c6d147256de3f67cb7c0d0e63df27f74a726a9963949d69ed091840737231dcd24c1 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2404 2120 iexplore.exe 30 PID 2120 wrote to memory of 2404 2120 iexplore.exe 30 PID 2120 wrote to memory of 2404 2120 iexplore.exe 30 PID 2120 wrote to memory of 2404 2120 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45887280d6f804c698551702c0151541_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5722f8f05679124ae23bc7cbc5e88852b
SHA15ca6f62b9aa1d3684d76775af3e7938a9597f47d
SHA2567e0c84c0d0b41b78f139a92f972ee7671341b88c6caf6c0a2439fb65f74e6e01
SHA512b1072903394cf9789f355e2ee4bec84529c4843539485543d268fc104a836475a50e8c0bf6b89c6fc1051f059a130b6308176a981fa8b86fe08f5aeb45f51d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bac04bfb4496e8b2325bdf7096983e65
SHA124612751eedb44e037c99982632aa5778da19038
SHA256903c57c71a9446a46e025c68a98d468130fe90a80f2458e271147def5463ee99
SHA51298e19987b74ac0422327ebe0601bc0226e021dee32ddde3a79a5d42ad3c8ee25f12f76c134ef0bf76ba03eea08fcdd77c985e136349310d844ffdbe67d3f87a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5128b173de8c63c1827e469e6e4f72ee3
SHA1debfa42da4e6746ff2e4898034a934533df1d250
SHA2561e7316ee851222f94bf860928fd64820c5dd4a23684c77b8c3cf23de73444d75
SHA512a68a3c01b6e2f52482c7c36fd040aeb452ebc30d3aeec63caccd086876095f8f6fa0f92598a5d131c1d6ef7b2899b3aaaedb230f808cfe517ae54a645c7392ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b72d3698b3b6c83268fd44e6af9e01d5
SHA10735cc8335146cf887a262673d7fbabdf4d4d971
SHA256570790328b740cd0dbfda17ccc334aebc73b62f68ac34937f53da1173e6f53a3
SHA51236f84c8b1f6127ff37ddbc78722f156253ef9df5023e06165240127c6829d0214aca13901629e7a1420504db6910173186f3e18338be49d3d7e134d840a1d512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54a16ff00c0e0ad70e4853a978024d87c
SHA1d7688d811367147facd8ee6bffdd6f292b4a0271
SHA256b91552f8fcf09927254c71da784a8cc86aa15afd00ad846a6e2c879155b18549
SHA5126feafc6e5e83775de700ccea303f5ad3792caa033ba9dd9177dc64d5aec20ac59f9ae8bf07b0d811e75563dbd64a40d4edb2171682d521524064f4b09a860059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c6897a1d628d6e6467ea4eba7d8901df
SHA1ea5dee8cbc707d3026d8e950ee1875d075a0d7a4
SHA256fbddef68656ab5b1468e5a8cdaba9e6438db5e642c93595730f9df8a9a641f7a
SHA512380722ad35db7a603a6805e659d266fb436485635e2338709b1c90f719562bfe2f5a997e33ab557d6c1522a27a0eb9490c4045dcf768e99d9b642631b9982a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52b70cf47b429afd92744455d5ba1758d
SHA1a982d76e15b97e20e86fd23b79cd3dac856a56b5
SHA25610b0354a14bfc849999b9b874a050ffdb37c4ca1020589e8c9e529ca3f006a31
SHA512a70aab32590db5d84906d4e6b50cf3a33f62dcd889f4b414ffa9445658dab1915b5ebe1a84aff3467c77a3cfd4ba88529610df7258e8b83aa5c94d6b3026bacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f8bb855e8fdb2e40ca304c5295fa323b
SHA16adc2ff227ca6276974ae112dafd89d5f961629a
SHA2561c20c5621d2259eb8addb8a7e2c8dd1191b5e64864d03d31cfe1ac17f7f18687
SHA5126a3c5ea855f4ad2c5fd5b078a2ef8eea365605a9ed193e05059997ef45e470dc77e9e094a4a889fade0ce7ea1a89e22b9d2e1a67fadae8f639c73303ed5ce31b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cc1ab71644030220f69bf5666bc2ab84
SHA1c4abbf17fb6853f75c49be1b332b3d6d2945cfd3
SHA25646316d592e25c7833ae6a68337dca08f2c364b3aed2556c6986493616f2a6ffd
SHA512e67025fe3070cf76f46700f50e6e3960d7d72e585ae95cd31b11cd2856eb65330a7ba5fad593c4609ae321b1e1b6ce4574d738252cb07ff295f3cf5a4ab09448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52dc5bbb6b7e4c1375c1da50ff5ee5fdf
SHA1f48929975e35f449db5eb407e693212a335df898
SHA256536de8c03c354fafa0ae3d5a00e63834866428db1ada276ac83279dc11e262df
SHA5124bf0b22ccaa38c21ed0c7f8509fafe1ed591cf214c840a65296942f7a76435156f2892c02bffb7283a4c6d376d815978277ab2ca3715891a6a3b59711952f80a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b7e46868a37b07489eca6d261fb525f1
SHA1c6f2915c988fbfcc3a7436c0e3f4dcbbcea31a77
SHA256902fa288e0bdf426edf27aac8044374af0bc9485397ed74140faa318f41d5837
SHA512676fd0fe99b604a912c4338c6b2d11a1d8adb694c254a4774f283fd85a87a8d195d36d4059fe2a0905491e0127b873e08578a7d6ff64627754d1325a88998aaf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b