Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
626d0d0bf204e8056f0adebfc10d5d37_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
626d0d0bf204e8056f0adebfc10d5d37_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
626d0d0bf204e8056f0adebfc10d5d37_JaffaCakes118.html
-
Size
53KB
-
MD5
626d0d0bf204e8056f0adebfc10d5d37
-
SHA1
7bc339e6277059a7192074e1f6226366a57cf09b
-
SHA256
1b7235066b0ea60e5af50dd134b8e4313d5c36678d40da392d124daa6a9b542a
-
SHA512
b201757b4f3951b09f51c96cf5071fede5670bd78dce768410b2d6c4777334eac8fc2b3c37ac86550bdb616312df77178dae802103875e41d409197eca80ae74
-
SSDEEP
1536:CkgUiIakTqGivi+PyUDrunlY663Nj+q5VyvR0w2AzTICbb8oX/t9M/dNwIUEDmDE:CkgUiIakTqGivi+PyUDrunlY663Nj+q3
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4051C2D1-4801-11EF-B74C-7EBFE1D0DDB4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000047cfabccfbbdf7e64dc37a71b306cec0cb6aada980cc5f469f1c99a18aca106e000000000e80000000020000200000007feda41d9a08cdae345af2ae78c2284b94df473fb3a0984aa710f6f8eb6cf2e6200000000430e1e09109a85810170c6b7c880cb37a83169a13d8ea605edee7aa2ea4beb340000000d45b2c2606942d3cb2cf13d8da47285c1a16d23e8a1e657265a9988269f8f429026c9c95133aef1c2ab063f688176f008614a544eac6156da2886bbb7c5ea129 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0134b170edcda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427797435" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1528 iexplore.exe 1528 iexplore.exe 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1528 wrote to memory of 1332 1528 iexplore.exe 30 PID 1528 wrote to memory of 1332 1528 iexplore.exe 30 PID 1528 wrote to memory of 1332 1528 iexplore.exe 30 PID 1528 wrote to memory of 1332 1528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\626d0d0bf204e8056f0adebfc10d5d37_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1528 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5451bafa223ed69ce59bc833dc8d5ba5d
SHA1dc6e2cea404ea39e537b647ac0246cc3c21bd7c0
SHA2564130c42dca1844e62cd99c6aea075c32051727ba614b59f05a1ee1c4decdb81f
SHA512d37b8f1c180c4d171424ada1a24c54f4ec94a507d89f264b728c47804222648494bf0c74db1a2a3d4fd45f5045cf3e8e7519e5316843eacd1e8dcd558fe11d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527db2b4f62425c23b39f13280434c3c8
SHA1d204fdd7db128ab9a30c041996c782b0a2684fbd
SHA2567a9787d2bc59f962e5ed01fe75d097a196743cc9b824c707eca4c42dc6dfd0f8
SHA5128984df251542d24b1a690c6c8672f465d58429cd3ceb9ab998a15e4b847f449130b4512de8d9dfe2a3ee6427694b143ab83fa51115663ffb0358c5342a3abf70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699b6c275652df3ca065d00aff93dde4
SHA152b5b18fab20f778f9c1e61cb7bd6d96af913d70
SHA256d6eb61d77ad708ea280a9626e2cdd05a8703b6339af9d9d2bc816178740f8c03
SHA51206e466130f1cb2bbd9197c7625881e9021a6d601ec41d65a51c6da968ee790d8177c0a381bfbebeb2399f4020133e7a3899095c1e99067763a6bb9d89fd5a967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a39811719a9961712bcbc6e3854be2c7
SHA1215517c92a1f355aedcce8bcab78c0ff9f5e9ff5
SHA2565b21d6cb07a87614c6e9e1d93468b7fbb6ecc72183ca0d88d3eb69d835e49ec4
SHA512ca3fbae0f27830d77f898b61520b72233524a388de7829504db2e6318264064da3c7d46fdae588a10ee79a3c4f3b80e5c1bb9ac1bf43e55ffea78a06829c26bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dda5acb384864f814a0b23a6a8bc344
SHA11c4192356bb24a1a4ee2e1573fc11f55c6590aee
SHA2566e748dc7a23057bec170c8e2151f59131f55add547eaac1dde3b6519d73b2cbf
SHA512b75f5142dbbddcdeb8eed981e37bada185f43208cca8ce21c971df1984f1125009cde046b6ae909ef7f702c2ff584f81dcdd6c0d701dd30aa790924ed08bba0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ef8f2002da02001cfb4ffdf45e7b2c5
SHA18a9128406738af19946b802c185edd586c8e4af8
SHA256973e5f3c75b6653a706365bdc67bdc5cb8f30e53543c29fd0535c627e0410123
SHA512849df68f23e5c39d85aa5461ddacd1bfbde5b50c74e8dc06a2bcd11e144350f3ba137ad06896428f07b86e3c16047edfce8215197c6c01da2038f40ff13bfa9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5534e6b88e0bfc629f89060428b967c83
SHA1519579f8527f1e664be27fd04ff2a7e348ac17ac
SHA256b04668a3885522e201c8d941dba039406adc11cceb898d2c173f92bf53e4123e
SHA512431795c54623ad0dce2cb4a35873938063726b6bdf34bd9b7cffce96387ec2e92017effe463536a919a8b9dbbd55b238a609c7f0bb5083a6a558edc573ba8945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5424f7c19c71bd1e8cb9a2b53070d9bc7
SHA1a267ad755c974f4804c6aa2c4bd49f2db48cfe38
SHA25614e5dc3877c82303297fba748faccf720dbc6855997c01d337ade678ecbd076c
SHA5128bd4d820931c582b5d95bdf32ec205d6a8ecc2da9d8e5a2770c557e8458628c8f90c829e925364dba9ad65db7900394e4a90d84331a8970c3d0de15fadc31989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520b84fd03d8c8fb68eb074cd231c3d9b
SHA1fea82f9eb626bc2532d62a6d9f5b33dd1eadc7fd
SHA2565180e65f3103ef7c870599640cf1711af27f89918515409bba89025d08778bd4
SHA512c9d3b93e97a09c9fc62ead94ca87d61c2229279cfb3cc7eaaa9fab074b62551082727074615d9b8b221a1313074902fee01308471cc3dc33a06ad67c867fe1e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a18acee2d4e799a8fb4e192ab02703c
SHA17c9018f5c17e765be0c207b0eaa88b159449f208
SHA256639ee1b65afa46bfc0135e828c1db9e14948be75455bad653089b4e1415827b0
SHA5126616444b76aa284a48e1233c7c882768f5b16ea40040495d1650bb16a65960558dac15ef06648136e85cfe7a1155bbd2fff9554124c24cc6467f26509bb07bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffb07eb503edf8ecc46fbdecfb1dfb77
SHA13b6838257a4250c4a64c5aaa6bab140be6ec3933
SHA256b54a503b753b1b61b240229ec5ab92adc4e09ada700f3f0b5a362bbdebe16efb
SHA512198f3f010b719ecb90f1f074467a466b8988553814d15d1bccf2b3e801f11175fcd1dc7c138dd4df498fc791f02dc4b42cf650942b80bb5d1e8f247b0781eccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71db5be70d0683a1ec12186667bcb0c
SHA189eb7f71910adc1f6cd8d4f8a82d9ccc01a08ded
SHA25611ecc71db78154b3486ac7d7ce7d90909e335253cc8b981f1d3fbe6217241fd8
SHA5123d01c90b2be5ecfd65dbad5382e6d072f5e6e00cb57b8f1e2a9deb35d8276415f8372836b1324332ed8b454e7762c8da9b6f939f1b60f8accd6e84fe09fcaeca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506a13192348c82fe0bbb4cbbd97b671e
SHA10f431eb0c8ef70ba513c50514bc77c992ffe1395
SHA2566454f694054a374e4448344ab7aa318d249e53562ba111fdc6a6f6ad7bbe36e5
SHA512071ef19ac1ec52bf21fa8f75f8b8479abe22210af321114d309ad87b134c9e19b05e7eab54027224dfa0fd06b80ad1bab6ad69642a59987b43eb22b435f5181e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d58822b14c912ee2cca2428217c896
SHA16c1c8f5f8e9e9ffeedbf11dc92eb593939bd30d0
SHA256f4617a3beffcf9f907c606304d3c6ef3fc343639c0f3d961288d5c56aca8413d
SHA5120504f287e48cf6c59b850536c6871318be30a909203b6a279b762e6db82606d679f44ffc77d1339ec9179b4ccccd422181e70015556c3971629d55a216c7acc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5539d0dcbd30639a0dfc4ed6f3f4aed35
SHA1f0078327b996bfe8c6f5120fbf9014cbd6ba4680
SHA25662950689155cc13b16eb3aea075c4e772508691d4e1bb7ff44d5f41e2690be99
SHA512cc350b3f950cebc2591a2a743d0ab4a38af42643c2e67e5280bd968ad1e5b2b57beac83849c3211d42a544c013d3bf744c025b39713bff35a23715234371ca9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ddcf28bfa3f7b8f6520a2966591c88c
SHA1dd7831c521ff511655ad4a53e264b443f69acf50
SHA25644a0178a92a4200950558b83b74c54956397a97e4a85d870a8dc92cfc340c994
SHA512146cd7c25dca17b8aea59e04f81111272109d5b5c77206c5ddafa4d0bed96afd052c37f49232713476838576ae99f1ab7cb9cff6ed5d1b79c42e167e570cf8ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caad6c1acf2917d2b53b6bb351249e1f
SHA1faa04f04cf13f1f085ef2f5ffb82ab6228e0d661
SHA2564bcecd33e42566d6d900f69c13be2002824cf27f0d115645e2b0fa7e640c8ffe
SHA5120374eedae9f9a1bf454632f5e74383c52230ab26403da786ba803263e83d6714dcca28897085c3579938c52624c3e8d537aef6b23f7bb0add4764612ffb37e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d580ad91ee1b76c6e5812bbd9323a4e3
SHA1d86ba9837d25c0389ebf3fb4fd26e18c62a4a187
SHA2565da25c22061e1065d315dcc06759048abd5cb65e508a001c28445c3113d8d6da
SHA51252d220adbd6061d2ac32de61ea1af6a9c5e515c0c4b72f66cf8ffb7c6a647b8f889485af859c059142e5eefce670970c26e6595403d0fe17fd102c512f5ad0d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5371cf46fcc83c9b8443e8158117d0dfe
SHA10dc696a62d983bc5979ef7227714077e3ce3204f
SHA256bc48a36e1ce2d35138cedd5d0e9c33fabcebc07686098b99a151f47d4810aef5
SHA512dfd4850b69545ad37de563e0d93d8bcaa28cb4cdeb6a7880f8fc6af5369fdbcfeab46dc1a0319fa2d009d2756fc663fe9691537500b6e73d0d7ae53d5bc008a3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b