Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
47a714c549617a1672ef6cd931def07f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
47a714c549617a1672ef6cd931def07f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
47a714c549617a1672ef6cd931def07f_JaffaCakes118.html
-
Size
88KB
-
MD5
47a714c549617a1672ef6cd931def07f
-
SHA1
2a8e769578a0622ef3e03c5fb1dafd05cc02c473
-
SHA256
d284f2bfeaa8fd4ae81961ee3b4d823a0d36619c2f98d6ab79af4b745fd0955d
-
SHA512
59c00a7f50d788192ec6a991218f1ac69615016a33e19f5f38944a732af8c4abeacc40a30e88c2c7bc85e57d82e271584a3a07c05072a8480d045b8b41fb27ea
-
SSDEEP
1536:gQZBCCOd/0IxCKBph/XsMla0bO0dKBofnKX3AxumRYa10qOzE01LXR9UfxnM0KV5:gk2l0IxWPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000983f13ea3aab28b65a368ab01e623e7edcd30e2cc256a841e4416c89b9f46c16000000000e80000000020000200000007ce584cb86dedd4139b9ef189e7e0730e8f36457c0964d5cda4a8e78172db30a20000000f44f46a133704cd89119cfdebecf6a605544f92bc1147d20ce1fbd928ced2f6840000000071840c0b8912cb455f79b9c2bbc99de596f585b4df2fce5272037c33558257456a1a21d8e6b11bea7d2093ae101904f3a8240abdf41ebca639b279b49933abd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427168847" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4AEE7B1-4249-11EF-B9AB-7EBFE1D0DDB4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 907da38b56d6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2680 iexplore.exe 2680 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2080 2680 iexplore.exe 30 PID 2680 wrote to memory of 2080 2680 iexplore.exe 30 PID 2680 wrote to memory of 2080 2680 iexplore.exe 30 PID 2680 wrote to memory of 2080 2680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\47a714c549617a1672ef6cd931def07f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1c56cd334a0ff7515ae45b79438343e
SHA1cd33b5631cda9f6a14af27f749b220d93ece094d
SHA256f5bedb69c4e29793196320d8a6bbb0f01f326e91eb5a1e74392d1766bee526c8
SHA51264951dca0fd1149ab1bf1c3f5ac48849aff16c0e67df753c73692b467dfbb2a2bbbbd3aabbcfe9fbb037d3b1ba757db009e97e0d59c1a0b0f05878dc69eebcb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523820a0c962e64b49f02985b0825033e
SHA11ce9f28a6b62d438674b32589e92014606d71d1f
SHA256651cf7afc60c32ff36dea4de98d688eeeb504c4b4cc8deae4448461f9cac17b4
SHA51254f3287be3b65a9c1f2747afaf68e07a5098263ffe68049567a5617e9132b730a863c6727b4f0a1e9540d4ba58d0d90f2352f2346407a85bc9e453375ce3213b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57745a816a1a088aad86560e9fa3c3f82
SHA1efbd5b036be53e7cc0505c643fbb40bd97e8c7c9
SHA2567918666b0d87ebfda83506e12c8d57d43d8152091f919a64e1985d8762c2d526
SHA512251e257ac5e932351579a4e4f69d2479c8b6480a2bc9cf44b8428e90baad9f4d38c7cc62ffc2e68cf35e9e18e4e9abde73ae638ebdcbd26994e10673bece362a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5073e3b5afe6bc79b5b442c26e78537f6
SHA1d633bc11aab368ac56ed20540ccb3616810c9bd0
SHA256101585e281a1f38a36f57a33ba4a7b946621a48545cffcd7c77280c6ce7e2a9c
SHA512d302b6198bd0e2bda5b5750a7571f7c098fb7cdf94ba70cc56b577274cca1ad77464a92603ed2aa017974bd9855594847929b31e034bd8b35558e3459d0e1ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ed325c6615790fe1725e0cbaed78df8
SHA15fee6c0767001e6d4248da047ce13b68a457267e
SHA2564fd8fdda67f4ef34d5d0125a770dfc56821e1f886ba8dec49241e25b45ecbab4
SHA51241ab6a05a73fc96b413d8a813c0292dd7673926d57fc22eda7e06f2d4a43811110cba615a4ac6b8ef39fca360a11dea25d04b81d6e7292314bccc441911bb279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f6b7fdd0a156328b571ffcbacc9e7ec
SHA1480ba8a66efb5ea5a6dd4c89ce58f94e4acbe668
SHA256907a32e06db42ad002e1159e1ad55a7f907dbfc50976da1640e7c55826a7943f
SHA512e3022e95e913985f947aa9d603330afc8d4c2493745c02745205e041ce3e3de75a1e4a37e77544f8342b5b6d328fb8603b0f3b6e4d66c62ebf92b0a6e53c450f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594755f574e90945bd28c00867513aad3
SHA1533859e832dcc27027293dc38fc76b1a18e400d1
SHA256b7a2f866108f6e2b7fb5aab088c24977993ff88f8607191ec7357a80862a86ab
SHA512850747929f75d793bc2342b37e1e9cba2e0c8de9239a7bf892086c130ea05411d1694f9c3563868ff6a5bdd461db3fc9575be555976b2b95736496b166f42008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe3a7ae797b7ecfd7344683db778517
SHA1ee9747fca7f328d25c535f1287fad29b08f93640
SHA2569088b2eded73baec586a816e3918f60ef9e82b31b0b9c3f014c4ea780f881d0c
SHA5120e2aec830f338c5bf8566a442a61c446dac2037abb67a57de0a9c2daa03a1c3821aa41ac8497b30efc50a21beee58ad92963417fc3039c52d8b4808dfb5f9cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd501550d99e1798020c3c9509f0d61b
SHA1255d6f2ae007ed52bfe0b2d8736b76b5c6e35178
SHA25682c31a9b486d3df987543de824f05f4a19d152c32fc72abd88cdefd429876878
SHA5127277bcbc110ccd70029c2069e863f5cff9ea65ec6c1958dc728eae30f7007efa59020b524980656bdcaa445feb8808a38598d46df9f6e009a349863087404220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526e85bb8dcd1b63ce27b3300feba12ae
SHA178755bf093a19386910f9790e46d1583f7a828e4
SHA256b24941b721fd4c3a872a3125ecd7c5187476ee00a4ca7b6eb0cf8b6fda7954bf
SHA51289b04bf53523653ff52f464889cef4122123d447939fdf3349d56628c2256f76a50dbccfde7befbe63e25f75cc8458b80b084a47e8499e53374a6f5f1554ada4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5370503f0e076f684bbca104d5cd6d13d
SHA1da577ab7235819259f448dfca4ecdb6cc7c1d58d
SHA256ebbc6db0694d32c25c616f88db5c3dc99d044cdb834c58255dcf10846d5ff7bd
SHA5121ad099613fc61e31960aac012460b0812a403d9464176ac119e700242a7fd498675eb3d6d39b74c3bf6189969257f4991df1cc351c83b26afe6f64ab2b6ad91e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ec6231ae7c5a6c4d3ffa6e843ab875
SHA13594fc2b4aed529a3843944d4341675a4f7ec324
SHA256562aaa5eee3ba7a2948571364c400121103c6d679241152d5c41f40d234188b4
SHA5129c3bf097f9a396dbb4f17c8d8f8b3af807370dedb70de1c31f73291d9f2788a7ddaa62e28d2569e5feefbe99187f5d4c65e0b9d5925a743c0fd56bd85b206355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ffbf8250064bcda962e6f50698b9c1d
SHA138c61435590a76c72b79e72ccbba448b98e797e3
SHA25656c9386d18d42c7500483cc9b2798d12d4cb44e2f822391411a1add363ef7823
SHA5121195c16bcf1c75e9a64bce7b1d4e94586f528a6ce6d356180a670bbb3e664a770406b59f304220b097ad2e30683a752f0428ed7bf2b7b5dc238128f1ef5dfc73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cced6049dd38b92132c97d47877d3cb
SHA1f739a5f939f6a51ea8a941f8f9ef96224a0c9129
SHA25665b7ff6e79a06d8f5b723a4b557df93884b22e6b4d32a2bb57480a78833ff49a
SHA5124a550c6ad8c9e7eb44ba7300cb18b14725caf435a4cebcc39ecc526a1890f8af118e350a02a900d6f9a7412f3a63f0f90d02a46d5e1ab71faeee6180145a9403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f235547c416776030c22f55f5f754050
SHA1019d81ec53ba0dd101fbe0292b681b356ec18a36
SHA2567b150cccffb9b846f68b87bb547098849b391c599976fddb52fb9d703ce4a484
SHA512080af6bb906a0f50d299a27edf20f50fc6b9dccaf939f57129ae20fe686e9a94713c4697e577a6adebc59f3c9b4f2c970ea8058904a855c2a4ebdc80f499f83c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593cb35f1542a507c7098e6b98f357d7e
SHA158e193a04d274451fe596158d5ec4a65a4fd34d1
SHA256fa9ccab5c76deb895aa04869854e18ac46505b550fff33b79eab6a98a2036634
SHA5123cc792d5acbbb76665a57f7984af2fd8b88838e1e761fc4448fd6bd6cdbfee3becfcc53117df9aec89abf235f2a3a68a660e69294d7933c9767677c5a1b09aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de7a208336d27f5fabfbbd61633a08d7
SHA164123e9272937d9f7b2366f2b30a6c7a5b0f0629
SHA256b9b1de4b515db8021451ea5c5726042e86d10a9639c69082b7eb76c280f3ebfb
SHA5122363a2aee774544b735eabc4bcb508eb065b28c5451998f8657357030ebe485a36ea7b9cf46eae2fdcb960ff88aefbed81958b099cb099ef4072b40c8aaaa230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53372efc1856f68f9e446b104ffaa9fcb
SHA1723f00300d16e4296181d55567d3a8ffaeeee175
SHA256689ede6090b7bca6a709f17ebc0c4e491f3e59a2a7f2383f3976077de40c172b
SHA5123c175b85f805cb5e59f968ed0b8c16ffbd8fee2f1ef0227ab1956a591ddb5cf3bb6f319366431048f547e27ef8e4f11ba8a4c4f51e2b39d66b963d45c986b966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b8406fbefc64c0bcf86ec48304a7801
SHA1f256eb22d13daa13046474bec5901c91784ac441
SHA256171c25fa2d9ab5a6925052236e37e199e5fce49c23b977d2f3537122301af191
SHA512f8ec5bffa0aba08a36a3422e0c257a7042d4aee2125ff18186c16d39292a853131517c9f8936be10a44cbefd97dfadd836cde383f84915371949efeabde3d805
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b