Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 07:05
Static task
static1
Behavioral task
behavioral1
Sample
4d440e08bbdb922d36465f54cbef0653_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4d440e08bbdb922d36465f54cbef0653_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4d440e08bbdb922d36465f54cbef0653_JaffaCakes118.html
-
Size
118KB
-
MD5
4d440e08bbdb922d36465f54cbef0653
-
SHA1
20060bcd16c70c608efa1bff0a1815575dd0e6e1
-
SHA256
606cfeaa17227b769f39d44c9e6b417b995f6dba65431e35c7e77f212f7f6476
-
SHA512
cd04d45ea15ed44067b5c7a42b954636524e2dc0eb13ad8a321f04afd941a990edc5b46aee0a87d593fce0cd1814586ed3d8cbd03b554fe9344cba0487be6d44
-
SSDEEP
768:7xr/50H975KovtPIJOOvFrAgJBsb1GU6wdwzU8CCJRFh7rqITUMzJ1WIKu:7leHZF9GxA0sbcRwdwI8CaFTUMN1x
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427275428" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB5B4631-4341-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000cb8437f1616d678fc179ccd237fa2d86da4b5a27d56ef35b17b5579923099bb9000000000e8000000002000020000000700554de00463a67f761653bcbff52e56ca25c37dd8391cb9825a05e1ba616cf20000000e3b2ef9eac3c1edb150cea7aa2ad00039590a392bf710650f1df1ba563be89c140000000970ec11c96416f0a005cda8ed322d040f3416b24c71dae6906101da8210cfa8f559b6e59b0c1d60b1e8af2d7d252c7b323537cf8392c6bd2b0ed66cd4228b6f5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b0cfd54ed7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 620 iexplore.exe 620 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 620 wrote to memory of 2376 620 iexplore.exe 30 PID 620 wrote to memory of 2376 620 iexplore.exe 30 PID 620 wrote to memory of 2376 620 iexplore.exe 30 PID 620 wrote to memory of 2376 620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d440e08bbdb922d36465f54cbef0653_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d1d4837d65785d90e0e8072ead8e92
SHA155091bcfe450b34a8e2a115178c3e7ca2aa52828
SHA25642e3c74d0e1dabed391db267cb7a527033178b79ace648601f531ec507c138e9
SHA5121dbbe984c833181497488810333896b2f25407c9e624705bb6c05681422e74820cf89464f65668b91f9329420a14ebb48e407ec56fc0c475e3b120ab425df45c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564a23ac6b52e3b712d338cc89d8beedb
SHA1a4764ad8ec79b1c386107ef5b18f1106b59a367f
SHA25623ce94fa355db0bbba9f5d8bedde2296dba5c7c4bc6f9f192745d730c3879267
SHA512949503bbef2283e58ce9d02c8d66bce628c7e72d23184cc78069df6bc64016230647f7ea109233515fa842f5cf2e9c755e5c73e4932c66df481d2b794831b2ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd4c8444e567930c7ede9bb10c88086d
SHA14e0a3d6a60fababd6b8b62b048e58acd291f0e18
SHA256ec123fa858adb491a0a6213b10797aff4058c3d407a0602adea8e3c1a8783698
SHA51221858085450f9df9e26ad10db81a41d056c804cf0ae1a9aa779d2b6bf0a35e999e10d1e11fa4749f862b316c3b8130e07f87bc5a2ca9ed9b406ec36d0be6dd8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552b706dd9243426564243382f5b43c5f
SHA1d13602e3abc29b530d3a80ecc341e18e0c24356a
SHA2564f1d72c99e31a19454994d8f38950ba411cf0f27ff20b5fc92940461201f2cb5
SHA51225c971f1ab19108c81c216b0fcf5db9095e034fba4d72f26fbbffa165f839c6052341ced54712f999f83873c3d30799b85490b94a4fe48aa25bb269646f292b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6d8ddb3f089fa200b51ed181dabdd26
SHA1d40c874b2ea5be7a40b9ba558b3af898ba1d6f0f
SHA25674e75c4288e5ed3f9df3d9e2e7525a575479f059c44ce7c83be4a47a4094b790
SHA512439074333f99df6aa847b9257c1dc4eecd9532f6914ae4e948bc4ccd23687bf78a2d47b3f8c45cb84f8ae625444a2df223091504207cfe7f36da57dfcf89fb03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55748427b54c9ecef3610a163697549b0
SHA15e25aeda51cb602c5028f3d6692a88ae0efac061
SHA256a03a0151e26227ad29069095817fdbc41637149d37a1894bd293079249689236
SHA5124ae1adfec6aed017e760ee6a749d9a89a7618e243e703f60f49c486fad1a6481b4f39f8088d5de425b788df45017dbb07395badfd8d5238e08508b17945bc479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a1a401d6d7d17fa4cd7a2eca7708798
SHA1709eed03794abe743549eb9bfef1fc7df7fb8a81
SHA256d434be202ac18e1ce2e01cd1c2b9ef8614bfc786e66f1acbcc901f247212533b
SHA512d5f6e851fcdfb66139f631fe4d1103bdd98655beb0a7e5774d395d3681cfe9c02bc2b1f60241fd38739279f40a71722c8d8ceb8c2ae30c7e38a24c2b82be3cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25c104c2b9d06d6f00e4e9c4385c59f
SHA133fdc39b191723fa53901ad2fdaa394fcd1c3fff
SHA256b309023ab7702cc8fb3ec10e1c732367251cb436f4a3ad9d06a3090a43d5a5ad
SHA512da0f99f02f5c08e2fad5259435f93ff45d39d0edaa6192ec424c31031e5250be6e5612a94724ac97dd6d584238b79ae172dd7d5a74ad4ff05114f10bd6a26941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd4a753e4cdeb780c11ac95bc149534d
SHA1726a5067951a915965e9fc5557ba17146384d7b6
SHA256b010c88f924570b30bdfa4a9de3d1cf6e7c6a260f0a4e71194523e4c65e09856
SHA512c52ee266caf6a20e5341ec55c799a5230ac480f7918cb90444da7796af2064e8a52705bee63141c24a78a92976404a89a9a2dfef97994e1ccb20a4996796f937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582a07b3a5b3910b1acf31dadc61810cf
SHA1f33adce15e8b82599ac2b4c2e34beab20d4a8813
SHA2561f6019d3835c659c8b5c39836841d667dbe2292e5f71f9f148cebcc63d277618
SHA512183adb37979526f9a063295a162e3a1e8165828a18eb6d4f5794de52c38c095ebdefb7c1d487badf9a0b691e4dbdbca620b0c0f3a0b9a81c423f05e7a31046e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4ddbdfccb34e166b39b51813bc13823
SHA1a4c1db3bc4e2ac449f1c850a68ea5ebf5a238612
SHA2566dce3a541940c3e8bd8ecfcb4af2500b062b9d2b9660abdc879d6e5b9f0253bc
SHA512d2ea652177bcaad892f598efa93542b75d793585389b2c20de658abe4b497952ba7332b2f66943ced3affa8fc515bf482a8ca88d5494f3ebaa686948a90cee61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe1d740aeddbe865c84a11ae8fd57f4
SHA12eb9eff1645dcf29dcea885c2e6c9bcb77bf239a
SHA256acd5239ac889d319badb87dee3f06a57bd633769e4f4daeea8d80bb3a0604585
SHA512b6e7a4a8bef6b2950687340831a63d073ab65fb7511665c36b494578564d56744364b54c97cbbe81e6f1c6e4e31eeb699af10a59c1af7d4639c88f36ce57f941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a3b11cfdb1f2f23ba668e497a04089
SHA1c0adf67941fb84584cbea94f328e90ddf7070a1a
SHA2562c59fe953a958c7fd4b70a9e0472bcaddde1c7e79be7ff88c9cd4dd777895290
SHA51230115fc8eec9a633543c63560875b634ea050976d49d3050ff56913ef1ea6fcc5ec835eba626ecfaf544ce281d03d7818b3087cbd7458fe7fb9a97c5b70dada7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb3f4e250b24cc0a713b7dc1e0dace20
SHA172be3bbd6d46a6df4a12561158dcc337b8248867
SHA2567d37277341e7fcf66dc5771070725b55beff2677676d5c752586cb9d7c6d9db0
SHA512624908eeb26afba4712717f78ca4719c233a7c26c6595810efcd179bf49abb15e75ce1a01fa7a605779d18b70ebcbb383d893a288e728a7160ba0a2f067c8a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da430a9ec2d7e4dd1c453fda98b1a62e
SHA10614f1531040228f274ba58ee3858519a2488904
SHA2568b5b324252a560a5d53217f360e9abe2f2df2652458b3625d147dad2b2701efe
SHA5129c66a85abc1dbb41add0c176a908ace7c59cd68916ff0960a9d55ccefeb424487588ee329fc21f60a80234994342e3d7652151f295d26ca66237c3918f100954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563d1ef930d1cb9428f5556010aeb16ee
SHA103fed2275aee5d22a24262e2dd1c318d39d908cc
SHA256080be3e40193b62249d9dc63a466ce0128251ec874ef9724b1e7fc8dcdacf04a
SHA512ab6b1d7696c1daee5a26ab104da1dd077d2c7bff29ff25df063b981bca6fe8e03ac08fc5a14301c7dc89c553f092bfa872eda03ba82f83261944903aee3ab37e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a998f48c7844d87286d78a6a12948ad
SHA15bfad9965e830d569140e237cbad5e3a77cf27f3
SHA256a592dcec79b9e50fc4097ea0913fdf2be234e5ed920d94f8287a70231cfa23c3
SHA512270fc6dc1c4034e557bb0ad3bcb1c59c0ac07be01fe3a42bcac3f1c05dcc93206c9b5aeaa11df6e46f7dc75a9a8df14e946c1220f78248e711d1181e1229a1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f0aecf7eb25db15e4e57eee54820beb
SHA1adbde5255e41141fec16f1437b6b0a0d5efab52f
SHA25668be6e7104d46e8dfea73c2f620348e7f1b0dc952a29747a4706edcf6aa5dc18
SHA512d2f2e99234b8da04f2e3a67a4b591ed6b9a33273eb2a12e3edbb0cf4df2d35db5566a14f42c910a5044e231885b154ee3494a8d85f4c163fde410a3c2a13c8d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55285a8d1bfaa449b37af293aa872bb31
SHA1b8e1ded73d49241e963fb38b4ced1c1fc7ea70c0
SHA256663dadd8177a4fe4814e4521ebc4d24f40482c205bf1c41973225a286c92cbeb
SHA51282e71e79ad3a4fd4cdb033d092f355d69f7877bf343c4ef734eaa7fb84544c8da85f8840afb78e88faf1c99320a54c0352d97f816e12ff4d84c4f7bef7476bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c98f0ca6d423450b9c0b70a552b76ec8
SHA16da37ff746ed34245d2377d3b671594501858fd3
SHA256577069b64d543ca2919dd36fc3edc5c6caafef8062e1e8bf4f31bcdf76f5f73f
SHA512502661a1d2eafa0f6b5663d9e28415925d827522966e36a0e447e50a75c213f34440cb1b259254ca7fba26814c81ab58fe9a3a932ea68982249ee0cc4552f4c0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b