Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
edac49877ae70849a33b71a8cae3d230_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
edac49877ae70849a33b71a8cae3d230_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
edac49877ae70849a33b71a8cae3d230_JaffaCakes118.html
-
Size
10KB
-
MD5
edac49877ae70849a33b71a8cae3d230
-
SHA1
aba1305338ba7f2caa440c96bc0da69f5c270d60
-
SHA256
e9d8ac965911bf75ef37b777562994f2f19723214ccef21ccd956255d0b0bd01
-
SHA512
f4206d285c4e4967d884edee61966079184a6cd3774374a7ab5f40a089efaf3a2ceaf502a995b55fadc97db6e3277973224f60924527846a21216bd542b22951
-
SSDEEP
96:uzVs+ux74+LLY1k9o84d12ef7CSTUHGT/kP+pSps31DvMdlwe60UYRDvMdldlVHS:csz74+AYS/i8SgaNUYRravPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601f6f521f8cda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D781EA1-F812-11EE-8745-52ADCDCA366E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000d8e2688b1853f01961d64a33d223cfd26920371f2a2a01b0be6faaa63856bdcd000000000e8000000002000020000000557db3b22fa2a2d8af7515238190bbedeb8ebf2cb00d1622ed6c54e110fa23e820000000b09530ebb37e2838b3dff8e803b471b9449926c5c6462972d6feda41d4b9e9f940000000fa73433e15c758695adaca70878785c71ee5691b9f337b472e16f71425d77aaa5f8e810549a501a5084af7f16b124195d3655cef79370766affe36b1dd1faff6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419008746" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2216 2240 iexplore.exe 28 PID 2240 wrote to memory of 2216 2240 iexplore.exe 28 PID 2240 wrote to memory of 2216 2240 iexplore.exe 28 PID 2240 wrote to memory of 2216 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\edac49877ae70849a33b71a8cae3d230_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e7fda47164c089cf5078d9815a57f93
SHA12a5c11a20c39d9f63ca58e7c0e67eb93a7466167
SHA25653fb01e5fd8835bbdc66d271ca10427cf6dab9b908618bf52f48fa5eb93f609e
SHA51215bddec8c69930e259f9adf06e593de7128fec64fd043ea2a48b57286f4e0f478985934f27ab88006ca93bf7cf0540738b056c6b97b5dde6edd467f887240d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efe6049301a9b497a52755c5b41f30a8
SHA119f6c251ead81eed8d6c3ad7bbd41cd666e20569
SHA2566ce0693ff1bc8426568bbaa003cf323c2dc3ed9d619dc609259871ec474f2699
SHA512ecb89de78fccacf217dbe5faa7eb361792ec319586fd8450a7bfccadab55895ba4dbb6c4d906e192c1f57a91d17109d2324ae791cd8df1db82dfcc93742be849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fce7780d4706f603d033d00e54d0dee8
SHA1fc42d2bc0e5a5b8a4a686df5178586b3480f4b30
SHA2565bbf8d708e812b9056b27fc68ff45ca8e19643a359589d306853afcacb0ac136
SHA51210f3b8df1aaf132c55f0e0be16975c76a0879b481d8083aeb89b3a5dfbc43558d205e5fc00ebf131b7bff2571b3d124625855629affb76c5e69f8d68c54bbb44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5946a8684bca82c665d28576d7d4bb1ba
SHA16ab9daa36e2e318729ad4f773e4420d8662db9b8
SHA2561c53030e1eab3be225f1f5e621a836b3e6acfcf9d0718846fce86e6eae35224a
SHA512414cbead249446484009d4a1c1cba40bad4a54414525f5c04f90a3adedf80c7accc2d18760ac9f96ba9509ddbe93fb847e9b04087346015f1c3136467eb47c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f237a7e7b11c8071bc98f4f94879e3fd
SHA101687bd8f2379ee872bd540c936c76339c8201ce
SHA256da6a71ff03c4746b08412241df7fb87450b662642d23a9a26bbe39687ef197b6
SHA5127cf9706eb38c8c076867bc4975ef6b9ab454a3a07f627c40230ab3eda983ece093799ac323ea9498959c3c1d0cd948b14aad5d37dc6a0847e7204d214d8d1ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52904d45073d928ead21943e3c47c86eb
SHA107194b12de8bd1ed94543807cba66a98c38ae30f
SHA25675efad8ea9306e1b2c372eddd8d14ea08e5ea506c4205b78e18e95b6910cbbc9
SHA51219677ad77eeeff6538ec8d0c5ed6007378c2decbfcfddf4fd6d2c54f1b5e42c1150997e40a872953deba45d4a3b22d675548f1e9aeb9c8ba819acc9836aecacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543f9879f308c40620b18800f39533486
SHA129582a023f24f7698d1a0f8a2c05df4f0722e493
SHA2566bc3cdeefe500ff7e9dbe091cdef78e32ba42528d7a8cd1b0b0b34e017c68ff4
SHA512c41d2f48169e85ee67e6bbaf0cc698917cfe53dc462c41c9ce9841437812153205c5355e5ab739367c74fcae1f6ae4376d774b1506e6850bf2bd714a09a4652f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55553f343fd0af1ac5910a54ac58287e9
SHA18ce8bf2a50df07609f2b55d2cc21e74b79834c40
SHA256c83d31228842b92f4d3d902eea8e7353b428d467ae1ea2b93e0d7171a3b3e69e
SHA512f148ea5eba6e1be7706fa196e326623ec44f6657a2ff0b30620781661db7126ade4002b5a53af5b6acb833ef6b4e80cbc780d10255ba3900e978a597c0f5b6cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdbe0d1227d66fad95c3af95c0ea2af6
SHA115eebe9fc1026163c98e18793a63ffc4c38447f1
SHA25696133b4e6f37cf43d5627f2026158205e0922550b5df45b90350916108af6235
SHA512b8416da782c826e27e53e7d0251dc146a37661f46408b6bcad113892ee294bb2246ff4fa80469d75ed5b6a4aeed199555d1f80a3de10157118a770b1ad23ddb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc3c76e3400a0cf590b2a8043dc93a86
SHA11545fc5605d474d81057022067f833f3f5e73eb5
SHA256443e91b106c07b087249c2ae37b1619489e2e9fab10bd47cc3a0e4c3ab3a2844
SHA5125b137e3c59a9e8b8dae57d1a97d81bbee7bb9115a5b72cb16002b4d1925a802a3e19f34f789e43ca167e9eb12c9b6369e571b0c5cbcdd0c9f6077eedc15cc906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fd04a83d1b76c3562cf697a6d612f51
SHA147be492cec626fbaf8bf25f8686c66c1299cf288
SHA25678692bb8097b2a7df09c88741c731a2d7119a3707e3abc92937ffb0f514988d0
SHA512312a5411007b91cd5ba219b6bddc4bcf7d63b1effceb7273758144a68bd1c9123a7f14168b394fadd4e934c577d234d2160f463fb1602cd4bbb65cde5c14999c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4071353e8b10e2907c774142d17b77e
SHA1ae04d2126a91c71da752b00640b8a673ad3ae857
SHA256a2d5f9dd25b25630bbf8f478145a1af76ae19c5ef0aad9ce2a12ebb1ffcdaff0
SHA512893d169ede4cff5f11d48069745f8c28e29ae79cb0b4b51e92f281d76301e4e7e68d9fc6d2e8a7edb2a43c46217c7e3fb0c233d287a4a290769144314f0d43ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9c83b1707ef1a4fbf2cd57113e46b72
SHA18e2efee418e8a151ea3b1c829b6204114b4d664e
SHA25643ac6833bd8bba7802725422732e19baae61631192481481af687d80f7f2b728
SHA5125a31f466c5347a397b7675e7e9120400a579c1ee35abadd0b318f79f35629701069fe6323deedf67f514106a5245d1ccb20372ce40ef35819e8508854a6c8f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aafdb5c8d7079656101389f90cac2f63
SHA1aefc3919657071bc86ef8eb4c1be6c50955e3690
SHA2564fbeaaf22d5866d81de8a5bd032ac07141b82aafaf771963cd9dbbf139f8f740
SHA512cdb7afc26eeb37b1d7960658c74c3ba7163bd873ab29baefc2e71569ef9f518812ca6b4e675de1dee3a71e1195bab5a111673cbfcd83b91246f5ad8fff6414ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b75a56ac298db1771eb9a03573b002e5
SHA1186a77c620c69dc8417414b40b36b50f4fe9a5d9
SHA256cb9760d1ed18d6f135fb30c80a9917e8491289a6687ed6117fdbba9304a19a9d
SHA5127122fdfe6905b144e8ed88bad89901c039c8eb80b9750ed6fbf5c7627c1bbc6a3a72397c54dc69fb131819f65ed2deaefbaec07ee7bad609858586218fef118b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a0f43026248c915f9e9021338982fba
SHA16917e70dbedd356ac02ab06cee0adfede534a202
SHA2567ccfed26958597e20ac5adadd88c89875a5e457d534c67edf10cba3876fab7c6
SHA51245c20d022ea8e26e3b6ed4e7716c59c0200ea6b081bb12283000fdb6f59b2b984ff1f0c04cc403cbc8754a7b21a67bafedd30064c49b3372f6691af691849e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c026434e1e878637cbc94205be2218f
SHA1b8619d3f165ab7dae7371e11923c471bd90fbe2a
SHA2560597b7516ab5bbcdf1f2d9d91f36b1b75ecbe7a2da61d04a75ab53feda69a168
SHA512652deb3db8a7c1aab352e004cfd15e178127f225e48971d9f351c10ac7ff38c7efb0904b59d8508f0f709fb4e0687e2d029cf4f91cf56566bd20d499415b6f0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592d2b6f1fcb4d92b118093ed31525943
SHA176fa91b6ed7311ea5fed41f6238109b759848d1b
SHA256e494ecf563024a3560ea565995b5f4c20f0c4c0d26f290b91f1150629b618d77
SHA512e6eaaa6744aff3aa5fb8f9501d758e0b581c9747fa32203a6c337620c8d5ce2935992d2d968b4abf354a6f1f2cb1e27776c9b4b6f83985c427e443dca8d73788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58923ef01c60004d9abfd4a1e6dc9ac20
SHA12514c8785501eee1820f4737c6ef98415ffc45a7
SHA2562e757a6df4cdfde44c49f9c53225f0c4e020b9d18338a93d76397dc80663c2bf
SHA51276de9c4bda0244bb68f30feb3dd9adf20d35c82ef1bd9f837e5bb3a49ab4de47e11a8ce35818e997b2d1adceeb1522224cd7190b9249bcf1fb9fa95d79426409
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a