Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 18:35
Static task
static1
Behavioral task
behavioral1
Sample
470554505ada9c1c9e54cea462fad7f3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
470554505ada9c1c9e54cea462fad7f3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
470554505ada9c1c9e54cea462fad7f3_JaffaCakes118.html
-
Size
53KB
-
MD5
470554505ada9c1c9e54cea462fad7f3
-
SHA1
c1d3f2e0101942bcb020a860965eddbc1b0912b8
-
SHA256
1506fcc25d6dc47a9135ec2f7da1fe09864e5377e98769887fbb260bd1cb8e6e
-
SHA512
59c96b5741e6721ee9bd4b39d42a1e93554d0dd2ffa70ca6240433a94598e0167cf5e5924ffb14b457272c115a445d152f52df1c17cee6f14ac383f3713e814c
-
SSDEEP
1536:9kgUiIakTqGivi+PyUjrunlYE63Nj+q5VyvR0w2AzTICbbfo9/t9M/dNwIUTDmDF:9kgUiIakTqGivi+PyUjrunlYE63Nj+qA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 201fafab1cd6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000010ab0ec5bb98622027deabf7d4c7070dca1bd6a01b18ce91f2830879bef9de72000000000e800000000200002000000062dad0805d5ff08b2a61d5740d61427221203da761bb12de1d0f0e7e617f12a92000000072bd82a2a8f49330fc66c47d0080db378739139ba8505550d0d25dd796f6e92740000000ab8e94c11fee56dca02211a1b63d5cf4bc8f74de56806f0137937a36c8b6ea8008885370b0d796490c48a3d43e296c59fd7cc99403b00e430f1900a49a863231 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427143993" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5F105A1-420F-11EF-BDF4-FEF21B3B37D6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2852 iexplore.exe 2852 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2976 2852 iexplore.exe 30 PID 2852 wrote to memory of 2976 2852 iexplore.exe 30 PID 2852 wrote to memory of 2976 2852 iexplore.exe 30 PID 2852 wrote to memory of 2976 2852 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\470554505ada9c1c9e54cea462fad7f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f0f730cf3e663022498b64a55a59b8b
SHA16dcf5a6834a7bba3a86929862cbbe78e64adf401
SHA256cc081eeeb5e1ea01d6916bc7a4b7ec718e68fb487338c589f4dfad5ddca33434
SHA512a2a1b862f6cdbcd3325b13ca23f39ade068652e1d9e53075ecf4caeb1eea79621db1766a9dc23b3942eb79acebf58c54ba206e40df82bbc504ec9b43fbe9d103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533e3538b8fd24057c2d2009f204d1f52
SHA196a22382c54c9d97671d16da6394d5f08880cd18
SHA256e5b370b780c540f84cf07faf3849c0267a31fa8698f13e8a3d2e490d74d06a05
SHA51234eb0261492a8605e299b946e779fba647cbbf4c0fa645cfb3347b91f5c51858bd9a9e867297a98a05bab9be1e32630a8413d3b65cb2ecdf331861b0d9c40b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c530a617dd12deee734445b89d7da8
SHA17a8098459af973ee5430dc6bc91c220f1829511e
SHA256d6a2dfcd3d4807e1fe7f6296ff8855451f5ab50145161604456c25abc231ed2a
SHA512be16452716e52b4459d688fdc74583ce1f63bab939b5fa2c176f2693ddb39613cb0a7b26d238b8bb574a5de52ff9209785b040e4f53a08efc15d4763ba2ad377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee3894a4b8848860b29c977749225cb
SHA10532e957c54beff98c6a3ed623c2a2a164af61a2
SHA2568d25a99f53e0394c8a653c7f56f8318d0488590865c518f30afffb5ccbf19842
SHA512d81d78f8cb0347e40526888137629547bf1e361829de99e6cdb2a2803a125a9daf6ecb75f796365a32e16630ff4442f3682a490a9013994981942a2129478731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d9b476b47b82b78b292ac9f07930c86
SHA1708ff96a84ce11aa7ed8e85e0070e90131d42bac
SHA256d04d8c9e645543cdab5c4cd07ee9c6916ceb5b9f8a7e908a8ce76561bfbf3fc3
SHA512cfdc656a79094aaa1ed1cf7bb383f7dff592fbe811fcaaa390bb67870a7edddec37d435a3cc71c4eabdbf08ff0efe8420c878cfb53afd5852efb41140fbd32c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59feaeba3be2976bd2c1a9a9f77d7121d
SHA100f02e18d0a5adb08519d416ded59d6c025523a5
SHA256b1632e156fbe77fc3c74aac1f8f1ce23ad7e3b3dff76dbfc759e3acd704453b5
SHA512975a38e03295cd58b9968a1d889375c1a01ced31affbcf9fa628b5bccd7ba65592cfde99d1155e31b4ea4048dbe0053c5942ca44b1b4ea906fd8a2b8ae1bc3c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5968433254794e0cb71160a4a40280330
SHA10a4919a9220a6066547e0ac3927b8b4aacb84793
SHA256f663cd2dd36d5116088f5b75f1028a80760f2c9849baa6d2cc5e62223a603ff0
SHA512da40f6022d7661feb2983b02885a98badaa8ee36134aef2be8474af10b47ac6ff8b2d3a23bc288db46d7b24ce70d7dd83399d7c1765d909dc4927a89f3c2b416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4e2fd46e4edb8aa2ab11cced876a7b3
SHA14c0848ae5b9412b2877f395fdae1571153061eb8
SHA2568887117eba39214f8b05ffb19724d9b990b5e36f1a0f7477c7415b3e817caf10
SHA5128be53aab32bbcc531e027873597bf85d293cb8ba2f25ff9b3c7d350fc69fa9a575d24643ffc8cc12164338ae98f8ced2b0dc2cbb482d54511278046cc9ced00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca6a822c4f284c0a0ada175c20add193
SHA137b3f92c99302ae9c1c8644fd41bf3983bc46788
SHA2560876c294bf2484ad31f5b568c3c3b63408f1b3c57b47ef0b5a4abc5830cce6c5
SHA512dfda60d715b9da6ec7b66cf8aaaea55fa24774cd9458cdc9b18cd4d36e1fc011492a66fa2de4bca32f810947ead6d1271a9dc19329e23e830df0b30ef6a55c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a13c19cbab1694e6257d8e1570a7f2b0
SHA13b84267ab38609207a92b94fc91b5ab95027fffe
SHA256aeadf932af012d8fcaa17ed3badf8f31c6a1e95cd98b30786e543bd61cd65524
SHA5121bacd9c17f1244945a27f5492a5accd8ffab7c346f96b849ba2bcc50bb7c46685868022b2d7db7d749c9e58b7dd4c9adddcdc74eacb2026e2c664e0f9f80af44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50288c9f3073e1cded3e544d22568c6c0
SHA14d363fcd20722917aa0a2f572f8f7106485657ea
SHA256c75309c7fe00a4bc91a0565cedbda2c7eb07ae2558d1b9f5d102104f55ba41ab
SHA512bc40f8aa4ee41e566945f7e5537928b6a2898c770ae6d4d94cea727256d8f6e42caa68bca91bc671462cf62d2a1966fe00bba61a81af7396618b4aad8e1daa99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fdccb0eeec233dca52b45d04ff40c38
SHA11ae4f40eece670c87c25513e7e898331fd70f46d
SHA25665710533d94b556562e9d10d634546516a547db0a473b59f7ce9d68c1e7f600f
SHA512c88ef4c82ed8d017115faf1b792173b07692da6ac31a66259571cb9c62002f85e90854433177c12e1e9eaf4352238d7a0baac7ce1eda339305c8d2f222633438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591f209f0cb787dff01755efb4738614c
SHA1ab869b58cef1c3ff8d8145c5238c3a9bb4fbf99f
SHA256ef346a5d40194e92b6776b74539bb009e733b94a023e83a5d64ec104999af447
SHA512754665c745a1570c425bc0cb6d0cfa012e5be3ae94a50d40942e4c4d03d68c2d6f9b73f23dd98d4b4626f1edbe2a08a0c419ef8f691ba9fdc00bed8033c04dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e122f9421a489327a6e509afcfd7cdf1
SHA148ff7d4e49834636b5bf6ad46420cd3dc8911a4d
SHA2562684adb074ff8b6b4912febe9a93b1717b6393a3dec215437311e89f95285b4d
SHA512d72fe98c003dc5ba91c8535fc8a54181ede5833cf815ff059704de450db344908c20b5c47a9567dca33911c0cb172e65cdca52a6774a62ae27bef261a9e72bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b35488a677499ff0466ccaebe075608
SHA18e29ebcec494f0e761e4587d61aecac3e729719e
SHA25689d4454b96f5b5c72948b00c51cadd4af8255602aa7c93c5dc7cbaf4ec900d01
SHA512b3a83b6cd088ef228a388ba13eaf9f85c2a59fcb7134d0b6c6fa357e40164c31d0535e96a50863bd7d32eafa7bf9c3d902c21912e6d75d3b4acdd21f94f81e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdc290fac1942d5c0951f572ea38165d
SHA1506bf4f34acf67e68a8653f9d3116a8707d771a0
SHA256d4d808aca2168282a74931bf0da132b74d833211b6d2a92bd0eb8b5c736a99f4
SHA512f76ed0f0fe5a717d56549625aa60a8035909d717ec42c25908d484daf970b8d755bc95056906283e24c5a5cc210f9c28b3686380406323a13c938b1c7d3c5a3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5928c7409faa3ff1e5b59e9c76c2c69
SHA16b73584c12b5e8a6b3de49a3f1acce6ab030f678
SHA25613d2a9982d52928b8c11efe5090789d38c801dc6906cb2732a1bc68521a1c26e
SHA512ca5ca9a680289b31aeb13968c36e105fba020688ddda4b89b402ab06e9c14e1facdda006a2fa35cf247e5ab1e60428cd5b1d9c3c49d28f116b1d59cec6dd2d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb10ed0e0a5b068a891a96a768749590
SHA1cd25aff628283d9b6326eb8a7359227717cee23b
SHA256c0158c6bf19a5cc2a9f171a6449a3177ae739977666cf705d3f037dc64b4c521
SHA51207b999e9288eadc28c199faa8e3be0384411956e490532d1631fd0d359e40aaf8b4acf362e97bd5c1d77fbc8147d433fb5d88ed6839e7e45aa44f741e9d00b88
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b