Analysis
-
max time kernel
133s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 01:40
Static task
static1
Behavioral task
behavioral1
Sample
4c497473963f714231c9edb9c20cf38a_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c497473963f714231c9edb9c20cf38a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4c497473963f714231c9edb9c20cf38a_JaffaCakes118.html
-
Size
53KB
-
MD5
4c497473963f714231c9edb9c20cf38a
-
SHA1
5563aabc03c5b6afb095175e1c2c1ef57760a6c6
-
SHA256
95b8975261907235257994d88681f351ec8422fb12758beb52736006adec7614
-
SHA512
ecd8fed69acd97406db22678f4e7894a209802dd49af3242ea61108f71ab74390be5fbd3088f6e07b2e4464a68ba432fdca959b96d895357f4cb419df4a6f6ea
-
SSDEEP
1536:CkgUiIakTqGivi+PyU4runlYQ63Nj+q5VyvR0w2AzTICbbmoh/t9M/dNwIUTDmDE:CkgUiIakTqGivi+PyU4runlYQ63Nj+qC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000295af61e7b76122643021e0f5cd08af7c98b894af2318f2cb1aa1e5f6c0551f8000000000e8000000002000020000000767e798b1fdf29b18c7a571011faf7a39d6a8e0df7234b5cb960233d07268c66200000003967fe429cb7e033d6fd426cfe3bf936de2b9da34eff5e244f326cb138b25d0b40000000afc6b9eaafacfb51fa51ec5f673b9570c8023ebc09020a003e9e0bdcc6509e16065a88df2e51f902bb782f8c596f1bcf6009a3b6355cc952a697a5078ccda0f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61F696A1-4314-11EF-B585-FA51B03C324C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d04e3921d7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427255900" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1056 iexplore.exe 1056 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2216 1056 iexplore.exe 30 PID 1056 wrote to memory of 2216 1056 iexplore.exe 30 PID 1056 wrote to memory of 2216 1056 iexplore.exe 30 PID 1056 wrote to memory of 2216 1056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c497473963f714231c9edb9c20cf38a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547dd751679c9ae5a3713794583450e05
SHA1925e14aa63ccf0fae5991b0fde85b9e194c45dfc
SHA2567568d57c954250c0fcfd2cc763d92f828200023c859f84b51cab5d721a8097f2
SHA5127672554a79678941f9e92564280781ad469431dd787ad7ba7f659fc2af815d12894a01c7ab8ec30cefb4a67b53e29ef5c6e3af9f4c092b2512ac5e140fc788f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eb2d9ee836808ac59108db2817d1ef0
SHA1a6c25eafa447c32a03dc2f7e9266eec8e0efe08b
SHA2560855da57b897822e2acc27cf0018387ddd9fca9174e3f33dd0ea5c10ab0759d8
SHA5122ebdb14827c6b46c573d8a13ea18113d283d80f76a43a95a9e17e7e81818271a78a0daf60749f160643a626fab51ead3387473f1bb3de42e28ec60ce72ce7def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504d5c5c0b10f688dd90fcf1dc4c56221
SHA1fdf953ba1cf5afe27a73b8c747e9d1a11154b3ae
SHA256d3e19285fe5c6667c2d6bd5c755b995e5bcbc420af14c4fa985ef278603200ea
SHA5126b328cb713b12445db7915ef4c0b2f9194c2011fc2a84922de90c12b86e5ed6da64fe9018ab8b7e3707f4ca85d6e10fb62139598500be4c3d7ccab91d4d2dd12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c60f5de011bacb66081b73cb0b5b9a4
SHA16ee286ff7806477220a66ea48d369d53ca9101b3
SHA256c6ee5f2d3020e2dbab8dad032b485e0606d59a17ce0e9852bfcf7de70a86faf9
SHA512a83a7aa7bc1370e9765356dfa8f38f7419b824c7fb95a28b0834c3710b4a4c7daa99397778cce6edcc153b511cb8d44da16fb843395a5dedc5b35f6a79c05191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5219689edff280762b5a4b5ee584f37d6
SHA1aa3880c71ffcee0ec43020e05d4e30443a08cb8a
SHA256fd706f2af69923250b0a1cfdd7ec2e37168283fb152ce3b30e3ebf9674017cba
SHA5124c9b22907100243d69a402804ce610212ff63f6bffc2acc4f1ace25c6efb6e8e795ea450e40b72c1a7c2df6ac8a1791c43a7acf59fcf4a36ac91369a1670d82f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb73ddb0c2a09c4a06346ed9126a40f
SHA1a11bd5880bd4ba1a4cc899ec815df3b0de15ee09
SHA256e9635b002484a19eb6d83c01a3d96242ce6878eef76149a21f456dddaffe52a0
SHA5120a0e768d5d25c4215c0178322483eef3b960115a8ac9ab9ded5834ab79f73a334011b32e9a46a8fb54419f7275c5be4d7f642fde7292922e5b48fde05690190e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f83526380b3e5ed551d819369e96a935
SHA17430d1081269643fc48915848938c6798aad8c29
SHA2566d76161985f55750bbd5db4bdc541b9eda3d66ef53b61829fc352befccc73f47
SHA512cabc441a745c35059bb30c0ee952886e7d4520172103dd90108163b1a850f346a0f19bee326cf735fdd348f5226bcb4e4115aacd9f35a70eac0864526491f4fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9f0c35a7e0da8f4267ccf7dc9bc1a51
SHA1cfc22cc3e3e1a118275966d3b351552d37cc5783
SHA25600461cd8c4ceae60425b467b06c68e79b97951daefdc82e1b43fcf2213fd376a
SHA5122792f0accb7e0fb1cb214d8b0e94d97354ef12076da7d7b2a7559fc0032e64b357bcbb3748235eb2b371f5a0fb05495ec859572db49e7a858f6dcebac2a63ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ee219618fcb568ae22430b82ff8f7c
SHA1f36c194f6b275bc97923186e08783312d3f2238b
SHA2563fecdd890e32e641983861f0bf330d4ae066549e2e692e0d555af77f109b2745
SHA512a61d710c26e4e4fc624a67933d94b1c01950dc52316de4f75ab4e0ed727374aad1e3097802ea0a915818a715745d9797800fa1f1425956a4aac1ccf34d66de44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58440470cf458e6678f0f7de09d2a6ad0
SHA10275759274965358547c3f835f6850e8721ac0a3
SHA2569400f73726eb1a7f8b436288bb74b09c1b2a2c77f36eadda2f8790787775839b
SHA5123438e029292fb2bbe90039abfc1c17d88cc8d378787d57e828b4668407ba90502784ac32b568d59e6631047aefe1f0269ae609b1ee313c6a3f6b0abaac3a58e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ca3bd6229b5cf7619abb2657821c7c
SHA12dd40acfe76b202abf1d5944c7e6dd6c68da29d5
SHA25692f67654183d92e56a33c2758c11d22806c160ba47732fc6477c8b839f14d50d
SHA512e27fae1bba6ece687049dece2c900b7ba9d0daac416a6c2fb77612c3a1e45ab8b0050ad7185155390c8b1a5d741d7aab7539b07a56cf4cbd4b2ff564d7155582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a226b2259c8e9cd647f1c288e6c119c
SHA1cc70786b33b9ded440dfa8fa5662d44e55b67ab1
SHA256b404abd44b8b1ad43033202b12e95f259b4d121247c6711ac99363f4001c39de
SHA5121b3480b9dccd2fd3245e9addb59ee0a27b7adb5b00eae745c08d1b78bcceaa3bd6f6679d4d8673ca918b0ac11721a66aceebbbf2c284e2031532de2f544c83bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf72fe4ecf6b89d23b3d2e705a40deb5
SHA13ef769e5240f31ec9f61cfbee2a6eb1ed0665cf4
SHA256940adab0bb5868f3a5349b2953a0737f14a091e2f2899b0cdf3a532c601c125c
SHA5120b5068b58b45c6a2a3bc770bc8a0f8251393c6f437c4231b4fb33e4413292c79cbd9ec333514381a8238b3eabd4aeb3bf6c069d38751348a5724dfbc2549d295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594a1c5f91881fa70090673dabfeb7888
SHA1219c39731c92d68592150590d514963640c5235a
SHA256fc85ece743df384baa52403ddafecbb3d30e97255f69ae9a27045cd8258b33b6
SHA51295332c2d68ad0b177f8d0d2505e81165777ec28b19b5500a033d626674beaa0598dea479af70c34143a5e6b84985fa3416b7f544d1b9c25723f59ca98f07b14f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5020640a3895cc4b31c5b3dc68015948b
SHA1a237e5eae26ce2bd3e71fbeaa7982671820f1dbb
SHA25699b905583da2669c915e459706e394cf89fb9f28cdb806a3ba9f456a39e65f5c
SHA51286294dcebdb1fd9a5f5298bcbfc9c21e1a957b2f3ffdfb85bb971d518daeb7037b54f6bb7229e93586cc74ef5673a2d1bdbf59a8d1fd27fbff3b83b79817f896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4661d5a91f9a42bf1f371b09d414188
SHA1f054a41726986a2dafc79f7c2294d66f0d872dbb
SHA2560e98b81184b619389dd512ba84d5d21e3267c633e5d8cf964731df4243bf9963
SHA512fa923591f9aea515c24dbd422be360d7f71fd7a679604a3b41c76c912563f5991af053584d505e1efb972b1691b8d6574b165036270c597906278a7d5c88bce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653738e59107dfe4e86149d45782c14f
SHA130242215ca7a6e04fb24533c064fcaa4f6a4fa53
SHA256adbe51a0d3b55b73e75a102c28fd866c4b309f4b58aeaf2fd36d418fdc2eed3b
SHA512cf8c360d7b2abf85b4c180acebc14d88fc34660fff294cb89acd38c75397cb34f6e22e73d36d0c4d5aac2519fde83b2a4e7738c1ab2a194069253b05ebec05a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0eaecfc8c1ea7f32c83c040e4d6e496
SHA14923143cb9ce7d3a9857c0d19efdc96fe92a0366
SHA25633887fdf2252a884fb3bf9ee4af353e88969cdde28a41db58b3c66ad1d05e1c3
SHA512db25fe7b9b1c53a6d3d55fe956e32521be335d28b685e602e76c393f50c865870f7cbb1db63224b849511b45a957f28db33ccbe28187cd4fde1f4a1ea8488695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2aa426c2ffa64e68d6cd8ba1e2d8e23
SHA13e39918840b9b6e19e0def1f38b8559c356c85b0
SHA256e378823f5f3dfd6b187ed5f4b32588d38a088a3cc6f2fda9471cd36dfe5e8872
SHA512321eac0ed07d6192be879ee083acdea7c7c15dea1feb50ed602959a68edb133e96d0c4742a94f77ec96b43a024f3ff67737f757a80d79e9c33e02c90e3f79d90
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7GT0RRO\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b