Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
615124ad4d29cb595ff387f2de7c49b4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
615124ad4d29cb595ff387f2de7c49b4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
615124ad4d29cb595ff387f2de7c49b4_JaffaCakes118.html
-
Size
57KB
-
MD5
615124ad4d29cb595ff387f2de7c49b4
-
SHA1
9af95bb021537a50cc122ba3b5716ef13427233b
-
SHA256
d8023d78dbd1877567f7b042e22d9754065fb942dd74b683a0d2edf6886762ec
-
SHA512
5eaa439fffe96fc831b6ebe6705ce8fa250ff0aebabec034d11ddf39318eb0a79218bfc7c53a92c9495b9d6d1b2ee791a68901c52c31a6f9ca888e12020d644a
-
SSDEEP
1536:gQZBCCOd30IxCX3UrfNfuf8fDOpfmfWfJfifmflfPfFfMf4fefMf/mfuf6ftzf6c:gk2p0IxnlGkbOpOuBae93N0A2E2myFzX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000ae517716d03e4c48037a1c80ef043e4527f76ba9ccc5da8e15fd7839a3438a7d000000000e8000000002000020000000c730857732eef155c510c5422c6a41a49e5510d442831946e78dcd436b4eed14200000002cb77bcc89a1fdfe07ccc365bdba2a767b7cf9d1edb1e7e0c1cee3d85b77b1c64000000091d2c482f6dc6c4e6cc2d31b40fda6ea07dfbe7fe2ac7b80f389ab8079d2eb19f1777d33b4835c3f92a4f1abdd3aa4b5283beb2530fbaf8e32a7ff28a0247b40 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8248E201-47A1-11EF-9EB8-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427756314" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09fdc57aedbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2816 2648 iexplore.exe 30 PID 2648 wrote to memory of 2816 2648 iexplore.exe 30 PID 2648 wrote to memory of 2816 2648 iexplore.exe 30 PID 2648 wrote to memory of 2816 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\615124ad4d29cb595ff387f2de7c49b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f1f80ab9224e3313a1e553fe18fdaf6
SHA10628439d4706f03489c610f4473aa3d430b9a670
SHA25666759ee569150073baf2a73e79111f141cafaddf7fbb3e8aacd68fb1e48f67f6
SHA51262e749217d8d1890b2213774aa6abd13a440d21a115033de9faf1f0c59a53a17f049a185af60f35eb49afd110adb27c37b46e8e7da5bd416517efac1c3056eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931c0b2909bfa62871aad152cb11a961
SHA18ac6c93d357a54432a273bf89b73611e2125671b
SHA256b22c6d7c6c2cf121bae5c79a772a438f2654f536418b761d8fb1c36a67a70417
SHA512a19100f3155acfbdcfe818e8a728a2bb4df98844ae3844f8662a013ccaf20790dd81cacca529f91e7f92201a81dfaced13d713b49db3410a03949f0e1786dd2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588fee2f54b9e376b6fcf421f33e1e6b4
SHA1104506fd037c6f62d5894fe3b19ee073a5d76c27
SHA256ff0122fbb18751cf585e7e898246fae44c85d8d71b59e3eba7e90d6284468344
SHA51255d657cf5967b918238bebd7fce7580e2928778a38769ee6bb35982cbac5fcb064b6e2aba642d5d4edf6265df3547694ba2e12ae007d2460c02dfd46e8263187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f31362c311df67f6b28f933339e34f
SHA104a110ea1d9fe36e22de01909acbf4c797278c46
SHA25655ae92d1d820c93b6e2f0092e227a768b2bef3b6f888ffb0af906c9e4bc64ee6
SHA5126368bf7943a9ccc983076b8c26aa9003f0b7c76fb8bac2cce047a285d66f746d1b3069267f46b96231f851a1a6e0363d033453c10eb90dfa213d2046e6a97886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aa71951a487a90980def2968958c41f
SHA1e900cb10454a612a7948c6f52f013b3f98008e7d
SHA256bb4609457fb4284728eb8d11b1144f5c9d9447a56da5333f186a33b8ca47d2e6
SHA51279320ab9b7d39c941ee6fd9854bde5b3853cd449a0f801ed2dfc22759efe3cb19bee3880f6309431a6245c9c49d6e64f865799def4d6790912bf75fb2d3e1ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ce1c39a092844f85a7c678e41075f1
SHA173e595d4e495940b6ac73e5793e52cb0d3158c8e
SHA25690ce26cbe915363d5afe6dbc44d02d82a6eb2a1aaef563933333299b083fb5e8
SHA5125c073bab5f95d8f6c7842530e120b7e17630d3fed0c10be5bf2519b117ce236d76e6e77830eb49aca3586d55de0152747e6f9821ad25af2bccd66c79164fb423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8783befb303aaef6069ee77eee35373
SHA1a244f6e4d27ac22e10c43176b0f5f69c3fd076d2
SHA2567f7676712b3a1beb699b9140ee1da73285b9dc606c341f43dfd4b9da793a9be4
SHA5128ad7886ddda2bd5273d41feb31ce2f349003907771d61a2ece824eb96afc50454f9a8468de97a07e72037484d48f01de3de59bf3ec7dcb5177018cfc596d25bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df772ad5b72301c883bc66ca5f6afdac
SHA1eb7244505191c912617417da2eacba3670c65a1f
SHA2563990404a71e00fd63797cd3b3cf78965cfc9ef87a080522a583fd950a2d936be
SHA5120ea35290212f57d82a50ddfd695b84680586eb1f371a9f1ebbd9ecdcadc46ff2fe12606eac63d58955a4c6d1d17d1ee8a9d0798d73409f8c3ccad67e02dfdd54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5686061acecf793a25e8c6163089bad87
SHA1653aadb59e3bfcdb853ae073f8d6640a7e6e4186
SHA256f031270060450993c666033bd712961f3cc1564a3c7a5c11ab811bfb5eaf62bd
SHA51237bc528320b302093e1b600b0fa94b00a20cfb0c8cb2fde45214e4e22871a6c8b1553fb3e2308e46fb2ca0870a5a25ad4a0c6ba952a2a869d661bb9f2f0f3a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5127126dd625784053625b25d63fad3dd
SHA14000236909fc8e3f13cee6114421f54d89affcc9
SHA256d8b10068e677808bad82118df8695c804ce973849b8baa00f4a26c246e8dd34b
SHA51243cb8791501d1b900892b0b286195d9000c41b2458d6f931b4335288546f79ce0da1aff1450decc700442d3ec559ab1e59783a963cb6144e5f1cbeb8188a4703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd3b34ab53bf450c4c271929688808e
SHA137a3696b7d34a17ae1f187e528465e09b625cf2e
SHA2562f28d6b73d8b9b9de505a8234147133d4fba146eb9f4799889c930620eda6347
SHA51206e5e704a8688e844d4944c855a5cd4e4c897aa699f23d2f42281983a3237f01b4b0ee744932d6bb9d446c0bcd51f9ddc0b3fd39beb722a903e7d7ff0ad0c7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e18c9265ce9476176e693b4cd3b1c5
SHA1f8ba8f28877701d9a9ee36a52fd68a6543ec3653
SHA2566e55af69523642ef18432f3308002ea7128d8b398a606cb5ebe26105c122a412
SHA512efd14bd78071ffb524b80fe84be8d357e2a03957461a98cee7936ce1cac7a9b229e69802237c931ce99210520581bef1d6210e3ec38ea6367a6e6ce9ac6c57c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5e8d779fa5fbb3a39c358cbe146fceb
SHA1e1c7719649ad5e0798cec13eadd2f9dc071a3ad8
SHA25647ecb5db50d8db7efd6620e6393cc8db3bff483da11b374b78bd9919f8e27047
SHA51294a1dbc58ace633c73e7ae699908b264263c1074246bab07703bdd1e760ab5eb30326deaad071412b51f2ebdb0860d59aece83a978915f459e0bfc1412d5c8a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521ce4d662bd7688337bbef544d495fe8
SHA168727d7534ccf867b7d7a9e6c65c9451be4a0ce2
SHA25623c42e03b34cac7bc6b14c08b04580e0a1ef81de65f2b5fd586c771342e45808
SHA51246814fefe21ebb128a3e83693a362166319927474d25230d7956a7e568019acb439dd8c79044163d85b4424b78247050cffe16c226e75a29cd4be7ace64f7b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c32d8587b211db93c2226b323b1f9bf4
SHA10c734200596f74ca8f3062ce2abe4664bf0f2a7a
SHA25694c815529f4acf1836ac9eb2d1793bd3d11aa2581794fd95bae4cbb88f98aa94
SHA51209345eac40989b893fd5a8f83c86b39fc1a3d222b11cf2496a321f4e1c4a056b3a4236e4ce23360e4c4b26b8d44cd18e96b8f11155bcb676987616836d54de84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f7843885e9806cd11af045099769cb2
SHA1aca069291e9ee6a0d80f7112d8f463b9ca9a8537
SHA2563b20b62b1f11f7fdaad1dcff3c03f9e7f27d984a59399658019167251f37ba8d
SHA51260e78f2ceac5b204f5ebb38f9b99f1dbddf702ca6ea6af8074acf48c891599d8eac673e5613edd445a6fe1a556dc3a32a95852dcd8631d6faac59e416b3289a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5883ef603c8c0f2b71acbd355197da462
SHA107c9f65b7e6492c70787802b8e565ea1cb70d11c
SHA256fa110c0e0c82fc02342ce96668b3cb22ef661194b95483f1fc4711077eb2eb3c
SHA5127a88334f648eb15a5242dbe14f746698292e061524a64da4ae2525bbd12f30465ce891567c80846ce1c3d87bfec99d5e3b1d9dbf0a200fa0a21700e9cdf46016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253ecaaeebe0c9397382d5d20dc72102
SHA1d16acca6ea4197bf7390950cc81db011c6155902
SHA2562584d14cac3bbe5a129cb5fa31cc07e07c074fd74c18fc67c887a3882cf0bad4
SHA5128f1c0a91d86944bfa609e34ac49e0ee1b9f19d6895e742c6af04c75e5d70122b2d6aa5353078fb9aea8251b14111072c9c69e143db350bf57fbfb735e8d3aa51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd90f3d13ac23cef42382a2d20c6540
SHA1b602d0063de6871fc92c21ebb429f627c58eea70
SHA2563f79aeba3efd5f48a68be70a8d7012ddcd6150edd5dee6983ad721af3456d797
SHA512e2449371e9f4f0a2d5b3e6ddd536b4c5cc251953ddd981ef5942f1c56d4a54dd1b3a31ed8b5dd7919a1747656fbf04f48c3f754608b8a000e80eb0b9950670f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a725c7b780db9c7746fa2e43be3bd106
SHA1b0d6433a728119a9dea6e5414ebf3f8fe93ad30f
SHA2564744463bf8189ce33967e911edaa5f8dc18448cd56364955cf254871a926d7ef
SHA51225e0a46cf3b30b370bd6b6cf8cc50fecafb07019915a7d48d768c157d72ee3a921b15f92c5a02a9c41aff79120517667aeb4ce830c0fe9659be9985fb7c9a74b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b