Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
fe0fa7f3fccd60c52aba90fb23972d77_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe0fa7f3fccd60c52aba90fb23972d77_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fe0fa7f3fccd60c52aba90fb23972d77_JaffaCakes118.html
-
Size
36KB
-
MD5
fe0fa7f3fccd60c52aba90fb23972d77
-
SHA1
a94a006cdf257dd227a7773e010523a339c5d588
-
SHA256
fd22441c7b68c46fde97904249cd78d6e46992ba9a8857fa8050242ea911190f
-
SHA512
3391dc83186441374c2b00498674061e239e31e88b839511e552dec19c9cfeea4cc61a3fd87de9290e46ffac9b337c596189df6e58ac71cc9387897a664d1a4c
-
SSDEEP
768:/7ZT0EipB9k+CSMt3jajNrE9m/Z62ScBd0jz:/NTupB9k+CSMBajNA9m/Zu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000002019e0eba925ffecebb0e1c14b83fc2baae868ef5b93db3440268ab7e1ea2129000000000e8000000002000020000000116920298a875d1e8e8729bd9a49c6303a36057abc98c336b953108f12dfea522000000079e363174caaef52215e2bce84b43e21ba32cd24e86719221ed1e152752b2fd140000000707963944b03cc2977a5c8b09f9a7cbd9c472ef85c02d58994bb41b8af3e4f08576f0f0739cbe865e177ad344aca391495a4bbe9b0b21424ca1fcada7ebea3fe iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419823232" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CBA168B1-FF7A-11EE-A1FB-E299A69EE862} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f8a1b58793da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2492 iexplore.exe 2492 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2264 2492 iexplore.exe 28 PID 2492 wrote to memory of 2264 2492 iexplore.exe 28 PID 2492 wrote to memory of 2264 2492 iexplore.exe 28 PID 2492 wrote to memory of 2264 2492 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe0fa7f3fccd60c52aba90fb23972d77_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD515ece3b8aeb7e4c452f523859ec25ef1
SHA10814d2e42a2002238808bb537083dc9cd2909308
SHA2568efb5e02b9453041f365ca9e212395bbb9f49bb4c03f0a3c0ce04a6511eb3ea3
SHA5120de279e08f0f44bff065990496c293a0e37b41ad50aabdd73aa112dd59fc36fb663414575af2d5a551067ccc9d0e1b1faa9e529541d80786e91949fac3743dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5015d9990930f645590f0f028714ccbc2
SHA135765b2347d90e108b8c36dc4ac27e2b811e4ded
SHA2562053abf1c74f2653ecd9b1ef0815c313bf71cfdd92a9c39ae25a82a4539467ef
SHA5122b3ba58f2f47a86dbdc4773d8e18422494b269a506656222f63457618e3fd2dc6251fbfd93643615bc8106f0b57c91ca49d2e21e75fd931e29b0f36ce8b82b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fff0179575ac78902de4b9653ea6b6c0
SHA1529bd2816baab70dae973b1c4e854ff70a363212
SHA2561997f8c7cb59d3ddc093b0fab4481feeebf679b79e6210b3aac3187718b4804f
SHA5124b4271297c87aad6e3369faec561ad2c51a773817338415baed8102c09d9f9dc4ea745d60d9330be51dd5fff9e75f499131cd0826c58825fd1858b97935f483b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a151a0344ea4346744f20e28731e217a
SHA165605bdfc4c396b8d6a8f9ba8e499fc0788cf078
SHA25654db3b3828576bf6a71da75bed310f677fe1bfcc71491b49d44f69d181aa0064
SHA51270435e517e31b8482b4db2a0da5111961169b942b48fb4c5f14b747c60d4862767ae72ac8309961056ba0147b4bca565455fc88f0b61c68cd0eb3c023093ef34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b40430ed98e4f226cf6e98bb5fd737f
SHA1175c4ba3e2eedaaf2300ba2b27d1db1d66020f97
SHA25640692d78d386538581ec0717c7e8c7a5cc0056e41c56127384db3f149a726233
SHA512fd35efb2124539b663f9d708c3590aa0e5cefc682f8d03fe96821979bcb19a858ce7d908711590587ef85b4b1d71b5a12da3b7b714763bf94e726e90ac00ff01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5936965846fa1bf5a5a052cbfdc1e4501
SHA13eca3f2ebc470f274c3bb1d2026c5b262e925dbc
SHA2564e4b8ac4a04f156f58be45f60ac234b6c647ed9c5c3e85504e02dd749473f11a
SHA512004874fa808fe99055dc4d211cbbf25c2fe2e504d3606ee09e3e29c8e6f498830852b6843cc411086da07cfde02248ba39e3ded21baea09da0a55af4d5c9d500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a2ca752ec4d5066d0f19762d3043b8a
SHA1f5d896eec8165ed5fa405d58f27d364e6a54c7e5
SHA256ce183e565f84ab60143252d6abde86ccb577619e895de67807e8ae5c8e48fb40
SHA512101d00ddfcd85bdbb68c9f9cfd8a0ac7e4d8b4cdebd2800c09501cd346c72d54f548fb372108f9e5abb31b52aff6270f11f0a25586cae01d282e36fed3c18ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5e3f76f169b8566813044a9644c50ad
SHA10bca9c51d8cc47fd53c25c4c8b2b8b073d5e3255
SHA2565f2750064553f00f1b0818129df2eb3604adf00bb82382fca22231a4d7dd47e6
SHA5128a7a0595c4ac348ad8c5c63bb83d5cf71777aa9374955c5163f3498b00126b0da3d24998e6374f1fa5aa0be3f1f1d4cae1778689e736bdc5b1f162d95a4cdd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b3a565ac0f3e1301af7e944a2d5b320
SHA19ba3ee709bd44e7ec7f8cd79182809708bb8ed79
SHA256b9b2b7cde8160bacbf76c996f2fea8af4edb6e839e529b9726d57615593eecda
SHA51227c0f34967ec395216ed69bb4855f865d152c95493d464799a839a45da453fc41cc8bfc1eaf3c5cb15c3609dae10bc22c01634c1134ce74af88a08f741d21a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7347aa811eed71b46416aef21f743cf
SHA1c5a50051cea476508502097003fb72fe4b39d903
SHA256e0711ffe64c59a7eb28851a9becc91e660650e196d12080ed0c3a18bfa08d28e
SHA51283b91bc19f5f77f2519eaa71bb0e727ddecfccc155ae4d6de8df098116caf4d467149e86a6d5675844ade403a6bb0a0cb0d80713aad5f4a1493c94cc591912f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8377c259ad614533a81ec941c4fad32
SHA1cfdc50c9954315d20afdfda0be5f8a0b0f3a6afa
SHA256e565fce07dcafdba1eee7fb7ee369702b018554a1e0f671d37e8982572b1d4a0
SHA51203091331c04eb487fab8bab9d4926838bb26a68495b3adfcd433c20afccebdac9b519ea1e8fee5e9999d3a1661e1ec1b828c27459630e569e011139c21368221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD537cae3d3bb2d0d5e99d779c904113e28
SHA185bfe28e52841b0f3308bf9efb5822ba5027d2c2
SHA256344f5abef95219a91851f3610ddb613b27163d3a4b88eead23acbec6d181579a
SHA512801eb1a13cdd5432a3e6276048c55718f114865ad300b0af9261a0e40033851cd620cb6bcdda5cf59225a37f0dfe69b9868ce8bd5f6c639d740783fce5312499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c06f5d3c9d97d5978137501ead99cb22
SHA14360e6a7091332b565c20e74478e7bf50740305f
SHA25641d7f5dcc9e4d76961f19972595d80e53f498fd580ff0e2ca0cc46d7b5c17d96
SHA512f833f320890162cc2ee78649fc8e132c8f4eb489f6d2dd4a68c56951c6232b5581f0e45d735e7f772fc902e4348ff556bd7a63c18b4e9058b1829312bc880b8b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\cb=gapi[1].js
Filesize133KB
MD5dbd627c28e97cc5bbe7be0c7a75e386e
SHA17bb367b5d18dd59a643a8bd4122b37a8a33bb9e9
SHA25697c5e5f7f3c5a1b36449b765e533eab96dd3ee4bb806d0c42d33b2d1457958f2
SHA512f09a05f7ea69e67124dc61acf324769c07e31bab781592988bce009e951480de0c7f310d4bdda3867f5900e91ffde031b48338552a47423d4e59622301bb354f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U8A9A2DI\plusone[1].js
Filesize54KB
MD5a878405cf2e9d55e0aca10f5a016990e
SHA10277e2cd3cf9de944e7e2206750b5bffc485a77d
SHA256186381606450b1bc2c95df8d7451987027ac3011163ddc23707d02f4514b08c4
SHA512939ad9ff3a85bf80fbc14ffc3c114570d42ad1e6d9824c096cef2cf670c2ea2ca59daa1d66c4e0210ce87ad937aebe4b4c6f69d133adaf82fd2844b0e809d10a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a