Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
59a4c838a0b86696b3c376238bc17054_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
59a4c838a0b86696b3c376238bc17054_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
59a4c838a0b86696b3c376238bc17054_JaffaCakes118.html
-
Size
36KB
-
MD5
59a4c838a0b86696b3c376238bc17054
-
SHA1
09b87e4665f7455dc153d9c65f8169a3b5fc9c4d
-
SHA256
d4523694a0ecb386fbe68192683cf0432b92a67cd0264aa62805b62798195569
-
SHA512
d45bc092c03863866de0010cb7bb4b2aba3d457fe795d42150cf35a18097a26d8b92a8b8e7cb0193a951bdabadf547de13697a7591428292a48498545b6e1edf
-
SSDEEP
768:xd65s7+Ck45t9IWUb6Ww8xSuCxXJ0fqh5mWcpu8718GEZK5nqqO9s9a4Avq92B+s:xd65O9k45tVUGWw8xSuCxXJ0yhVcY87e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427509121" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10be34d36ed9da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000c4bcc74ba6104e67534394c87cb3af163112e0f94cd68ebe4b617e174f97048e000000000e8000000002000020000000bcfdf8b9469498bd6e858ee467f56cd014676c7fe9286432a96fc6117558259b20000000554ac23129e6ce64e8a1330b4d16ea5d7da2b861f4daf315e3cec58f45d61dbf40000000aa52867d5aff48f3b8bebb17c72716ae786081dadfba76753511cfc2bdec09d293f561aeadc4aa1bbd4c7df6bdbdf1fdb3a6c761e4ad7e8f8fa32afc32089084 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7C250D1-4561-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2432 1992 iexplore.exe 30 PID 1992 wrote to memory of 2432 1992 iexplore.exe 30 PID 1992 wrote to memory of 2432 1992 iexplore.exe 30 PID 1992 wrote to memory of 2432 1992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\59a4c838a0b86696b3c376238bc17054_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f82125ff8ee3f20dfab2f7498421857
SHA1d16b47f734968bbbf63529e3dde40d836909a3cf
SHA256fa6ef347f6d19818ef9e7f5a0cded4ef649cfc14bf91374f7643ff8b32fd1268
SHA51208fc500e70af621637285d2b959d093f810ee29203c55ffd179c7ba02393861727c535a0146272872f19e33abbb3baf036b40db86e7330104077e2b3056abaf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814fdfe5039cd669c45c8e9ec707ccd2
SHA192470f876568f2b8eb7f11457de82d6daf743404
SHA256b7d8b2d7f784c791b91f456fcf3718c3a6db68e4374717e09e9f8dff12da7919
SHA5127948badd4f612a3ecdb0c6559673de5d90c8b08d2998933d16c2c035617a5ef311e70e259f1499f50c1823f7871c7b692ec4b269fb9db25f603a6481a4b3d46e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c1645799abd6379dea3c9b423f5c5b1
SHA11a24456db7cfa7a99f03b04de0a4168613bfed0e
SHA25627d04e817c5759d3888d066c1c0979bc4bf8a7fb21fe0746fb85d51d9190eab9
SHA512b665006d6e1a060d8f5987177832f0fa23742543228d4bef03f50728e716dc2151a55af7969ec46094ec2289bb6b2d7b374d1f594cf4dd8994d5bed527993bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbc7288dbdf2d1b762136a6a60c65321
SHA1907a025be6e21289982380fd203562ab29203ed3
SHA256ebfecaa57c54bb44d2ef4ce37b2276dbcdcf18ce70a45ca059b67fce1fe3244b
SHA5125fafdcc9578f521cc170263a18e3665e4ed061a0387a4c9d9a34381dca992e13f2ba9db71b3113eb2b47dc20f8241b22ee221040f5fd24a89d5f678c7901fe61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804a895b6f39bbfd5af305da6d0b1bac
SHA1105bd422e8a20f481b70f814fcc3563881dbb8cd
SHA256c5ad40b84b4ba7eb45d02dad1649702e75a5dd38028869ce26bc067f3692df80
SHA512c7f209bdb33e5c845513ccdaf7ffdcd34590ba576257e01ae30be29cd382605e3e3fa9e13608f9d7f22e39e4bf8f3dcc9f07f8bd5cb86a3da592aced45718b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b716cdf2168bdb2f4230b291516a1cb
SHA192e9cafef49204a308f0052f4ee97a1406c5028b
SHA25646d523d5ea87a4274bf0d0f8f317f49ae32aa21053f50b9ee2f7a6fc915540ee
SHA5120f0a4b841e5ea17f32af8a8c2f198c248e26681ab91a9a6313e0d65409a595f1f9f84aa7dd878ea745615c1a6f6fca3170f6fc1c15777b402e600feca2cb4324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553e2bcd85a015e4c290bf37c223b4445
SHA121847ccb821344f97fefd77e8d29c2958fe84b65
SHA2564f2a332d34a9720eeb055a0c1ab932ea24efcd0aebe901c2ea575713b9e1a732
SHA51255a8d5d72dad7a11ca3d203225662a9ce7e6bded84df65fd859291de4a3e33f89fbe2a15d9c6753322c83afdabafab2096450448382d34f38d10af6ae91cd03d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4755e41cc6231d24cec01fafb6813db
SHA1612cf7ab3acccd62794f49e2751808258ce91f9d
SHA256fada3c787b4741ee063eaba24ba86f6d7700bac0db9ba9d03f2c1b63f14f6e97
SHA51220480ce8aff23cb2f66797caa23635ef04ed1910f8d41c52e8a3134997e426c24b36cdd51643a41794bb4946fe6761a8a977c3b7ab74b293faa11b84e8c2bf13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555c80ff68d7cd4bf99a7d6e5c33540cb
SHA12b6eb02d80adf26cfbac20b1d397be075341d0bd
SHA25613e297aa4cc9127b2a827e86a9a48a0cc908c691c5c075879166756459817049
SHA51217164dc50af3156a29be3810ccb312de9ea1e6e7d37dd88999682b856abe4cd924baeb08377ec1be29f66674c48e8b4cb9b72c638015967abe39133ed9cfab52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5046b0dca1a39825d81383f3afbac113e
SHA1ece8bf072a5807a7813f1a960ec525fdf512731a
SHA25678b865248f1421dc53c9b0071b5b0a2175fab84a622b1a2d41187727b8a3eecd
SHA512fc62ed05d4c803ad4a69afad5c74e51f05a5cccb8e246eb533c657dada1b2252c85ae50bc213ec8f0f040660e8e60d904287d1b278688c0a4b63268efe870625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5294b022c6a2e1d79326b1625a754bd18
SHA1225c38ea43c4db3f65d081237d356720330d3e04
SHA2560989285dec5233621d9b6b984ad86193785aa7e27555f7e764ee5ab210d2e901
SHA5128d39aa669be33110c286c48718ab834b3411455d7c7ebe8670abd516d4188e7db8e624d164061beb9ffe3a0ae748bc78403a3367fef8df1aac93742201b11b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d032cc3884d9cfb368d0b004095d530
SHA18e538c8b3cbcc93cb74dec0f0507f82ae2fdcaa0
SHA256180aa51b6f976f017cd327e79141221331165feb8e8cdbe1c451882385773aad
SHA512df81e284a093d0b4534229eb8412f81fa5190821ad03ebd0e51d7418bd17f657ae8ac755599c15ee61fd9b77250f63049ab3edcac6b0bd60fc15c01fc81aad93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a407fd7cd4696467074a80c459301667
SHA1f391cfa4a43130286801e051ed97cc8045808f0c
SHA2569747822a79ee4dcba300eac4e16f2819c1f83b604e24dbeeefb3e4eaaba4c418
SHA51279756cb29c2c3f60aee2a087241ed402d9f399a34059cccdf17434b823c3898e2a5a6de667c8e48dcbb5f6ff0ee9bf66d4629b869415e3b14282ca695521098f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f962b7f5669127058733821f5d5b852a
SHA1412bfd15dddbfe0e1227168264161b0738235d27
SHA256a2c317a7d125a3eec91aeed9c462911a6e4673af2f2f4145483f4afcfc0e916e
SHA512018bf218aababec5e6109236c6a772c9f819a7fb5e2bc348aef47fd9cf10af1075cf6e4f78dc944e76cccd5e26db6ef73d3b250e4b55d4dbd8dc2bc05a5df199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5695ab8cbb958411ed42d37d256ba09b1
SHA1ac8b35b7646b32d0a5e6ea7d280f04ecd203fe32
SHA2564c94fab4e9eb596c915eb67e6c04821a49415fcce57c67f5d683f9fbef643bb0
SHA512dfa4dae45e38a828f6c4c6df92024320f45f098a0484969e76763923b9d9eb9c4d8a6993c0bdfe98c2dad0ffc8bb2c3b8f749604dbdd399c6fa81eed03a67796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e14baae7d9ff8097bf64b073879b4462
SHA1b6bfa1333d7f7641d6e3d24a330992332549e4b8
SHA256c3d542a526df8e22d865cea45d023dc5b718c850bd3cfbc4f827a189756f9ba8
SHA512a90ee1dfe9fafe8be70ff8bbd9537e5b5bfcc12320b0a968b0827263067682f4ba9012a018f1bf02cbae639a93a704a38791f0f23c069caf8fd14e40b0702468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565cc6c9e0d996595b8e39546f0ad25c1
SHA126a23d1dd6fc60b5e2666fc8e4444e304f06710f
SHA2562ac612f7c374f7c5a05d5bd3167ce14658c9bc1192c20c74a67503a0934cdd84
SHA5125acd62ed524b2d2376df60e56fde5ad0c91f7aa3610ac2c58eb73d38c6752e246b18f88021a4bf0e05683db10584806a87c93f0c093d87b4382ab142d2657726
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0E1IWGZ4\544727282-postmessagerelay[1].js
Filesize11KB
MD516f1b19cd042265a234dc208fd7efc64
SHA102f67c09980ab6057f073d29f4c3f2792257d3a3
SHA256509be2bf36ff013c9a1c31ac54b751aac2401f14496662a16ea8af6903d21b27
SHA512652ce3d209d5d4c1e39f06e41e87a14a3174419b8c9cff8e5683846afb51f9f4939c41fb51a7aee67d9d26db80b370890182ab7df089f826479d3e5e2843566e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\rpc_shindig_random[1].js
Filesize14KB
MD5f03c96248811fb7bba5b92a7929fecaa
SHA17938e96aac5714d34a1ba76972f79d52b5f403aa
SHA256dc138da7a3e8f2591ad7e46811e2681412705798dbc3baf5b08b953b6be7afe6
SHA512568fcfd183f1d8c92c28257b9b0ab1e9ae35c445aebfd56de7dc4c45db129972f3ab4bdc6d58701e421bcb8a14e69a5fe77449c853cf49a612ba917fd0bd9fcb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YW15VCHK\cb=gapi[1].js
Filesize67KB
MD5b4b711f3e747704ffe02b49791ce8cac
SHA1ac7ce4cbd3c8ee66e3c8d9d209c1352c160c3b89
SHA256f65bf40e2f0ce993b54772f703f72d53f0fa925457346fa8ec2031879ffa91d1
SHA512b738deba57337a9147927f7dd35eab7c999dea6d2ff11f57fdc2e5b6f64326028a54778886548ba128a3f03ee333cc9e43de5162d8b578b85c290626577042db
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b