Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
5a1a9cdcce287cbd85664ddb962051af_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a1a9cdcce287cbd85664ddb962051af_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5a1a9cdcce287cbd85664ddb962051af_JaffaCakes118.html
-
Size
123KB
-
MD5
5a1a9cdcce287cbd85664ddb962051af
-
SHA1
b0dc96af0bda2ad52c9eb09d849ab5210cec3faa
-
SHA256
519df6147738d361f858958d1bb66e10d6704a9e3257806866721e2493af285c
-
SHA512
ad8f7c6f0a2f32fe0243640553465ad1badab87ab4a4897afaaaaa0397c477835e65a0bdc0d3e22cfd10469f20b5e71c7d53cb3711e1c067c8e232592fecabf1
-
SSDEEP
768:wx/jrKdhlviZbD4vBbIFTtle8y4VDPrRiDZxMgp2Rqhgi7dA8NixQTr:wJnKtYbUGF3+4zRiDZxMgp2Rqhgi7F/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000000bebb6bda19ffa2ae14af2b203730392aab446dea4d40b8dc92a0a0238c02a7e000000000e8000000002000020000000df00d40f15bf65b206214721f24e586e46e6a95fc914686dbbbf98fb625b7fb720000000731716c022f7e60a444c9562598646a726a81c0f66bbf42d5b4ae0a429c7778b400000002dd0d66e02d555fdfeb90c2a7ec259addee388763cc0bab464001599150529244a516fea596e26aece3c4f82bcf7df93f92f3219c115d510ec0dd5b8b95ae2b6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b071e9e783d9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{049DF421-4577-11EF-ABC7-72E825B5BD5B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427518162" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2304 iexplore.exe 2304 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2528 2304 iexplore.exe 30 PID 2304 wrote to memory of 2528 2304 iexplore.exe 30 PID 2304 wrote to memory of 2528 2304 iexplore.exe 30 PID 2304 wrote to memory of 2528 2304 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5a1a9cdcce287cbd85664ddb962051af_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ca8d6d618d48e24207da5395eddf83
SHA14bb5fbbb32d6435b026aee1d5f5ac581360ff793
SHA25616f272a8d1d4323522fc6946a3da51ccd4b37b50170cd007210e4c949060fa46
SHA51230d0be20c484a169a452f8eae81a56d870d2c29b34937f42bc128ab3beec65f70c9f4e0dcba2fbba689a636df9a184021c851f7afc314b738e36b93b2d47775d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7b8e18d4ec7060b55db0a20934034ab
SHA102cf794d473fd21871b7037a4cdc42fd3defc18c
SHA256f5d4ee488dd58bdae8e4eb217450f8c09347724f04160a9a8282fc9c6206f91d
SHA512ed80f9d0944a2ba9fa7e5b99962155b2bd39ac9657fc16f068353cc28d4bb1c0fa930a1214aaca754febbf5d47e770a4b3d8042129b4d114f01367f68f7593d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d0ea44f27b29cfdfd9c43af5d935e5
SHA11bb6be1e9bfca52dace6d097721255af5a05bab8
SHA2569aa573b3948ecfce98d84714ab491ac5b2785c5f09ccc5ee9280069df0342c8d
SHA51248cad342a55d7e7fef5e18471a7dc077159fdbbff789225bfb5e996ec8e6b8918de19d6b6c50090179869445cf3cad1a2d30819f1bfc5643450cbe87f4bb3852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa7627df712e7e22ea7858d4366cdfc
SHA105bad92dd40d0b0a37ec501aa231274bcfefacf6
SHA256f3b91d1225398f959da4d2ed7918035afd1bc36bf561bdaa1fcf10db503f2a43
SHA5123e5c2ec8fa37eb11d2bc9ea76fae1c70d2c8721e71fc1bc7288ecf4514c0e23ea16f8ef6fce079be78dfc3e360824ba9273cecb5221136a6c129f0148b4fea11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a17cbdb46ce2349e4dec5ce87da8503e
SHA14ed66f96377b096b683b2a147375d5260efd199b
SHA256a9203691f75880a6533b195c02a3c3646b976099ca4474b3af98e46e7f2481f9
SHA512bf97fa7ea461aa53e5999f33a9337b4c04fc6e4b5b49fe5bd859f3c80b172f06c849b17690f7eab50d351e8ae24f3d0852055a3164541a7614765be4cf2b6953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594067c70215ff9818850fb970183b40f
SHA1b9c43483bfdbccab5395b74652721a156e52924d
SHA2562ee7e75ed7dc438eb462d117f104bc2ee875875cc0291bff303a3b7391868247
SHA512fcfbba347ece747af3e3f3a6a1e2eeb6e5d08e7016b0931cfe0e35d5bd838d4b1fc7d962c824bee4d3842f13341c168ee133fb11026af7d692200740b6b6505d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da9e62191414e6ec0b9ec9c47973872
SHA108d9d0bf6c34dd35e43ce86a72731655b4f52f43
SHA256e10cc2d55b2a4a27de7369f2edec0c61386ec7fae34effdcc93379ca9fbd8561
SHA512e79b758c359aec2caff910c4eb384a69165ba109aaa6cb23314ae92ca14ebe39342949a276386dce6fb10a2fdf628ac2bf8a0a971603f4083c1c42e8f988ce59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e84f246e3f2655c6a8bd900c5515822
SHA14c601b896fdf5975b98cbc3e4f5e058df7e06e7b
SHA25675eabdfd7ce4533f166fca0898aa9515e156977a6e15ad15635acf6801567aa4
SHA512f61a413873e908f792c6d5f76c7a7093f975e6a26402b0b0570753f2fb4161e76044eaf127e183f6adfb095f387fafaa28560ac27afb39a6e5154d3fc9401b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53343d036b8f0c6acbff0d3da0b8683b2
SHA190649eda44a7201b316092fe1d6776d07239d981
SHA25688c9924d7a8bbefb506c7c2c104467a3ddbf7ec9d9227512657cd6ff5916bafd
SHA51243ae8e9995d1be429e4af36cd9e3db6e2661be6b3e58d401825b300abce5993283dc0b8ad1af2accfb6bdc03e746f129849f3feb06bc5336efae223db7b05ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e156052a21b16c3960111d7826efc95e
SHA19c46ed97ae701869bfb23e3fcd5ae889377f89c6
SHA25624ddb87fe42f682e358f330d355ee0850883897f44bd51c77fdecf58159361a7
SHA51256418cab25fd112b6042873bf8b37f1d78f59782dfacd21488097e2a11944310f49d3b5eb97d98b54b30ca09d6655428b737b67a49484e634c99af5191619978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1fb37e7455725f380c7f37f86166651
SHA103d400f7db48a6f113ddb303a819ade4134d73c7
SHA2564ab3327098b2807269c546f598e5cd863ded1fbc46ba2d6a2fecda623e4f95f9
SHA51270afad375e65ce17e65306a9bbb9223a0e31eecf077df72da451e88116841733e2061113a7052962a38454fa801d5f6ef661bbb268f27ef07d082ada57a67156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab0d80f9725d04ff3a17ae3506063b6
SHA15b375b3bf0c9260e0a4d2240fa3a94798d54cc9a
SHA25699d681a4e058d281a41b7f236597cdc1976df73e43564e92c476ff39905820e2
SHA5122b168a9c3a30f2bb6e26bb1b325f1b1f6218c2fb614da66c1e1d676bd2b880337eeb809baa406235ba5a1714bfc813e9954b0f285f6a7f3a69ea425c67f8b93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b16cef77b60a21785648f58ffed1cf
SHA1f94b31210c425d94e2ea664a11702422c772a0ab
SHA2568fdcd783dc3d8e3a03410033fd406eb45c2a2dfd0d35a5a0ae506c5bf98e3fbb
SHA512ad5ae67f724f68e7109cf928559313131520873ffad166cea56d4504f185ccc2df06ddae64169a91e4668423b317100da4b9933da462c0cb0011b7695413545a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b325524e921da8b2bf88a5cdd2def86f
SHA112520bf314bbcf9aecd89aba7949d6a7411076a5
SHA256dce870c4fcd1989436e4be6192c0d0d2be98a7429ebe571f7fca474fd93488a3
SHA512af6c0ceb9e6245ce874a7ef3ac84cfe71a014abdd35d12ed344bfad91ab9739f702574d723d13ce773a2ff952bdc41969e3b37f1a973b78020791ec39ca9a4e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2cf7ddbc512ac00b542bb028bb86593
SHA15338a46d4c9673245c3ac2e23b391132431248fb
SHA256c729d808e9da2a217a3e1b7a39ece657199aa2d2a3f68b64d18f687042ea3853
SHA5129a37a70e80dcf804a51a179ba2c92201fa39ad47a6f796112a29bd0c9167697ac00a473e39b5a6ccb3005c24b4455c2ce92e31c7db3b48d58a283230edea5885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520a519b44bb7c190ce6bd09e3afc9162
SHA1fe8f75dee1187286b856cec89ca781303371b68a
SHA256546368f5dd35cb2b7bbad0a6dfb2acbaa8c52dd99279a4873fb677bb85336573
SHA512afb3f16ccc20154670c16df0cfea0d60dde9541c46950aea19f348a8abe618c9014b98364e66e26323dbb117a49a97883ae1441fd067ae06b47378da48585bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf12c2555ad4f1daa6ec79e8f19fb33
SHA1e9f4049dd5e56931eb11e8febbc65f0261ca493b
SHA256700619120c963ffaa2290c5a2a1e64a64cf21c4c2342f07fbfad2f665a6fb98e
SHA512799c8c5a96a6964c92f3be1843339410e3bf995646d0fb67f458de6529a2df807278a53acf6281b5f69fc0add28e78781eb4819cc17442f388dec3283786aaac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ed14b66542fbafd3ef1ba12248e21c3
SHA198795dc9dfd6ede726556785749e9ddbe65b0eba
SHA25617cf6e78e6a556a2dc7565845bc69f35a1abb8ca6b5bae42939baccd68a960e0
SHA5120dd4327d98bf217978a4bac02534371f5959ae869229afcbbe2ac6e442355e44c5fb57e6b32381787740abd7c7f9df55535f6f8f30c3c1ccf413e283da6ccdb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c50ffd72eb694dbd6a902e3cdcdf5f
SHA1ea8bae1a9e771e773cd5ae4c474aa1706541d7e6
SHA2562716ee153663cbb5ce42140bd830e2db9faacc8c26f3f1631e3798ee1f9a5446
SHA512c7ffc03f62d9b4fd0570b03e3dfa3eb146590b2389f39c4f20a25aeada3d5eeaa42a16ae3995fbe1012517ffaf00f2400716e0ff8d6a929eb1095e9635cb48e8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b