Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 04:38
Static task
static1
Behavioral task
behavioral1
Sample
4840c39f8ede20ab9e2bba3599ebf0f9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4840c39f8ede20ab9e2bba3599ebf0f9_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4840c39f8ede20ab9e2bba3599ebf0f9_JaffaCakes118.html
-
Size
26KB
-
MD5
4840c39f8ede20ab9e2bba3599ebf0f9
-
SHA1
ddff5f7a66e04b9710181b1db5c50c1204af160a
-
SHA256
4261599d5c4ec70486308476ea5b08b86f8aaec01347b2c685001ebc40757bc0
-
SHA512
d94a6b623cb42f4757c1e205c2f7a146c2a5fb98e2a28079d2024c4ceff2f2b7dc927ad5300e4c1dad446dd1d6ca709ff1a31adef82cf316b65ea4f25e42e2b9
-
SSDEEP
384:4+QfPFd9QZBC7mOdM4QBKfpC5IgSnbmFe7Ac5s6A0kJvAgo0iaA1Pd:Zcd9QZBC7mOdM41pC5I9nC4GIP0iaGPd
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 702727f070d6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427180186" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1AA25601-4264-11EF-AC29-D6FE44FD4752} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000004ba3ebfaf544d7fb15673d96debaa8bfe20d0a6cf723e23c51c1b000dce25b66000000000e80000000020000200000007bcf143baa59331e8cb6589b9dcf3321e805511c159ce3498659ed64649067db20000000a2de7770928e1a1510a4b380f75d543014bfb01c0fc80bc4fa0dfca3dc734d954000000008354e49d2b642f363a135c366d6b6738389b72b510bf415d6badb310bb54cd521200190393f1acb07b6ff31abff60e35ed7d02c40c029df863c0e1465fdf441 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2680 2172 iexplore.exe 30 PID 2172 wrote to memory of 2680 2172 iexplore.exe 30 PID 2172 wrote to memory of 2680 2172 iexplore.exe 30 PID 2172 wrote to memory of 2680 2172 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4840c39f8ede20ab9e2bba3599ebf0f9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a62762ff4423e4f86a020cd1609002
SHA1175c11f6803a1e1b1122ed359f9b91836b6e5da4
SHA256b55571057edb3fc48e7856bfc7c85afdd134663f521fe457590399e1409eb6af
SHA512347a49842b4548f1786bf876934e0d00b3e48565ac8be2ee42c6fc9828b3808ee1091ea5913286f24da51f1417979df0b2d4fd380d4cec56a3b4b4a87d676f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7d5ac0fed06625b829f8d884d876bb
SHA1c81b9cbd3315349e2aefb840a00a0ed595363b96
SHA256de1c9a00822b098253d2b29d8b9a38370277c84b6dd4b5826238791a6413ced3
SHA5124ab2140f73595df70730d063a0f3c331473354bd1e6287dd5b22b5a999accae943ae6cb5920ac3dffc8a01248d088024370955cc989b63cf9020acc6115c59a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dcddb4dcfd0746dbfc55c86f2c39806
SHA103377ce884a2fd1fb3f1a7a85724e3e6f80224f2
SHA256f95ea6bdf3c1f52b7ca0c53adaf2f53272f7a39f5d0c99f6027bdb6048756403
SHA51229439a2f307350d4fd6f8cb64144724fee09ded60d2a03e2c9debd157da098436ee4558194c67fe3f24c92627cd4d1d4a40cbce090b1aa1396907f2b557e0d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d9067b77684cea93c8b676c42e361b4
SHA18cb2d1b55dff3a38a5ade1910713d983bb324fe1
SHA256da4a7f21c841d6c968ae25a12c2e15cdfd7976f1735bfda5a4e998d19af7e60c
SHA5123b7c338d454d5454318f0bb42dc1e3adbd3e678f4bc437f673df83f54b55621f429f12655a6995440993fc817c36b427f2037f7862cd7673ec05fddd812051c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568a3fdec95c542ef3df313aadc175d5f
SHA1193d3716e8b70164f6b465f6da70f3dd5e401a74
SHA2562b0d1f0562ece9ecebaf457889d31ed036a8c58564953592bd91a715918f3829
SHA512512b8530c04383de41cd68c62727bc23b62dd1f4d92de36801ddbfa917e03d0659ab2ea62c20a80d004e132815ed058afc95fcf4f288df9f3dda6d02c4adb439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ec5739b7d3217ad3b4906cfb50024b
SHA1f79ea206517ca07d64afc6e4df26d61b3a15a56e
SHA2568f87e6dcf180595988705eb3bc3193a843ea4569136cd953bfce7175d0e58b9d
SHA51228bc6562937131552fa29becfaae4da252acb8f9c1e21a11d9d32a57b62299e39ff83ad9ac47bc85fa1bb252b7141102dd947a064c1471e400fa5fc0ec56be73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c11f02176ea0d490f0dcb91e95c83f9
SHA1d05e65d0306b639e38a1c5ef26621844f4493c3c
SHA25674e65f9ba7729c34ef316d3a6ed281eb8020a34577abff73d94268eeb93b048f
SHA512a275229c425a52fca7bb0fb0f282793722120090f5efae374025fd1554b4e0aeedb113ad017645c292c3d2f2405a5c52113c0c5aa4eee4b892c18d0389cd3300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdf2dae25a2a4df8dda7529374e0bd9d
SHA11dd149aabd5df2099c65c1f6e8ad4313c178b67b
SHA25607295dd9bf1382708491041ed3c5f7e8a0b33fd6e45467e1ee82b7df2c46c370
SHA512481f7f78132ba67bb324d6e8aed5d49c8ad8ed1ead3296439d23d1d2d56128bcfd72a2ba624c7d8654c1cb788f99e7cec0b0d351ee047cac3187d3d768906e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb654ac8a015a9fa91a72926a8a7cd52
SHA1a8c4172747dfffcf76a721d24866f74f88b49899
SHA256038fb6e5086fd6576d1463065cfdc07a0b3f02ec5a9d16057798d88baeafc7b1
SHA512ab48240e2c6ba8886a729c7cb8cf23acbaf14cc931b5d218b12964bf40a8c0dfd450822548c11de4783faefe1f4a53765204f8ded9ad68ba5d383e9b0d0e26b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599df0f3bed1e0ffba39b492f7a2db46e
SHA1b236daea8f29916ac86953bff34d58ec52ef8d27
SHA256acc16f8033c38826a20406661ecb7df7f8ba00faf385b71368d4b59c969f1802
SHA512342f1be15fd2e485ca80e0a644500b4f7db036873f758b2f703d7e6daf98e21fac41eab07093b9c9b3fe198ff56443649355a4de4f0c2a326a03f7ff9e184f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdee30f471f521a83549e3454eb833ef
SHA12019181308338e8cd4b3468ca24ee1c59c8b1c78
SHA256eb01ef02178b1a2d8f513b54816286e7e7e21d3c2b978ceaa51538f8ac15e4b0
SHA512c0619f92ddec62911da0cf4cfed8bf0ee83829d4b570a6e5fa515e23a5ae346220be77eb7cc21feda8214c5ba5f23d8650f1bfcce93c9a901529e3b96bf920fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530c9cc75c932e7e69e8164b290d2e4cc
SHA1b8c1cc7501d3335c79e7c236025c1a84158fb13a
SHA256195cee208e00c7221a52a1073ed0ae0257aa99c87f13fb85225888e09ef0bbb2
SHA5126ff0f5f343159427a3e43a620a06d7a7b7f17e12feb45ec3662f0a4dfb4199db2cdb39500e60c6e5ea1d52a67536841b566ba43a0873440c57f75bc278e72043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52387e8cbf842d0c9e0df9f0afad233ed
SHA1934b8e24968fd1b674cd90e462e0857bd3d4f1e9
SHA256a78ad6a68515b1c11431fdc4f2ae8df33c10cc88cfc4c5e823944676c87edded
SHA512cb428209dea7494488b94ac1c610854c4c72bf231622586c1c568451d38865ce3a8e5ddc1d6cf64356b445c8ddfc85fa994fe371705343d4e9adef7d05e4ade8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51261b43960887d3962994641964a7748
SHA1962c5f12d6fde303b0821c8e9dbf56b8242fd21a
SHA25680fd0f66cf0d8f0e666711af35edded1aae5d6019d72c6b1c2fdeb35dc399733
SHA512bffe5c986aa8e90c81356ecf4a74db173612cacede3f25908a6537600ef542953a7c7ccea2786c295cd89b7acf3fd682d8d3bc5b86455edcc6283b17642e5c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547d0cb669f84686778af06d235e4c912
SHA13eafc43a2019cf933711b25d478dea9ab52244e8
SHA2565fdc3486bcf4738d1eebb275ea6ad9358643f2bfa2fb65f356e4d67b0bc5a40a
SHA512fd6d01ceb4970211784570c08f3fad081703ea7d765fdd2c8c5e13f34dbda9044a9ebecde126ee68037b5d2214c142d024ea9862bfeaa82a6fd86e36b2096ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587515866122393e7b65b6e238eb81348
SHA10d8337422bd0948a349a8be38efc16099af996ad
SHA256ab686943482cdab7164b26be2a990a6fd04e5918895c85d9ed6cebe40236046a
SHA512be6454e5d1643441c4bef809788f9ef93adeceaf31e12a7248aeb7c71e2af8a410eddfc7d2f83de34ac13d2a28d73362c3ed2d922fee0bfa32d4b30a489eb6f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5369e87cdeb0a08ca585660abeebafc16
SHA1b794eaef428f3b288d0399825858be1da1cf6cf6
SHA256ee5ea5706a4d193d4d83b133a5812e9cee339e50a37234563a61561fe2a1b9ad
SHA51251864fde46ed9e4111c8ed5a51278b21ff6b6231daa1bacdb0e93e41007a1a0d42122a3302f524ef9c50def7a14c25c4adf0af086147c4eb2a28c5dca3ddc0ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a4c713c420ece91d9c8fccbf7424c2e
SHA130c60407f3808eb60d9cef9783f94c6a15cb74ea
SHA2563af861ac0ccb09a4e6cb980e43f90239287f1f199b0a9f37658b45197e18d092
SHA51216b4a18527006f262a397cafbe6bef466dd85a3517f6adad4b71e2c43222573e4b9d1b3c2b1388e9112417eb7a84edd0689c587db6d09305ee68b7996d6cbbc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b61874653d09b1f54ac98bae672b6da
SHA1cc5ce19af3b5b96fe9365f4a320c03648928217d
SHA256058d7f7b1830d4318d536244dae3a6b75c914919ec9180c1c2850be3b73f310f
SHA5123ec828e8f833c88b8f55ef89a68aed7c52afd2594ff856458c9b781366ee040253dc05a5f4a26ee72f709b4eb0ce6925a2a5065ef07fe85371ed5e79a955099a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b