Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
4930e393651db8e58fa300d40bc96611_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4930e393651db8e58fa300d40bc96611_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4930e393651db8e58fa300d40bc96611_JaffaCakes118.html
-
Size
57KB
-
MD5
4930e393651db8e58fa300d40bc96611
-
SHA1
afe6b6265279d4a0b5205e3f97d4db9dbbc8d40a
-
SHA256
5932461b817686eb693b5fab77dbcee343814c473a92e57a69e721fee55d3f5f
-
SHA512
3b1b0f7ff31ea64ea991bd3915d42707be1f6fb97c955165444efcd98b1bc9466dd216478c7a3e4f47f7b17ab53c1f8339061f38b252f77775328fd89bab4f60
-
SSDEEP
1536:gQZBCCOdF0IxCzbJGNwYNpuiJeiH1rGeTaxS5F70T0R87ukI2ki7hMxB2yLZTcG0:gk2L0IxEGNwYNpuiJeiH1rGeTaxS5F7e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000e4d4493df1374e2dbb8956fd02b5d4834b3f96965e014c90a052135f8413a246000000000e8000000002000020000000ec37043156821687e39323a17a8cfea550e42bbcd7142a25c09e8654c8bd4bd320000000c20709c2f191f68b49471258b9140d9be65f4f2b861b4d148397563aa1e6ce674000000076188d2bdc1f543e2050c0249909953c62a774969c1d6a037991beec1131bc0ac6a331d2659806ea8911d4b7ef52b07a67f47ba1a67ddb1229b64530660387a4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50227ee698d6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F6B36D1-428C-11EF-B49E-DEC97E11E4FF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427197346" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2700 2648 iexplore.exe 30 PID 2648 wrote to memory of 2700 2648 iexplore.exe 30 PID 2648 wrote to memory of 2700 2648 iexplore.exe 30 PID 2648 wrote to memory of 2700 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4930e393651db8e58fa300d40bc96611_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a50b2b2ae01c0cfd7f23e6a2d20ea915
SHA13b0b43eb3228387767af593804581fdd62fe9487
SHA2561d1ee292edd7f51edbe52635dcf4c8427664a5df3c3b4e6d2a2e61105a3160c6
SHA512290d3c6f97319131120d89bba83bc3f2475eea338da4715cb02c10c6cc557ceb5823d21fa2699da9bc1ea8dc6f93aacdb6e26d24eb29012ceee7a064e93b5dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8e137512f1d0987fd413f4795335a5c
SHA147221ba0ef716f0b2a4ee5af5a02bc124a346570
SHA256e0b33fc96b47fa9701c79e66bfbdddb729ad604481e2e0e35daf21c1b08db3a7
SHA512b0f605b9c92472fa754d5108e5959419d3981e91039d61eee15a7962c5e166e31b237a872f79df5982867d8e69f9f0fd28433c6c21aede6f7b00c4e64f126744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f413938bcb6f6590056771f39a7e3c3
SHA1cde30c4cd4247b635cf4369f1d23d04d6b0097b8
SHA2565e6e776d51580699140bb92e66087dc11c59c2f369b6b38f10a28982675a313f
SHA51206e1a78e8bada3ed32396ac57cb173fcdeb27e547a132af8ad916865273f557e2b3d96f966562895f0ec68ef78661ae01f58c5739901ea1de8d02f9e88429e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f0f3793fcde27923a0324e67af04ea
SHA1dab8dac8e35697ab0f95db17ec903fc14501dc98
SHA256e4ae9a74224c6548711e3ce4a6bec51c81cfdc6c2f12b05b2d3ba43c77064568
SHA512b86959bd32262d47f94cf3e533394447cab95724ed65975d455053643060f745b385eab9dd53eb6ec36de2f9a8abf8c687dbf1368f8cd5fc31d20f8ac15cf719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597b77ad31a36da15d51f6890535a5b54
SHA12b9a597f25d2564bcf330e89f6e3038b66db23f4
SHA2565ff68101aedae8fd78f01bdc96bd8f0142e89b465560643b84725e21c5a398f8
SHA512301efcc761c01e93607caad0c4ae4f27e308fb473eb7b7f5bce03e0bbcc422534a48bf47d8a6da375d626c3c64b76aab4e9d7c441303bd255c9cb8f7f123953e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560c9558c5583697c160ae6b2c77ad0c8
SHA1db8b05f8a2619b13081862676602b2d4d23ec318
SHA2567b0d3ff5312220d578029f8b85bb5ae4213876b4f6d941b936d09724243d0133
SHA512d8310002dd78797ba329103c13493c831656241276895052a8cb38424be2f450609c22c8767395074f33cb391f71268dddaef372a9a153525329cffba1b806cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d93911f0d6a25b76b580ac773807f2a
SHA1840baec9b4f68abd197c2c178d5c2245bfc9ad7e
SHA256146ac646e24be37932cdd410dd3fa8483d29eb41d9a46ea30ddd510a1421e487
SHA5120f11c40d189bc38b675a0044cb3164795f0fea44f4b3776099011154005698cc006fb63e8db4b0b0fabf181443f782f83b397a0eed7df7234342b40747134012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee94ba697e6b7a4c57096771bfa592b5
SHA1df63615322ee6b2609dd3a61f9885800c5acad55
SHA25605c14f2c030f0da998118917be7d6fb6266498c7dff01a3963d3b1dbe3057cfe
SHA512e7b4dd4e118a100aede5481d35b4f54971af045d076f88968a92dafdba705f6714b0c8f3b7011083a9da2876e8d27e495c3c088ad40e74f3d76f48ddd0a38565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f01a51bf2947c93b89b9f490dfb9571
SHA18cfc91a71eadbc6f417ddac481db57e40a8a5998
SHA256afc8859e0855b599d4d5ec621cd08ef190b839e8a05f2ac76903143c087207ff
SHA5125d1bf5a10bbfb852b1f914842646c8f5d4e7a5725a83cc43850f65c258e2dec084f5af690fbec4ad78f8b2d6435c9e70d0be690591a687b80a9ed008b517be0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f04bda9730885afc443d200f0196dc62
SHA11d09b14089cd17b311dd2616c1319052155c78e8
SHA2568eec3bffe0a5c02ecb38dfe5c315c6b8fa55cefa9f04d442e4c0d10156ca2e72
SHA51256003515eb5934d8f1e1c1c8a92e43de1eceb4667814cbc873e3a62f69773ec4b9674b7a03750a5ba35fce1a74040ef2f9bd19d12632afbdb2400bd84ab24395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5851d18287e356b6b440563270afb80b0
SHA10d006c8bed63177a184e17ffb14453a8f4971b6e
SHA2568ff966398025c38977b19f4f030a5da84d5c0839ba350bd740a2bd29552ef73f
SHA512f2fb603a931d31b4bd3fb8d61aee680fe238cbde9eaf93c4a426ca583a758efb6c463fb9520a46fe7b630df08eaa17144dc5022a00b77b8f4ff31818341f5c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff36e6a889e04ab916b64c575388d268
SHA185ecb3ff039e14e07863353e5781febc575b46b7
SHA256a2b0ee7f6575b0dc8f489002f9deed9531fb9731e39f23d7c8bfad9e161197ae
SHA51293f03d1896451657640d7d0fc49c37c633c8e096da3db221b5c251a7a2b0a23f0a276eb5a91dffbf817626c7f2fa3ce57150b30bd3fc237246eaf7428a067310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e9332dca0f27515da29406ad8ba78cf
SHA15511a40fa2f9968e1e50df250a2482179c58d93f
SHA25630ba27011bd0e9c67dd02f6ecaf6bb59a3d7588cbaf74870bc23a9ce03a2c639
SHA5127139dbada0d9996092d0415edb77b073d7a48db5117e00012c4bbbd7220b4ca93eeab227c81e66257c5f09aa55d6dcf9720273fe8950abe7ca23cb2145838328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75441c86bd7e737c232773314a0b6f4
SHA12695c4b9d3a9326235d920375e000255097fa74e
SHA256f24fb0db8997673f2c8ffa37e329f490203675c60644e75ddfcb47e752c3620a
SHA51266b774e28e8ae4d05e07ea9e41027f65ab9ece6b5c82205801d2712c7837c39cb537d28b443a76f74ff1d77a66ca766e504e819992b9c607f4934f2d7628ab44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55849a4f871966b6127eaf9e6dd899f1d
SHA1fae01f65f62500e3782c7b013af05fad0fde7f70
SHA25638ac713bce58c797045744e212d2c2477fef4d5f617c02b7b5f003b9c67499e4
SHA512641c851d2502ecca971f264d6a19830575ae8a9decd4f0d71f2c68d95a5217c336ec0d735b054d1ae13c08e2aaac1590657fa754593f9ebb04b72f2e1e64b29c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5903cf0d8945fb232c5248b92096cde46
SHA18fce13f9abbe5462411e5987abdfd57698dd12c9
SHA25697307ce04fbb6ed7920b1a3264abe3d1047a8450bf710127b4ff1812c3e58f45
SHA5121869983a7bef03280bf71b742e0576d520134afad716b5a10289ba3b61430b4fc657bd613803d6c5369daac52ca53d6bc575c3ef297f7eb82f4b34c4430a5999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ce5eb8c223af3c6e5f96640c57030b
SHA1942326166ccfcc0af2de5987544baafab9c0800e
SHA256c240577ac7f2bc06c1448f525ebcba8e3c56ee21665cbe01d9084df3a89ed18e
SHA51203c58a7d2801da02bc926a7c7b190bb64e1e9ebce9529cd8495b71e440e68ab3b39894e9a4eb4e8399a88040bb30c61227e6811041abf2399aa4e5e0a667b2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d95263fff330bd8c6636a6299246a4d3
SHA13284c9b8b4216701f57ee43b7b37b821d486a4c0
SHA25605d9d6e46ca58e6be2c0df2384caca1edf7e95c5798e298c264e608f29c56a3c
SHA512e1cf0b538be32c643b87b7c130ddc3519e9418148a9b2e92070aa492dbb2927eaa52f2ffcd01749ca6ff505130c7f91005d3f41268e3db5a32682eb21ae1c9bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c32152bcb3a4c6d190186bb59c4af6
SHA1dea18a274d58554fda1f3b456d29e7adf1633e3e
SHA2569bc6b1a632dab409dddbafe83d77efcabbd48ad25b7b2f273724c30abd0ec5a5
SHA51291281a75e367522c13a2b91a1e55dd58152bc5481f46ce04983a7f64e76a8f78765cbdff810c74a04dd18f1d8ae6512bf99a52e3eae50b6b7f6d423bed5941fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5667a1aa9a9e6242bbd5f4a817698a2a6
SHA17c7f0c37743991d00d7c212422fe6b6b2345545c
SHA25610b489f95442e98c7c088062a6106d822e20d5c4421a60c3fd000c1ae4463049
SHA512374c1d4310f30ffe13f544435f393940391597413009c5698480e60647bbd469d46a8cb0a9795bfb53ad3f7f68beb5c18f73ca43342e05f0d1f1efb0b20d8812
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b