Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 11:32
Static task
static1
Behavioral task
behavioral1
Sample
676981b1fcbb96697b926e56bf920a28_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
676981b1fcbb96697b926e56bf920a28_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
676981b1fcbb96697b926e56bf920a28_JaffaCakes118.html
-
Size
120KB
-
MD5
676981b1fcbb96697b926e56bf920a28
-
SHA1
4af6e5057066cdb4f4d15def3cc3848255848035
-
SHA256
6203b7d70b6dab3d3956232fcebf515606e45580e211e527fea6f0d0e31fbec5
-
SHA512
a25f42ecb71c1048e8cd3cd78788b899e3cee9e0106b375c5265190058780150626f53c9b854f07a28956858494699003f220be8252042277e49e452b19fb4da
-
SSDEEP
1536:29C/KR19APs89hH1z8tGLkzn7pWcKObqIxEfW:IZR1ePj7cCXrfW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000000c45b3f3b5f363af300d1cf5abf360979b9181e4b269803110ccc59dbaf91092000000000e80000000020000200000009187dea67a058d52166b5e5de9177aec210ab5ce964b527175e9e339cf98b8a8200000005dbe9280077f57a828387850871a62c92e9821a3d64742b8cd4acdb11308467640000000eabc51e3e9bb286e35370e6f351f1db9e90cd2f4d06e98feaa1eb619bf3d005f32137612711225d067180d1a5fcc256501dd19b07b2b7f222d724b2170b20512 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427897122" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906b2359f6dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59D98471-48E9-11EF-B9CC-DE81EF03C4D2} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2776 2080 iexplore.exe 30 PID 2080 wrote to memory of 2776 2080 iexplore.exe 30 PID 2080 wrote to memory of 2776 2080 iexplore.exe 30 PID 2080 wrote to memory of 2776 2080 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\676981b1fcbb96697b926e56bf920a28_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a71f3d62a3543557291b3c7aac9ff2e6
SHA120595bbf82f02596e028b2c912f230f125a768a3
SHA256cfd56fdbc4f19d3bad66ea384562971e92f9f7d5142401cb676533d24ab3134c
SHA512292c398cb67f9ca6ffbae4f83c423dcf01ba27a553f96a7eeeb6ad8b3b00d95c5114c649b1055c5a087025ee794adb5e4df92c757214f2a4a0d2980f7e0f55d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f556ea5966f7865e951b2996e40e7b
SHA101c4752da4632531d4db98b89c528ed32e034a91
SHA256cd3c31f836716236cf728bdadef39eed083f8a46c55205064858b8cc6907af11
SHA512576a96440312d75862c1d0e474215758772ea83e2ecb662f36bc58cb06e5661127d476848757208d38838dfa707915cc91d94c13cafa306537b8a7f665ab2619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d2f120a0aa2552cbe53f2954fc3b09b
SHA184c0739509000de43ce7b5a50ffeb47250839840
SHA256b15b7aaf6179e76b2000eb09cf69e472207406afd2c220fc2d1fa3d5d7698b4b
SHA512eff414768c75c94c6d2a4f63de6b99acce3ed18ebce4a5f414215cd07bf356fffd3eee1c226faf643c194556031a4f79a457757e252769e180d37ff8b5219284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0126eb8b1fb26d1b4661bbf10ad60b8
SHA11d3930b8a9eaea0031db6aa619529786e5a47683
SHA2566dfa38c1ef54f3c8a23dec29f0b6b48b734118ea9ccd0048fd46a5debdd9ee9b
SHA5124794b82db89457a6902f4752f1e1460bfd30092edd9b4ed902a87588c9b7bd4b963e04b56f96a2046c8c58285335508e1fa9e4c52f42348fcb4abcbfa123a782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d15105dada5492808500cd616404e9
SHA19126d7cca07f614b838e1cb2a8e451abb6cb57b9
SHA256da6536a4750c37166bb25ac87f4acbccaeb69a833215328cdca5aed907713b21
SHA5123f81a493a4b4d01f36c5d0681a7c7ecf711e8d55212242a2cb1c4d90a2c811d97975285877883acda11bfddf433e945b805bc5195d47da83be0ad54f91f1f6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5422cbff2430451cddfb89c448ce07fe1
SHA1d4ad36e53d89eb7aeba203f255d97974ca98fd53
SHA2563aace9e6b93fb58f2cb4fc407a4ead91c38260e816d9aa0ba4b0cad42f528bad
SHA512f497fb7bb1bd00572aff46c6b8c9e31181da8a92de3d94f0427d95c9c74766edaf490bc473bbda3017ae0f254de0dd620d4a504f10a6fe7baa331563f25dfbc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56234bb62d3cd6ed48ef53543401968a1
SHA132be8f01e4a76183cc711d438fc7ccc97d708da8
SHA256e979753ff7dfd4fdbdd4a2805879f67af9318a3bc68830278c3be0cb652671b0
SHA51295ee61f667714970647b7b77f5d4ffa48f3a9336f25011f51265b2625af3f34e2252dd1d40cd6763051d34127c6a9348abb00b73c8142b855bd42baa09a8bcbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5892a323bf17fd78c9346bee519725557
SHA19c96dde96b621923a8c4738219b2b6da1c7f5fea
SHA256086d255d676c504b5690c5d36835f3e05f2f1d31784ac016a639a2febc7ba841
SHA51237743c14b7145471c4c0fcefd512384ffec7f18f9d152d8723284eab363ea3e70c49f9cdc8028abe7b0f13762f48b76f5ca3c90598c69470cc3b9d97cbca5d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4df3e4b5194deaf426cda46eafb62e1
SHA1b663891c12a90aa257ba83078d3b956cd3ea028f
SHA256eb76d5db879ab3ca197d34de3bb76c5b1ef1694571a3d4c6efcc0fc7638a2b2f
SHA5124895fb66b16cc9c4e72cf02a7525707c8f3e438aec3d82ff59fc154018805f6e6f7abba8d8b7d98766b7cbefa76cd4e18e499bae7186bfcecd06ec8b2315b227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab4763bd98edb252644b9b2e4bed6d3
SHA12fd2374314bff50cbf6b7ef18650742c37f5525c
SHA25617e70e0b0eeec77bc55bb2878ac7c1065b6867d72877487ebc915af866d43688
SHA512497c4963a3cf20687f590d6bc880d2871303e4858ddfe44a9d2398332dd0aee510239b984a8ba478d37d277a16f5e7b5dac8af6906088dfc95ddf48338c74532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b667fd94225e5fec8c91a0ffbaef6afc
SHA15d1a34dec09e36bd287eadbccac569ea322f1635
SHA25628696e185e4b26c5b0c131a04f0650dd081b45c5af233ec279fa8d58457e9ba6
SHA512284dbb95da62eb5121a273426c7ffc3d3d48a573df7f0c5966ed6d55369bce2a1e6aac1275b519a6e6dbb4f858e09a2a2fa4dc5806d57175b685c577f1b38c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b29f071e1741d76a10aa7d86b4e35d41
SHA167b8834dc6b38bdf02a35c93f9a1e22aad763599
SHA2568ca52e75b8b7ba76e4bc17df6baf7332539beefb2a5175ad72ca2bda685c2a27
SHA51217358e1e0eae66ce0cf9ff8a226c851d0e3d515951c9a4f335bf11081df7ba095cf981d01c2a25d155cfef82b8a75466e1e07315554d8788ed0bde2bbaeae255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546271ecc6674c7d35b577adf911a9027
SHA17cf18c3175f28c345f75326465a1a3f4a0b3a016
SHA256384004fde15913254ba58722c6a1dcf79cba021fc098328163386163c96a6dcb
SHA512689528969847f3a51a8f7c30ce3d901c6cee53ed18c527eda14ac918b5b2aae20cde8456c90e74cb0689ccfd70f1daac25c302900872aeed0fadf410b92bbb29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9bc4f8e0081c668b4f82143c034d7c
SHA1b2b823b9360d5614f795a8a3fe1c98beb7e5cd13
SHA256e95ddbce39c446b1e53c5f8eedec8282884731f482bc741bb80cd69defec5a47
SHA5125fef735c128dc31b375fe6fe14966c95c1b88cd784d8ef9c867f24f33d30dedbaf0154af04adcafbce0ddd01117b008c39fda4d3033d290d19854cf1c28f7682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd35bdf6f319a0ad5959af46dd5ea246
SHA12ff58783addf05af413818536422b436dbbb2d0c
SHA256f6205632f6dc65689837d7fb203f6d545b3adb1d175fbfc85f322d5fe597a52b
SHA5127134e351c96ae3d2c9da061dbf5ce65c28d1937dfb81c84b3ef2908f3fdb2bb2951c15bd67a8122037180d386a19b2c7cfc3687cb257722800ae77de21af0b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553615af4c9e1440f1a0f7e68335c2b12
SHA1f767bf122ad44b8b9a1d259f316e5a6bc3a6ec90
SHA256586690e78c074b335b465f541b463b22f49eac8bb243bde4545a235bd580b06e
SHA512bf9f29acf1796cef86b91bfa7907b868afcf2d826c2a58aa8144bb36c02700f42556966c378230215516d8e69ffefc2bd4d289935a85e00c80fbc35588492726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeaf20dfe2cd6f33e66a7908256e0370
SHA19a176b3cfcc16f3823bf7930f40705252a29e1ba
SHA25693791bede84b8f1204e7798ef5dfc7404819ec2ce9684eb993df8e4093cee3a9
SHA51273d43adcea9e66eaf1d64a0d17aa6e78f53c9885bdb1fe4908fd68b4877eb93d1d901c3a6985716a74f5acf5eb41650aae92f3e949d9718c41880773f4af8e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a52e0a4adc35608a532f9be49163a875
SHA190343e5aae028d85b3de79b09441dd030071dd44
SHA2566b6b2b34efef27df7129ba142872f28722529cac8152d01e6534945191073414
SHA51297f57371a9a4523005adafeda5ff6f2434db4d6fd6ed732ad76e0281413a7aabce938e6b7e58d9f06ea572362b790255b0203ca4ba00b36d5004a8e223391311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545970de24fd7e8b18ea4cffe05618dcb
SHA1397c63cc4fa8490239be40e8f7caf9c531458658
SHA256c0e8ea103346d982beab15cd3691f82a28806cd08f5d9ab53545619b76f2eba5
SHA5120d70d7a5148f5eff6c788ee9988caff1c17f25442a3ebac143894e31c4c9701f8a5d1c795dde52b7f80b7fcb4258d19db0db603b7e66ba41dbe57f4f8089cc8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0b978fc3b01224e18357564033860ae
SHA1900bec81a18ba471aaaea438e18773f6c6cc0eee
SHA25644e449a295cb214d5af25f45c1b2e7a76dd0ea81700ad038f5723c3909bde12c
SHA51206ba7fa38c104d489b35e3cf0108c84de46d72dc82e5d5da10fbd2b104d7a86bf51cd342dc51326bc97f00bd14672f75b582c56173e100fcc6a7db7029b0c6d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553553fcfcb7b15328888152ba8df4ab9
SHA197bcbeb86aac1a9709b70833e42f178250c9f7fe
SHA256b555a4be4f7ee422ad9307038e4e959d71029f04a939aa24f68c94639da880d9
SHA51230d3f6298a3ced11a958a5ccf5f266ab9f725d5936dbc7537547bd477868296d9a5e6201dbc95df914f5dd4cada5398b0d42985928bd53d05de778be4ff06987
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b