Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
e92c8d080692de31abc9cb226e276609_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e92c8d080692de31abc9cb226e276609_JaffaCakes118.html
Resource
win10v2004-20231215-en
General
-
Target
e92c8d080692de31abc9cb226e276609_JaffaCakes118.html
-
Size
18KB
-
MD5
e92c8d080692de31abc9cb226e276609
-
SHA1
9a9ba6f54171795a271914a8d6ed7a5ae1e281af
-
SHA256
14788f023e3b6b8ae83ef4f3f6ed779e089c5b889c6e22ca524560baf580a1f9
-
SHA512
e5ecf57bc49e1459702d4d78c7e3fea3497337c297c42024b81c7bd8f7aee9f306823d5654a9875137b83e065ab8e5f2b9e582eaff2d41cadc4db6bf0016822d
-
SSDEEP
384:HRG4eoKNBGbF0X68/oTRagQ4pAS9qgtgcVfrXK132mu:HRG4eoKN4bF0IQqFbXrXK1Gmu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418797122" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3289681-F625-11EE-A4DC-6EC9990C2B7A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000000a661ba4aa444a220dd4d55f63d85884eed858873b6de08f1219b14ac16c328f000000000e80000000020000200000003b4f1323decd918485811cb6c0fb34de8fe08d607dd5f14f07e576b2d2217a0520000000234cc1145284c53c2042332ab4d63715696cbd2b414f0e015b4d9925e28e78c740000000ed9947e16e6d84721e2cc8f139ccb54d9bd064932e8dca5bae711d631e555b7df58b04a3172585c4abd7756fad27fa9dc0e461bf6ed3cc954a9c94d2bb80b750 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bcae97328ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1776 iexplore.exe 1776 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1776 wrote to memory of 3020 1776 iexplore.exe 28 PID 1776 wrote to memory of 3020 1776 iexplore.exe 28 PID 1776 wrote to memory of 3020 1776 iexplore.exe 28 PID 1776 wrote to memory of 3020 1776 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e92c8d080692de31abc9cb226e276609_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1776 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599cb73005c94ddb6f962c9b20b565263
SHA1739a0c0386e150d457a6c713f460bb9d64b47bd3
SHA256655df8a0bfc5da2096cec090d00d6dbfb6fbe002759fcca368f0fbb41e047d3f
SHA51232a3b8f217c7dafa111eb29ab8f3056e3015a80014d832ba70b4e8957800cf77b7d0e7b5eb5eceddc7ea436923707569a97bd04a28eb1deb14150e98fb63eca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53aa6ef769f6ecad5520f71f765edccec
SHA18bf3191010fe753dd6a7099b61d0e54b6c02f05f
SHA256fd5df6f15fb078da830a2ccaed712615a104dd1e012fe89fa586d4c622c3aa72
SHA512adca2779bc52716a589fd5eb675269d6fe2b80a9466e26fa548f56aa008e3b890b1aaf3bc5683a5f6ac6a6dd3f580dfe4fa4589008203d34819b664b71eb5a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ff0ca9be8c4435c41de8def361fabe3
SHA144db52c6ace71e0b1c97d8c616d31f6647d86905
SHA2563b58583e6e24a4720f8aecfb4e4d61b87b6fc9bb4306e2ae424328d2068acda0
SHA512da49392182e7c1f2c0b5f130498223c03802eb624928e50e04d5dc244285a0993ba6638ade5b2f3061b2dbb858400993a6b6dad52dbf36de0fe140f10d0e3342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5790dc42e736c68793830797f18c44e3e
SHA12bbac10ac66ad72371ae5c3e5117dc7c41054e5e
SHA256222e28e5a870f0c3bad9066137891e0118b36ddeedbaf82a638a67fb0f0022b0
SHA512f21c5abaf300c0ec1fa651557e4c1257d471191a72a06612134ca5f119292b4bf908112492c210171b2590a8ab5f177e73a092b5919cade813babf15c94cca1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b21483e4ac2ec047d81d43408ac5ea4
SHA118e17b670e5f638a8a8d7ba1a91830bb76ba7d6f
SHA256f7a77038694f5d633a3d298d6d1509049e1d0bcb4bb4787fb8a2b9fbe64faedb
SHA512650af454912b2383215141ebc63e267d0fb05e07a225e5568d3a103e288f9412c5c0be4d0a23ac5d28cd9f8c157f954433b0f5426a8a62f94ca7a5d90e88f1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566b3e2d137ae6f305a267f1b16c267c0
SHA1f99f5415a636a4bb37070d3495996c87025252b6
SHA25657d781a78b8cbd824814ebe39a192aad7d21d8d81dac7c9947388256b9e7738c
SHA51278ca608c21e92c4c42755cebe58a578b9f7d3f14b01edbcec34e9421dc4998b77d8f35a7b47ffc40576ad4fba28b8352fd1eb28f87d9301e88db82b887369405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530f38daf11ad1173dec2074ec8e8873d
SHA1ada70a1b7d4b6d5893d2c716073307b756e884c6
SHA256f4d96d882a542814948f519a269fe9da78dd225fabf12ef7ff4a85f8681b27b4
SHA51225d83964307daecafd10230d9619dbf99407e60fb3e0bfb77937d626194529a9434b0b74148330af4a5362586afaae6b7c152a1008fd3229143965a37b11017c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb8ec25141510fa077317dc5f1bf44b1
SHA1e344f415da5dc14e31d94326c41468c60bff1432
SHA256732981c77b7bc191dad7f8d8acedb124976357ba9c1607c15f97b795ca3df2ba
SHA5124c71ccef032780bdd6919af262cc792220f2dc88fc030c86f1ea9cb91a43aa9bb063478fb6cc0b940618b0a0ff27b6b534fbc62260008dc3d846a3431b8d4954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fbe9248ce19408bfc83420168c0d638
SHA1a057b8e729e7566d45518f9af247fce827235c32
SHA256cf37e9bbfa0c4dcfe834a83aa3f550a3def6190e5e11c9dd941410c0b08023c7
SHA51218a507ca93965c9037a301a9e795f8aef9b9bd80023edb880d9ac9ad1c27d128d41d03ec177d063d0c4671631785ce2e0af07cce7c09a52800ded48f29437d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51282cc55fb92e20d889f8971e804e1f1
SHA1f0de56654e998626c6e79a985f68fde873753114
SHA2566c3652fab45baf2cfc1971f4cd9fe1089869ffaf271017c5a56bc59b78073bef
SHA5126607c14ad5e5ce4fbef03ca25ef131404e0f8acc1fcf9fa791d3e1e94721f00aed231374fa2cdf8f9e8d39a9edb012533e16d45ff65eafc2ed027e0f506c8ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0f509891c8c76d4d43743e1a7c5ffd0
SHA1c6bdaa3a12cbb0093a31a283a0dfd8b29a3a1a3f
SHA256dc4f4a6e69e6d25e4d61cc595e72b91f8ac1e0752e5f463286b8e6afd3f5f26a
SHA51205ee9334df959e889525e2ff85b7198877d427787536cfc7ea9967f8bc6e8e5e93782443ca9bbc59eaffc323b5dd9aea2dd1a77e6832c5f8ad1e08410eeeb477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5180440ef426fae7a7451be9f2984d6c8
SHA1902f9adb29096aa939c8324bdb3f803aaa8cb1b5
SHA2569aa40fe8b4b45e0ebce3c05fb83b6e756f2f2e939f543fdfb62a7de6b1da5ccb
SHA5125806e07b240215865f0a6b77c33a0b873da237bec1fd4b9817ee0bdd416583fbded2608134f7db6f2c271c3b42c34f7cdec1b35ed35ad74a2dd36b18acc70d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddd05fe1ed09404a5b8f2af2b0ea1893
SHA17e95a2a0641fd63e9fa7083f528dd14f8c607b62
SHA25669d1fc32fda536d97c14936b1446564a569b7f16b99256fbc7f4a892411302a1
SHA51223ea2a916ebccd2b21e85ca3049ee58a52afe40b151a970c162993ba8750682cd1cf024153a065ff9a57b341baf1416a94b65fc3bad2e99965d0a46e76eeb596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519ff92baf06cd9239a238e7c3a41f858
SHA1254d374b374cf5a7d61dcecb7afc9a0af8c7386e
SHA25636fc98b81659e7167624c3eb5ee143957551ef69aa3f0801cbc106514d746cc2
SHA512ad2b8bbd31f65179bbcc9a3d0e35e81fb7d8a3401fdfba46d5662d072fbd2cf84e021429a198e60b38f044fb320e9b8924a1c916ce2b0c29430a0fe79f66945c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531cb14a86c3905d09ae374d244c5ea05
SHA1c133eb5c32880dc9ec3f4af1886bd9e94aef6959
SHA256d9097680a544961bc4715a1ee37b1df7bae5970244d35e5c1d11abe39557db1c
SHA51237da0c9b841b6d253bc49ad84eb375818652c74ec3d04fb729fd8abeed7e7c816b909a3ac99572d113317eadb4b1403891775dd542581fde69185d400746f871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539dd5a07241937d4e9e8d525c0ac0c1f
SHA14707a91fadfadf20d0cd215254a0442d0c904ee0
SHA256dc28fca7d74f6453d417abbfeb65b53a46a1f8b0664801598b249f7773b04a20
SHA512b99bface179fdb2f37e9e70965adeacfa24f48bf66e52ca46d5c08279bddea532552b0f86ecd0df365029a18673dd4444ea819b520555857b753b834e8757c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c03c9888dd9329505db5ecba6ba4a6c2
SHA1deb4fb5dcab6ccaf1d951fab6eb6c4b24d324e86
SHA2563ad26d856c87069c0841e142c97ed43dbb325b211eb4a3ae5a9ab780e4a2bfef
SHA51231d95809602a2c9a0a48180605628059be58ffaf19094dfcd12f9f81756be1e87a4262ca5b0015332fb74f9db9363b6e67e973d4fe93173a3f88bd1755b0f303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d9abce2f4fd67c6a16b02597539ace4
SHA13e17bbd1311099bfc5ef9e1bcc11ab67821b27a3
SHA25684453a075a5b73ade483c44f72695754b761940b6714fadb24237a800d3e5876
SHA512096f16f3d04da3a105b4ea1b56a8131b72b7922f9adcebbf5c43f09a259823813945c286d1b0b54a5030d2d85d54f03125c5a096b5f3b69e50ec6e9901be576a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bffd72a22e25c78d1e607331efb4e03
SHA16038ae50365ebb7ddba7594f23a8561464f5427c
SHA2564227dc0808a347204e14d64b868eb18d1d5327145cd390e07393334fa8565179
SHA512020c7b7705c8a1efbeb707ada7767184452ad6cbe3b18d669354b576c8dc5b6eeb2883a4b9f17b6402db7b6a6f71eb6390c67709cf91b2cb6ba99e64251a9aac
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a