Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
f199bb17e2c84b6475390037f26d0ff9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f199bb17e2c84b6475390037f26d0ff9_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f199bb17e2c84b6475390037f26d0ff9_JaffaCakes118.html
-
Size
2KB
-
MD5
f199bb17e2c84b6475390037f26d0ff9
-
SHA1
45e64c9d5b675714e5b7f23718be921a2b113411
-
SHA256
44283fc88c3724d5027831d2b30ee920941087f3fe64e4902e3b7be58962c422
-
SHA512
2fd47513ca3a0afb803003de998e6552d0bac2eaeb2735ff6ce302a3d1fd4be08077e3cff5214328d31729a1bd41a1b6a3933771746169e66c6a1fca7e04dadb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 205c69ae5a8fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc5000000000200000000001066000000010000200000007673f0edc838d096633ff3180e73342607134e3bb595a216392440087512cd23000000000e80000000020000200000002b9949232ceb0157458665f28d06796e7e097cd56634eb24f2067223b8f2d6c920000000b4a3bdd6426e1d4d1b8be9deccf8ee0c2db7187feed00c7dc5e46ba75d31d9d840000000b337c3cecd39083d9df7f5f1364f83a5a9ad24ee0d9047278a00b3af2dbf681d85e297e7ce6b597f57cc1564ecf6e1ad9d2e417051773ba4d17c481583805881 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D95194C1-FB4D-11EE-B291-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419364096" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3048 2380 iexplore.exe 28 PID 2380 wrote to memory of 3048 2380 iexplore.exe 28 PID 2380 wrote to memory of 3048 2380 iexplore.exe 28 PID 2380 wrote to memory of 3048 2380 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f199bb17e2c84b6475390037f26d0ff9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ada8fb44f05530ce4027af0d5508b9f
SHA11209ba548676ab77b5ab03091218c1ff0e8d5142
SHA2560f38782a412feed5f1b10ec10e50445b11d53e292029a3f63fb98f71fffa1b1f
SHA512648777931855888dec608f64c12271aa30db7de50e03b568b3d0a127dbdb1d5c44926279374c8b54feeffe65c283308329f4486f09ae55750d8aae6fd0206be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b43eeac543d4b05c77eb6e58d9bf1181
SHA1e04527feb7085de5e96ad113ff1aa7f07c42dac5
SHA256207eb0f00cf253c8b012f79e4764991a0a644e4b1501ef1b49d9ed75d1f00084
SHA512ea0e6b8335fe75941de7edd2cba4ac394eda7708014dab949c8040ccc463feec2fe77b68aee7db37eaeb74a481f78c2e09b5b786b2d2674cf9cbc60b61b919de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d96b71f2a3ed9075a98c466158cddf5c
SHA18bea6c66e75a08075369b9e91d0c11768671fbce
SHA25600ab57c44c9ac9dd9af2efc9ceead2ec35e29721430fdfb58bde84d9515255d9
SHA51235ddd845b7afdcad4f1e1dba8dcd5893d32a41496ae7535f1f59ce9fb76b145d914a83c4fdad1e7b5c85c1dd3e8a1edc14ca6c318ac5d7b7ee85fb6b9df4f012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542dd6045d431e1f309c2a2223b75bb4d
SHA1d206335b17cd4dce94cec4994c0801c8cd7fee50
SHA256f2874d0f7ce1831b6dc0de6e82fc406723a29a77a4d418fcf6ce2254d3670d3d
SHA512ea60b7db92953a262a92be67180c4029d577f6d47b843d2c540c2ac2fe2b0af409bc823658312244d25b188ebe5dffb0d62fb31e6d447061f40b48109d497f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f3559981f3b498457cbb01707e478a8
SHA11eca122a967a308d2e0e638410ce7b4a5431af72
SHA25682c1cf70e5027ef8a9d0792a4ad9fdd15ae5c343ba8e80550127fe94dd0a0fa5
SHA512a17e0f67fca136c19dd35766687c86e68496f69831767667007858a9302ee0302744a93ebaffc35f1fb19d8b77a2bbeb244b8ea66b8784e80d2d7ccd80b1984b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbadaabfa8fc7ad82446a7d44de777b7
SHA120572c0d424b4d69921aa036b9bccb84030af9da
SHA256a7657fb7e4f0eb8054dd7c4d9b1886357bf6fdd1c8d782dfde550f089f49d819
SHA512770e8209afba1c417bc6bd5fbfd86998b20d9b298eb83ecca42d8b637ff246a80b1a05700ef4f28b31f04e436fd6c305cc435a685bcabb66213ff2949c7f81f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582abc468816fdd110226d300e0b66661
SHA1611f066d5269bc956a5f1dd8077fc69dd163f36b
SHA2563adbcfe9dde92b13d1a2b760a872d20502da0e770aa16ee7fa699da60052c33e
SHA51270c1ae9373afecbf1dd680844002e4401787d3126ebaa1d642899cc1c48ac94fe8a0846298da837eabab888c86d2786877b09d023f5fa7b74e14cfd61e46b276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d9326b5cec32055202046f8aececa9a
SHA1aac623f705988be68da11e276c4c2ee24da73fa6
SHA256dd8a9b2914e623b4558a79f60e495aae4545cb3ee389cd40da0c6eed4d7376ee
SHA512e6622d6ce09d80983179439467c642a37609c360ebb12ce4dc3e9607cc2b3d2dd3ed18d7d17c43dbe83a3de004407a670b65f969824dfc23129aca215b742051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587b2da55b95c71701890d0c3d2618d60
SHA1877cf66bb642797ee74fac1c93b50a1a52f054a5
SHA25626481cd2e59efcfc0daa58f1a5e55563d26dd70678c577b92adf4560840358e1
SHA51245b61168b1f01086ba4592aa9a88f8a59cc0d727e376067351eed75631750b5a113829752cba98aa32cb4a50f1a76cac369cef263ab20ac1722cc5b5cf65730c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0d889c2bc79365c0900040a735a7cbf
SHA150b558e2c2796e4ababae93cce9436298f48bded
SHA256ba834855a6e62454d5b622d834178b68896ed540c2eae38be162f014be4ab9a0
SHA512b42bf35409281e52d7dbb8bdf85bdb987ecf7efed084f7b11e10e102e912b510eeb6ed2bb8a738e4abff1d5adc72b8b38fda12c6d244652d0ee2c1854ed79399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4b070a27a6b1ce8e4ddffc1a02ea5d7
SHA1fcab7e7d2eeddce34495ac3a8bb4ef3f385f17b7
SHA2563399b4a3f3fe8fbe44776af2c018bb33ebcbdf356aba9bc3a0fc4d4115953230
SHA512378f07db1e6d59916357840a88060acbe599b6145d90da95dbca6c5574111dde9354ce05d4fdcc211f324d0ad5ddc33993342ac8cf48bb6f7b8214f0a3ac51d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc9fea32e7d5e5aea54d7a20ba58433b
SHA1da35b66202e5340331c4d93271bd51a7bae7c6f7
SHA256bc397e776740b88c2063357227bb1a13ed4958c4b0306478180e751f96b8b7dd
SHA512f45820a53dd8218823a0d45fca7ac5e6ae8138e9e97a57ebfeb746ac5d3fe6c69dda099957aaea5437f8c606aca404dfb894e9e6a000e26ac7612c3e363cc0ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeeec922bd55823452002815be534686
SHA1178affe6b7754c61297823167011d17b105d0e2b
SHA256738edf156927ca2fe8946260b7dd11dabdc56f8914b1c7db41575284b150fc04
SHA51286a6dba96c200b328c2c56f9d1e23b9aa3d60f5067c2f027382a0545f05feebf04b48cb8ba6a2f774864ec191b0d3b0bdadce7669ee2b57dfc823b2b739cbb3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5674d3f33c059ebf106705ebe1629b038
SHA1580e2e49723e65710fcf1b4c5167c8dd24b57886
SHA256a670b736d545df6e35dad70f94cc208ea3d3b130d793d8ae0fd0e2f1de90b0e6
SHA5126c1253dd1b1fe7ae6308967fb443b03469abcf2af4ba86da087cd05108dc61bdf38fc44ffd79e4ed6e1bf1ceb5cb9896fccb0bb546f0e84130c416c3c10e0fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560d3e0cf617dce8aa9804132580247e6
SHA1ac9a85a47f70ade03ae3d01a2f96615cfcaa66a2
SHA25608f88bffd5e6e6e59e69371384d72bbbc32f45ad2c85a72270c4271f3bc67d76
SHA512f3e774c6542f3575a7fd2b12a1b86f0750ecf791d5dc39ab573fa4d1041cde769e859059b7a4009663464cdd1bd5a5449abe0cca6ee37d58efa735b9176ca268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5240a5a3dc726d62a99fba36ab1d7ca01
SHA1d5e338a728f67ca50e860863a2424d30fa775b50
SHA25684a91011f3c717be4ea705f47b6d22cd9f01ce9bd41a2953f25f55863dc9b21f
SHA5125cab43a071929808f5d089d2040cd86ddcbc2a02b0c69e272f5b7adecb03d51a810012d2aea54d0947756408bcf0b688ab49645f4170f6d0bb51524681856437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53109883e494debb4060e61e4d416dbfe
SHA1739e687923eaa092601051f6c0ffdf79ea6653ae
SHA256f768980942d153c73c2c1f5eda0afa0cd82841a9cc476714b3b9fa775692275d
SHA512a544a6de58df600261d0448a336b645602cc90024f75d6e278c6529404567f6469e90efd2f3f9cd20717455b1111b81053372fc5790320ab17f9a12bed39cc59
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a