Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 04:13
Static task
static1
Behavioral task
behavioral1
Sample
482cfde4782cf8bd379dbd5e3f5625d8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
482cfde4782cf8bd379dbd5e3f5625d8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
482cfde4782cf8bd379dbd5e3f5625d8_JaffaCakes118.html
-
Size
11KB
-
MD5
482cfde4782cf8bd379dbd5e3f5625d8
-
SHA1
913aff573599f3237e4d6dfbd6ce5c07ff2d905c
-
SHA256
b57cc45b0a2f176d07879e6ec51c6c6dd73fc6dd53f1e1e41d78528e19703325
-
SHA512
d1c7b240ec71d96235b1705f77ced1e413b48d73c5fb074111f237fcfda1df81f2f7826c10348de406956933971b42fb4ecad397706c7efa853623027c3f039a
-
SSDEEP
192:SIDU8FTpF9FENTV6yKqMjI3EwuyQzUbrJy6hEcZG4C1Yje76RTZRQ:SIfLrENEPwuyQzerM6hE1+eu2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D28F741-4260-11EF-B0F5-6E739D7B0BBB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001354736dd6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000babb0579583a5b6ea6c21b9c5d28977b62e28f812ece9cd85def8334a3c4fef6000000000e8000000002000020000000b92f12d7ec6fbca4c2cb3ac798857a58ac3f0cc6a3986717a7246b81378a1ea220000000e3f90d830f20d13d0258f89e32c321fe9f44a3098bf50b5f806e05e8b148816740000000bd1ce14888b7ab4e6177002eaa3598f21150ca7412804330e93acc3286a7d83e5c71700e0f89bba66078d527078b344eb85ba21293bf1bdc8d401a4c7ad470a4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427178687" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE 1044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 1044 2468 iexplore.exe 31 PID 2468 wrote to memory of 1044 2468 iexplore.exe 31 PID 2468 wrote to memory of 1044 2468 iexplore.exe 31 PID 2468 wrote to memory of 1044 2468 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\482cfde4782cf8bd379dbd5e3f5625d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD521ff59dd326966ecdd75650fb9617378
SHA1ad6ec97083feb92670e48321eaafab3eb2243629
SHA256d3bb2ee54a820914c9c5bde088b801bbc788243553d37473bf19424f0b7f0bdf
SHA512639ed36f60055d75ab2b7fe46367759c80ca35bf753d5c67383a51fb8f7468f4b49f1de6a07d9ee84e8b2ce08d0132bece8d94a78fbad7ea8031c16bc785dba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58b66f9f7f2710b3d6f4d45265319aaa6
SHA10b46152be3779fe7fab66b3b899db7d0a9f1a3d7
SHA2562bb1fe1695d454c108676f267dac1b49d40c6cf3f43b42dc4bdfc40a50e9ee1e
SHA5129eaca174f29784e5f500a124ea6403f0955ddeb1e188b2969e19af3b3e7bfd1c70ab81af3d65f4b8ccebf8acc9bfa89098dedf3c17f67aba418135f2a04454fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5709a63789ee978f2b41dd7a565e5a5bd
SHA1b8817c5c36f21fb19bd5dc85e59ad120f67ad1d2
SHA2563485febef515dee875be91f0ef8e6e8ec9a4b0ec8713d96ffa463539ec1a2ce1
SHA5124859f90770a442b3b94d3c6fa36f3d55f757b39c2b54f89291ef853d5337ea91e8faa207a6cdb9945772729c281f4166a41affa2db0a9153a49d409c22269643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5371a0c69ddda1bfe8602467a519573d8
SHA1784244c12df8afea6400e5d8e1249ff94fa4b3ed
SHA25663c2087574c4806942f11ae9342c9de1d4a4f7882c4c185b3c3bb5dc33b0aee0
SHA51252a0d1d2a41ff76a4d1b63b5d04f2525458bf1b285017eb27db639c04e06b9347263577a400b8a598ec343455af78a129632447da60ddceea71130ae4aacb6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD593785c49b9b4db8c32a77566da9a943f
SHA111be1265b853f83a31c961648edbd36614dce048
SHA256a9e2adfa4e68fc207d5521485c2ac7c60935bc95305854ad5040133dddddc7fd
SHA51258535169e9b1510dd5e0dfdd4e84d9c2ec43575f8e1204b4470cc813cfea3191a59056c855b7422d1edffab59ab2a963a6d2d998a94d7e392778e01b70a3da90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b98e8f4efc3c8ec5365b4a8e6bafc4b8
SHA1848fd6115979c068a6d18182920a8bc7814ef250
SHA25606fe2d6edaf2a846bf1cd8e62c4acfa210a0f7176ab5626385ebdd7f99b73296
SHA5122a39d97205fb0ca7e58caa72c61ee8b88fb31931e3537666f5e71f969cbc5c30e148c67f38e0b66f2080a7a361a540b06050e41575ede5f637e5ee50743d95dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5acc808b787f074dd45c1c1e8cf1f1435
SHA14fafc742f964c7b20ea999f3a423cc3242c474ba
SHA25672540f5cb0aac77e6e93f549a543efee028043c06bec07eb22b0192c23e16901
SHA5124516bc0acc69dfb4eac2a308eceb57f585eb170a2c15328176eb6f3b903669a6761963d2a1e514dd4a3f14875291d44e0f7db26c891e4ab704340c1f3ea6d2e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57788a0e060a947e414121611035ca21f
SHA1421e9ac1787c7cbccfa4937fbdf6bd5e1472197f
SHA2562066ccb57501c4c4396cec163cf11bc520f864765c79795acd48f9a852b3435f
SHA512f4f65a28d45ddd33cc35123e8bf34e997baaf1bf95cb58533b918f84070428d7cb76afc1efd8ed6f6982309424b6c8c6d9839f4fc0191ceb67c63511c333eaf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5693ac3651947e319fe5099461b1be355
SHA12723f6aa5bada7b844edf534acf444ae20f99d00
SHA256769ef0c98c067f35cba58d13397090c2418475a4ed922cc05c59c3f43f37eb13
SHA5122d25b9e2719bf160312b43cde1d4b44128ee049d6d5840b67ace47394fa37121fcbd9563d60c55469570d8bb5460f52d4ada39346fc087d9ab91486b5a9c8b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD534973d9849d0c038edbda49a39aa531a
SHA152f4f604b0908ce5bbb05d461d5b918ac59473e5
SHA25653ff9a319fd73a0734613908bb6ff1a70032e9b977a8ce6aeff755a32ded3b4f
SHA51219ae8197f7934d4c6d688824f456716b376bab94537c7fc1d5bd9380dd06e89c4293397e977f54694e2ffdbd45cdf34685fb9fa1ccae26d115474eee18db70b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51c7a7c33e8f701ea185237b3f0b1edb3
SHA11be9d371cb28c2dfdd14084efc2d01f1cb70a972
SHA256040d052bd7823b28a9ffe2637a9ea03bb116a14ca417bb8ae7773cec7bc43ced
SHA5120eb6425a6ad2bdc5c5a51a2fd1c246d02d584ec108f7811dec8bb57a9d698fe8ea899282c3c8a90664a5afcfe108796f6406d86cf4085dddd5edbf2f80a22ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD506c289d879b434012430a7c0c543bf2f
SHA1d0d2373e007664807d050a8ea30214bffedf0b6e
SHA256c2f3def44e652b0731c492ef0eacbfb315d0d55703e5aadd71f27eaa8d8cb758
SHA5128a77f4baebfac8b5ec6e7d109d5a70ed260f70a4202dac509152cc3cb252ef7e6e52d2618bc524909687451ee1f836136a48823273a9b035f2fb7b74c7ba215e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e1697cae40283123dcdac19b36239dfe
SHA102d8a333e2656a8897e960a785385fded1f91ed6
SHA2560df5f655fb46f7245cfb83defc22ea9da72c5fae00d74d2be080769b296eb408
SHA5123bf9de947eb96692c887de122b5654e1ecbb5852c5063482998f843c3b7b195c9e7d0f11028c15cfc9091777fee97744c0e3e6c1f24a7c83ef5161d49b5def2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55c3ffae1aa26aa377b5e84ac214768a7
SHA1f567060f1c85a98b65daffab073c0bea760e5aba
SHA256e2fc3b91f702881e3c5e078048efac1961f374b9e0dd30e2fe0875d15098c49c
SHA512b0fcc2a6840707eb287e6d6d16dc7daff1894818e2268e510fe3417373086404f96aaea578915a9509f78fcbff444a204d9fe16afba9b5c5934642d58b8101c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5de29815cbbf31c9c303cd79bdea55a16
SHA1adef7adcd3f31c90ca4acb18ea7c3e84331786e9
SHA256cbbae6171d70067e87b7a23a2ea7d105d05384e7829d624a29bf6c4c58aa61da
SHA512a2a9af5461cab897aeb970acc07644d1dfb8f1f8771191bfd1f7045d8fb0d1ab8c1a801d28239464d6020e179d92fec02b004fbc10f8823cf5eba529c2061772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51a9518b69faafb10406aab6d9575dfc7
SHA1bb46247057408ba6b630bc5831292c2603235ea3
SHA25620a170aa3b45eca9d6560a6f0ae6a06b57ff4dd832002281ef793226dd84711e
SHA5123640a50476d0c1e5597a61537eeb8547546900d0bee527b818dea045cb1d2e53770b6ddaa2f5ac0077b50b8ee341194a37f7c5b3f6383bbb95b8063685f6462f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d038c9b614caf68f9a21ef8fca57c9de
SHA1472e02ed0562e2331001777562c5592d08d3cea2
SHA256ba8a6f5e6874850709bb77013916a4d843dbfa09390cd36d240927cd26cac086
SHA512832aad26139b59f5635a48982121ebc59caa32cb365bc00cce63bb34e3370b8b37c59cbfc5ab07c2e87f047b2798047d000093c301e7a917d7110a45fcd4faab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57a869456cdf3e7f7219b8c8764da0e16
SHA1feacf1b99c66acd1e22cf572269600e4ec3fb042
SHA2562753e77615a4692708c10e4a4fd8bdeec0ffd44043e714668512290cb5dccd5f
SHA5121a6ad1cbc1aa31e4abc572d78fd451a5336c7e0e4d85ea576a9bf068902951b8603eff3a603dc90431d5e05af7f693467b4683cb8bc0f4d36bd7acaa2535f862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d6c6e868c859839f2df76b69540dc13
SHA171fcae23551c200690d1eb65dd12438e2b28ce1c
SHA256f756de1ac0285d5ecc6267ec67de90243dbbd98b3a2bc0c0f1fa10bd8ac93a1a
SHA5121587ac4a689e176071c90583c72ed5485a4663482639f55f4c04ea07cd44952327fa55b6e7eba389e7a32ccd1b54628bbd59ea8dff72fe490ffb3d5c3a72da3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58b8e9d8f7940b78702ade82f538a4bba
SHA1097781d8bb57e10646514f98684e43d1d034f98a
SHA256197777d3d14757a5a17ca4ebbc0b24c511c6e255ac2845754a467632c2b4dcef
SHA5120f1155ff27b1a127103843b2dd94945374bf7d9c8d57bc7900ba39f9e0871cd1b2a3faad7fc60240d44b76523f91cd8729b6149577410c083427667c7a17b653
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b