Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
4dd0bec771f7d40e7535dd99df5c7858_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4dd0bec771f7d40e7535dd99df5c7858_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4dd0bec771f7d40e7535dd99df5c7858_JaffaCakes118.html
-
Size
53KB
-
MD5
4dd0bec771f7d40e7535dd99df5c7858
-
SHA1
6aac1eee8813affee72c16bcdcda8d0da3442669
-
SHA256
92128c67dbe4f27c22455e4c038a933d196bcf3f124a25362cdbaec7b9fa2edf
-
SHA512
1d348be1424b1975159a41c3e3b2152cd0721d9f6ba068350352b9bdd726dfb3c3239523a1c39e82a41c851c9c4655f898ea08d5baec3adc4c0231b58e54ee95
-
SSDEEP
1536:9kgUiIakTqGivi+PyUjrunlYg63Nj+q5VyvR0w2AzTICbbYod/t9M/dNwIUTDmDt:9kgUiIakTqGivi+PyUjrunlYg63Nj+qF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427285843" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000d2d954ec7c73b0433f52202fec4e792ef5b05f8e1b7b9174cfbc340485a4c917000000000e8000000002000020000000446b0af4ec3204921fdaada44b0857e574782cb71691005799c9589d85bbe132200000008a9fda06cf14826ef770c7e908fcd50bd4ec98eea81747f96a42f275eb5938cb4000000026c9dc0d721d4027838de6646a0faaa838c5bf230d963ae025380c3a61c463483d2aef05b6c1eb401a991ab208bd4b79b27cc0170ba9b4e1df88ea659a26e23c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B30D731-435A-11EF-9994-C278C12D1CB0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40e2aef066d7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2632 iexplore.exe 2632 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2676 2632 iexplore.exe 30 PID 2632 wrote to memory of 2676 2632 iexplore.exe 30 PID 2632 wrote to memory of 2676 2632 iexplore.exe 30 PID 2632 wrote to memory of 2676 2632 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4dd0bec771f7d40e7535dd99df5c7858_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593934b597458f2163277fac5f19e5110
SHA13f84872d9c4201b6b73f1f38daaf5d143ed66313
SHA2562de2bbbae162f0bf4739e7f7456cabf915f26eeb6cc5dc3957b0b1ec963c347f
SHA5126e803cb9818d7b66039877eac36f893bb4a361d288342ab96d06a8d118cfe25f0f921c4184ff9ba72057bb0095b4070288f7f5ee7fd605f37a0e4b1aac7bbd7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553113c566603d78ba645e5d34cad9ea9
SHA13b47b0115312ec1c1e76f56fcb44115b49e60e70
SHA256fff0f2aaae58ed5388b0972715b4f8fca346a07a30e03f2ad51b30a2351297c5
SHA51229e0913b01d377463b7d642330582ba8787349a936665ecdbfea75e6b74959557a16bc848dc7dbf83c6dbc9a88fb87af66bc9211fb05151e1c0bcdf147cbacd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58364dcd69f1fa3377e7aa861c6178127
SHA1e3b73f41503d3aec2213901b824dfe2f0c062f56
SHA25616fa46b74c0f920f7bc9ad70e7213d55f9df37c3189949a787caec06be97f702
SHA5129f01a95114bce4f754a204f241a12ba3d00b0c15ada0ff947f33cda3606004c0b486b5f44a35de77e5817c5d84f785ad8338c34e1c02568967094720f439fc84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4040b9775c7edf0935aece5b61d993c
SHA1a40540dc8a66212de9083d200d740740b166aba2
SHA256f33529fd2f96ee3aa1084800da5e70976a7d4e4da513852068547bf4e64be6eb
SHA5122ac4e5de1c304c62c64b8a171dd742724a94773216b177c76c3d825316f77690b811bb137b2e44099d98fba7f9ed21fcdc75e2c1bbbaa348f0d918ba08ef2c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f630e9ca48c845057b177392dbe68b5
SHA1b9391d38b6095b0ffc2b62a28d8313ff527a0a1e
SHA256ab952f3ca53099042163c0338c31457901953f1f50c4ca2802a62972960b518f
SHA51241a205ba8ec2e04ba11fb57e33a8b0fc666b2d61bd000579ec471517ca01d32b74ed5fa6efdcbaf84312a560f875441b3abcdd550782f07312fe9ae7390acb70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5226daa0b9021f44b5c4bf787c9b4b98b
SHA167f5c986834b04d5763fa44851625954f99c9f4f
SHA25672e0ed771e2ffda52aebd91c659081fc21aa824f66eed636e93f72c2cb69e08b
SHA512f660002c9a16617de42a78dcc3efea85d48e4265d8487cc42edbba6a793bec7898c8bad068b834db5667efc6c32be95ab9ecfb10b72deb0342bdf9296a1ab1f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d973032e2c20bf8c450bd2a7d31a06fa
SHA1b41d7eae7ef507a24367f9a1f91b4c0f89e51567
SHA256e8ddd58835cc4cccafc842ae568622b144cc43843c8fc8a090e9179dcc9d832a
SHA512df8e83feb571f2605ba47ed42f01e4d3f4b8cc7cef3ce5da27ac1d04223416fd8bd984666de56ef2b72e52d81281e5102cd02c77fb131bb53bd3fba18a110b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53af16b6056d936992e971bc48d7a55c8
SHA1ebb25f5aa26b9a3edf29e650392019630870ac82
SHA256f15984913234e36e7d810009ba0baec385db8e984d1be056b93a1b7ea38b4d3d
SHA5126ec9c99b16b3cd18835c9ec61649203c9dd6d773ff1fefd78d2880d2086013c28e7fdd9cedd30c5d33606b9cb0f5b63b8d636b5fda9a7e1c0543b468de1e3d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abe5378041a28f3d7a56c1af3e57f517
SHA152af6fd2774b565bce3756c5a413487f80b44cbf
SHA256062ac1941500b1163455e783efac8e224bd3a9c78e4c8f7c6a1615256273fd89
SHA512bae0060b6503cee114b5cf0d1c24b6440cd177f3a9e235936bba9170d35ddb59c4b916e3a48e4acfed433d0ffe6cce498488109cb820d90e90583b9f8366ff2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0f2e29dbeda1150a40079b68fe13214
SHA165779ea7f757dd10bf97f09cf51e4de2a1f87c18
SHA2565171d30e0a51f87cd455d616210717b5ad8655d745f84b92f5bd96eb5414a58b
SHA51247e0ef39942708f6bdae3b02101dba0f10add50f93135a9fe33993aa6f04d75b4a84a5aa6b006ac211c9bd9d83375a77c20ef24be7ee214d43f7c7af6ce54a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2a6cf0bf3174f7a7c7ea26b23a6e15c
SHA1d08ed04936d857da81a51d7ec5500e0ff2429079
SHA256660d79a82bdb3b17874c46e6c0892674149f2ff4ae21a2bc3f47adb08f152d11
SHA51247c1bea0145c83b4f4fbf9b365aa6670744ed2f5eeddd9ac30f462934cfa9f58367214c323bba662ad510760359f11cc153b44b81f4cf85c2c69c605767d1d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d732abdc4760fa2749e66512cc68efe
SHA161a9d04ff458e7bcf10e316664ddc415c41a5882
SHA256a1beb586c84b947aa0babf6e675f70a360f37c9e30c2e36341f113c0afc2eab2
SHA512f4097332bc3bb21fcee83e78ed7e7fc70e721bc0c6874f03d3c86eb174117527b9e6b86d822eb6093d1557f8376448e25397135f5c4881d2a4544894445d9401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552db2255fa89d8b4e6c5bc43f454e648
SHA1c5316d7cd5bff9fa77918da01ddd44ac585bcde4
SHA25647dc46cc5c4db154b6e892c9cece8dc2e74611153b45b828067894abf9726be9
SHA512eb809603d5cd76b20386bba6bcc540e4ecc1b122b66482fdc86c697f46c20e16c59d03369e3492492f40267468fae9f11ff8960fb98e57fb67ef9b09ebf69f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5180182a20f23efd2e9da1403e1447ac5
SHA18e6ef6ef1a585156cd6a57b689fe36f83aa23405
SHA256fde3f539e7bde18d17cf5685c92841c753f13c91aa46f6534e04fd1bcee7ebc9
SHA51200df8a6f1b5c98f01b3e2c563995ba26e59cbd560e6390dab707c5969d3e664ee027dc3bf0154699bc663b273a2cb517e2a47ce56b111c40e71e2082719bb551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca64e4081a37c6d55551f7c1278df0d
SHA155c9412587587a1d9e95f8904f48a1ddf942772e
SHA25649a172927367ea4869e27a9021b97e552310befda9dedc137be09eb516039cbf
SHA512c1a08d52a2a06087a163eb38fa2861b76696b6c613d8ff39a8061e900615c7f98ca8c6b2582840ad20ccab280d72e3e6d9876f13a74fe54b67ece6d0fd5559bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a47e2f21696807e10a91fd7dca98de9
SHA159a1b1613988fc18ea5b36222a0adfee43791702
SHA256d8129c105fcfbf519c80ef7923057ed75a35e09fbe7176f78ee7a47696916495
SHA5125b36e62d9effb6b1ae9d249eb155eb6df136958ab6b40bcbc59bf4da360dfce094e2fefb075522f5b047ee2855f921d113f1ee1879273436e9fddda0f12a136f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd5feeb9d5ab07a31f523c2752e6f2b5
SHA1aa0e0000c839af408d6b03838e23ac04ed6933d4
SHA25639e0f0b72f40b6b607c0616c36e63768a4d99e0c3d74161fea401b9c596917b1
SHA512db20c71feb5f9e39af9ce82a4bb8a81f57ae8c4c98802eb593cd4f885d7de505b7c9d6298ad81ece1bec610afe7d96d34e44a95a802eb3eb08073ed15e3d2c82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50397db2857f641ea221c0ad78c57bc99
SHA11f55b12c5f7e537c1012fd806fdfe1c9981b8ada
SHA2569bfeb8e9a2046288c735e97e8a7d612d9edf50ac16e1e2d6b849800003cd2e3b
SHA51268e448ed378c572cd2c0c3902e9c966a152a093670d527e0c40dc07992a7f33a3bd49cf9b232eb4b2ba23ee343c8710676549952af25ef52b5998497dcf4e2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e74a2061756a03d451a98f86c377f408
SHA13a15a7abfd8f74bd80cc6c6fbea48cf84cc60c8d
SHA256367834fe65bcd1ced2a8a24b59e7e55010931c189e624e7d8ef6df11c253ae6a
SHA512290ea1c857fa8ce45dc8b3008f779b95ea0b1c4a460057d2b2f139770551d7449dc10330b54256a9bbfb82868a3bdb9ad7000683fb69e95677e2bcccc9da066a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b