Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
f02fc0cac4a2943f666543a581d4571a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f02fc0cac4a2943f666543a581d4571a_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f02fc0cac4a2943f666543a581d4571a_JaffaCakes118.html
-
Size
4KB
-
MD5
f02fc0cac4a2943f666543a581d4571a
-
SHA1
cdbf3ab4ed229f751e5aa9747b6188f07d50fd56
-
SHA256
f3f0821f62828d8fb0e8792fa59dc6ab42ffb28cfa4cb96c2a7974d1b714ae4a
-
SHA512
4f8cc36e783479ac5b481155d172c0c9db4f58520575401db1cb4ec180beaadc39fec5ed20cabc249668663e1cf24ab85b62e7e61015b8f4e1ae9efbcf4a7d12
-
SSDEEP
96:rf9seakGiwLsvfpFFOxUEivBUqsOeN0Eg9jag0MwU:rf9FaL7LQFIaJvBRlVEg9+g0MwU
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0476801e48eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CE7DE91-FAD7-11EE-B7A6-525094B41941} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000053578295481d16218458810d5d1076cfa4b1ae627017e25ad2a67f4b22367dd3000000000e8000000002000020000000aa7321baaf51b12d483a495343117383d98640ac2669c6b4bf28ad4a8a3ffa862000000055ca661d2905ac19e6ced531149178feaba9175ef6952b338cd51f038e9ceb5b40000000d1dd8941ff1df002569263f3a035b5f9940d7c9c7c4c51cc4d1fee3260be5e94a9198906bd1cef771d2b875e9fcb8ae25b2ceeb10dc60325b7e79a9fee3fc851 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419313124" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2016 2212 iexplore.exe 28 PID 2212 wrote to memory of 2016 2212 iexplore.exe 28 PID 2212 wrote to memory of 2016 2212 iexplore.exe 28 PID 2212 wrote to memory of 2016 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f02fc0cac4a2943f666543a581d4571a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5480b3f6044494b15c19d2853b170b3f2
SHA1e6962a0ca2a511d4976f3a02d688c324df6c1b83
SHA2569a7a71526aa8cbdcde5087b325d834abb5f36f40b2d8e02fe028fa0dbe023a6c
SHA51223a92442b93f884196bc11f7ca6face71b9a057e2c36b5054e53780885f46654667175a1db2737d4f9e11c916152543338f91aee5fd3010b3de4c8d2b88ae2bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506327d16f993155bede870a3bbe9db78
SHA19bc01983fd16932e20935ae088a938e260317d52
SHA25625cb5950fae1b5a5d34cac7f7a0d442b101acde83b0831b81da8c7d1446defaf
SHA512d2ba854c17a047a97a03eb776b63d7701377c683a8a3d72438884a1a35fee3aabe1bf997088b239bc99ead924096177766e088cfae118754db852d1eed429f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5572a6f14febe9ae95c374fb1e78bf799
SHA107287cab9aee33455ba9aa67d5328e93d9a397ff
SHA256320708be1af08c54e6aad3bc8169bad77ae029f13b0e024a3f9f59022fb41970
SHA512cfe352b30cf4b7e46684a3ca65d06772a631310be652c138d91fe696af906548897cd89419ddfb7594ae6a1b139b696709dde4935bbe8566476f074b6a14ab7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ce306c3cc4134e0cf20bae11ccb4150
SHA1ee0fca858e649be9b6d4c52bddeb171efee69a29
SHA25611ffb85da68cccdc48cf0f16495a0d80f463608e887996431e75911e6bfe7364
SHA51208cd657145f2ddd8161df456c0de31ba06f83250d05dd18cbb19ae44fcfe421573c870b74ea5e5996d0c86e178c55aac997589c6a2e17390f1ca8a396b6034b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b1d50e98c1e60771b618070fb299f43
SHA1841da10eda63be74ad75e5c1a3e9d29903e27993
SHA256b227e4d3694ce2fe239f18c1d6a54afb26fa5b3656e14a73d1f42f5b1ef2358e
SHA512fea210454f292d1df3de4673ab36c1d156703f022a49d7b2412cca10f35c79999eca6cf769d9db031416a80aa35422d4300fce3f0aa3abab072e2389e240c7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b0808e351b6d7ddb0bee6d90b7b0ed2
SHA105f371d644e8f4809a1a6ce667ad0f2cd565bb69
SHA25649ac79b0907f0ad312ed64ef33063b3b213c2e4e64df4e2d0d4eb2443623c9da
SHA5127171279200ee30a35e573a4cd5303542b547a9e14998fbb43d5ac32d169ebfe7811b5e188957126547340dd23de3a644960fce9da860a1d73abc3c2e405b6224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50aca37cbf519b39c9e44eab5f6afc5dd
SHA1f6f32388b34b978803b87e033279a3f04fcbc45e
SHA256a49531d117f3e631c48b252904c5113432d8a6a0953a6350fc17c24b76d01137
SHA512ba009f9e0f81627c896c8423dab1731a3345daf406c5aa663c77feb075055339e4cde3bd8dfd5324aff72419130f146b93b16e2ac67d1c972f67b098636ea450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f13769c8987c5bd0f3488dbb5c9b9cf1
SHA15e394869dfe1ac38b6b670f584022d121803eb6e
SHA2569a6006c6a458e7e6133f470643af040f8149e203b12292ec14ba14c7bb5c7575
SHA512cceb5568d924b78b07c2a873996a547d3c62fdee67b811e914f6678c9622fc257cedf2017326a6e742a98f129176841786eaada38aca4a5acf0aec15544890d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5478f61942abddf307f751818409077a7
SHA1bfdb2645965f346164821639c319c1b35811ac0b
SHA256df45abf3bb7a4bc0a0a701968b3e2dac350bf3bee22db8f0a0e9c4d5ade3fd4a
SHA512dd80a4981e6c8390b1424af21f3e3483cdb04739be99603b50ccf863122282ea9e08d359ded156eeb9076be218fdd242e2b1f7789409ee654fb19fcea3a67371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f93024aeed87741ac5f868a649415823
SHA188d6a07ca61f77eeabeb91f9a33e9867f0a6e3e8
SHA2568ea89467efaf2e7092096671198365a534a7e4271931ae06f9bf93c46c3895cf
SHA5128137e3a9315d3b525596715ee53cc6d204559a351be7a7a3e40f0c8348c0a8cf5af7e2d6076a229e47cdbedd123caa628031b11f440089d5a5ad3370c0a5fa07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5689047197e4fd28861f4e4e45d912976
SHA19a5549136b48e50e2353b5cebd8fa9efb19c678b
SHA2566d25a89b468fa0ee6770198cc380438e3b8363429a57d12f8c1ff406f7cf9c41
SHA512fe4522e3e8c6ceb4b3ff79df702b81f7081e616620077d97fbe326327510f33c5e8a7aa90bb1c0762980cf8c357bd00b289404132b8f20ecf3f3abc1274a5ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e5b178cf47875d686be7f1953968720
SHA1123b6fa180267f295b93d50894abe454af2991da
SHA256c1c6427a1ee6df4a1874bb2fa641a89b17d796a206583d36552d4e599681d64f
SHA512083179019dd132c5e06c375a1d4f446ca80a7e63c4ce35d0cb46a9b982eea5ac6ea3279815641303519c2c3a3011c9e95499aae52182c442625e531a3c5a6793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f3da90025940a40275107030e8915db
SHA19741f570c168b4d444a5d7dbf58773a933665abf
SHA25622072628a7618a2e1c9efd646fbf8863058789b6b81179faa14f788f5a91cc29
SHA5129fa05f3f620167b34286b475c13af1a0ab157f6069903417333a2d9f31f559ca30a28d951e48b38fca854280e02ae2491c7e486fdb886057bfdcb539c2e881d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a7bdcaffad6ff2a123809836b2ca7d5
SHA18a6334af42d623c1b604ce969888382f6a49ddcb
SHA25624b9bd629664325da00f39d30e090e506d0382528f30806e162ae13e17636034
SHA512b55a1d2d1c47d50cb8b246e967dfe40c0ea419f1a3dad69319ad488d43fc275e91cee7ae34823d52abde8b3100e7d625a229b38fdffab3a77351622989772dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5716e0dd6154ad559270715877ba0ac20
SHA1b5e21c24bc4348f6acca35c802147077cca2496b
SHA25646192b394cd3da09da71fa1dec033af48c3fc906bc5eeb0621a59024d1069827
SHA512d1280dc226af30c23e00b470514e67a7347236f39d3f37e308f3e855bb8942f0c56babdef842309db244744b757c50ec22ef0fcb1c3134c8212a4048e6fa3f69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5134b4899911d9d37e8e27bfa978b67fa
SHA1add5e476f5a04425e7cd4e6c149d66e18dd232fa
SHA2566a5ef91ef6a114cba5fb1ff209d16f6625533d3df0dca399e69045feb7574473
SHA51235a21ef1c9a0cd69728b5d30609146e0a6e5228d0b30d887b6b8ec1d8872e8362e99a95bec8390b32a38cdf8305ee5a2bacefd4df43882e7fb53ca2032e20b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ae1a2d081c8643f40c1b83c7fa4d082
SHA1710c610f9c33e5fdbcfd6d2dd9a4d40e0541f296
SHA2560f98dc7ff9275512edab78e1b8a1bd5fc0d86044d42f7fef8bd1767d10b74a7a
SHA51240c79546f0717dd3df0a3dacb3c592b178908d247d6ba35f79f042c77946aef69ae675564f48100524bdd54c806745c5d327254c4dbc702bd7634fc3a7abcd70
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a