Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 08:26
Static task
static1
Behavioral task
behavioral1
Sample
5fbf325c07c7415018a307ddb2528a18_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5fbf325c07c7415018a307ddb2528a18_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5fbf325c07c7415018a307ddb2528a18_JaffaCakes118.html
-
Size
1KB
-
MD5
5fbf325c07c7415018a307ddb2528a18
-
SHA1
2f2c2062983133145964a86eeee71920fe845a40
-
SHA256
13a5b66f12b395b443ba28951052a03b60bdb614227c26215c88b174256eae16
-
SHA512
bbc9dfd4cf9ffeeab9cfef8ed9c755dad50b331db4071743b25a3a121a36ae33b126f936ba39d9f2d6b83408468643adc15ddef2bced75108a6ec3cd1e94539d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2011faa37edada01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427625832" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4EF7741-4671-11EF-8893-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000004659ccaa38018c73d6e742f79ad4a168ee1894479fc9e6ab84f1469a181f4a73000000000e800000000200002000000054425c6ec73ce8e13fbc55c1a737b2605477ae3bd2e7733cc731ca1218251740200000002e407b0f774a0abee913ca53e0cdad12490731e6849a77e0bf97c243b622feb9400000008e36d966ac525833720705ddce7dff474833480aadbbd5dd7659dc3979c5d06873904c8c08aae9e1de23ff1de85b9d074b13f8e52074cfb17285d56c4c26838c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1344 iexplore.exe 1344 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1344 wrote to memory of 2096 1344 iexplore.exe 30 PID 1344 wrote to memory of 2096 1344 iexplore.exe 30 PID 1344 wrote to memory of 2096 1344 iexplore.exe 30 PID 1344 wrote to memory of 2096 1344 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5fbf325c07c7415018a307ddb2528a18_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1344 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56594eec9956cb86b4f5ce084c3f99639
SHA1ba9fb116e8d2406ce5f08a15fc9559299002f59a
SHA256e3824d420199d16eaac4cf0803a869c1e0780d8407ff73e3998203e2d86c79a9
SHA512f15736de7719500af69df3acb4f07bf408deed1934f9e2c5ccb480924984e8cb584d931bed3f75dc059c5f8d46f68526d66bd4cdbcbcd8094e55eaf42cb87335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553ae8408150fc2d3cea1e7d6b1127f45
SHA18b49aac3b8a79a53312cb0b04d1def56d9a0e8a6
SHA2564cad22d970d8de0d9a1851fd41ee407b1f4d75a87144a7cc870c3dafce6c129f
SHA512f1b214d7292839680fd332258d5e01ec762483c129571e07e06c51cfd4d64468da262e665fc2f76f7e7498bb72480519dbf59363128f1cda53e41e5740475adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6678c8977f2b47a8fd29908de45ec61
SHA19d290a5cc05c12a8cd135f6b653cf446ab5ee15f
SHA256cd323f4196207e11b63aa3a05874eb1636a4621f97e25bd4af97bf7218e5a703
SHA512645029e88bc55f53445881c6ef1d3cdb61ba13d1f882bca642b4347a271560f684b85091823523998a9371d0211dc6e057908636af9074dac2395f5e33c38384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5493d7950ae45887eba5a7171700e9bfd
SHA1eda4afb1bc003db5c35578f647137f5b0b918113
SHA25627ad1327ad688c33be07b7e2ebfc7684b83d1f9678f28c34a66ca1b114f88011
SHA512a9c5519aad2f45366d9ae55e48731edb8efcca619de0b877f95aaa4ea24d85db5241770f6a3281f34a09e346fc45f79ac0f0899a5eca0211b247c13e796424bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a395de35f8c3dfef69fb8245499564f
SHA186a425a2b7c9efb2eafedcbf217430fbad58c025
SHA256ca7254a5a8dce369c8b784b9381125012962a12f8dc09386cf77145b626ff7a8
SHA51247462110971e6b45a734ae02f152d7146279c4c9033c8295d38f6b090eda31fed4a06d2d42a4b362bd83e17328bcd5a58a661e7b1c252f0a1cba0187d7716bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c6ac2aef49b8612e0a8bf122dcbb5b0
SHA1f9714545fd6c08d42992c5cc29726103d1984800
SHA256f89e1e133dcd5b0dd6510e6ca49d532ae0e063d2e22f4fc066ce112230129e8e
SHA512d6eca964e53a9ba4325c290138b1cd8050ff1b78ea6883ab4257cab155c6a9dc38d464c03d4edd1d78a37b12695fa0f23812221f14846cf17c32e956dd6c389e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527dc68888b1ba0afae744433347a1868
SHA15e0e1f73a9b27cc47e54b2fe3607e3c3532f2edf
SHA25639c4aca69af290cfa414d75e8328450c01cd8de10ca489a4747689cbc25cb8f0
SHA51201ae56a9e9cecddebfd6517a9f76be5dfd0bd2eec374089d7e934eee248b08a34f1a18915f70b0d5485c5ee4c421339c770f747c87bd32c68d74bd84d80c4494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f811c588de4ecf22f3893374f1d336
SHA190421406c03d3f9f194b51389c26e38f6d03a575
SHA256736e95347b0636f128a9ab494eab065640a42acdd1a2cecec5af591fde23e0c9
SHA512930dc7b360e4883999af7661706bd57fd62e643f67eeeff0531f92fd694d7ba23ba54cefea5605d88d5ca12ac9676e65c27f0dcbcb2e9aa600c99aa11a223bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c97a35657aec785fed21523bd9eb2368
SHA11166491a43d22ed6e882319dd559ac50bb194d8a
SHA2569f2d1bb4a9988cf4693051945d2cddbaac2f76078b2cce87608e9400e9430a3a
SHA5124c1fe41a6a02067731650d7ea11ed72510ac2186ced855f5db3a07f4dc6959edc567426486f25b9a7baada18c3ba578220503196f8a6af6474f42f85e1b55386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fee1b7e88649f06ae9207fda6458d3c
SHA133b8ff793e28c46bfe387d7ec14e8627b7a2e672
SHA2567fcedc635e01fb9da67c0608062b01b08ffe104083bdb6eadce5a7fc7e4538c1
SHA5122769823c93b4682e06b6ec911975870bc34e3bc73bbda8f964d65b11a42ac3cc83141b5ca2ab556247e5eb9ad9f6da77c5ee67b92cce59fec64b727169baeb8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5129a78b0702bcfe30b17a7e9b099d9ab
SHA126d4452c282dedb6170ad28366128eb5fd6fb25f
SHA2562befd209a52920e194dbb9d7369fdd252aa3ee0be0204fc04355e8d279599b1d
SHA512d439337bef4d0986818fc5d80fd548f009670c2fa93dd4a79078989824eefe2a650833862055168d36aad4780ef988918ab55fd4063ac9109d6883a7cca97d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d751f3d32424c3b1548a5f3032bd19ee
SHA13093e41b389a2938864fa53624390fc7222429c0
SHA256ee41449a6d72533ed84df744c0d4b2c663e4a3a229f0c76ae59312bd53c89d1c
SHA5129cd6ac8aee91718b4deebe04a23940b66c30f33acf4ed2721276ee64c782a6990fa049f18cc4992079915c389dfd27e7cb4e9078ea05a436809513c6ba225a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55193f377e137f86523e86622cac94a60
SHA1981684de373ccd3c7b40d8ef439f0d895bdaa950
SHA256f6758c90d4fce6d8e3571989dfea4b1dfdb113fba4777a6efef9cf84179ba1ef
SHA512d25274ff940a03a30991320953b3d92fe95c38ab1d99d39e21b0d85674dcd429adf1bafd54c4ad9511ba7bc13106603b262d0b950fb8251ca448cdaf0bbc34f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad919940fb41182054dd3758f78fffc6
SHA173d280ae89a31fc68439fbc3c2720b5f9adb89b1
SHA256d718e33b49de4bb0af61357653a2ad459766d2c1e504c1d4b6080a564702b079
SHA512a5b71fdb3dc5c3fcab3e983e1444e3c248290e47c58a95d0970afc59f9a9c101f8b956e2f9554f39952f209796b4c8b02524eae5e9ce363b9f975a2098b47641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9303a36c237356cd3c78d0e2a3250db
SHA17b2b1e9da47ded3dcfcca55ccdb98221f657fb4a
SHA2569c0f6484d79551416787e90b091068e72a71e682c07dfd762ab34aeb487b016d
SHA512293d75a2280ee657a3a57adde8e9e2c38893883758e5cf5992570f37e45f27cc68d838740d5e658a743a7c560f807263295faccfadf180b213359463e1766a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcb16f203ed29e30a5fdd24b7e18a9f6
SHA1802870a86255fe171e113bc3f6b1ccec974c0cec
SHA256d4f586bbb8839e1b60d9f9d866b86bf8f4e8420a9e89a4218a0fbbdc6d8c61de
SHA512bfb34610458c289e658fcd81867f56241f967bbe3cbf9ea42497181a3e10f9e2b303e23b5268e6cc67c2ddbfb0df06e69f1e9791243e2b82e3ba3707a837ff84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f04900a0d4088dcbb6141bb50c1154f
SHA1e2b5eb35af273a56c5feb5f103301c3d8177aa88
SHA2566ed95d476d73eef381cb6972a6f686ec62e59f43bc1e5f4a211713af53ff8f6c
SHA512d94b56e4584bd4f52d5950cd35cc5562d018932eee84675f4c8872bdde5a775881d7e04c30564066de1c70b629b81c95c6a607f0ef0c834b907863163c1abe5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578e4e975e582b5aa98ea75d14d552eb4
SHA1603c5635f92e56c2edc6dddc4f956009567a5395
SHA2560cf7129f07e276f41fa225d68a5d48efa6a674588b24a9484348d8f52122b97b
SHA51262836ac8e2b01b4cc1b85cf0ac2dafd654f8254c3e78f623c19b0290ffc407bed85e8860e14d4525a4bd50f1d00235a69c670d793a62fc999b58cb3ac87645a8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b