Analysis
-
max time kernel
136s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
f401b4b81a01a2d24d5770a921962af1_JaffaCakes118.html
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f401b4b81a01a2d24d5770a921962af1_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f401b4b81a01a2d24d5770a921962af1_JaffaCakes118.html
-
Size
4KB
-
MD5
f401b4b81a01a2d24d5770a921962af1
-
SHA1
8cbeb6bac3d40bf77d8bde76fafd25281796b971
-
SHA256
b4454bfff033e23d35457249fdc91aecdc0ad6b7b1b4a6ba8a3a807c3d1dbc89
-
SHA512
d731ec5b493fee30314b0c7e2bab23b084e5d82860c4fb8bfc719dee4feda397e2382fd2cf88cc33e55c723e085bd03578afe481e40da39a788b16741ff533ff
-
SSDEEP
96:rf9seakGiwLsvfpFFOxUEl5MvBUqsOeN0Eg9jag0MwU:rf9FaL7LQFIaO5MvBRlVEg9+g0MwU
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1A47CC1-FC19-11EE-B33F-663D173F3824} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419451700" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a529a2e22ae42f4084bf8a2f7b0415b200000000020000000000106600000001000020000000bd14a5d7cc96b9b398f3adcfb238934f9d468d366ca4fb939ed5ae4d0a0a83a9000000000e8000000002000020000000ec81d40e97101174ced48793b2ea0c659bf9c9401903f1b59429d3b8dd98a791200000000fe5d9cc283de229e1e6cdfcde932b33363744518dee697dad132d492d15f9d240000000b436d7b5e14a07430799097d7350b1154d0454e1b81eeada93c49cfd91c053038da4894941a5cf6cfb2d562dbe80cce31e271a9f8a1470bcf381754af621ee22 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70509ca62690da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2732 2968 iexplore.exe 28 PID 2968 wrote to memory of 2732 2968 iexplore.exe 28 PID 2968 wrote to memory of 2732 2968 iexplore.exe 28 PID 2968 wrote to memory of 2732 2968 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f401b4b81a01a2d24d5770a921962af1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59828e932be60d5e591776a548905ef3e
SHA1a04090336ad19c60d08ee19d3b7d7602cd104316
SHA2566e994d8ac01a8e8eb22c72c075cbe1ce6284bddfe2641c79f29ae2aa214b155f
SHA512852da25ca7db8329fbd0d3bc3b45f92fce5231ac9d78f392cbacadbf499dfc7c1ac2ed0519f77fb60b36c7c2ba5aa7e64c03a2766677af9e9d173338ef4b1cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbb2d95a78d85ce821a398f0541af9f1
SHA151f29d54593bad6e6d87651fc3ebadd28d1ef239
SHA25646082bf50c2f145685644eed773a31a3710c7b3e8b852fbb47c25bdc09e6beb0
SHA51237ec513cf897bd24206b4d3ee3a670bc28782111e9e45efe7f90d353adb6d3f48efeeeafaefe1ea9ed8863741a5afd0899503324f599289b353c5a57d687c713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7bda2daed5fc44f133dcccf06d4ad13
SHA111e986e5f6f987acd5d464832aeaa305ed612ac7
SHA256e768febeaf2520a81622537588509151cb44d8bb6f7901a904f8ebbd697ed050
SHA512af0d21daad2a4be62a4d7016f620a21a9ea5a08f7ce891b59f3709d68dc1149f14fd1651d585133cbdecd3bbe3ba001c424a8d0810caa73967956591a32a2533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0769935c2d51a3b07de02a969719eb1
SHA178f1c0f62ebe15264ba1c25cbe9020bb721beab9
SHA256002fbc63436028c195e421d74f07a61d3cb95d6ed911e3a2c4808d32adb1d476
SHA512a44f477c658f604ea2e78745afa534fbace2f8f5157fa09585011926fedaf2897e4727e27aaa2ccfb2ad143aa77190fc5761ca49220a079bd8ee99c2914e7dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576c041f467a031b46aa902f237231ff4
SHA1416a42b5971226887a7ecf41fa6161e73b8c7309
SHA2563aeb87a348b42c28f857abf10ac7ed2686c724f34d585ef11cb2437c694d435c
SHA512b7f4876f8d193744877ad5fc4884c0b416ce8b80e12bba32087dc2081fae85ff572853df22638e66131e391dd6431a3336f39911503e542b5e86105887c1e3c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538074abee5905c734b4581aa4d683b05
SHA145c8e60cc9c56388de0e9d4bd841565032efcc04
SHA256ddaf062d08d16a2d51bb2bd3045eaef5d027f165a836c9ed1c1663cfc420dc28
SHA51222e078dd4c2d04b56d52afbea73737a60532b1c6ad6c7d7d7fd01360fe3e2019779c4338ec19ba149f66a591eea676a562157dc1359e3e7cc902e4532e06d45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce30705e30a4dc1c632eb06e0a9604ca
SHA12154f6f7a73deb6d9924c4ceac526d68757e9965
SHA2563bd9bbdfbe4645efb819dc2896737b796c937595b4407d2e5d1b53b4a2269bd0
SHA512ec2fd681a18b1009b0e8ae6e0b09bde79c96fec5f30d104c475f2ab2f7222766ee187a3e40b46fbbbdab825061a3cf4cac4b5315b8e8addf5b767f2c03411567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5096000f853cb8333b645d99f6c747e1a
SHA12fa719f9775cd1e2f091db5ef94a3f40a4f44634
SHA256f23121154001604cf699affd2851adc1c53e6fdeec97e0c91107c7a40ef1b772
SHA5127fe703b7d5f0d9be174aa2e6bc539773fd0a07b29da424f5d9e9a7b76ef27e8bdc4aeeedeb204e22f48b151919c82635d0a980f4ed67740bdcd62a67652a93e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559783eea9bc10754c916be0d00b687e8
SHA18039578df0d219971e4631f2ec3cfb7af91a555c
SHA256f07c9bbe06db8aed09c31f40f9ba73e88a942ef2be2b611c597373bb83cbf7df
SHA512da80c43ba77e365c61b9c7a2d226243ae488a10b7537bc78093e88b20d865e95f3ce0bea6663519fb8f35bce1704fc7892312ebd16404ee00735241d3114883c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51591b8bca2266be9db1192275101f700
SHA10f89c7128509869cfc32410b866e18d801de6150
SHA25668b7bd113013b616a2a4ccd3717c03edaca555a91e9097c303ef8fa5a5059987
SHA5124656368cac352111ce4d9c34695478782c34f6221cd4f230f9d4218f4e6ec405e1cedda74edd67613f5dcbfc12c6fb70d935ff6f5257afee4187dedcf98c863f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588f2817369a1bdb469520f55bb25faf7
SHA13035f37208377ce2225a058ca985556251fafdcc
SHA2561b53233e6513c2ee25a03b8f0107ef787c43e16fb846e4908203584e7c8b5112
SHA512f3746b8311f0aa20a011c023c838c3553d0c0a928a884f3866c98f0078adedc37eb2ee3676323dd189059b395d6de00aa0e3251c9ef1e58ec303f3e529e236c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515c8f52a725b27689a9a1e9814e47711
SHA1a706736337b03abdb3ef00abc47167968ea3fa46
SHA2563ed4a3b32408659ccd4aff216bc5c5b880b507693d0f8e4047cbf778269ed098
SHA512f6f706f60bb488344fac362d5178b93fc9d50f6a9dc9579202ce1575973daa003b044c910af8cffade2be7270af13fbd3581c58ab09cde678ddb03975205396c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521014a8157511f1856d565fd02fb54ce
SHA1456fb74ce2970327b90c02ae610294aa839c22fb
SHA2565733dc081952033ced31f32e04d8ac54a3aa5346d55b3ae4455d5c35aa70b5f2
SHA5128603df879b85f3a4ceb86544889da0ef0a13b0688cfddec1051ee7dd608852ee3abd6487c9474e1934824b0905b347011f74b357ded76d6300aca6260016e918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551a20486c451decc39928a1f331a4261
SHA139f1fcb01e5c9eb7db9f4ee7928c07056a327fde
SHA256b19a7866423b84b34d8fd7543efc724049a506e4bdcb543943880d8bf3de377b
SHA512ec4aa68065fcf8b0e80dcad13a462bf8d9aafe46549abc7fc5c752b18037c5c8663e589fc16ca896bc032c925d1c890890b6e66e22765cf8c3cd36396fa1a75a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558e883c3a9924b7d148853a11efae4d3
SHA18f22eb5a576e1ddea15a4b93c527eda71960a5ac
SHA256d55b3d23b9986b2deaccdad31b3e3b8d5005131041a9cb1c10467e916b80177d
SHA512a1eaa6260aaae5819cb31225137b19f9e30b469f3ab0cb559368a5ba1f2399aeda902af18d87d7b3bb5e08d555b3afe62775fb41dc314648b5dc53ff71f2b21b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b5e3edc8e85d0d636e4bb655d035ad
SHA1d0cc96c10c6af0fe8137683bcd8f1294a956d2a7
SHA2567395038b35e19d340df840cae24d5df14872b5b7c904cdb7e986fc0cf5e7e3ce
SHA5125b4ab0fe4ca34e54054e1445f3b1a665134dc2b2424e139102ef4599a4949fe37ce4801f4312b6f419fcf1c9805cd3ac3cba2955d1da141954b8b56d9e9c2049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dd2b64e5bb98dfa591694ba50e08c4e
SHA17c7d043fdd5171cb99be1be3a8ea6a945ef48d2b
SHA2569a1c7cc68de0043a7687ec7d65abd081e9696e332dbe1daac6b0220eacabe1b6
SHA512da233c73afede0c5cc8e01007f8e6b623e38753730b54172ade1b703e2900f3c654fdffdf0c318e51f82da66831efcd6952b094a16a7d9af20aba5ace9dda2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57281a73f6f6e172e2e2ff4e54e17e897
SHA1763926a6406eda5437b4930ff1efbfb1e5a91e4b
SHA2563b8073792bad69bf70c45d4758eab6e201b5dc2845c0c9285a91591ccb64c2ee
SHA512e19107de4e73dd83d6dfc96171f8f8574d7870b67f1e62f7e8225c38ea7eac6a6bb6bc8b35e0e7dd14510e3edb308908c7bde6171f4e706a8d8eb49e479b4f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5654b483b407858e072745e7082f80fb1
SHA1f786124cee8694b112b1307c41f44a7698aa22f1
SHA256338a2e62bd13da2245150721034545f68019436192db1c7baeb79f8cc596b5eb
SHA5126eee403fc6d162baab1c5557ad217f3825c37889edfee99cba29586db52c55dca48d4fa2692a18b6735a93b8713202dad2631e0f751bc9b05a31f7089dc1f0c0
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a