Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 08:30
Static task
static1
Behavioral task
behavioral1
Sample
628366b5921a2e5f0af14a1fd6d52ba8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
628366b5921a2e5f0af14a1fd6d52ba8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
628366b5921a2e5f0af14a1fd6d52ba8_JaffaCakes118.html
-
Size
90KB
-
MD5
628366b5921a2e5f0af14a1fd6d52ba8
-
SHA1
72cc531a2064cc0ddd8f4347ecf6e6ace5bdbf25
-
SHA256
949e79434ab4af8a62656ebe673ac2bac68e1d4557f48c462ea3b1a0575941ca
-
SHA512
8ed901a409315413e6bc36adbcbd1d43990afe500364d663324a12c83fd7bd8eead91eb543dfe00a23b93c0d6cc7f8724423e106361a6499ef93080feee0b85d
-
SSDEEP
1536:n/y5iDGAoKyFOdNvj0SxEaukVN+O7fjet9ABuJtz3gYrs8clcR90FfeyGEOO:KOUSF+V3AEP3G9S0bL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427798924" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8044eb8a11dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000f3c08202c4626440f2d0858c7db903ce0e95661dcfef11b5e8344cedc2176c1e000000000e8000000002000020000000b235877f783a29142311555239f09e054eff2344471d720a5089e053e05b764220000000455b91d31e31115652e586db286a3e75a378c3e2436b280237c2139dd2fa635840000000085768d9ff2b21aed514ed432b3955ce2665820b397841418b72ed3bc34751fcd4ef17099470322762f6528bd9aac29c29abe882da16a20243071b4babcc5d6f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6065C91-4804-11EF-8420-FA57F1690589} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2052 2532 iexplore.exe 30 PID 2532 wrote to memory of 2052 2532 iexplore.exe 30 PID 2532 wrote to memory of 2052 2532 iexplore.exe 30 PID 2532 wrote to memory of 2052 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\628366b5921a2e5f0af14a1fd6d52ba8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50a6b9fffe6fe727109ead30f89f9349c
SHA1a2204f40cdae59b1b5870a596e5c852f529b51be
SHA2568333e53ec324e2a5a912b76eb4823374d348407a82046ebba3087f502261504a
SHA512fba852d5e02fa06c5225707900a74b4826aff4ac770e0a0d16a92a450a3f49fbc36b84e5893afd2b0c14331004b0462a087d4df1fc464343c88b1eb3ce7eee99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD544031a220d7163eaf7ddc8c8ed135351
SHA1649c6b4d49ba1c17451bb00cc838e26e8015a0fd
SHA256249659799dcb25bd847b738d709f645a2c592692ae560e911f7d8faca145d0c8
SHA5122df5e9a3e604aab9664b2290d1fc6a757308f8d41569b7ddc4ff3d8aa2d12dc0b52cffe9d59a51435eac5f99a0881287816af32bcf0f1f6575b08f25bf7b9b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD547636a3da0b9f679827b7af11e86a948
SHA1a0854c3fa0f1ca62ec6feffd1ed2f2387dfc989c
SHA256990022343851a352eaf0cd50e2ec7aafac1eb29cedd63e8cfc71ad150f3f6195
SHA512120f41f400dc8df1275816c87048c12d31a5a1a42aa508e36376e49e46c2c0b107a4ed8283c5618a2c234bd0b292a10eaee5837700f86921a0e2391b5c6ff6f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bdad3afdaa2e5828e105efdb06ac2688
SHA1d72aa086102f133289cb1502eda9e23614d0d361
SHA25607e28282654eae539d93c7c865ee5842a79e51e32b40d4a87944bf1d08b887d5
SHA51274b8cb27285f6079945a09e86fdafd712839d906e66ebb1e7c321ca24f54913ba0c798592f8700c600c2d89f8549c16fcbe7ff48663018833a2d99c4b51373b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d79721cd8f0959fadc6c4f85697c5ba7
SHA138edebdd8f596c5323d416adbe5d08f18dc36153
SHA2560fe2f8b0b7bab28462d2c6a162203459b6d3e989fac1bcf290e821ca07619c95
SHA51286a46f7f3938cefee1b0cedb03aa168d15721974f2652d6daaca1c2bc180cfe68ce3526024cd4bdbc8302c6605ae02f60f2d8af99e1172fb832daa6ad99b6d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a8a36f3ba963a617f8478827142972c0
SHA12903cece2eb5c19ad02bb492e683f8d28f167eee
SHA2569ee6e6346684c1bbdc6ff526c2e003d72edfb0a800643d98ed69c048a02d0329
SHA5128bcb5d262a5c17a9263b2dd8a6d34197abdc89ca92216cd26dc7377fc455ff5e2f9f6efad75a9b9470fdb53fb2462a975f77dc3c11f3045683f04cffbd5e969d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5125a322244335bf43ec985954f774217
SHA1bfe6fe36795a38520e7afce4b467884072349c5c
SHA2561e6c12567baa7e7a9b77bc5a7de729a132db85270e0331126ebf79bf3bb86938
SHA512e0f9d66d357553b26211ced1aee4c3212335bfe44742cb99b99a580ec82257bb8df7edae23390c4c1c1d97cc09ec82517e587913d21d1de7b26cdff67abcf9b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a7ff6359d9004eec74353081a897e1fe
SHA1f57c22f828c06b4c22fa6a258426525fda255203
SHA256a1e51025da3c545e0e4f10a632c33e0dd4c76006b3517e3520adf4dcc3cf6ec0
SHA512d5efe72da11779fb2019e320bb8cd136997ecc40ca58191352c94c0273e28e6aa5c0e793167a6538903f1f0b251dde5cfae12a5818163bae6149c3f135723806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55537ac4344a0b4e36bb682dffa11d502
SHA176fbff2f938013df575bfc479ffd8960261ee310
SHA256a4ace964883cf60305f3e5711e784e36b7db2c2edebc8d34d9f480a8d251c0e4
SHA512ebc732060e94a6370e3606cf8ad69acb639fe2afd83af18357fb5167499a2a70ce69f4ed7d4d9906e75035de3a0379b3a4bf83abed55c98b495d56c557740453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57fc52b89ae031c9dfb395f1653043858
SHA19b48988fdb6f061e250671a65a0e343f7898c1bd
SHA256a6952c23947cd9950bf0bebf9d027d31175765c46bbf2899b55f0b5551aab0d4
SHA51250592209290f0aa339247b6f36bfbf8a52c194cfb8466f2ddb3f1177dc7be788d37e9aae959965b8e820e7a4bf805ec238d3a17b99d37957320930f0972edd5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5138996c9b9f00d1510482d356e8bab44
SHA15f38333515dc68ea5bd61ca73111efaa3a4cab04
SHA2568baf6d0398bdc655bba0a9c71b5d84c1109950f0bdf7f3828af7ce9226525c9e
SHA5123bc9834e1fe8e9735d212592a7d09f575ac60011daea85f3c3a10802897fe628b6981126c7d9588fe7fa7bcd7d90d80024b1422cd536da000af148911e9b9226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58efe61b954e633c4ac2242f427525693
SHA12a6e93f9e375588e2eced93a3d8dd94b1392be41
SHA2562d1a42eeda70211a240126659db5862184ebaa5b46c5e7e1d106f28f6fee03e5
SHA51241223d4cdda19ef9226c1b6924960549b1934a16b5b168519fa941daf31894342e4b602575867fc80f253168adbf71508168a5bf46299b51da3cac93dd7d1f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5370cc0b6db99a96195c979f952cf15e0
SHA11462d30272504fe28c67d23a5c4dabfa7f3e1ba5
SHA256ca50b891e25b0b23a6fc936d1f476f79c93636821a943f106c985bc2eb0614e6
SHA5120bc5208e571b0f8711e950592f0cbcf264583dd6077addd06b912e07a4b7b1743dae6ca8d6a8780eab92f05ad020f6c9da610a21b817331bf40a15eae485e283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ef56cfc3f0d933de005fedc5a9b86236
SHA1d55b9e4433e6818f4fb18484099e552630293de9
SHA25653cc22c3c66b8aa75038d34707a56e106d513cea71d08c7eabff659e3ee60bb0
SHA51289227179b8c087d5d66c55d13fb7afec4a07c83c177a7ac8819d223ebc80be0af5e5e322fa04dc5407e033ee0b10b0627df3f95214d7ea442f7001153bdd4f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50f8f96338748ace445ca52df609f0633
SHA1ba76fbc07a2cf08758b6e00ccbcaae45df7bac2a
SHA256126c9a6d353ef15703e73c7c575626c7c8ddb6ae57b9a0fdd8460ba7460b9606
SHA512996fc4e2aa6465009dfb9aa6d746cec97074c806c85768d08f344126524e577bc162624261626a2119fea522e4034611d7925bce578305d927c8020b6d3093ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5aa763c81b2f55d3d962692ffaab8e25d
SHA165019b4d3efc73233df9a4c1ca4afd138438cb74
SHA2563249a669f01c6047dbd747fcb3e12ed267a26fbc0f19ce12ebf8e82d3710f41d
SHA512e80f01ff4ff8eed1d3a1abe1e0315939c30f5340664d4dab89c925f2049d1eda5b29d183cbece2b18dbc7459a1811ba6e3e3019576b13e1df712d83efabc69a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD507dbd2037c2e18ed9d99b99c6bafa266
SHA1661e75116463782ce4ff8b899e3f04374e3db301
SHA2567b2f4220e2a92d3d3c95fe99a9e8a085d10b82b13e68474b9f80bf2a66c1b1a9
SHA51287d6562f0ebb87c08cd9bad24df0dbb89d50f2da9fa042db155fb5b7769b29c61dd1f00be8725d7e475a16259b187d6ec94699c3814dc930bb10e0c214be9a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50a7d05ff0b36df77c81bc33cde20a973
SHA1eee9ad8d1be51e9d5144b1aaca3b485c88fb2905
SHA256767958d557e3a638088900d6fd078f9f7d73b17cb381fc8d577724ec17bd3468
SHA512c85c57cb997a77c5120e1940c2a2f8c3c48dfe1f01f29efa1d5908e42ea0d744c2f16c9e61abac2c531e4f1fbb8a390d3356e66a4d1198726f85f054e66be738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ad01360596e1f070fbc02e431ad822b0
SHA1f5a243945faa84a79decb795e4b82350b6daf75c
SHA256a448d14b54a07e9da3497e284424fcee3c03764a0c87218a9ef257d23b9f5356
SHA512d59d15be733aacd43de26e6ce2e1d57deb412ab7b2cc2e4b75cac179cec985aec27db7b1b00df895af788fe64681f3adb292758669923bca8b1ddf6ad1872495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5920c2cc801bca2792e19fd53ba401693
SHA136f6e9b26d4133adcca75ba86421db043ef2aaeb
SHA2565f8148cb21cb27cbbcbf96f5719868ff67e95aa39b2b547dd0bbefc68754f4e3
SHA51261d8747f64d770eda882e3a910593d5b0fda4c604d10e6d8f5eee0af335f3025fb66bcc073680538a1491dee515a8768651287a412b01eb7dc4ca637bf9ba9d8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b