Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
6575db1375511e13240feeb355f5e3d4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6575db1375511e13240feeb355f5e3d4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6575db1375511e13240feeb355f5e3d4_JaffaCakes118.html
-
Size
91KB
-
MD5
6575db1375511e13240feeb355f5e3d4
-
SHA1
c0ab52460b83fcf373a9b0d39c475925f23749ed
-
SHA256
58a92d9e9a67011a73f04c9ef6989aa864cf3b172f015b1b98c77e64ad81f6ba
-
SHA512
09c150e29800b0feb647946044292cac321a53a977b9ac0eeaa3ab474c1fae47d50c21bee0135a99677b146623896a2c4c47977e5a1f563133f4413b797ba321
-
SSDEEP
1536:gQZBCCOdV0IxCwEqSimSG+15qxdDjTyjvOgxPrT+vZtGQE5i7I6dcFpI5tlKoCa7:gk2f0IxmPd
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427860936" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000000fc7d1d44f997e6269478192a55fb984ecd09c0ab31e92ebbe2c578183d6ac36000000000e8000000002000020000000924abd5381e03ab8aa079cbec9c50e2d39b3475d234a24fb7bf9138f723333eb200000008fafac03f707311f89ea98b66d4ec348b92a43d91df4061bcb2d616759e5dc3540000000400e33563d03a26ce802a9140ffef12526c3d37ccbe34a76e0feaa788d66273bba2aea64ae6390eb25977b7e54cf2d70d3cadfdcde2635bd2805cc2069ce3fec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19DA1B91-4895-11EF-B6DB-72E825B5BD5B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c019f3f0a1dcda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2544 2052 iexplore.exe 28 PID 2052 wrote to memory of 2544 2052 iexplore.exe 28 PID 2052 wrote to memory of 2544 2052 iexplore.exe 28 PID 2052 wrote to memory of 2544 2052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6575db1375511e13240feeb355f5e3d4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd46efc5faf8867eb34ddc4f21c694e
SHA10638b743cd11709ad43c0959607494f463645852
SHA2563291e0175a413d1f7a47485cbaa5e1593b6f68b8d273bf9fd1d73be73e0cdef8
SHA5124ac4104d55e248b04711644375cb037ad5a10ef9e2af2b5eae2d1d1bf8f5055ad06e5877aa82b53f28edc0d73c8ad77e8952e7d6bd332ce118f796b26bd2baf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d5d3336099cdcaa73b7bf59f0aa6461
SHA1ceb6952a8ede65237ced62bdfee02229ac9bb81c
SHA256ea9506e4696d09cb1ce6ab6f18be33e637be470253f16558972a12ee4a8c5a84
SHA512fe6849eb3af1b12baa5a8c9a0b85f399ae7ecf1a8e1345429c1531a734640121f6287c8672f8c0cef56126ff1653d4c78ef406319b103cc598313cf6ab8ab3d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d808f2c8d1cd974cb0d83c89dfdce91b
SHA1e5925b5b941fcdaa5bfd0ec94c56b3273eddbd45
SHA25613ca60b36317c126d54ccb00f1c27fe65bfe3b174ef03ae6838fecb606c47554
SHA5122d3d9af1c92ac6c0a23be0d6a75d6bc91b9fbadbcd08ed9b964e5fb8645ac73d942e78cbeb73b9026c9cf7a0ae8c27778b4018fa9b43461f925abdd01ac8c696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeccf66b0b56e03c6a5a63c77bd81f72
SHA1bba166bd7ba87445f2017f18b5aa19f57b78a822
SHA256056bb31e11d975a77bbdd6d9ee9b0bd114cf0b89f1afcf590222598c2761c0c9
SHA5127990fd2bc5309dd6cf589ca57366a63ffaafdb11b10d195b368768d1bc12686f8da0fe16f8f6601ab60edbc1bda7ee0bd350268a961309e3be54c1c9f982a9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12ace1a8caa8140e4b9394193e82619
SHA10b870956385328fdd35fb7c0f71c635e6465d179
SHA2565381545359a3f272e14d9c0e273fa9fd76f7278181ea0fead80f7b7477bd494a
SHA5129473b9b6a37a245dd3005ce498e75ed7dd79bd76692acea1d579f55daaa6068881db02ef0d52d5689c70cfa7fc9aee2bc8c955fc4668e11cccb1b6d2ee28a017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c57ac396eb106b64dc6cfb67c135210
SHA11890076cb364ce84c0d983c93b3c93f59c728d42
SHA256687803d8166667513320d05491c9eea3303981beca63773ccd28aa9ab5ad4a00
SHA512c83fa44e131acceee77e226eea2ae17229b1d061186e9a5ce7debd09f3469b964cf5b5d75c481fed36849c2b4d4b18e516bdc42cc310520ad8e58dc46fd47403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a7cfcd5adc1e3c7d79c6c27144dd205
SHA1549c0a225c0fb4b4f6362a8336d838111fce33ae
SHA256563682fd089e380e186d2af74dc43bd33c12abca54f62de0ab6fd74359f6cd20
SHA5127fcb76d4e32b6a122a21a9c408973c4f16a166dffe956e459a9b0ada0f0a2ac4d48604d5e91d5187ea0b0656a62500bebbcb1b2e103805cfa36cf6b7c2f065b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce32d8fb221c905b125a515d77b9441f
SHA14557ab3a522299f4a2505322841f3101f71dc5ce
SHA256aca2a8a7112ec875f28509bbf9423685fa294bdf83fdbd2ec0b4fe017f3a4971
SHA5129479f9c939afff205475ffc8e50d413adb6e0fd16b35522a0064946502de2e1243aacbf6b7f6c1b9e82657ced69c5f791e8d513edc1d410d276ca8524879f382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51113d1a6bf6762ae634b76fa7e9f2250
SHA1e9ad9e72d8bad45d5d6b9e3a401353845cae665a
SHA2562ba98558b47b067b2a0f0487abf514a3d78bf92524da6cab285c99be82a38cca
SHA5128b62c56f8b2f5255ac9e6d7640bdc695a8a5680e113e907c1bffd6c2102ef7e589eced24acdc2b25aa51089c97c19cbf27a32b698069919b2e260ce591815c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53be1b95b1995d42fdbbeb0c7eb5b1346
SHA1da487ee74792afa9e05c9331aefc5476027a093c
SHA25601ad47373c6bd36f94e4d9de240296d6965530d0daffbce246c420dcb966ca30
SHA512bfb2ca88104f7a139c16a52a5e81ac13a3e2d15b619175e0e0ad04837e48217edee9bf90846fa693443c62af1e8781138b0552361221689c0fb349c6a0295ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceea9d58686b50e95c900b96b2b89987
SHA1209a37823bd85f6a267dbace66483a536b893de0
SHA256009c425d0a688cbd81d8fed95b6d9ca21a7e4f7868e6149e4a080962fc4902bb
SHA512cd16064387d48c9d786b02c75e8b26a64ec302ea00b128a690556e2ab42be69d93fa4438bd1311716517d5c4b8244943cb5256709ee96aca2afc46aac2c5cb8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588519c65e8b80e8ad7598f7290bd4b4b
SHA14795ef14aaf1b590ce838abee5ca97001f32b862
SHA256b2cf118970b4d0d7d904be0e963db9afaf4e1c8981b57cc31ecebd54d5c00180
SHA5123466656ba1b4af3b63ba18ae4a041ce88d0e88f73105e31238eef09b5a3700c3badfb7ccd12083e0fc0b36091764b485f22c1768347c00ee208006d53ed82dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f74279fca87b64f3706fbd391a079d3d
SHA1ce48a4ba6412495c769887feafdcfbc42d0c9338
SHA256910c7af6a1b2d20a47b543af9e7e27fe890ddb9806a7ce1af0d3967d727d77ee
SHA51259bf271b07ad3470c5d33896255513843d4c2ac1f1ae923f9053c07fe0bbaa14ea1314d9130e7274b5a63bdf1a37312b6d9a66b456dcbf1a51d41356ac223172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef3e8112290d7bf6251e0021b4b31931
SHA15ae667066929e3c17ef4d063ac6e660258f34712
SHA256bfc5ecd18e62cabda69435e71dc6cbbafff03333cbe96ea2ca3f102fcdfa1fe3
SHA512dd7d2e2d348c518d54c18a7be3e0b4e33fded83a853164d65dfd316e02fc77926ed9e2893acd64d9349f2a99f27ab9940587859cf4f5df93324e0611f3d6bfde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afe3af0040799c570e92e829f558fb48
SHA125a6506748a5b0810e3fedd3d33ecb5ba3350fac
SHA2564a199eee9f4eae565fce5c9ac80229e8c21647de2f5c2da5a63520796a614c12
SHA512f9e47fd8202eaac949feb4f790cab65f580798506d9f136a02d244324fce49ee7bd3af7f1d6b0f29d4e824f5789a3dbcf4b2a84a69fd963f6a11281697243d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5502ece77bcf3b94dbffdc0d7730deebc
SHA104aefed7266e8701171e94f7e93d5038576d59d8
SHA25693aa6a2edf9cd13d9fa56e85a0eb5b6ee1ae92a6dce050038422dbfb722e1a68
SHA512cf3d5d13993c6bac08f2c46deb668216a179e07292b7d2d964368c304276894ac48c6c53af74e8c1b128a7e77eee4ee9526f182ecd6bba031371202a9b3be9a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e669ea44d41916d1bf212150ddacc1be
SHA108f95644124b3ba0ad6c4352f26e55e782c8c68c
SHA256481bd326a800a544dfbb495df1ac569b06d3052cd1b139b7508fe7a72a496a45
SHA51230db505a756ef0c6bc0f1a0b511fd40dd3f650648e96cc460d2e21cf23d6623fcf838fd718dbf9bb8c268d8b0dffdd15136efe9c39188894b6272ac98d11d69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585195201556ffa99696e8f271b20cb3b
SHA1573c6643030e0de604c8582dc36d66813bc1f20b
SHA256ae0d9c9c3fbf7d683cc2c50d7c7ac9cee99de88066ef72f9488bfe83b06925d3
SHA512ac1e12cb00e6fda88947e5aaff5574854dd3629539347ae839f97fb17b91aa6442fdc548caf096b4ae2afa3eb23b4192c0e13649e7d14d70e814ea835cdbdfc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa7383ef37b0c532734d86181e0bff67
SHA19afde8b644f0897c91627b0cdb5da86b6497722b
SHA256328c60123788cf938fb24625631f207ec231fb0d52d39c11fec890d674a5da06
SHA51297a9581b95c1f40223d3f5524f820c451fb0e1fd8bb1aaa12e504891ae12150b1182cb0cc2d1624b5aeebdc71569e3b0c08620143fb71885a8f8254b0e5a9f7d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b