Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
59ab439806155f28b3198e7081b19ec9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
59ab439806155f28b3198e7081b19ec9_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
59ab439806155f28b3198e7081b19ec9_JaffaCakes118.html
-
Size
53KB
-
MD5
59ab439806155f28b3198e7081b19ec9
-
SHA1
36c2d627a6b217289d21b1b5c303a19d9cde6a42
-
SHA256
445f958568cba9e5c3261d14abbb9bc441debe8bd17adb938712a41fd7db4ed5
-
SHA512
fbab87b9deebde91b1d2cba76ebf05d15b9c14c9dfc5081577d11a164c184584cc98cfa342a3986dfb8838127ce3ce074b75de2c2a4a90b2ebbad5421af646ab
-
SSDEEP
1536:CkgUiIakTqGivi+PyUirunlYL63Nj+q5Vy0R0w2AzTICbbzoA/t9M/dNwIUTDmDT:CkgUiIakTqGivi+PyUirunlYL63Nj+q0
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427509558" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC3F9681-4562-11EF-B9AB-7EBFE1D0DDB4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000000b4023e16575b3e4f1a0386d6a35cd48b6824d93032f6f4675f32b00f2b518c2000000000e8000000002000020000000d7a0c450537fc84b6bf5566e4fa2ce40f2ff32c43649a4572e859a07060746fd20000000123d5588d9dce744823ce8086d33755a265e4b992fe8a28a637b7b5a5bd3611140000000077908efe453382d5bc8a5fa83b2e56609f53dd8d2c9a34f530e150a02e8aacb0ce01d1e7a3cc907a8068a71899ae3470f4fb007e8c46467a4decebd9d8c4df2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d92dd56fd9da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2680 iexplore.exe 2680 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2412 2680 iexplore.exe 30 PID 2680 wrote to memory of 2412 2680 iexplore.exe 30 PID 2680 wrote to memory of 2412 2680 iexplore.exe 30 PID 2680 wrote to memory of 2412 2680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\59ab439806155f28b3198e7081b19ec9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd57bbd4ba9a575bc5d85e9d979543bb
SHA1cc53c5074fb8ea12afe3f06a5b77a6beffb67fe6
SHA256067efb666f858dcd6c76611d1f26dbefdee4c7be44a1cf5cfa1b800cfa34c29b
SHA512d1ca7b82ad5ade62ac542900e8baf2de3ec38877c74392bf0b2360b97adc9b4f5c44063042fe3b04f02bdb8349ccd468efa20cf82b463673570716752617c1e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b621c687ca6ac9d4373b63a23ed288
SHA16676dbecb57c7c54086a6bb86affb895ac5c8c7d
SHA256f22691c7ea9d2fb1f93f0ade6b3e0da2133ed96a432ce4222a168ebb00be5b77
SHA51204147b19906969eaed958635b93b1179a60d3c6f7e5acfd80d309199755e255848dbd083d738ed16239c0de2ed83a6f7831674768e7157c261d4cfe101b63b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e9aa40b75792b888d88cdfdad223363
SHA107fd0b40d6b4a7d4994d56830d0028de6595166e
SHA2565dceddd4525d38efd9d6210b22e4128267a7c1324cb04f2096a98b3aae394874
SHA5125ef0f0acd08d07f8abd75458833baea78996b5b75e07f0c25f8bf6023e3bdcb74e4c45a657fdc9cc43520d2743020fcf6e43aacd5859aebbd10458bad40047f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5929a0d9b5d187e911d2cace938e49f99
SHA141742afa83eaadf64f764a12b7bd0cf402332c91
SHA2566f5de71d2c85bcdbd9fd10b9c6490b49f1aa0dd7938e917ce14893a11b00444b
SHA5121162dba2c58bcba576b17f87605208b33f046cb65f4d7e4b9eaa8b9ce53f026229e679326c580bafef5503ea8724c696aea4a64ef2c8238db30073a11b73adbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e22041bac4c2100151b064b6054317b
SHA16e2d681bcfaa88f5c3040adc8851ea23064475fc
SHA2560175b9a87094feba4cc743ef22963c0687184849066294be03fac04d505be5e2
SHA512127bd46396c172f2e7f4a7e24fb1a0f40d31d1d5a94e7027d2443ef5f0ed1ef720c25bd9923497b4971d4de367615db121cbe633b8cd7faee60e8c20608a54b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f11fab6357c2e4afb5fa27927aa556d
SHA12969f2bc070a8d74251eb31ac3afe8dcb5ec3357
SHA256bc386c5c84942d1a8983e8554b22c65efdbbfe367ef4f1fd0cc287e6c4aba377
SHA51250b74c3999f87845e1c5fa99d4f3026ab32626fc451dbd87b34604a6139de3f1ebee43dffeaaa89af803807371acc386d95b32e324faa8c56e92dc4b053df244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5617eb9a727e5fac260301c21428be3f0
SHA160453053fc8ca6520cd191d3bac4955a8297c6bd
SHA256c2160e2ba67f71121f271b1ca33e61a8a86a4928fbf42876eba3436009d73762
SHA5121150ee5582b676636edf5ce510b91b26d777d4ffdef8533caa93cfc191048fbc425fe2c510d20a49ccdc9b4870d7c182308587a0278591b4eef5bd87f1153868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53776f972a8189521adc97316ba7d91ac
SHA10d1f3be69f0d203fcded8c2125a22ba2bdad13cf
SHA256de0130464a72746039b0e31fcff58e7cc53948284bfa6a686d8acce139d7d320
SHA512206aa895fe4b7651aa80653e7b520ce84a7d96976aeb62ff6e976444c3f5527a3a5003dc4f3f0c1f56654178f0c40e591fcca4c2ee70eed139495466d63ea1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f843f85d780d7294fe3baf5d303d53
SHA187595fbd9e11d15c645d9b6876ff788ad117fb1b
SHA2566dbc2e8b78a9ecf2d4ba073a95e584a455ed97e7dfb03ef281d2745174fe7461
SHA512a431bc03d349ef7df59459e8399cc67ec05ab3844082a77fac62e82be74e95d83191d2f39d894f8eb49f2d1c7cc36c99f8a20473e6c40fc4096bf46b7f9cdfcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc0f0cca3d837888fc2629ef69a43adb
SHA1c2b929268e6dd3b9181144ed1dd36f92e491594a
SHA2569f0c636737a861819bfff0062ee532f2b39db78ce1d96535a3db77669d0c5bd6
SHA512d1784bb64c7e1f8956130b89f45999522877327cc855aa7415cb381882cbfa09ee83a7bf6d8f8d4eea0e067f0e0b950b6ce5fe494ea62e390ef4d0c301d7c3e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1bf466018dfe2b3a7b73d870e8a13d7
SHA13b63ac2b9d43c20e2c1082d1f2fc473fe31612e3
SHA256a93c4efd4f650355002fdf35933e4c527a8b969952e1f1dc45ba77643ee7f39d
SHA51213e888c614855bfc34c3661ba7e666f1fa5f202f82120c224dc40c6e42332b03aeefcf587e4250b88a410b91dff3a7428ef0cf5c68519f27cfcfd9af04922050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5956c4d537f0c8e0d008c1719d6f13c6e
SHA142f8a0b009dd876c4307dc3ff702312e6ef7e284
SHA256b86faa4d3ca7525f331f344535be5fae3914c7755e8533cc52d426c02e3ed284
SHA512b863f505d574b7112cf4947c9ab73c355cb691d17a92f16f3d909d240c0da30858ead49a032b2f68b1417a32167ae87d98f52a2aa80726781965657a8d809150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5675f0e41e3725fb9b510b55d7afad180
SHA179d4ff69636eebcb7305900f50435538781c47bc
SHA25681557c1c07e2cfab06705021f44567c5da0caf14b6329e375a689491f9a91180
SHA512ad8d5eb14c42384527ea2345de31790b55ca59aa4b8a24c21e16dc023b7a3069d02145e411d86877ee1e2d5d0fdf2428fe58f2938f014092a64ab804a6b2df02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be5d91bdc59cb714c8601d149cd1d335
SHA1f7be909af605a1fc7e216119e7f0f5f39452e38a
SHA2566562332721ec27e77dc72fbd9f73bda98b46a6d793cbccd1b3bf2fbd18bc4143
SHA5121268ce61a20ea2073ad513ac79c87812f9b2587e47d273c4a021e69c07165d05c60d9d709f2f6928e0fb688111d118301f3ebd8fe86dd4a4b4318efb5fd98097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547eb0754bf4cb27c9669221827abff5c
SHA10823d7a8d23cf28998233774b6a057de0c4b6be4
SHA256acad2de704f17ad2ea3278059c72b3c508686ab338b4f17c3492236f660c6824
SHA512fc0e9367c000502852465da2ecd9adc425328d65a178bf5e1ef283df6edc930726804947e6882e00a3a440e5d5ab8d8b5537c02d6a4adc4228e9b927783dda2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59690b85f50d218c9e14a2417a2f6e04a
SHA11b8bd94f8b6ed330c828a35d353b1594fe58dedb
SHA256c4cb56de370796663d6c5b84102fa99eb8d5c763fc3704006a23f7a9fcdd781a
SHA512868eef98b79f413e1735cb8b64ec3f67e9b004bcd9eabae2ab6134772aa9c459608d6deb7fa580e3cc2d6b6919c4e1c43d1d518aa5eb8a42bf592640d0e1ad25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522387a460a60c15e67533d15c76b75af
SHA1330e513428e06f873b3333221ffa7f10963ee1da
SHA2562fa4bd136ddbd2ef199b2a834d562b6ae971b8c8c994e6940a2214075b183251
SHA5124f6cbb4e4784bebaa1270fef82a279f4e1d2620ee2467c1499ffeb9643bbddd32dbdfc70db2b580bca44cbcf84cdd23c352926a931537743a8e9aaec91f31d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d957fd889161d1d660474ecfb18e84
SHA10f881eb2c84783d73032b5a4a59ae431a7726388
SHA2560b3d7723235cad53fbfef77c35619bcd031f747a9d7f932389a8e4126e1648bb
SHA5128754a3e2dfb5c3e014fa560c8cf68464fa565b36ed3b72ecb375b594646e51db7cd6b0f17936d193ffef451e1eeb1885e502f07401449607b7803f0e48535e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5a3cf0db2ebfffb5413e7e91f9115f2
SHA1afa8ddf67662aad57a6ede3c518b5b3291ba5715
SHA256ee87426b1f90b57f627cf0a89216ca1fe1f60a92e0c9221c849ecdf61ca5c2a4
SHA5123ac6bc4ecee61d85aafd7872540c1370bcf9a82bc56147fdf64bc61e08edc0e2d5a683d282e0af317c932b754f8addc857aca2deba58aa3b41f87962907b5d98
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b