Analysis
-
max time kernel
68s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
642eb78ebdbfe92c642262a3bb08053f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
642eb78ebdbfe92c642262a3bb08053f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
642eb78ebdbfe92c642262a3bb08053f_JaffaCakes118.html
-
Size
5KB
-
MD5
642eb78ebdbfe92c642262a3bb08053f
-
SHA1
e2fe6f58aaf97ffe7a4b9c6d04f7ac8811e4b4d6
-
SHA256
cd5b26841d051778897cfa256e0e742b90b455428e3f8e3fc028cb50b33e0fd0
-
SHA512
c2cde03fbec5e92b7548c8b4cd21835d220d2118d893e889a906c02a39262eba36fe7816dd67629dffaefdb13e46adc5ca7dee45cc3747c8d4575e3d1ccc41eb
-
SSDEEP
96:uinS3uxs1cOnx8DSSW0nqtmuo/et/GZhLsfp5APH9Z72NXGGlSnGdfZ:ln8uqnGDSSW0nqsuo/et+ZhLsfp2PH9Q
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e438f95fdcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{234003D1-4853-11EF-A74E-76B5B9884319} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000001b6d78d604f01208974840dde5b8376bcb11a5e1a010dc7e95de8659517cef3f000000000e8000000002000020000000eab440fa04bbf7e9b40b37a984a9303409d3b43262d5974592d6494c3591546790000000d3eb3e8f41982c6ec3f5449bbb0bd7f2e746cdb70f4a81e522325ca245ce80b292b2d099910106668a9ec4145af77e5e6acb6a9231fcd87f88e040102bf874af6a066882dc9ae8391c7b657056b88c3d21e4d5c45d4dff62ac5be5863eff2a0d6f7c5457c41b2e7d621b3e9495ea4ef9c03ac29560ed5fcdf56f3e205bdcba787dfc46c535347bb600ec0a5f9266900c40000000f1b31a11f96d6aa59c29df0016d52e1f29c8e744de731923e2393161c211b2888e6a947f662b60af893f7ff067722ddf2b3b2ceb2cc0637ab0fc2fc77c812e66 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000008247c1639990f98a7af679c404daa69e7db7ee1eff4db542ecb0bdd7636c84e9000000000e800000000200002000000078cb73bcfa4fb92b9a318ae7f12acfea05a5da397d7922ffac8c3f887ff15173200000002c25abddf6798ea79741531e5f935b83d3acc1074f814a2b770562f35beca203400000003b67682a6bf5234e9a8ec3ddb3ed43ad26e7a9ccde364e6ad3ab880868256f0e7eaf9432b5a91cf804119050b38e3a7898ccf7630fe273d7eb244abc4ced34e5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427832607" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2772 2432 iexplore.exe 29 PID 2432 wrote to memory of 2772 2432 iexplore.exe 29 PID 2432 wrote to memory of 2772 2432 iexplore.exe 29 PID 2432 wrote to memory of 2772 2432 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\642eb78ebdbfe92c642262a3bb08053f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51956ff65f0564485450db8cd0b539b35
SHA10b59ba24fbbb675725d827b2101783f5ffc863fb
SHA2566894f91d062bb7404c26232f2128535a164d573b4af4f74db6ed4ace6aa1c295
SHA5126f610e82e1c8ff71a358bc14cdca1d6b51711be4b81a64e5904a8c2146a887b5faf686e7251bf54db1f8c5a2603eb6b14067271c9a86e6b213e934447074b6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d51f9514faee07c064aa05db6cd5a41
SHA1b0d4989193c5e96fb9af66a4a0a178e5d144f7c7
SHA25631fdaf19a039bb7fe55cae3f2080959a329d5b806c6b9b3b69cb5b1255bba12f
SHA5125b28929f718cc78a407dddfd64c0041f7d1523fa2be21b59b37b91c23e6585722267274e7b01b0daba920dad3b187766a344a3c93deb9fb3355d7a17edc46554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6f04ee3f2ab24390f40f6eb71af52a
SHA1d402969a57e78ed70ff83ab17b9433162fc980dd
SHA256ff24c9474da33b5886e41f38cdb1bc952b08b6b9c5d4ad98f2421c408d5baddb
SHA5121d6a71a3d4f16599782a2ac96adfd503bec083129a7e0aa7b1e081af814ed57dc3393ae1bc70cff13816826be9a7266f71629176727c593edfd268a78e51544d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d25793d1ffb2ef7dfb3c326fce43430b
SHA1d608cab3abdf2ae9ae237d5f26d0bc6f5daad20c
SHA256267d38b4fecad0f85c7a7044bc36f6f404f88004742c54fcffb5eff08af24626
SHA512233519dbfbd39598efc2b9e60712dbea53e994251322d9ded37339ab271d329b70f926340450bfa03c956fa8691dd4e5a9f70ad14a2948aaee679b9c0a9dd1a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1443bf55afdf9141cf8e5a4c3c628b6
SHA1ef6657cfcdea4f7f39e93969970ec60996865ae4
SHA256d7d303d7a363cbfa1b5757c730ac717c61de4c3183e4a3ac91ca18c49689d13e
SHA512f1925d912402cd021f90b3aaf11fb5bb2df90b49d39dba4763280025cedd2423d694e653ee745bea288aefb27b2727e360d7b458c9a93ac5389075646b281243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d586220604586a347bc660a6f7cb174
SHA176c40e1c131852302ecd9575d55f3b32a5b84346
SHA25672b30afd22853d46ab3ad5308c27c9b6883ea4f133c81525cf060b8eb18371c7
SHA512298a868c779b14293ad4e6f61b599845092285781a006b9adefe666620d8353ee9690377bc04bc3eaad8ab329588c823fc51c1508a1c60001089cb14f9bd4d89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f41ffa3f2f122b857919988cf364a01b
SHA1526a790d96bcf7e603604afdb8effba2463950b9
SHA256a405769c3e80208394d8b763defb68a4b10d106e0e44852223004481e0ae1014
SHA512439948a5ddb8b625701a157d6655d1c38ea8b3f8050f9b053321c73b9aab74cdceeaae52125c3dfc0d6c564cceccf3894a13ac3988044ddd9636d791850b293d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e92bbf769a01eac2316873dd42fb2bb4
SHA1f0770ad299130b6d48444ffac75dda60fd148714
SHA2565b24a86ea3c30d1d1f478275de95d29e5b40a25942379b8a0ca1bde17c386085
SHA5120662e9150e900a3957374826ac004f1087f37ed15aa7b1553562980e430dfbd34c34a4d7bb2442fae49d250a7b8e58e37b51f2a550027001775f1ce48cbcba97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07d807dbdbc469fd98e5e0c276255ac
SHA1e9447cc1cc15c14fd088f1c7dab857e34d6ef5a5
SHA25681bba8a215bcb8f6ac89db4947afcdc2ab46f05712a878e1780ab11e8d225a06
SHA5129eb0878813bed0c66dd01f157f9a8cad067a0304f1513dfb14cb1cc22628c16b113f42a18c39d97a495320b5986502031a80e728e2aa622dd42f93be359932b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d09edd03ac1909f3b7d79fe8e511ca5
SHA1205b2e1b96877dacb748ed4c181c516ee89198d4
SHA256355567e46c149296d83084736df03920e812c4f3bec6b780ced0c4bd6a109e7d
SHA512b9bba1354817345988623488e1bdd4a9f00f95e1b42b841be1102bf49fb64bd5e9546c1d7c048f47e180b1a2f4a24fbd2d82ed75cb477061afcd284f8f8f89ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a9845a6c2259c3dae9b3461877b4754
SHA1660604a5edeb5e8a911f429abfbb17914848dcc5
SHA2566af8f93e5557771ef653d7052ad14972fb4f547f86e7ef6bf026f901cfc3fdf0
SHA5121d0aebab8d839c02d37389bba521808edeccd537f92b209c3c3a8632efdfb515b872d8c8480009c269e4c6a90695a87d66a20b6e0844046218c0b9cbce58f0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5165d69161ccad86edf777c32d9568e4a
SHA1a8ddcdb9a7f8bdb2912a0039794711b583fcf815
SHA256af06fc95440bc1d97f6df86fe9d6f8498d88a4c4098f3171afa19c3dec6c7598
SHA5124996659c16d52156516778eaf48e9b9c1a087303e9b8a67b1317325287bf50a7a5e180dc116a36ced575bdf9f6e9455aa41784c746788f7c252ac37e9f645619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b713931f914dd927169e44c67e41c707
SHA110041ac2c77d1e091c7303365039327fc6738c6f
SHA256a8d1283b4a8060897a8eacf02bb590f3a1cce7f4d14d017fb77f3e10b31de16e
SHA5120096df53a00b6dfa593683ad701e2f90559d9c345726df762bfa10aed739ab9e869da1dac1b3246f40ec2cbe7480bd99593727e538eb5f91ee697df5e7f11288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e69f6817eb09b98dd44d49d6af41bcb
SHA15dde3f140cbaf1d3261501a370e9715e54ea16c3
SHA256346912b677fcc5605336bb8ca9cbd56a3cb670c85e87c5410aab5ce37ad3a1b2
SHA5123ee66a915c575384f88144effe20a076877d943afe867f14ecf1104036569b1d943c746b355f64e14b4125b7458c4f98201a4b837ed240b189083aa72ac4ce44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54142c09f820b777b463745030ebbb15c
SHA1ebb9434f77d2e53e5365ecf1328dff727486d0ec
SHA256112b55726f151329e250b420e543f2329d4a332ca215425ff49b2b79d6427b05
SHA5126d687717c855a99c7a7b68248c8b3375ac8ff381001e1adea1c3ba0e3a93bbaf76a3dca33e41fbff97f085e6a64c1b951c2d00fed28e2f59fbc71beed6d2a445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563f0e33ed96b91023da4144fed32a1e0
SHA1ef2afeb077a1507b4ab8bee32a31cd3047d44cf6
SHA256ceab34dda411ad182261d109fcd98114f01cb5f9963d88885b98e72d07ea26ca
SHA512b67470d7c4eaf619540ffd3e248d49640f6e46509f7eeff0005f504661118546f866aba1ebf27830b3d9d1d4d308d7d2f6e0f4023e53aaf4b381e179bad118a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71c4ec5286d4acaeb095441487d50fc
SHA1c93ade49c7e139a172c130c1659bfa29d92f14db
SHA256ad766db8ca6b8ba70cd49d09cd1f8bebb0b6da56cb51cafc2aff577688b2e966
SHA51207c578252b99759220f7fec95981253d6ba0c72cec7178f6891c2bea359a295de026b3738bbcabb269c395f71740a8e9d20195bb8a36e2edaf11daa537e3650d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ab75da55f7a1aa54381ca1a7fcc5df7
SHA11844aa05d790bb805dbe0ae3e0508229ab33bd04
SHA2560bbe6e4092188596722729bb1e7b90398336984671b02fd11fdefaf67d398033
SHA512c26a6caad06e146887b8bbbc3e799034759a5bb8890d17f62653e3021989e669efc47262ea118f82d4785f6706bd4e881e8fe7e5f31d34a923c440f04f8ac858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cb3fcb12dea4ff6ec782a4e238096ce
SHA1f9f02579135297e0b23b686edd8a2a8016efecff
SHA2568af4bfb14cfeeef6562b81d29acd9f293536471a9af74265da3549ef963172ca
SHA512a94cbae0f3b2662f6cc69f12f853865c60c1d83975e3e42a1d5add44d06007bac0a7627daecc5a322824db5651859944f0fd38907ce5c201da4e293ee9836265
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b