Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
01cf2bb8d324db3e105d178d76036455_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
01cf2bb8d324db3e105d178d76036455_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
01cf2bb8d324db3e105d178d76036455_JaffaCakes118.html
-
Size
13KB
-
MD5
01cf2bb8d324db3e105d178d76036455
-
SHA1
c8299632b30cc341e8a1cfd050e59c1e80e02e09
-
SHA256
0fc01dd1dfd6b1403fbe546ad188a715cd1875f53ca589a7e2d8944deac78b19
-
SHA512
4be9eb2409ec042edd0ec1431d6ef71fff9cbe04d5a5daf1d5c9298cf16b06ea07be38f1f649a54d3e21efe5698f9e5e24047a5a54197d2ff52c1b999ceda32f
-
SSDEEP
192:CnMgBEOks1QTxE6av//G/pzRwzcRYA2Kich+ipqN4GGb4FsN1vWu:CMOkjHav/e/xR0XEpgx6RsqpF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420332445" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000f4cdc56a830f2c784b581b1d56348ed9aa49410bdb6a51f563374704ae70e4fe000000000e80000000020000200000002ab4e54d786b61ae4f4636ad8711e9c25623bfebde6d7df5ad52dc441e4b11d5900000004c73cd7ef13a6da24d60112f126e343cf9234352cd8ea07fe2b23132ee02f1b44b11efd55e06766f1e45f0d8b5c3ed4a28a9b936bb06817772c93e045193d27c7d03244a7788c35039cec04deac5e813e9121016cbeb03448c26a42d1dfa680c259de58856d442e897e4c37f1fd0897d3b25dd98975016da4db8abe7280d2eb85aa40bf818903c838c626e03bf482053400000001956b0cb506ae6f3cfd6cece78536cdcc98357f556cea5deebfd8fca6ce6a896114caf2d250efd195afe92bfdfa57958c4b3ea6b925ae888a546dc134ed5f2ac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000066cf070be4e4b1f7f8ddf9744a2e5d32dfccd381e186faf6f7752b9b852e1b78000000000e8000000002000020000000e840a81f4a5c9ca622f3ab8a6469568bb36d9c79ae50be9752651cfe5bbc75ad20000000fcac9d44b0afe189b9db2f7c6bc077d5ad861df8fa4899e0bba15491f6f1948940000000f6cc49c25830d7a982f24a721505941cfd2dbe24f5f187baac286d55da0d6a96bcbe87d1ebd0279e286b997571f3264b4c1373946ee76e80567afeb66b29fdaa iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76F09381-041C-11EF-B411-768C8F534424} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6004894c2998da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3004 iexplore.exe 3004 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2940 3004 iexplore.exe 28 PID 3004 wrote to memory of 2940 3004 iexplore.exe 28 PID 3004 wrote to memory of 2940 3004 iexplore.exe 28 PID 3004 wrote to memory of 2940 3004 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\01cf2bb8d324db3e105d178d76036455_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c513d5c5090a3dbfd88c883a5f177b6
SHA16f08db7468631611549d691be799e0fdb0a1c989
SHA25678a947ceb10637c22e465267667a9a3d39790970b62b5569490c3ca66d0e620f
SHA51298fd9c46305196bb9105d0c94651e325b97a68430ebeb3812b001db42d676be286eb9481a68bc65fcfbd51a722a6248ae0d699cd1f09071def6ec7fd193a5756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f5109ba3c32c89f11215cce04e51f1a
SHA1b4faa304b35dcef824ee875744dc8b805718a11c
SHA256dbf6885e6f80e6290ecc1543c9006b08b1104d45792825d9691db3e821702a64
SHA5122a1b7f168805e28e542e66fc52707cfbdda90e69193ef848dd8201743b826f0bad914d7639b7ba77325ee217775a8bad1751773887c4877c5d14708a404909b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e12d667f7440fadb14f0dfe26c3d7ab
SHA1aff53d273034cf56e23d588b6d3b242a3e5d63fb
SHA256a48f22ae2e546e608528ff8d081cd78a231e4bba7872a7960efc46956bad76a1
SHA512cae3dba4fd182f7bdfeb21f8839cfff303704f3dfcefe16353f3bf862718946c65c231126ae04000db49edc5808afa70014fc36a01d33e06c7ae4d064df7ebcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d26c47a20503636b1bad624c0e41c98
SHA17754d1ec19ff6989ebc46879e7ad56a20c37c251
SHA256b8063877031d07fc4b341bc443f546cce294a127cca179b168acde8d4854d231
SHA512791993ceab4b2013e8a6ae9f432f0e8e37ea02f4949eaf27850cc4ec9e6c7de9ab4f16d675e8023666048efef2e257ecc95b814d291fa10d120471cbfd2041b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5817e32a5444fcb406df584cf17b097ac
SHA1384620f97fa2344b34312c21093895542f0259cf
SHA25649da54b5426b46c6d3007a0efb7ee1c4132563d1c455831171228ee7e347e03c
SHA512146bfa57a081db4a9e5a7bede4bf1d5d077b8d3c7d8c9e9e3351542ca2f92f30e4b8ff687bd84c52d8b61fdf72c7c1ab6da6eda41e00d14aa91b9a927fd6ee8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d056436b66c201f9441d0bab10416b7
SHA1eaea68700efe0f9e93c9fa4150fe9ea6e4a745ae
SHA256fbb756223777d38ecd0f29c6ed49c645a889cec723c5caa46a1b0dc196816242
SHA5128215def85d8f7b1ed02214880222ef95f908013d189e97e56bf02b48e335882fc14baef007cc62c30bcbf0d571b444bf3440174904860617c70f23057a4061e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c8b18c93ef44d1b721e666a45a6a31e
SHA1e5e331ad81fd2475494b4731b073518d03c98e31
SHA25665efb33fdf0f0ca743fbcd551805f520d63a9b61751d7bdeb42e9d4df4998236
SHA512329c682b15433307861482344a93cd483fa9d43e14249995eb8b410d661257d2cdfefc5d6a23bb92640ef56a1687d3d80595c835ddc87dfa60251682cfd07e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a9c46df195be21fe9bc391636fe58ca
SHA1a930731d81ce58005c77fa014aae0a6c9ca8e143
SHA256b8934f2af615ee2f8a662acb556f0aa01a6cd3eec2e59cac5cef95bdde65e7b7
SHA5126ece5bdfe14c53df58008b38849a73146796edb2f3fbb798c176638ab37e5cc4dd57636d6181888c809e21a6163ee538ebb76f814b685f32dead05a62e5bb3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b32c860b986c632b521f95670a2a344
SHA12132cc39946daec0ab446acb4bca8da62342a67e
SHA256d00b4e119bdaf8b97bb44e5bc834af222ea0a72185d8bf3c9f32db6195a60baa
SHA512ff374982b715d19e63e7615c6f256332898025d7954c75e3fec9e1fc609d5e279f03c7603ef8719edd6b34b11391c3cf66724d2274846ae6a1734819475cb49f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5916237a37c1d63fb208ead46947abad5
SHA16162fdc658cc03a0f7bf7956f6ef35d3f7b80f51
SHA2561533d34072b166317dc9482f849598807e0733e15cfd365b7f46b43c667400db
SHA512dadefcca02479f54380265f26c16c33944c1a68beb92a44fb8a8bdeb0f4b1311d3df8c7accaf59bba73c93b9137c7e05c6b1b5573602b118ba338a410d228ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ef94727da2c9524078fb295da83ce4b
SHA1dbdbbcc8a60195370bbd93495321372083992e04
SHA256fdf6204951a0f71f2a87a532e80f2c78c2775ff74490f5e93c06f19d20958864
SHA51255712ef6a3f00e7a2f4ea5c61426212021440fe7b0dc2cf8eb6594b68cc1366d5c0d7179c5dc08dcc5608b4d8fc850669385cd3c34b7a44d79e7ec931dd1ace2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c13dcb8105ee8e30766edf3bb6699fc0
SHA131720da7d82d2b556c2553bf754dc82d8fee954d
SHA25660687004956b9f78b9ccf6423376c6f950bf24e6731d807103b0390aac67b00c
SHA512cfc8b23fadb9b285f3df2a1e07e892cbcda05ae7e89d23e8701612abf4a433accca722eb88ec396b97c724f762311f6e2ebca1236c7ac5038a2734934966c377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5dc426339e4a71218772807e61e991e
SHA1ea0504f89bcfeba9a8cc3c9f0fdac9f78f0ea6d2
SHA2566ba0232309a55da1a8f5d7662f86a9a4c8cb119d683c918d732c3575e9b17bc1
SHA512ef085e5783652c21e1e3f54d0cc0da3e2180d9429869655f828a4520da42f37b5eaca3912a0bd68a93f7127066e2308cd145d80308089e2a822a91d2bcd4eba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e37f2c8ecfe579005d2221f0ac6e78d
SHA1d3f20bed7caf3d2514a6f7cc1a8934c7e40cceb0
SHA256b8af190c7a22ba7134e21045dae4b25264bde98eba6f3cde1ec4bede099058dd
SHA5128c65f31b821118577492ffcb23078eb8b48f9a99a3bae2fda57096672c5eac703d933a411c2dd90d611a00fd68479c9152b66fc4e6d7789be6ddb68bcf8e7522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bde70ae2a68157bcaf1076bb6c9fce1
SHA1c8e4d1887f8c832fe6e545254678e8d8591e2cc3
SHA256c58cd7d0ae6df8bd276ac56443ad2ba27d37dbc2dc9389d83bf1d4bcdffeaa1b
SHA5124dfeb389f51bfa6575ea8e405a3aa1d907b5f32dfaeae74cb9e521cfab8edd86bf4fba4b366a7a88e568801c260e004b72e8df139f6a714533b2b793c4460534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5182034d27bbf18b646c1999ca8e73201
SHA1926e127741b4903cc58ef481aaf200ac19876373
SHA256ecabc7248e84342fe3c680d4fed1060e9dd4b01c640448dfa0f6b5054b9694df
SHA512a03babd73ea659eae7b16e1364368c4e38f28c0deed14d560f62de948fd22eed37c375fd82e0422328b7dba01f240cbaed16845fab88524051cc34357d50451f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f996be44fcab284dcccefb9b796bb016
SHA1698ca64b87c8e727c81436e1c172c1f106c42771
SHA25674a86c3bd367657e8c3c1db435eaf03340b6ab487201c80d0fa56878b4799bcd
SHA5122c6a8240fd0703c4860c79b86ce0ba29e20364939274ffad19bbdf9ff90244fc8fa885aabe12081d9d9aa0b8419c1e127777b068173a62da223f36c1c0537a43
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\673IEUYT\px[1].htm
Filesize792B
MD5040d1c8424197d4faed53a1427ca5590
SHA108233c3b9f4c7bb9b73555db0bd0e5866f4b860a
SHA256e1cb74d2dac8a40b4bcfdebaf319e44d7763b6653c1134ac730864e63e281a95
SHA512c0d1f45faa994779fb365e2d89f075f2298b7b11ab5ee3f33c16f809cddeeeacca216cbaa34eab7c1c9300e1f6c75131d1328c78d8646b964fa5abce2f77209d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a