Analysis
-
max time kernel
119s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
0066a8be88c72435225c976841e7e919_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0066a8be88c72435225c976841e7e919_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
0066a8be88c72435225c976841e7e919_JaffaCakes118.html
-
Size
36KB
-
MD5
0066a8be88c72435225c976841e7e919
-
SHA1
87c93a6ed091d96596d7c76ca7433f5c4ad18123
-
SHA256
ec7384d6395848a0d7b6e4047cb02e190d6432b7cc3eea803e58aa5a8fce4b3e
-
SHA512
fb15bb95673b5a88bd1ab437a83deba3705afcfc8e3c5d76c9e5b15cadb46dbfee87a15fb3549de6a786044f82e93ca9d283bd3852913f01f2f62f707c6a9a82
-
SSDEEP
768:aO0RPWBB24pJTJlDVxHNJklVPf4maRjrzabBRZ5fvp:aO0RPWBB2EJTJlDVxHnklVPfvg36BR/Z
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000029cdc1f0cfb1ae41854630db24c8d9170000000002000000000010660000000100002000000099b585ef52e8c212bd1bc061927d9efe51e55ded2b03316a1a5943ead5b1f86e000000000e80000000020000200000000e331feb5c2e068e464013f9a272dd87b01c273ef0a7db32fe79400acc5868e02000000028b279956ebdb7ede88a58c2dc4b80140c046176d80adc5b07a4be69af2d9511400000003715477d9d83a58f4d8504faa494f4091ed96271a50f6bc2a75e611a5841bfc1971dfec221e752bb6baffc5c12f5fa8e6b660bf3974dc7331d41ade0b94e07a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F123B71-03A9-11EF-BEA9-FE29290FA5F9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420282987" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8010f22ab697da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2196 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2196 2820 iexplore.exe 28 PID 2820 wrote to memory of 2196 2820 iexplore.exe 28 PID 2820 wrote to memory of 2196 2820 iexplore.exe 28 PID 2820 wrote to memory of 2196 2820 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0066a8be88c72435225c976841e7e919_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c2b0c9c35b40699a28c3aaabb4bcf938
SHA186631f0c431a655b6eb1745c340d912901982fb9
SHA256e6ca0bb4a1100d5766ffc95d3f28e8d3d1f0fe9ddc34b17f2c41d07c1fc360da
SHA5129c67b1d47a43c53cb2a7e4b2a337640c55220c51bbaee17e6b17d505e9a5919f83df2ba822c6abbcd3a01bf79522c1d4d2aab3e5f7d27455adf113addf14b9fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50722643f15d253d9b2fbdf990794cf1b
SHA193f11f7b85f6510602048e19896628d8b1003e77
SHA256ab7d3f4b98abad10b907bfcf91518c0cb21b6cd8e0eb707d913a1853f20f7e47
SHA512b6802e0f24c1a6e7c08ac7e448816c80ec4a8a3dcccf785146d86e1797d22146db4611b77569cfa7a1129da809f9fbff0faf159028f55ca032576d180550121d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bb7d7a2ac939d9898865f8aaa9567ea
SHA1837ba3c975eb7a2036823131975f8c0f2037dd1c
SHA2566c5aa4597baf65f6b63e0c921ac69f946beaa6fa95b85989a6022f4d7c374a50
SHA5120e8494d8e5b504acd89777ad2d69fa0cee10b09f47f7fe0b485b3b470167d86c741baa1297316bb84a6dd9799ec0c1edaf1f2b958324ab5e9f73c70d58de12c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52031ca9a4515a5a17c766185adc5182d
SHA12aded6ed01201563e2287e4a88748d87c73b41d4
SHA2566502a64ce5469b0eff833d144af0faf19005e185a24c06c418e1c2029ec1e40b
SHA5126ed20e6dd31894ae73c4e4e73b3dd0542cae83425cdf4f56f1c982deeda1a1bad5e96214939cdff8178cf3207ab7243375653dfdbcf8ed1918ced7350c66840d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3352ba31c655c806209bb97cc794e59
SHA1a8c68f38ec8bef820f07bec7ae1f5bcfa2985983
SHA2560c4d4c70521a995088d50a099ecfe01a0e8fa9b76ef5f8c47a5076623b7519d0
SHA51263a4a3ebe0e4c3a6ea48d2cdebdcd9581e0e4d4b5e8979d38809ebcdf3ea0feb23e76a4e5866ae19c568bb191462813afafc83a41a85f1c641a67c7b07d193d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514efef569322ee74b37c02899f16f008
SHA17d53ce5da57a984af51c9e375e2c10297f205eb3
SHA256c5895cc3e466eae925ccd25afb62f23e5a8179ca27515ca0ff78dadde0a39b1b
SHA512180c635354093c8c05cc90044022b78b8d797dce1082318f6dc46771f4153c368a89c6a9c7478b089964129d782b5f23ff22d8c4bb869000a77186ca2a300d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59779eb730a67e355535d8629c39eb6fe
SHA150e05378dc25a81917e482e45e5f6387b14fa666
SHA256488b0b867121ff3ec8514b471591857696abab7fbc41d637035978eac9df2fb6
SHA512952f4e319276b3faac45926a1b7c0e3381c48be11b76f84458bf04e304d4871dad80993deb6e9152597d56e7c619c62ca48d9f1192986f6e51662b9758bd47a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0a272926996f82fbd0b2755093ec49d
SHA1b268b6f6409d44bd24383335a3950b91f30f17ab
SHA25641575d9bb9d5f557ecb9e25ab5c08dc819bb3ccab10825b7b913765d834ea17c
SHA51286bafdf2afc40767f05046d26b126201cc80951879ca7994f055a32fb0d2d747149935dc3d02ef07e68eb2646a58056ee9412fc56a37dfcb3d9819b4217082bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a85273e4983e49559cc76c4baae4c731
SHA1970b110d22d590ef47361f8cb2cddb6da2c9bf05
SHA25659a7903e01caeaeade69993f1c35494adc05d9aa81ba6f58d0d1f84c4332a01b
SHA512b9cd4f60d68dd6ef366ef527adece480a580aead68a7f4c75f23101769dfb3a641b5883353e10c384b3e543f5466ca7c52244bcb2ca536b276db1335e6ce7fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51973416887dc42f3e35eacfdbc84e1ba
SHA193190430fd9a48b8a0c5412e13ef2f8bee32924e
SHA25603480af466fe8ecdef9ef95d60ea646df718edc7c4948593f58602862ea23886
SHA512e34269b2a555dab474f08ef9a63fa7fe173f78bf65cb08c4fc89b15d1247b77dd1538347fa0dce0832e96b25f352948265445c1c959193d8d304ca813000b23f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52382ad57472a9b8905786f0c6ba3ef04
SHA1484cbdd54e7aca009d62bcd0827b891381cf0c42
SHA256e66dee5a501d16694742f6d671d366b13fd3e43f97447cb7d769e8e09768bb30
SHA512cc641d4bca85aabc2bfe86c61fccafbab38f162d2ced81e0433e1124c8dd73258f89fd585303f05ef575bc50426820483b5a48af986633a1a0b928f573232ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a32056f2c71692b56671688ce857ea8d
SHA1bc29fe3191f25e464035293d9cf16eb5de525bf8
SHA25622228c1c93b2118947cb32045e2c4bf48f9112b4f60b7454c33b5a70bd584b7a
SHA5122c6be16f2e8dd71575799d8e6bc6a4cc583f89b123f5d68622d21d49466bcecb6e3d2d9616f434f8f503204cc55ca77a5d417bae04616069c543675e98861e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5fb2c6b380015ca21c7ebff67ebee7567
SHA17df1d8c3c18034d2ac46c41aca1b3a3b62e0c6bd
SHA2560c34d47c604d3bd140d57d6da8b48cefe5afc76b34650c8a2d0a3d14a9aa37e8
SHA512c69048d0085b4680e0beadbae7920a10a551a2cec762b1952c001edc67f8877d2c30ede6dd568982c0836c4f59f5b318a083df8286ac8ea27c800473ff060b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F56AOVHD\f[1].txt
Filesize35KB
MD5982bf2aa0d4ee8510e83beab733bdfc8
SHA1c74804a2dbd3bf18beedad7ec414148ae05fec82
SHA2567d446f2d97efd880edc949405205bb0105388e755183b109463b9de83c92df51
SHA512e48587fd9e46ab6cfd46884bfd8f9cb02d8b5dfcbc22588cf84770dc5f2d7f41452cd18f62b3d9e0e49b3913ff7933281b6daf10420e6fca2d59975196ca4ffb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F56AOVHD\widgets[1].js
Filesize90KB
MD5824beb891744db98ccbd3a456e59e0f7
SHA157082a005d743ec4a7f928a928bd7bd561078c7c
SHA256173460e89e6a7244218badae2016f65c48a3eae9d400802273eeca18b07336f1
SHA5126c19e304af16ae43504a44eb60c542526d0d8f635e4f57ab557e93999ad608be99c25354898ef4826defe63f8ba72e4d09c5eac445efbde4587534ca202958e2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a