Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
4c19e67166e3c7207aac453fb3ece813_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c19e67166e3c7207aac453fb3ece813_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4c19e67166e3c7207aac453fb3ece813_JaffaCakes118.html
-
Size
58KB
-
MD5
4c19e67166e3c7207aac453fb3ece813
-
SHA1
f43f68c263e9e11884c4ae1d4c3f6bbb486d66ca
-
SHA256
16a6707baa93b1b4e5f87c67e4457fffd904fe6d82d856ea79f5007ce38fd3cb
-
SHA512
6e2cdb9eff353d366470830224f2c20653614f07670c081ea4ffb3a749dd8fa41539450de4eaf30ae4ab6662245a71b846eac04db4e7f8d80dd1b9e435f611a2
-
SSDEEP
1536:gQZBCCOd+0IxCfRb/fcfofdfhfpf6fEfefmfWfQftf/fmfXfZfTfsf8f5fPfVfxd:gk2o0IxYkwFZRS8W++ol3u/hrU0xXdpd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427252276" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40055fcb18d7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F43E6DC1-430B-11EF-BF10-EE5017308107} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000cdbd2292aa3a87714417fbbf405c9d28ae2612d2e845dcd376d62dbb3f72f561000000000e8000000002000020000000cea9e258182120947d74fdf5f902a84ffe08cffdd77b05080f271fef370dd72720000000bb47a5d27313907e5505bdc6b56883141b72e8bc0ddd8e385fdea179e811eede400000003366d8fdc0f0a780480eebad7fa573573fbbef3b223026ac6293588ae9f8c6ed9b721e2a8a70ea3c521e6e0856c57f3346de8aaf2a10d362c8fe97863c5db0d6 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2184 2320 iexplore.exe 30 PID 2320 wrote to memory of 2184 2320 iexplore.exe 30 PID 2320 wrote to memory of 2184 2320 iexplore.exe 30 PID 2320 wrote to memory of 2184 2320 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c19e67166e3c7207aac453fb3ece813_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5295e1b89f87657a6386e91f2de2bf449
SHA1ca85318c5d8f71cb17e5ec38dbbe5730520083ce
SHA256b321df50ed7aecc32d55c1f869f3021542e31f49213d221f8754bdcdd5cd7b0c
SHA512606add09f135c8d6927876a2353c6011c4ecfc09f8a80cf6108ca8664ceb14563df2cf88691a482b0b2063d60d38bb12a425d895183256bcedfbc84a1da4258e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe69741316c109b552d15b22ae33175c
SHA13b9316519123bcc2a5538a1e130be9506afadc82
SHA2567786388de039a97ab7324df872e6124af2f1d37ae9a6aec33af666d12fcdd31c
SHA5120377ff15a6e44f7d468072995af4ab3370193c62dd24d50e0a89906966e6093672fb2aa8829bb3878e47c1eb59b7f0d38d44f44dcc6bafffc82792263068f303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af198d0394e216f475a6716900bc040
SHA119e8c0576fef2c2ac8443723237d6075401dac47
SHA256acf14ea232f4516abc223bf8456a69a31091761ef7ecd67388b7a7ba7c6db63c
SHA512b49cbbbf0f448c81d3a5e7afe46a90fe8dbf987938c263e824876a9f9bc21a7673534b2f11d8cebcd7fca31e54df08e65018cb98e3df1a96750a710b3aef4650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a2e8e4564c6f7c7fd7385bdb1b61c46
SHA183e48936a2d80b096ced77d674f5de5de363c13d
SHA256b80b19f3897b95f9f264831d4e4c6574d924cbdf3dfde0ccb0970a33360b9957
SHA5125210902998cd8bdb6fa744cb04bc5ae7f0b7f103f741fbfc6c2d86c997e07dc6f147edef80d370dd846f80e455a86a82fcad1008b8ebb452b851dbb4b97b2192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5605254781284a91d1483924c63798555
SHA1153426364e9402343c5332de39da93a537e646c3
SHA256cb48cc1d2d5877f239735f547b40c9d21dd1cbfc7397a396bdae46fb35a110f4
SHA5125361d3f4e54edf1b0d2388fb43f170b51b6c96b056e80e363fa168b5b110262b1c52643a57bf3d46f445539af1d3b8a209e7eaa7102434f60aa15c17c898d864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5221dca61e803b933445acf561d627929
SHA1d7b2577cd2e2b387abe0b47e1a0bfcdbe23b9f0f
SHA25670b27ab3674f7da6027ea831f2fbc0efe2c6357e8cd6b0a46810bc0a82fbb82d
SHA512245faef1b9de65ac186f6f36354e7a52ad87d05ba0319ce3a0492bf35b9234a0a7dfa529a5282717c230424cf465a4c4d12351b6cff6bf959e3bf8e594c366b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5275e595c59c19e7a7f0c29c7145195d7
SHA10a0a69dd0f1cba269064b13b5f3de01206dd1926
SHA256208b4ed3354607182a2094c85aa2b68e704b6cb8e780541e620c8886705b4435
SHA512471d623015f8a8247a6d62d4ea25499c5d9e4e37ca235f0fe5db391ceaf74e6005bbe1082218c8bfa391ec6a23b414f3f925c9d96e1b96717df2a3c8b1024638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c12d0321ea2c5fea23806495d0c613
SHA1259b0825ef127767a5b61ce7a3c3a4868d601b35
SHA2568f9d970c8f80c54e99473ec400a6cf37cdf86c034506451987f250569662d533
SHA5126737cad459f01de49021b1a34271056b0fd20e15e24a23833400054e2da172f0cd91d4a00c9c09f401d251f0c692f40a68bbc19144e0fb950a8da4dac33454d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bd9fbd435111a3c4a3be27863d4437d
SHA1c5e2056bcb8e02320cc10b1a8fcca672684997ab
SHA2561a5ea2004d292d0e05cb7a579ebab8ff6f4c0419d1364ab41632eeb43665bcba
SHA51283a087a30dd9e1b75d08b905b982d0dbd1e0dacb28d19dd0aef7a8abe0a9970f6a056f04a9ef22d71d3ad114622386271e4e64edcd446bf52eccf342efd42c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5883dce68bb4552dc505f83e545c31095
SHA1652f0b409bc8c667a8682df7f40a20e87acef69a
SHA25605dc0b56b863c22abd606dae5521d0abe0a8745979d7dd1e613dfde7f440ab08
SHA5127879ee8a72635b4e7bfc43d3306b37dc772a8e18f85518387a186d36bb2270c2841d6c25ce005510a8de311233f4e4471d341d811e13aae68b0ec8bda28582eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcfae54f182b8e4463ac873c21c355dc
SHA158bc8693da3306ad9d56de4efd870337e7c31cae
SHA256631d6b5a595250c5b7bed2c5bb16ced97547d1e05ab9992df3cb8deb40a1ee6a
SHA5127fa18f64b0732b3ef85474288e7586c1811637eb376dd185a2941d229f63edb8bd794a50dc0356aa1d7b8bfd6f4af759d98fe5ca723b3bf50a128f23fcefe76c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ea6b7bfde569ab0c86e341aa9b3d271
SHA17c0809ece8303ad8c85aa7033539bd262d755f08
SHA2560bc271c3513316aef041b6d6b197188d4c2d6162c0f8c5a489ce808d5bd2a33a
SHA512e74beb8fb2fd59c7f1f3dce9b2877650a70160cf68e2d46d941eaef8b9ccb4ce92747e95136cf368065e93dd753229774b7281a55cb293d0dea7f5694e8c81b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342dc557b99076f63d5c66671e752f5b
SHA143657fcaafcba22cb04ce51a2aa15a7205612f2d
SHA256295620061f998f1f4ab48f83de6a37ea141acc8fe678cfb51368110298af7ad6
SHA512017e53bc7067f1d2adebe3085c8ed3d7deafceb2c7ed9522be59e5fc278e460fcfde1d13248d827dd343ad3d01d4770b2b4ab1acaba1332c137b191ab228ac44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab41f561f4b8cbd8b1621bac8a68aeae
SHA1eda6eef726bcb18840729761250ec43db461ee29
SHA25699df2eb79c00d5ee86837267cd1616aa24c7cb137d96d80a84016cea68680c38
SHA5126a66c3cc39ebf2c82c4e5633635c5f7597f45319d883c30e10619818f9f70987cc76719c3f7947a6400fc7a7a089932c238fdd0cfa2f7e8956ee83c05581f1ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cdc0ac34332e7808f48a88df4c28c29
SHA1e87f86190c3a1ae893eaa9e0c0290210c6e8fcad
SHA256e8d688452b51baf5028ed3c55c42421ba946bd8839cdbf2669a5703d019f46f9
SHA512dd8c1c37926a79bb7f889385c25d9ebbc00b932f90d197ddffe8f1ccaaee7baefdecd2a76df1ab6b07b428eca905257f8332e767bfbe88ac6a7021ac0fe45c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573df488300a2007c29f367b7c10edba0
SHA17b0f4e6ce88cfb0c5645dd6ed3fcbd35e2a1999a
SHA256ba8251817ec345ffd229cebeb53692ab6c7904aa30838037175e548034ae3c03
SHA512ecdc897b42211aeec3a8b4358c107397acb37c5c344cd9416ae83a72f2be59f66735d42cb7489e60edef0c6bc1f233957e7648a10d0c811ea28ec5b23dbefb6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e86118b550759e82650041161082cb61
SHA116e82d88387a1dc223e6dc71107e8e613005b72e
SHA256badf9cc7e2a98701600008a08c6efc49dccee4140581265f207bdb4a11303ab3
SHA51271dd09b6cc3e814799fa6546f84cb3ac3a0f9907201e73dd0c97f4fce06cd06e8e110eecd2bcea2ab66ccbe027c4a7294274adf8564f2df5674410a1b5d1aa67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503994d7212b8c8017625daff22ca03a8
SHA189752f2a9354e2c10a15e5da53809f45433b6ad7
SHA2562dc0485f8cd3443fecab2e8b8efca5a4c745fc34a38f4ff9c5aa45c3eabbf975
SHA5122194f9316dfb1f4c41771bdf56902398cd60a50e4a2627ed245178a8e3e5873990760b7b504cb04124b8482c6a027535a7a294968390595a49c8c274c3f3720a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5779b65ea5a05c30bbccec6b985b2cd6c
SHA174a45a39fb8d13059b4a6a57c33ce4bbfb1fb63c
SHA2567492890fd98addfbb3d789dd20f5c12d72ec66ce1d18164a049bbbc598a7e4de
SHA512ef24bfcd9af5ea7ea7a7a80ed18086d68c93aef3cf663f902df1cb532ca7b75dc1c3825e8317b006c4ddf05162676de598fde7aa8f548ccdb842bbe23f084883
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b