Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
01614b63dbb54dce584359510c117f58_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
01614b63dbb54dce584359510c117f58_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
01614b63dbb54dce584359510c117f58_JaffaCakes118.html
-
Size
21KB
-
MD5
01614b63dbb54dce584359510c117f58
-
SHA1
cf15e718fde4d169a0ca5f6cea8e2259688dd460
-
SHA256
c2595b05302658d3242956e4f86828a379f11e3590bc9e0abec8ade5f4f21007
-
SHA512
a14a03a0ee5053a7533e70fa0f6c05198bf3e8fd892f805fb6fa9effc3df71f2cd3bf9185532efbe16438e7632d301c6fdfd23df85561a0f50c5e10ce35d7737
-
SSDEEP
384:17jcZiOTeES7u4AkJGp9URt+L/puZfqCeIkB8euH++aO7MvBCdN5tdqPnjWq:1oY75mut+LRuFqCeIkB8ek++a8rjqPn/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304896b20698da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA81A421-03F9-11EF-A1FB-E299A69EE862} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420317588" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000007b75e1a58f36a06223b4aaec6a889eeb5adeba424fa5a779ed27211ffd90db3a000000000e80000000020000200000002f92cbf9e1ea81687fcfff69025f1aba04ce9a6f0d736ad2f557f8b6535806c42000000098c217ef882b512a1a69120e43002761658099c3f3f0f97116f030748e5c4588400000003ec02759da32220d587a24a8cd6a3915132365883bd1fe33ce2f7cd4e6dd34b420359aeee66b109e3b25a9625d1c3b79d5494173c6ff5d1f20c5722299f7f960 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 3036 2068 iexplore.exe 28 PID 2068 wrote to memory of 3036 2068 iexplore.exe 28 PID 2068 wrote to memory of 3036 2068 iexplore.exe 28 PID 2068 wrote to memory of 3036 2068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\01614b63dbb54dce584359510c117f58_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5830664973d0e4a665b835aae02e4f0c1
SHA11f7682292865c83b08d3b68f68dd89fd49d5d5b7
SHA25645fa99ef7a0bbbad9f1aee4ae6cfbe53cd3e70ec40ab8c156b454ab055befbea
SHA51228ed6750f89ba62872853d531287678c7a9fa9723f86fd47e0b6125b9b34a56154c6dbd3173ea402e720d099a5c6a39b1620de0fb362a2aec3137d752ebe8ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e2b3bbc4e10a84f9a5947ffaf30ddc6c
SHA134457562d6a890ee3643fab63563e3e8029bdcbd
SHA2563268b3973020a9db9afda096c8d6f65f0516f8c7a5a1ea276d394fc55e0e01ba
SHA512c352defdd367eccd870ee81a5f68a8207e220cda658aebf765720f72f59e1095eaeb44b7e766b5a6ce38909ad1abe47ce347c8ce595c9e62f63d6404df1bf03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57db45bcef0d29cba9a5e452e9544e93e
SHA1a389006378db0b198b6864e3de7cd7c1dfc1ab41
SHA256e0f3f2235b61b7eaa4fff8975cc1ccd35b2a1afc3e23c5fc1d6776424309cbe1
SHA51299bc47ef6edd3595b1215289f6c2b38c9d729cc8e4673613500b3ed2fd0be5b4902afaf532c94ffe89f9c02a64d49e0c1a10d2b89de0dc6af1391e68e247e49f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD534fc2e3fc38159e517a1c535647980d9
SHA1ee45ef42ee52afcf729cb103c140bc57bfe93adb
SHA2562c38a9ad0f7db7344688a80f140783cab0bdc65fffafb272c17a4119ca31a982
SHA512c665c4fb6050c5ae15e04745d82993b8942f2b29731e87671e2fb9e5abdab8aaf89a117aa2bb5d30a897cfaca7b96cf4eafb1e69ef23ada1dcf111ac8283221a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD595a93d71314661305b7ecf089081a90f
SHA152cf4ed4e1064937ad36bbeeea3097549371c4b8
SHA2569c62b9b102812e9f6dd4d3c93140a2408bcf2fa81bf6d46f6a17bcf24179ac79
SHA512d7d32a418d4b6798019e8b9b67b5b79c46e4bce07e17b3088566e598f033070300f5bfe34608a8d9df4fdff8511f8c1f01d4a832f0eca3a2d35326ba143d8c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5796ba69d01e6d425391d1391f20b7732
SHA102e671e5bc9f16bd213f7e7b0c4f8cca27b6ffe0
SHA2561e2a8407a98072e44b6ad9dbaf7bf4a90b8d71b89f621da55a6fa6d55f4fe897
SHA51258279d7cb9ae1c72df7d85afddbd7e28390ad274b8146684bbd427034427cd2f87120ac5c40e3ac2bca4efd761d692e99ee861f425d0be4c548607199b9f16d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f717fdf283c86a4726663c746dde9dc4
SHA16105c00341049dd8b036a99edf804a50e0ad1127
SHA256c1bf17d46937f4580e7675ba28249e38f1b2087cda3db1fffd79f76af7829f62
SHA5126c552812c75890eb85dbbd1a203d587aed1280cc409947588b58532bda254e78b54faa6df3c9c4e3e24fb280945869701939697909f5e61a01e306f903d16a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54d01ab0c71e555d7ad316c0686310f8e
SHA1d5bfd0a30b63cd673c7b59bfd24342bfc83d9cb8
SHA256b4159acee076b3305eab48ce34b2805369764c8476ce7ede6a46cbf811f240e5
SHA51267ce354baee42854af00b2fc4585e7004e6c6d7015d5cb167632b03d6dbed39252c92572d621e9dbbb313d19efcfece10d7c5979e05783696d8fec5235797833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50bbbcc4d0da73727c3deb88a144c4938
SHA1ce95d89ba89272677d6f413a703481b63a3407fd
SHA2569597b82e07b1d6c11ba3a7cda35a434a3669004703f3285aa0d48750019fcd86
SHA5126d0848761d2071276ed3933d80075b1687f0e34f19c17eda1dcd986ddb0ddb42d2b508bb23e8994e462daf1c97e2a614b6b568780cb607c976c5e889301b07d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e35200d2a5ac615543c839ad4b8ab9cf
SHA1510b717b33866f5e356b8be9e3dea63ae53309b4
SHA2562c018887f5d01a34b6489fd14eab49c263caaec35c6c5bb2541219e19a38f274
SHA512d9c3c8fa522e3366252ce7e2d83122b923978bc616e93575be8640e45dce4886a107cd023f97f8c30bd81250fb68fee0c964687cea7c6f60326d003f14673791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c126f7e2b20b810a542f901c0b3725ee
SHA1e6a9f971e97be14fc978b1e50db762879ace64d8
SHA2565df885b799efc2b01d1957f6834e906ceaf41251dc7be724a98e60b39313a49d
SHA512d8e4dbf41e49797c47867227c7da465424db9fe99322c03eae519d5ee9d903d1fd1541bf6529ca16b1c2779f4ed512757c226d3aefef91474b912bb1991b14e8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a