Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
014ca1925bc79a14b1ddcdb0f9952658_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
014ca1925bc79a14b1ddcdb0f9952658_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
014ca1925bc79a14b1ddcdb0f9952658_JaffaCakes118.html
-
Size
461KB
-
MD5
014ca1925bc79a14b1ddcdb0f9952658
-
SHA1
a747851b531a66568909a96c8ea5287eb6980115
-
SHA256
33f274ad62651ba29cd7a742d826c32014d42334497133398fe314d6e2c71ef5
-
SHA512
bebbd5b9b98c2c582ec268d492290ea8b5b99836f9e5b08931008fb4dd0d61ddf4393c577a5e4a004b080587d74f8490bf7ea5d5301a50bff5642f087bf117ab
-
SSDEEP
6144:SUsMYod+X3oI+Y1sMYod+X3oI+Y3sMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X3n5d+X3J5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420314763" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000f88f4d8be289c6da78c83ae5aa39645ee6898a65e3629f17fc80921f2c71d9d4000000000e8000000002000020000000658ce359d4833556acff35e834e1491a19aa5c8448d690386689b48da95366f4200000003ae1736f6dca6fe62469c8291c2d489a88667a52d0c37a884ad62cb2f8ea73ab4000000037c51ccbb706fe1592553a26c894bcbc01b3d6b24274c721c241eae18b576822e28cfcb1674934fb29fd87b2dde78573dc358f32ed9f4202062a8f7b4c917fb3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c8cf240098da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C422411-03F3-11EF-B73D-E693E3B3207D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2120 2156 iexplore.exe 28 PID 2156 wrote to memory of 2120 2156 iexplore.exe 28 PID 2156 wrote to memory of 2120 2156 iexplore.exe 28 PID 2156 wrote to memory of 2120 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\014ca1925bc79a14b1ddcdb0f9952658_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d13b0ba49f6aa0a926511ba6eae60d95
SHA12aba01d7d7ab6eae80aa2e7e948238ee9da16615
SHA2568327b20aefad2f4a7f9e4e4d50d264ad86084a88cad7c97f9b9cc61c62359510
SHA512e9624f77bf9b604edc01622a7a4df80d931bd28b1de25a7808d761f782c08b4da4362df0352c992af0be187f42d126563a903e9b3e396760b40bd7f3c837b977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8a7499aaf5aa1880fcd55ec972b4bb8
SHA14e28f1ddf8ec86cb29d466c4dcc4dbc2941dcf12
SHA2565e3e442cfa2d70f03a3dbdf667ac8205e575bbb3b8b2dff844db6067365dfea4
SHA5120397189c828f91925716882a110a8cfaf2e5a6743cbf0436f879775331bea24c04f0a2dfddc609daa7ade6645b8f5961e220aea12553f9b4dc726e23da8b7620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9017345437ab9f881a38184a4870061
SHA14a243556e65e44f7882751823bdbd83d0645fd7d
SHA25629df20486ceb23ed9ddf8ab36ba4dc8737a6388ae0dd7fc3e6cebe89d22f0fb2
SHA5123f665e822ab93c2c7d6fa40b88aa692b3106ef780cc1c720c8014e4fb798bdab74f0c7bd3351950af2641dbf2b890a2e408a11caf8dd458302575f5bebe18910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f96ac681f10f64cda2fdc24379f381c9
SHA10766af0aa3b6e44a0b9f5b5b35f505461c4b6d71
SHA2567171cc67d588cecd4ca96f65f8beb908bd8efd06b636633e327f607a04803ba4
SHA512a7400471df857292a422da44c67ea2c5e1de07b69656e6cdc113b33e72f7f7059de0011cafcb10a7f43de51df7f37e4e5a754673928709bcacc09da5dbcf66ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e57735b2954a5617cb19dd5dd9a72e4
SHA10cbbea283d47eca3932a3f7a16833d1b7ec12d16
SHA2567eb158e31e2cbc231e3f4c0088832b6c14293c9000ef5d036ad33466738c71c7
SHA5126772e466dc5eb61e43ff623d8641f9e8cfe9187d71d65168b210a6e35686d56d1bd438ca8304c5d2813070a05e2072a1c84c16d2f5fbf821503f6a221d52b0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eca953ad6509db37fbf52f5b0b144ba9
SHA1e05e41727fbeaeb37a94e69284c3220007f987b1
SHA256da321ac818d7e70350f916222eba35d172421129c0c02a0d59240318ab9f3e56
SHA51234fe759c63fbdd4a96cd3a4760916daf5fb0d9c880da0773511a6063221abed9a2d1d2f509d52e444d8afed2bd4b95d867aacb598d411244d914fe5d6193f03b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9d17725c982ffb8fbb5021bc3d7482c
SHA161c619fdbcd71e8b99ad3f09769a030f8448e598
SHA25660795597f88d5a3659f18497519aed11c16a653593977d8667e67df821c0ae21
SHA5127ba61a47f599610fc5c02b0a7525e12f595809fcda7a09ab3c576a62a8e66fc679af9952492baef688f01806d3a2bd0be1f1f001db593ae9cf4c20627a158ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af7b47638aca5fc2f6990ecb4431e1a9
SHA13a1873233523e2f2aa912dced963dac9adaab58b
SHA2568f30ed81b4f9df4b447a8a44abe380cf63245b54b788479876c7c26109d9b566
SHA512e81f408bf2e4c30b62c2c74e5c05d9c459cac64153c8ecabbf7f19614e4a4ff474ea6a3c616e80337921c65d76761aa484507103fb8a6dfb8103f325b424add9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd145fff6066d471c16a502b1f90791e
SHA1f3690c77e7f3c9e81053b233f62718df7325c37e
SHA256889209ca7e809fba6891bdd408ca05e6e891d246f125722b66745ab5c251dc49
SHA512377a8377ee80282ea3987580b307c0191b7ae19d8122a944f848ede0eeffadfd37844a1e5b2cc4816261832279d1d88d3c1af9e5f9619942f06c311efcb1b836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a24c4538f06bf61f12a5629c75856e79
SHA1e244ecd1b598929b01f4d59799d2c6aa05779ea7
SHA2568b7e3af92836dbba936af46040ae251ebd98f2e1d4f19863881e58f87ac3fe9f
SHA51238c76cdc0e501c0cac1219458d7e9d76f998a7061a78544d397a045d54a79adf58cbc0be65d3b983cc6d3c8161c8c160d10acc56ce2f46cb7528a674538de047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe401fe8cdea478da9d2a60d7299eb34
SHA1d841f231eb0fd888bd717725439b393310603776
SHA25605f8b2f6c6a8f8b21170aa838a616050ef69b18d81994e6138e36f1e166c69f7
SHA51285ac211455601a27ca9ef4cbb628cd1c4ea70cdd19b3abab639340f6559fe7d6e4256cc779395aeaae8d73dfd874fc08bdb59b8ca2e74765b59027e7ada0ca55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5480aac4df89e343714dd21373d3e88a0
SHA1f3ce9ed58ac460ed2f3374ec14a1dbf75b14a68d
SHA256cbea2d128697b4c82b39c304cb2a2ce7c0cc430ea30abb9e33aa462c2711cfa3
SHA51287646d03c47cbbda2ab8e24e85a5aa308f1ff5fba1773d99778d80ccf359c63704446f3fd8229c69b8a9cda1c5ff16257e8335d3c15da3032eee9fa8c2e7d0e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58124dec534b989fe71b4e3a0a9642d60
SHA1400fcdecd75ff198e456ad6685a7843a076ab80d
SHA256fc39fb3d1239f61599c999fb811eeab28e67284654e8a5dbe02e05c03f07f338
SHA512e6b6aa44b8b2cfc01c4cdf05414dc51560743ec3fc08cbbb0611d8fc7e93930aa72e6a81c4e7c8481a7d22f31c6e79f1455ed5cc26dd3ed6543c1152cfe7168d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f62b84f13e4182312da74d9c9817051c
SHA1c3528c3f50f5cad5d5bb01d08d129dc75b8894c5
SHA25649de928ca8fe08481bf72e3cf03322b93afa4194ebec8828384a3c1eb29493e5
SHA5126e7422c7b1b5065509688664bb68062e836b55eca3932ac0dcad29b902e4ef49b71937668e9e00e463aadc850bf5a3eeabae7f3cee6eca63cdf373c292a93bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f0f9d3e32581e99934c83e47389f797
SHA1b9b68ec69a739c31bbfaff6a553872b4fe030bd2
SHA256313149c8a095577ee2469caf90552a0aadcf8d1cb62293082add3151d18e57dd
SHA5120535db83cea217d557baf9777f4f5dc1e3f50a3c7b9fddd7a19130da78b85cab3725f4b2cec40fdc936aa8f667f20797dc934158b30f629bfaf226f85840dd3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59901bf144f62e2c1882ae713277fdd1e
SHA10c806c855f5de8d04c9563ca471106cd8c4498b3
SHA256adf20774eaeda3b5000d5ab0dcc4de187f9cdbe3947a34dd7e3c4c28e047b05e
SHA5125684daac881ce4b2d4fd346d78941ebcc3e60e5530b3c9d3eec695acf3bac2a003953ce85034823333f1360daca75c7ade2beecac1d5abdc589e9af3e755cd18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc2e8e8d8f585d865a61ccac924e8d19
SHA104821adff3dd8f03d87c9ac4dfce3c318acf2355
SHA256e028b61f1ea41f208a7d549c6ba99e418abbb9aa1475a66fd339b6e4e182bf3f
SHA512b8fa775e76d324e6da89d110d8f89e5831519ee2582fb3f32a6ba657b0f6105bae2330de801d06ba9f761280d9d3b779cf6f1adef4784b1b5f346a155cfa9a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad536d1e8de55bbd368bc01399ec7be8
SHA142b3f15ecec6f86e6e3a613b1fa3ad20866aec47
SHA2568ac0c5f330bc0143d2cf84f832f00482246a551ec07f28dcf406767c32697380
SHA512adf0c0a73326fd30c509988989ed9bc81b73f854770078ecf9731ebfc252d28e1c4fc250476a0f5615ec8c107aa9dd86fff619a40a78da6d8f354d1c6a7c54ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e5077f26d5ae9ed5e6f07dbde5a03bf
SHA1d116267558c6ae897189dfd446947deb6fb046b1
SHA256a7788ecbce5c4e266ebd62f16781cbb71806b05bd9a810508296979bed3af1ab
SHA512728d71047e78eaab89042fbb93ef88ab83744c213d8545c1f935833526dbde9308b19305df9efacd767ab0143526788504028471f41b421aba6e359620a71b32
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a