Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 11:20
Static task
static1
Behavioral task
behavioral1
Sample
fa2ffb858b3b5d819da9390399772b8b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fa2ffb858b3b5d819da9390399772b8b_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fa2ffb858b3b5d819da9390399772b8b_JaffaCakes118.html
-
Size
6KB
-
MD5
fa2ffb858b3b5d819da9390399772b8b
-
SHA1
e972a69ab5ee20ac8f204ad814ecde4a2da52d69
-
SHA256
e45c07c9b9250ee24f505354b7090b6c8dcca6348e3f4e7093d6b4d0f08a75e8
-
SHA512
0cb2c27da1dd2692d75fcf5f126a3f0f1017485fd97091da6b2a658adbdb77579e604db7b104c5bd02e8ef080d209029fe1781fb8e4fdea2de1e97bd0a6250b6
-
SSDEEP
96:uzVs+ux7cYLLY1k9o84d12ef7CSTU52cEZ7ru7f:csz7cYAYS/zb76f
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E549E9F1-FE3E-11EE-A34E-5E73522EB9B5} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d75cba4b92da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000005d56cf720dec86bec7b485c1ed3a5094c6f1b433851f82d00b0028b2114f38a0000000000e8000000002000020000000d78ffe93373dcf57916c81b7e67536c82f26ba006813bd088152d1be4ad7faea20000000b3c22a39a4caa7bf907168d3fb118e6ebd994c18260312a5fd9c339ff0d2924e40000000394ce5f2116ac2d033829434dcedd94262a239bd35f43107592fbd65f14dbfbd4e08217d2240a74db72962a1f2979d1ce7c8ac819739ee84fe2f14591f54c640 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419687526" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2744 2012 iexplore.exe 28 PID 2012 wrote to memory of 2744 2012 iexplore.exe 28 PID 2012 wrote to memory of 2744 2012 iexplore.exe 28 PID 2012 wrote to memory of 2744 2012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa2ffb858b3b5d819da9390399772b8b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dd63cd1885f945aae1b296b971b16b9
SHA15579b37b146bd8263c514b841ca7703b60e72943
SHA2566d4ee8baf02c036079f3a6468a1c9873e014dea7ac74f81749fd64c9142e5747
SHA5120b7f75559291ea5cc4a6476174fdea466a8ba32f0b0e4d061d3cfc914eaf1e83ad5c7f7d8d7220e033433faf3782bb65e49b5092a3f3adc7d3576c3548c5bb09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9ca8230aa81351eb4a4aee68a0f0d3a
SHA13b4b564d6635fb1e14eb231a356a8085c72121c1
SHA256dbb9ae76722bafea899f2ad133028fd48865d62d649f9461d9ef2dfc4f5aaae0
SHA5125ce8c159b01463df76c5e52732eec6ba2623910b40a1039d3b8a3c75ba1fc498a4aac440bffee269cb40ff811357ad66aefbc7bbb1d33434349d720d5f5a41c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d184d1299fc416d7349674b60cf10404
SHA13f57ca6ebcc6ec338a8a60dd6ce99e119a83662c
SHA256810b37f741006bb512370f6a1e06fbfdc376925670c5ecc6c5710c32f7b571f4
SHA51210ed644537b4e57e72eaf02ad03dd4b1060377afe859e8ef244e58ee59fe7354d6df91031d36c88bbe5a581472ca3dade81820e4630553fd552f4c28162477c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a68451e916191195fb032c39ff47b41
SHA14e4e98da101d14293b611ba33220bd5c76008e5a
SHA256616726a9b192b656ca7ee9d85dd64c7c4a529c626ba1c6fb2a33d5ff0d6d4de4
SHA512519409d761b62362d231e0d07c057224677f4e6b92e6834114ce4e9546129ebc9f4beaaae93f4550e4c2afb51d346944814bb2dcf762b995180ea639734cbead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531a8db9a832ddb535308da66915020c1
SHA14afe736603212a8640233196480583f651936fde
SHA256ef2a599897de81018a49f997d57da8e454e08111b210ba2ed519a33af1ba1f7e
SHA512fc8867e38bb6f2ac96ea9b609288cd1d61e49d7f7e60c406825ed884cafa7764367e89ab0636ded91081d3422d9fb0cba0315244f1375b9aa5059ab5cbb0fd08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a18dce48022bd1c9220b15b766dd49ef
SHA1d431b8bc36678b0cb4646c3c75dacad1b584ee7c
SHA2560afbd7d693de6a0186e4861238145f2a6b94c1ce92bb38f673882f973b432608
SHA5122521094c64874515a8424cd8a5cb29f751e8ba76ede3b0f9eda31ecaa12f1eca95bcd5ff2d5d4658f27de74ac52ee0ba7ca3188638923dec0f3c4d29f00e2e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56af07fb869bee76d7d930c43c6d23674
SHA1f1931f871d447b7a812d9dc32178292e5d33a50e
SHA256d99d9ba72771405a51f73148540d36b10f85b4938400c50281552a0983bded99
SHA51230c3a81831ff25d5e15f85630f0c20aaaba6d60ec0274e104091e31fb93ccaab584bf4c815f3dab7884a2584c486e1de187cc02c49df54d71ef6384523e12f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9587826e64641ed17041e1a00ff600c
SHA184b4de5275a01ae1cbb9abd60660055c921f7b76
SHA256236eb470681e22327728f1c236bcb97380885271d9b8e70fbbb76ea70ba76900
SHA51253d1746955e7005b3555833a9403db3bed2f561aa0fda52c426ea1229f88dff1efee2f41470027aa5d999c5fe2503a00ba797d7a93bfc0468120fccb5d8a6169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dbb9e44b227d0734753416a716dc074
SHA1fabbbe555676cac421fa1b8656f09322d6a369b6
SHA2564a0c389c179bf4b170d90e16213c305b10ea4e5ffb79b9a72685c389a9e9355c
SHA5124a5d6655bf9e2f380cc30ecd0f65d779d1cc9b0d3ab9f0ad5f289cec753246c151430d522ac6debc479df46467668a023dde4100f49cb8fab13ced01128045a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fda1c6388bc1b1aac144c56cacf40118
SHA11dcab635767d37ad02b91f40cbbc9e8c21022de1
SHA2568834c37edc990a396e3d64cb9bf2a5374e7c35e8406a7bf53d43ce9801e7db21
SHA5129ba1d7251b2e5db808d7c51b35aca8328e20e28f5c431f45cfc3bee7a9804254fa31ce90c63741728cd9b137c38d15ae623c988d51768d9842949971e9833a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d523b2a58152e5ffb5f62c37ca884742
SHA160f9177c0ea1d857846d2fb752870126cf42fb33
SHA2560eb2e0801e74163af43a9428131b44c9dc1309d8976b5773185071fb9cb17ba9
SHA512afe9e8078cd41be731657e54b08fcafbbd0612c233a53ec3795242beff05153eff6033ad82d6263e17bf2dad3292d70e230fca2c3fbdf8db56780b359c02a1f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f6505c046ea4eb58648a8b91402cefb
SHA1a543811204245065b46a52621456b3a3a2ac56d1
SHA25626c183de4845391a82f9a0b187e759d9345280712d71e708b08bc43d003e4a9b
SHA5129503e5f4f96cee108cba7eb897f3c9af0c55233ff02af2bd32e45f14a2721daace6a07966f947f177d4f3e28f049fa5226b0ab53c5878d9196281c12dd1974fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fd8f2e671c919294c450e019e9a5299
SHA189359dfe16b585dd97c365fe5d4b62e51f6fe3b9
SHA2567ccf32dc1ed869e85c5f46c9c0ccd9b86a331c9b7ed0c642a1c0f8477fd1af61
SHA512b844d50c34f87ff2725ea10a96721007a1452adc58ed7060139f76beda0745810117a49b1d8aacf260a48a85f144c438137d81463de4643b262fafbe0309d8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5611f56ae80eb65f2a2b9de9d2f3a0926
SHA13d75165758ac536cc53d845d03e30ce56c71159f
SHA2560d4a68d67678c7c3b4a51b08d5ee8cd9dd479458eca62abe4f68a758307ad462
SHA51230eb6e93093ce9da76fab96e63e96da93759624c55b98b65a8cefe456aa330efc9781d28ab9ab5590111f7f23337b65dc49191d7548776014fd2dbcdd611ffda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c6b631025170ff0bdab81603e1cafcf
SHA1724b1d3bc858f10627d416d57c131a5a845c2194
SHA256b772eb8d5f8ee7b966df1c44feda2852762cf13e354a4237c406efcbbce07135
SHA51245ad30bebb4c3363612983f6d317f813d4eb616d152cca89ec1c637974e6528ffb9a11d77474f465a5160549810c2da536386b8d93d08c7456d11744b698aaff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a1acd54d808bf250707e57b3370ecad
SHA1a9204af753aa95fd1e5424fa80efa7b0e80ea490
SHA256add54d1ad917f6a77fc6038895a7cbf29e74f2059cd79fb45d428334da183f09
SHA5124d00442403a5fc72c0154b9a6970d67776097bff0aac41f36c06cf7cd242f9043c6413472dce6cc0890b28671c1d961bcd79598f3a793b3f47e56a9073a1ad82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544e165ef04e003d4a51c984f523abfec
SHA10e6f4c8a801b5c468d5e9d7f6bf46b63031027f4
SHA2565f833e9cfab0961e1db88336edd9bdb4225db04f29f49ff20611210ae721e6a8
SHA512a5851d052eca28587e0a1f1e365846cbb91d584bc9f569721ab5402b012b383b8d70b906d63b199bf6ccc525b7b58694618e92ff11897d8cfd2c57571994772f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa6a8d067eef64f4692ca15bf3b58d48
SHA1eee97b158fb924e74236a23e2568baf70de5a666
SHA256cc1775a1805a1e8856fe31c5623e49581dd84620a7ca639b483a7d2425bb9247
SHA51298671c8ca918f06142e45a484a305832ea94252eca112fddeef281f055e35f37c7fb7d5df47c6d8c6be101c9410df6a22289c47cfba60530dcfa22f0821f3444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e30e3c63a23b43e8ed61cf17f1b37b3
SHA1aa48ca10d2f7d71538b55b6487c687473cc4e493
SHA2564810c07d811aab3ccf420496be72cbe48775a8a2f8cc8ba66edb5898a15c1b91
SHA5123d48905f1a7488352bfc4a53eac2291cd011290dd21d32200d1c3a3bbe191b81aaa90ab5f8ebc5c62e61d00e33e5b4bcdb02f5debb6f0180b731597daae2d9cb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a