Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 00:23
Static task
static1
Behavioral task
behavioral1
Sample
f24332666dcf906efa8b58d7fe7e9dc0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f24332666dcf906efa8b58d7fe7e9dc0_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f24332666dcf906efa8b58d7fe7e9dc0_JaffaCakes118.html
-
Size
12KB
-
MD5
f24332666dcf906efa8b58d7fe7e9dc0
-
SHA1
551db5b3f502d7ade1769d12412c14eb014518d2
-
SHA256
a9b71c381675c7188786adde7718f4ce496b61ee693a689bc5b910ecc397af7c
-
SHA512
72e842ee53b0341864d1b6d7f7da68109b211dd3c7b7b7a4d0cf13f3e7f6ef0e4acf2f3bf0d69a2d03e54445649c44a6ab528a7bae378b431ecc4e91025ba7b1
-
SSDEEP
96:KsuBl666MCo0Gz6ay1nptOK86Ru4+wgv7eGsHLAn2ifRPzTwPyEXFtHFIn+4UhJs:a666MPG+Noan+4UhJs
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000064e477f519a45925459e820f2e56f91c9189e33c64f6b683ae7686061c3e782b000000000e80000000020000200000007946c2f879c0df492160252a5ce10de309891f64fbb0f57cfb51bfb0379309bc20000000a598aaffe05f76f7499bc38d1cebbc3f2f1401f149c2e6f61bc17f8f991a3dbe4000000087abb58d6dcc0ae43994ac73277857111da972d460d359ee7e82af3166b6df0b821d0d97be862ccbe4b16f6d212080ec20e2c3977ecd9518d244040508297388 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419388851" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e030b16a948fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D170751-FB87-11EE-92D3-66DD11CD6629} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1460 iexplore.exe 1460 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1460 wrote to memory of 2632 1460 iexplore.exe 28 PID 1460 wrote to memory of 2632 1460 iexplore.exe 28 PID 1460 wrote to memory of 2632 1460 iexplore.exe 28 PID 1460 wrote to memory of 2632 1460 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f24332666dcf906efa8b58d7fe7e9dc0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5936020f200f4fd53e4eeda9e9b45305b
SHA19c2c82c61efc6adf6f1eadc45b6dd0772b965a77
SHA25693983a44fb3c887299ccb4c1a0ff5d624e6403ce9ec8f8ac9d27757789ed6ed0
SHA512384fbe0e70d34f5e946e2f1d7958aac891ed7522ba4e76838cbffb60ad6c8550785d2692d171977daeaa73d4958cb27fd6c90376780a06496cda8f76bbad801b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc4be7e80dbf12afcb1f4d5ea250d369
SHA14d994e0382c9c952ce1bdc54be70557069a5b9ca
SHA256ff390b78d5481b2c72b5f768fb59d997eb8428e2f81e93ac2c6d667aa3fd45df
SHA5126e80e1296fc4bee489928cd8c2618a965143166c19fa4e351436e61162e9491d0a5d823550412f8c1d3508dc2c40ea670cbaf070403ab20351ab3f991725a920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c61555ecc61ace59fc3da981e59fbbc1
SHA1cf494f52290c5dff08f361a28b29b828862da0c5
SHA256db87e76bd63f50308f2bf57d4435a673641c733a7a152fc781c014864f0a36c5
SHA512ff69dcec01b2f1cf94953ec8071893930ab8f5d02d7a6dcece6fa70b734a9a16d4e5cd0da393de7dc57634866765a53f17072421879903af9e509be16790e961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1bcefb02dccb09e3369c1dcb6ba25b0
SHA118494bccdaaf5f2bf7d930ad36b49508cbae6451
SHA256014b9a9f394b8154a27c0eede65de03e5f81d72f7aef7099141694e3b41849e5
SHA5122f4c32dda50236aaef794b7b7553ab84787fda8dc44aecb736f1cc2c72c060b51221cafb08be4758c73ffe5246c05ff62839e0748c7814894652f827ea02f6de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599c2ad09a42810b7a889054769db1c5a
SHA182776fd739008cd6dc404c16c27f0239f491e383
SHA256abf53fd6a4cf4b99333e62a547caa3cb834f7e91fe9dd15a7f41c383428a6a1a
SHA512c6cd703f0dedd13c7b4f627a2a4002f9dd90007984a0a7a5f4f8de60e9bfa4b965f2dbf757f61c1400b3ac6f6e762d157efb8bed7ee2b1cc788ad19977f765b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593ad7052ab0be52ad202568dbbb1ad9a
SHA134b01bb0dcf0dc9be1c33b3e93b210e721381dd9
SHA2567db2e84859b01939214dbe14213cf2aa350b2d7d333305b4d40c99b656b46870
SHA51276d61c0a44e75164060f79fc4ab677ae235be6a283c9d5120de555e844a96296f98aee50d2dbeaa29d9f571e522142ada369df695525b224186ede47fe889a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ae9869cf39f409588095961b7537417
SHA130506bba7b26d77fd4ee09fabb5d038de2e5449e
SHA256a8e58eaaf867b0466a5ff9d3c319ffc1f33ec3cdbfa8a9eecaeb3398cfd32d27
SHA512e0ab407e66e7d468ca13b09efd2c141f370bff8fc58f3ca9d81e536e41a646cdf265e9513fefa876934bfc5fb368970c3ea9fe2fb1dcba8faecbf5b95ce1423a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571e65cb4ebad29daf239dd965af6da74
SHA1ad902bc2994e5658c07813b48d7486d5f964dce7
SHA25692c567a0cf7c0c358b83eb69b944dc27bb7dfe4a5463b2a4d19a6bf8944e351e
SHA5120076180cae379db0f5fd9985b405e7663e9ac350786c08d8dc7b76e6e904ffe88ed0a79d7ac6aa88b10b378b3b67b7f39d22722d47ab7db9ff5905e7e51ae44d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b657a38e9fbed573a8d16130e7a0c21a
SHA17a6f5a8209e3d9389eac583b4839b8464f710e4d
SHA2563bfefe3f00e5531dde11a8d2fa18bf0cd56cae72d27d4fdc5f8fa9cf10e4f066
SHA512c69f0e4730af26bd9b4c21c7b0cd800c4113524106d326cfccc4043ffeb46426d67a03045296c82656b0040d1f8e252fbe0c15a778eb32109c44a18f4cbaa1d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5837f6d30e7d1f070068e11ce9746f02d
SHA11d4711e70d20b03b924f13088ecf02616604b7ce
SHA2568fd49fbadbdc3b026f15ba2c40777d1a5092ee78a650d32a483eb032062f0ec6
SHA512f2e01b522525b9dc868065d309aee51867b48c5e8f3772e5f529c1ed6857a843bcb6e0d0d904cac5606cd2b9e7ae1ca6dfdb05e682c5cf7728d8f2ddff51c855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587e30e62c585697072a022407fb8130a
SHA13859d5dd4870cf9553245375632417a667d6ff76
SHA256b441f597bc8310740bc9a275f158539ed95d42742f2a2fee6c56d9afc92cb5d1
SHA512cbf2ec20ff2cf474efc3075134c2ed2bd40cffe07b1f58549330a03c415d63db69d15722c51889b37196c580cd4194df7708dedbf241c4d8ac64c5c51ae35a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fd7e035df7d5e0c55a4e2117e4f4ca7
SHA175c496118940d6fc84ab6f9ca89c15dfe6faf242
SHA2563104e5f8db6709d69cc1e37fe08abd00ce542d883d30faa54ffee805149aec23
SHA5124a23815bb5bf5c97d63cde5af8564c8b1b858bb80888725d3f38b83150f3770210c94e5d388f89c977dbe48e7c5b1bf0f2662c5849fe2ebcf5d1361e50da1032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3dc7fbec1352dbd8466a5a3aa84e45f
SHA1b32ae58629c8c3bde25ea5a1b4fdd2682844f56c
SHA25691edd9e1ff258c6d13107224303e14e8bd872b89aa9f59df8c08467dca3896c4
SHA512ce996f90bca93a7143e63fd63a4093b45e275948cf36b31c03efd16a5c9a1d17c664683e0e3ea5f511d08d13eb6bf8bd6feb1207d72e6123d1266824ba45b31e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502bcd514a05fca14b6b956271ed37156
SHA1acafc6d0ed982f5794bd18698a6332afa76e27de
SHA256c750ef6d6b07c2834343727aa6ca2c57d4a021ec5a4bbd4858deea6a442af2fc
SHA512c52e83b2f53866d71d88d7b162e287480d2a0a27fea9f10c23a820136750a3290790d90e32d7b9397aceec8bf0bce8f18b87081811d06619683e6e9fd720169e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d6886eb482324951333c07b6a7b56ad
SHA10d7707eb66854ec459344904b1aad56396dcb591
SHA2567ee2415b2c2a4f2c937acfd43e5f32da67e1d5929f30fa11c1f01fb587822881
SHA5125c866a6b648bb6b22581ef100237f9806406791b9cd333956caceb694200f82300ad65c7e8d0bc530b008a3d52e8eeb6d870d1a587b3bd99ca6af0c2337aecbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511adbf2c69aadac849e5c04c0fb24d6b
SHA184e5cfe6c9e619e8edc125edfbc6ca213b4f3f7d
SHA256f0eecb98d4c8989f3190be11c41416e2427ba0d18f5259065edfb007a6717e99
SHA512a8ae061b1b8038494977c3b5120cfa1885a360372c9ea8124ba24cc8a391f1b6fbcaeae32acea58650d6406261e2f2191c2d46664dd165ba59d730ea032e4f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8d92586b92c91576bd4402973bc4b4a
SHA13cee45a770670b8c574abcb63d0aa5788913acde
SHA2568d34368e269c884b286dc8c49d807f932d2caaff99fe27d50005193cb0b548a9
SHA512d8ca39a780ad0910772637fe43fe3551fd98780f068596fdfff6fa1a06df7582a1a458265652713865641e93506a0a386c2445e959e2226c9216f20df3c31300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e029b687ec9e548a16af57ef6ed642d9
SHA171fb85db383960e15626864cc8ad6768093d4ebe
SHA256631863363f31aa2a26520b74fc42d47fc6c8f71fb68f57ddb4925b119f1b8f60
SHA5122af48c5a9bcf41cba50ed4bbb245e2a6785feea0a6c3a8dd762893ffe9b820e291313a3b9715ab707e89bc6ee5cc1c6716d8e88b1179547b70adeba9dae3a93d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a