Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 17:28
Static task
static1
Behavioral task
behavioral1
Sample
4aadbb88f2849b3a6115ac87b661b414_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4aadbb88f2849b3a6115ac87b661b414_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4aadbb88f2849b3a6115ac87b661b414_JaffaCakes118.html
-
Size
123KB
-
MD5
4aadbb88f2849b3a6115ac87b661b414
-
SHA1
fe02cdf0c247a547fbac6426bc5297bc038b5804
-
SHA256
50ffa2e676786214e38b04034284b1dfaf026f9b62049a9b82349d3917cb41d3
-
SHA512
4963726f5f233baf1034e78d586cb277e7c693dc79577194059ba7bbb9aa3cfd0c4bccd11f67a8c34031f7cab90c56c7d115b40e7f3e9c0acadedcbc897fd40f
-
SSDEEP
768:6xJcOmNeAv48k2AuDMvlT7KNlCvcHhECj9dekHNnDHesUKVubkOUtfk6gFF8gBkJ:6TcnA72AuDMN7KzqcbqkB9SkJfk6GqIm
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000da06d4e5c319c9b3301867a44bfcef0205c56109c3cca164ca739f55a564c418000000000e800000000200002000000000080669a38c343c334b64ec4e70e3699ecd2ec032993052f46ea422cc63f3f8200000000c576a0b47e402188bf1809b7416ff8598c62ce218d8610d4336c59de47b9b334000000037e58559a23285302ceb3bf106a86f3ad2b716640e15d14a2176adac02e0bded36d40bb6fa38748d6174d95c8680d585f52bd24088e1efbfd864b2728bd9eeb3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 406647a5dcd6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA232681-42CF-11EF-A74E-76B5B9884319} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427226411" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 708 iexplore.exe 708 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 708 wrote to memory of 2832 708 iexplore.exe 29 PID 708 wrote to memory of 2832 708 iexplore.exe 29 PID 708 wrote to memory of 2832 708 iexplore.exe 29 PID 708 wrote to memory of 2832 708 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4aadbb88f2849b3a6115ac87b661b414_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5631c8dd4b9db7b5595039d8d2b552949
SHA168dc9385670957bf03e3d1c8faa143a5c2c7baee
SHA256ce3902608327dfcd742a50bc2d99e7a931fe34b0f3ce695fa43b4ab8f40749bc
SHA5126cfa55f0dc34d341d42236de3cfc3729c8e11a7e9cdf33f91ef68890d03b8fda2ba31f278929ca9e9a43f1b1708e6486c3f6ee28c7c73933c461218be2ac48e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc1d0eb961c748dc4503fda501fc61e2
SHA1c39f4464135053161fe71b28571f12ba01ae39fd
SHA256004d9a08fa899b69151c3e271896b7194cbfb18687cdb7713ec87ff07858731d
SHA512fb3f2a175a728e201759e1cb214b22abbbaae93edb793d20179e5cc798106e63f73ab01e37034a8afdbf6ab6892e91f6ad2d5d1c0b110ab822eb7bd3cb92fc23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e9e271b1dd639f95cc05e623e34f89a
SHA1565a7bb0a47785972b45c4a482407d655fb6cef2
SHA256ff90d0d0afa6c52574286bbbf5e4a333e85f8d0580e2c7719e18d2b234a79a7f
SHA512bfbfdf9c1091d4c996884c5bc459cd1a8f9cc9d02f48347f9d59c96957f74781b6e4d5d3c40a1afd8262fd1fed1664dcf174dd243b497c2c25b408a6770a7a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc412c3ed0c151442f30b78f55d738b6
SHA1e5190a3d2a396db8c79cf8c21cf8e396d87c78b2
SHA256fcaf1580292344c1b3fef67d764d95fc3b43c1b9972e2b71c8de5fc9aede9f4d
SHA5125348886d4b9a0a420cafacc66fc6604a44129107e30ef29231bb1b1c3eaeb84fa59a3077d1efedbc859f78ee422254dbb1a6d79b1acee5e0479484eb9dffb60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee8794ffbca5f893ce0646e4a9a0b44
SHA1e29ec96c72b2f900040913b44538a05b0a79297f
SHA2567333c062c5d7763ba3329a7a957b2ca1db8b9177b50079569ecb9e05c22b159f
SHA512159101204daf3617716f0c1beeb0ca5e84cc892188e6f455aa3bb1c4651fc8fdc50146f2b77bb475413cca3747dde1a572a8d19b695f599e0bb0ee4227f6ea04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe4eba1e3f2f58d1b368a8c21b7d029a
SHA112048e125aea81da2ff1ecccf59575b02e610b72
SHA256671a8bee57e449d43611416827ae103a35824cb97dd9472d08e39fefeaa33815
SHA512e0637bc0f7525c90b27254e2980b4a65b237ce611080024c6d79a9b6c0834673fc067afefc5324cccdc699cad007c8bb00e7e3641057d5f16254056542f83e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d28890a33d5f9807fc21da870ef65e6
SHA1f7b62bd572e77f2ebc2a80b18c602b03d026c634
SHA2564924a168653578848f0af2f23d89c3474c3eb16c1ce80a6376f5880b73ef278b
SHA51261303dcb52dec564a7b4653e845874048b158190ce77f034a1715ff86161a6d7e84705c2f7a2bdeefccb599bf8d68b10f12af0f401dd6b6ddbda534a4b6c0581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508d5ee56619d0d0d5f42e0325eaaf3ca
SHA1193b5632d727c12bd6ba656879d8aaed0f547718
SHA256df5f6da88afa263fee02e44903f8a230bf042da1dfbbdbb30231f1539c75806b
SHA51215e2647fce9b72c4e573b6d55c43b0f24d2e572628f723075343d5df492b43d00357a45c9f9c4aa949adecbaf9a9d81343a8f93623e6d4b3a0f3d5d599a973c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1c8ecc1f88b0251fb970ca3ac392695
SHA1ccbef430449d536dfc1bbc536d8d4d04ae217bf1
SHA2561428bd07ff29a899799abfb5338f22b6e80cbe8958bafa7781a77298e923aa36
SHA5121e1582ad6aa29104c1adefb0f69761c1f1796ff583438ddfd2b0bce1724917ede86accfaf028489a23dc0d18cc64fe9a06867a7c382428892a0f93e5ec792f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df1cf70accb1ac607f078ab62f023099
SHA142474338daa43614d2f92028ebd1f2dfb60b809f
SHA256f0b239934ca90174fb622f7796453f216b227fa0aa732106f375a9b9ed561b3b
SHA512ba0f10932ba0b6e400743ce2958e9efb6b94e49186506335fe29364621f0cba3b6d5cc0402b92f2935721b75794dc6e531a9543b4796abe53bf6d8115eed160c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ec6eeb0e257795c2dddd8db24288a2
SHA14b48928c969b2bd004ee6fa069e5c31333055941
SHA256a2dfe2b393f38f1c4d2a6351e0405977882adf7101e95b0753a044f3f54e9add
SHA512ee5f7925a0fe3da964a83921f20c8f7170aa7ecd98bd647cefa3fc0dde293acea2d5d3312122fd3de0dbcb445c5df3886d4d314196754b875295f3df5b6d91aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566579863d900583984cc706a60dac65b
SHA1388d43ec97d3110b90deb3ef3d372379fd782bbc
SHA256452b9333db2eee6e5a5d91973d9f2cc46f35cd140c41ee2b0a670ed010f24898
SHA512279b0e3591bf3ed0061214e5eb460bb441d0dba2c1f70012eaa189651f2c8f497641420b945b3d8d7b0c26ab8cffad5e3b131f7b42070f752028e2b25ca3d5ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56628985278b298875b4e3794dbf85aa0
SHA1279181a438bfeb61ad523f5ddc4d62718f59d7e6
SHA256bd18cf02a83172ff4162b03d31ae860698739521c154f1705bee86f6cc3c4e6f
SHA5128a31c0763e247c9451c349eb26324d14e3dd1f02f6efcdf509f6c0a24499d6db3a2c64950ab5f78fa8daa9be0beaf2d2ed7e027645a7397a76906148e8c9a73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe79de69cbddc7d026766513c2022377
SHA1014e5c6160742cb69a210d9096caeee4d9f6eab7
SHA256b5f5759e8b203c162e32f3aab15fa31b0733e0e9041a010172fa12f6ce7205d7
SHA512a93f47605d012516a01a510800bf1283b68979d3b584c8d1926bab3141e5448193629f6ad45c596df3aee53633912749545d9dec47453b46f8afce77df281be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b3fc6269b76e7ab89b9fc46f43f5c91
SHA175c20d035fab039cc9d85eecf6c86c6ed92c2ffb
SHA2569ebf8f28961496b95aef7eb033cf925a61be0293b0b46c556c83701017ca8fbe
SHA51235ece3b24689bfc245e14b8309461cd594c6bb7f8eb5579440c1e72cfe3f8f5daede247e6db7c6a2e4cbd56383afd71c34c4dfb357373f7bcf6203665c2187bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c367f0f62396ce70312aa3f4a5c80163
SHA19c83f9771f089428604f9914b5dbec43f74cb34d
SHA256ddc253deef3c1e6072cf67b4a6e78955fb9eccd151714a99876dca98f1901ee1
SHA51230a47cc359fa767b05c528402dd877ee5ef3d4873ba8f06be998deb0f86de21b07c806268b12672285d10657c144438eed048317ada0d10b29072815b7bbb57b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de06a91d86312c7ec504916ea7f7c4ac
SHA1474ef850e0b1b24eec2949265021b1f783706512
SHA256237d891183d54f89f9823fc395cd9631389dd8c49efca21db6199cd554d292d6
SHA512723b6920b3a563995d112f3f81add6b4059ee2eba44bc3844faa59216467f081e53d54012b20dcf34e7bbfe161ea351927d0d478bf05bbb4223b9801bd47ec3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eb800ae29f0a67a8126fd987080a107
SHA19459abfc044eded47d20b859dea16241f22ebeeb
SHA256e1cdbd2ed47fdfaf214795697aee7978c59890bfcabe59d73d8fe81fa0e1e372
SHA512c1740fa691f62d830e6b9f970358815f1028135ff52b5201dd78d24f3d4ff609c04710ece4f95c7b72517be73f9aec6b79df4136330cc35bcbd76ae44592acf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebbebad943d39d4807a83cc3d0ae6733
SHA1101d0bae919a2a3173d5a134764567267046135f
SHA256f11896220408a3ba13dd24ee000bfe3137626b4678fd5e07ac4ac069e15e5026
SHA512ad889c6fda3008fcfd99a9c0a3eb7d9afd4de4f3bcf49d0357f560510ac88a9a1f45bfdbba7c6e2066a95108f1350f178f79a7a434b55c095712dadcf99d042c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50058166ca427e49780e46c54bcec00ab
SHA16963893874dad195d9f329a5ee6a40d71791a19c
SHA256c83d84bddb50fd4f18fc51558f435d15b90878ac30851ffc69a68036d76f7303
SHA51289b80f655647c018e6ff0efa35b82f46e528e72560c4d0fcdc14ab8a15b033ae4faa4293b13792019fe310c511f323c75d8b06e341851d7c60c8978ba8903465
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b