Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 13:16
Static task
static1
Behavioral task
behavioral1
Sample
6350975951a1cb1a5a4a77ec78d288ec_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6350975951a1cb1a5a4a77ec78d288ec_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6350975951a1cb1a5a4a77ec78d288ec_JaffaCakes118.html
-
Size
39KB
-
MD5
6350975951a1cb1a5a4a77ec78d288ec
-
SHA1
9eee9040cb6f48a8279f0bdae3f4ae3c9efddd6d
-
SHA256
630a289c1d92222b113505ce6a197f1b3ec727995f1eddebfd0ac3f18c4511b6
-
SHA512
ec0496ed5597f4255869e797a3d09716938dcca08ece2172270039a2c6c12dc42de3eda2c6ed656b3ac8d982eff65f1ee70435b96179ba675c6450ca68f2f855
-
SSDEEP
384:pWKn3aufCIluVxeRPG2Cnw1lvu2eSoKFsX2efup3p9uxU7ITRyzWSkU:OVxeg2eR2ey3p9u9TW3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A90CD4B1-482C-11EF-A3CD-E6140BA5C80C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000002a667cd8f96ee40ef2101ff73e138ac32e0267541e35de48c8bd1658967ecd9e000000000e8000000002000020000000d496c2b31d6893ff0f7122a503db4d28f498f652688779723649d55051dec25120000000c3f66d956a264d1afe1a57048c39352ce62850d7c30b024931c9360d6d61ecc0400000007a883f2dceda0249fb5fbd48705b2c5fd46c04ff62cf72a3b4a67b4272ad40729f39fae5b70663de6103044961ec75b23cd44c45599fed41d0c4d89172722aea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427816080" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a7b67d39dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2772 2756 iexplore.exe 30 PID 2756 wrote to memory of 2772 2756 iexplore.exe 30 PID 2756 wrote to memory of 2772 2756 iexplore.exe 30 PID 2756 wrote to memory of 2772 2756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6350975951a1cb1a5a4a77ec78d288ec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5620a2ea67c0c9bfff9bbfb091d587c21
SHA1d6302ed6fa9773dde48b607dcf6923d78ab17777
SHA2561fbe644fb64df231dea37b70b433c57974b9ae1d6561d03b94e96c61c3883ebd
SHA512772855b59fe04854060183516d7698c8820a2523cec3a16f88b3d6bce55a51c39a6f00ccf6a84d0f391307e3b547741296b740795ce72fd6d0231252eb514867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a97cb163014dd0623b2314840a573f
SHA14303ce6cda5aae37f6721521af93476ef19bac6a
SHA256e3e300c7334e793239516109090da42187500f0cb72b482c088505efd6d913f9
SHA51223986bf73e65d2107c3023c5a4d50ddebf76a3ba4a56a13942f496aab12e7147f28aabb26b9dcce5d2e2d750feb67e5419960537a896bc6ee503ec38359c76e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07d8fc55e318c8371b63c4ff6a7578e
SHA15d1cd8f71120cc529acf0578dbc27e6d22a56e2f
SHA2565e29e7e24767621ea311ca58c84587a0c7dc4859612aabf0c59400b5a25e7721
SHA512ec592e6c46af3dc4af596770b67226aa97e290bfe810d0ce159f9edf91f03dc1f441bad2fdb899854538e4b3d0589e19d15b5ec8e35794ae1083b3073f4e5141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d5436d73cc094986c5b7559b48a051
SHA13e363ac5f19aa319f195e08e62e1f816d39dbd0b
SHA256c434330ce838a8b5cde6e82297b3fd58afda7be5ff6219450cf161c2071400f1
SHA512ea3d48109f6fdcc12015f667c2981dfc818ca96f727a7a3bef146b62c594b6d9fe3307dde516b4307b9c5b5257244a4ed7b3e2f9597399b564bb03bd050a352a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5154e5cea1d056a48651760b1f27e1bec
SHA1d1e8e539504b343820b4f493a60ce7bb11f36561
SHA2560e13ccaa5d45b670edf9741ecca53c69687c1f70a1f7b7a8a11bbb1f598f8551
SHA51240187b2d3b2c373c108c471249c7fc494526d0750de2f961fb677761156680e2f52dc325847f17fa31f9ea68cf30a97d4772e076ff7d1cd8584ad7f81024b321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9bfdad6973886ec68dba0395fe28873
SHA12b4cf94f4f5ce18994e24efca6d29aed2c2d9bce
SHA2566b0fc4aa5d098a7539b6c5edb19fc7a631e236a0854b0b6da0351ed0f95b797d
SHA512f197092bc4a2dc956d6bcf52f0c35fb6b44dfb8d3690c8243e80852ec1e59e5edac04fbe3fec05f848c89007be2847986f1e305807c8d5eda32d9fcd1888ebc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a02edef6346bf6b4d80e57fa148c5e6
SHA1f5d46d3cffab7019dbdca6177a46c1c969c8f5fb
SHA2566dc3d4f49a7dd2e2ea5d2464540b5426a17ea942cde513bd83272c01151b656d
SHA512f93493487722e42100ba2d737993cc8c4764296e602c7a8d011702b24092af0b8302e110acbf66b1fed54b0a5b3ad973627a76434f09c9c4d04cbe461f6bce5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ba51d3bcc8a0b01ddc0ea747754bff
SHA19f1a3eb96a5dd85923fbf451010e374534481833
SHA2569a84a49da4bdccd7e1c2e13225bf1225dc9e7b1ed6aa94ac61765d8bdc78e46d
SHA512d7b39fac6a61e67365edcb19625758d63dfdc56b1377b64e1439ebd42f11f2f917b7a94f3933b53a35fc122b15f4d602598a14f0bed6d354d5980d9414b51e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fc6304327696727a9878b9a342eeb3d
SHA1b6bee8d521add78b37db3c902b26f542e1ffe241
SHA2564c66641c5913ca78b0442ca01d6d07be3149bf817ed6d3bc60bcce93506ed00c
SHA5129f84dbb9a34685bc3ff797d864b6304bc6422abc7ad7292fbf209431ef38c74d83588cb1492e3cea187e44650a466a7165fa83e652b6dc1fea1cbe89b66969fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b959877b37fac3198c8e4da791bac590
SHA122b5581504c58513391f2e272a5c8b18e2147a2e
SHA2561d126d308a173dad5e7101f3401ad5a6845c8e3573c0836772c3e3b1e771f26a
SHA512ab9387fd5851ac5a23d1a13dc8d2a7c184334344046b9e076a35e40e248e6c4ef6d7043cca5721e3facafcf7119bfaa998eede93a57967a2bedb4bdba27efecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576ac482737391f1b3675658e1180de65
SHA12dd6feff42bd49e7396630d5b57a2d425bf3e4fc
SHA256e7b7c1d8c7e86fd97b3b38b4ad5013ebf06f6e06ad93c762dcd1c5e5525eb2d7
SHA5126669b82a7468d94197d58b154b3da679fa0d94003b22580d37ca5cec2da96393d77143ad7aa43f568fb0e375c60cd1a9b589181a09d2583176f1589eb71a8bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d501abd072183c115a068e000ed44f25
SHA1bdcb2ba99a702f705d4238826d111602e950f440
SHA2560a6821dbaa6a842f475b7c8f769426d1f593252a68795e494f8ebe44663c5117
SHA512cf64f2aaa87e37659a5d5eb47d7742cb727b2f07821167c43c6b0c9ee537b034164870b01e3d907b706cc960525552485eae2068dea0dca24ec0291df0c4950a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5445b19b740bad6eb1920c9f24977fba8
SHA13319b1206e3ac551bcf61814bf60cc389f611552
SHA25604ac10c033b7e5040aac185d3bf0ad2a8e281515a8e2e75abe185b9a722f4fa5
SHA512903bcc6aee0132f38c889686618021345d66b4c9a3d9441551cc0bd6f23f9cfb63a09a4fd9ac275d2752146fff3d4b5c6d576a113b88b5a6e9f5dab97dee8ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c414d1764a3d0d19096e068fc815bcb7
SHA18cc857f656114a4a67438cb321734a4108f35cb2
SHA256bcf46ae8646d6c88fd64cffd9e393a43fa1c178997b9f51de0444c8835d2ff3a
SHA5125bd7af656fd3877221fe7acdc7a258a8048e41e50fd50ca58d472521d73dc93bd3ad2327da329801bef16f3b08717dbaab04b420385438962a8c4a1d6cbdf59d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dfea52e2840204fed153c877ea936c3
SHA1f14eedd1fe3d0737d4622dcb1b4530cc2e374e7b
SHA256984f4ecf7a07905e821cdbc3af8a9dc743593f9d59341a2aa8cc7838b9e39a64
SHA512066596c51ca650ad5c9fbdf02c72ae69725b6d67a4ea5f9e67a2492faa10e7ecf0b68bde350a6c76e2e48eed177e9150c057aaea15f707c5c940b99d06003d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bfa4b91ccce8644fe5b82036f0f371a
SHA17a06634ffc29f6e6c43e5a555a8dd5f5dbf51a5c
SHA2563cf16e04657bfd01de3a875e182164077f9a00901b5333828fd018300774d4d0
SHA51245a3b4d28c0ff6684ecb0f02c8f478220ef6c54a88729ac402c37c675e49600a186db585db84dc4929bdd4f68ec94e191f20fff7a59a514493a38c32e4e1956b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5432b7928f02d7b03bb69040e26b44792
SHA14f61b3878481487be451d94c13c3f0b7f3d9a0aa
SHA256bc83858bc9ac4211309b11792c99cc5f25e324cf4bafde73bc57f656cbe3b103
SHA512f2d48cc4baf908ef21653a344d3bcd5c1313e1862dda69b6b8e61b0fc637bcb7b048b5bcac49de6de77d352f518cc7f330f58cc8eac5bd2e47368e080e728845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5867ea539ad99b98c77563938539e7fa1
SHA10bfc0480986ac6682c6a4679c01692ded480f517
SHA256b0b0fae726661f993f953bc4b7a4b8922172d2cba4aa446ab70e91dfdb5e0e02
SHA512ff60ac9861c1f04dc03bb314d010d24ca8f3cad39beeb73bd829827825f49d633fefc08faa240950ac7d6f3701fc85272bba05adf3abffbb16ef3a978f54006e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f87012a3240e85ed124176167f21d26
SHA19205a00c1dff482a81d76d12197cbb73b5d0d751
SHA25624461c4085eb692dc63a4a068ee573ca6892e8f33c0f53fe9123f8fa44c587fa
SHA512e30667fd0d1e9f8e42622340c59c84dbbbb16ba77e800fd1c4660f410e4ca8280aec80b30a4aee0913d58e1294faa6893bc708c26fd8dcf1b0e83a0a8b2d8227
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b