Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
6630f76b4d187e8a2b1d21a4ccf0dc3c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6630f76b4d187e8a2b1d21a4ccf0dc3c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6630f76b4d187e8a2b1d21a4ccf0dc3c_JaffaCakes118.html
-
Size
72KB
-
MD5
6630f76b4d187e8a2b1d21a4ccf0dc3c
-
SHA1
73ce0fb5ea9db460313cc733985f8833c26fe392
-
SHA256
4afcf8214adf53587688a0869c31f5f8f989112ebe1e3730ad51add1c8effb15
-
SHA512
8f372b613f7cd3910c6a118e05535fc497dd47290128c0fdcc206b7fce8ad557c717ead531b8278149c34fe17b9e82e304fde896c2bdc7b98d9a42e25959142a
-
SSDEEP
768:Py02oA84inpYK8sYlZKUGdXjG7elx1+DYpyNnrg5swjJ8/Xv0u:K0PAJUzYohx17Nu/0u
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000fe9f69f109b798237647ca418ba396ca01f45eb90d5226c23ef97a8988ed1aa4000000000e8000000002000020000000c383d1077243811d6c35d5bb8d17bd42578aff7107e65f3ceba9023d1326834320000000421efcc2a2f37fe4d7b0aafd0b210e558e3930911206d0b941ab22964c8a67e340000000d553bfdb7c564e0218b5a72188ffed77d8a771cccd6091b6684895cf048329cd286e49e4463afdfcf5861a793d2dfb9175501ab3b9b53c577641c7c95412d474 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40BA8F71-48B7-11EF-AFFE-C20DC8CB8E9E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427875605" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 900b7418c4dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2996 iexplore.exe 2996 iexplore.exe 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 1564 2996 iexplore.exe 31 PID 2996 wrote to memory of 1564 2996 iexplore.exe 31 PID 2996 wrote to memory of 1564 2996 iexplore.exe 31 PID 2996 wrote to memory of 1564 2996 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6630f76b4d187e8a2b1d21a4ccf0dc3c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afe9e8c2a8109d13d957d81bc37bd574
SHA138049dc9a86698995b0d9dd85419b2f619753d8c
SHA25667631bb11aae4a164fe002328517c897e36369c1c0bad7355396aa429f9bf09c
SHA512d3f926982638c906660503f4d13fa4a9a13b728b05621e6d4441bb0e736d4e705ccf707700bbd5123b91839ec87f4c52d1151fdcfcbf9b1222c031c0cea104a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3c76e79195d0bcc1f29dc3fbcb63341
SHA11a98e7bdd1611efc5f04c7fedc7f70e623ec131f
SHA256c492d36e7cc55ee7e9395269db7773c9aeb93b5897c2696a59910384a7df67de
SHA51280008435af4852eb9b4f28ae3d36a95170e55455c4113f40d101c4f13fdbefdbbe90f5e8ee85b53b56b25c848650b1fab51bb02f7a93abb44ba4ed5efe967c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568fab162b4b53f33d28e2de156e5b3f9
SHA163a4e7e3449db1127fe2fec4cb4426aa2ba4c061
SHA2565b7aa60a1d8077914f0304f74aa549b7c6b3737097d7a1e237f712ca08f44ecd
SHA5127896a0a50f4a976460d04d719c6a2668f40e725e2e7179aa04002d5309163b220c1cb7be801fab6ce4ba98d1d6cb855ff2cfd74e58d4843089fac4f0d6cc6980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8d280e785779443b096809a09e80fe5
SHA1efa4ffbedf2e6ace5137eb2d2f22c116f0a1c39a
SHA256a36313e9f7c72587c655d5ae5750f4ca393bfd7365b6296d3230f2a5f009e8eb
SHA512ce7c8a98b9d48dba78f93dfdd5a4a026be7e33d504942ac2a72409a02856dc2c324d4b51fa69795369b5bc766233b65f8ab1426a382bcfd0f90de0b536b22c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e6ce36b75b4fb561397271693d11790
SHA188fedefc0723e4357c2ec292d6211207b1570ad9
SHA256c12d7c237568a1387f5fb851b7f6a44f5770112aaed933bc41657ba8f0072f93
SHA512c4e777d24d03bb5be54d67dca2f5d836f0c957593a8cedd8c326c02f192e8f9c48fc348c91b3bd873ae157c2bb4860088c1141ad64774937fb11c9d83b2d827b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51360cc23e8eeb7fe515e8fc14effa596
SHA19709d91d076ec9f6752a9b389ee93a3b00823845
SHA256461516cb519b73518af2033adf49c3be8dd5a77077a085f9b66e657544c95208
SHA51292e4e29de88646e2682daa247c0bc4cca5f33b9701d076a2fb25d32e9077f8ed7ff5daae7dbda9cc6a65f21c17b944129f0d486f44645bf0cc443b51d64f9ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abe39c1d16c6b734559dad0d9210bbc0
SHA12cf2024b1a6ee43839a64c21b0ac9c5df453e12e
SHA256b00a6eac7b51797091f955dd22892525b61c6ef1d784a4adf95b5a7ec7a1c19e
SHA5124bec5de0c7edffa656d8abc3e060353cddf571d9115dd18100b43899c8839dc94fd3f568f0c62b03db98946dbea911926ea1eb2c182f320147fc2e9ef31d68fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e7f0c124d8b5e4a175353ffb110fed
SHA196f8feb866c4b1f11c18a274b3335d8344386d6f
SHA25688a6c571a774126a1665f8a356e08a2f8f3abef4b63180ee3def34871b63d584
SHA512c4cf09d46574980f3355fbc34172bb80581e0536bb9232e7a20090dac9b5f90c8f68a18d3470e17afeebbe9066eb664719948414b77980692ce1e3ed5f328351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5555050e0bef051f74a53bda93dbb1513
SHA15a9b6a3c3b3c06fa38da79b2aeccc8d81b7f24be
SHA2563e6374b83f96334fa025c65abc55a0f0aca0bdc2eeaff297a832e90b704bc6dc
SHA5127e589674d4838573981cdfcfc574baad74aff6a8daa99f9be39f17f6991b0f85c511a0d69280d62d896d22ed49178de0415fb52f0c82b340024e1ce0e8f5a5a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43f4a1d4feaefe9384678c6b7e88ef7
SHA1c22f9b36179e766e240a67405dac73c4a5276ec3
SHA256b99672db6cfb7ec694a4f85698c74569dd835d3fa5e1b74a050ba21dde9252f4
SHA5129c7a7408ca49488278822678c36cf4505854c3a82010a0f03f8bd3de89592bc741b61f422f61809dd57b3158e1b7b78cb097c33b6de9012a65089052d7964c5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561ee140c84ccc8c41fda73480b8852be
SHA15d54630cc93d4f801ce6e1489a8ae2b412da2fbf
SHA256c4c96e2cb0159e96bc57faa6e8a44df4eaae0a80e907e58be12686ee441f4c96
SHA512adbb130239334d383c1b44da28dadd60d1bee8d248f7031e6e3fa71e94af12414e57417c7679da5c652b322be9cc6df8229e87c1d03976b80c3a9e81086666f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53122bbf5460032f8245c348139532316
SHA10b18ba2e6ff0662cd735618fdbf2922ada920fa7
SHA2566534106238835d7632765a9d6fa824b006eabc9a57caf824d5101f0c911ee137
SHA5121f2e1bf7e48899a12391cb8f73258e433bb9741bde19264e3dd589c75dc87619b99f3080bfe55c77e35c7c223d907ba13dc1916e38f0ac64f2dfb7163f99c607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd1b2f4c64336b66d86009d37407b36
SHA19797e7a761cd80da2f170176617c6336499c494c
SHA256f2b02e90b288b5d0467408f132384c002be4a0c14447107d58e5d81f7d56dd72
SHA512b8f4a090f065c77e703244ebc5ef63cc9afadc876055c732e76d58ed6c2da137cbcbe7b41fbefa7a0f080882319936630e0437d20f64d9e7cc1f3f22f69d5e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7f400e198650b055f9383822f2b19e
SHA17d67ff4d47393f70e905fc0f2714f3fa6de6203f
SHA256ca5c51eb1524727e802e35e219c82908060feee547d790499c28d6fa352f9496
SHA51285f7fcc829d67fc17d571aeb09285b37f7eb8996feeb4250e4289a10ef73c55981515510b8d36ad3fc60d12a9eb23b074183a8c8b82245d4de4fd33c00de77c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403b1db8484a8947172b5f88a3fac57a
SHA111ead5c533876362bbadc2d39980f813b357f487
SHA256277ee70baabd1148024bad7c2ffac955df1a6ba5b6e1abefaa48f068aa20449a
SHA5128f9dafec36dd5dab64a09113b235ba81b5a66dc3018d67de1c2f1530615c6b804c4219b01fb28e3a3f7cd6b1c2fe222c13b18f3f158b4ad37a99cde608f4f8f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fc5bed4ce2dfa951094e620b9b0332a
SHA1733db546ee9fa0d69160870d1676a57e8c0edeaf
SHA2562ff40eb52476b145105665fed4bf9aab394eade4153497f43d354024f8593628
SHA512ec791a99170f89396922630baaec359109bef8bbd5a4ee48c81a09a662a7e49c359e167e01b4df3aa9195173069d676f92b193c823acbc94636fa2bfe9f00f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533788ad20f8638e996f0d494cffd953b
SHA11a4280b21b6c9a44900f4e339e83c1c2596714b8
SHA2569a60ed60d787b41337f75e932a54defe6197fe34d55a6b39592c5fe73e4a6322
SHA512fa80f5ed9b1fa91edf0c3f793f5f350b28fd7aedc309aad9273a77901d53d7e02d89a56ca84b4b45b093fcb234caf028dbc294fe5191ffbb44775b5a57ab1434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff87a240b50ba8a3d9c2ddd05d1243dd
SHA1ea86e5481aa9ac03307c5c785033a147100a8aec
SHA256a4d4e46fee4c83f5e787c8b40c8c20e0e743a4708f906f5c02d186a56d45436d
SHA51289934e7692ceea3e385223a7dcc466696d2284c8fad5e8ab6615fff5df59e9e40fb07c902e9955d7397edd2d08783ae411260581438e27fada68831ea4e5fe43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dab3cf6583e9b37305672a0c9f25027
SHA19c11d0b1f839e1f2c389ddc16c750f0805b7b2e6
SHA256ac678d89480613dcb3727cd156c460bfbe34b011e933f3c5678901c41f765136
SHA5125202ca45a46fea1674edc8a9adb10c99280ba60c465dee2964282be61e194784c32fa8a04e88f7f957038f66f35f13ea2fdc7e208b799da521bec49564a74cbf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b