Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
018e75e61409e664a47bcb69aa3924b2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
018e75e61409e664a47bcb69aa3924b2_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
018e75e61409e664a47bcb69aa3924b2_JaffaCakes118.html
-
Size
4KB
-
MD5
018e75e61409e664a47bcb69aa3924b2
-
SHA1
3aa9f5bb5bc6b5456809fe82bd4b99dd40db9b6a
-
SHA256
8ba20d4cbcbc622a5c9f345d8546c643b8b4629c33719f4fff814ca9f4074a82
-
SHA512
d475ab741d635e0d07c7f5c4e13856ad32cb08dbf39096fa5d58e24a0c745c559937f373da606366c5432ba9d44d5e1de3424b92b179ef74206f593a4fb73724
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ofl0MxCK:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000003ba53323db9efd53be49c03c28c725cb04bbf42b88621c629b087d91401d15ab000000000e800000000200002000000006720e4ae77123ff43f6b3bceeb1c589c12e49e9aa48cb9d78aec500e53f80af20000000d152d332e1a40b3521f6bf1eb5c1330bbbce6c03d57d3d7556dc040bb0613bb840000000149fa8103352804fce047a52bd5fa72af10180a4a216acc9c22218013f71c44710a0e64ff50b514f97b20f2943b2a66b599ee0364eb490c242990eab5ab99f24 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f4afe61498da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1230ACA1-0408-11EF-8804-E25BC60B6402} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420323686" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2096 2848 iexplore.exe 28 PID 2848 wrote to memory of 2096 2848 iexplore.exe 28 PID 2848 wrote to memory of 2096 2848 iexplore.exe 28 PID 2848 wrote to memory of 2096 2848 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\018e75e61409e664a47bcb69aa3924b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546e3158729aa3abdc4e3746c5541f24c
SHA1abf11e568abfbae2bbcb9a008b1ead507209c627
SHA2560112ba2e8ce7cc5d0d65428ca868ae35852cb538676d95f28a2f183f4e24e035
SHA51220d872bcb9c957e284f52e0138919c59f25fcb022af8b070a0d6a924b961ecd0106730ee2a1d15b989a8659bc944a5cc1a8b3f6ef9f94c23ce454988e67fba63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5461fe60606a0ee349acd9ba06aa938c0
SHA17ee51ef4d10ba90644032c702e4c2876a256ebfe
SHA256155461572589ee60b80358d4fd146f4c8a79e89a450d0fee4344b4a8ce75f7da
SHA51208f74cdd6d9faa4b658abc207dbcd810958413269bc0f99eb2c67750dc6a05b42d1452b42ed87126dc05e9ca3c5c05e5190ddeaa079aa2e48bc69ef23307d8ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591f10f60fab3021efbdc52676593032c
SHA1201256211079ef1a9fe6d3d21fe0712edbcee679
SHA256c64629b6a3e18460cdd250b05f6224f0f2fcc0de6149ada15813c2de2d8f36f3
SHA512bf446251b867c16a2dc466c61e34f6303832917d80fcaaa1e36704335ad46c3a88b055d8f2ec17b853010ca70faa4fa0413b09e7f7af48e2f776bcdc8b81dc2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57be5c4445aa42f91801776f83aee3395
SHA1c6e60f84da58418ea002ee71eac019b72325a56b
SHA256e03f5ed7828c402da51250e8ecb52f97b12c4a7355070f97ebf6ce6f9e2ca664
SHA512f0c4a8476e394baf000be75a7b993d98c470ad5d8433a203195a1ff46624acf3d276a9daa4a4accd1b7cda40fbd6e70b1aad19ec806a570dd65b692141bcdf51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a333a904761ba1e61a99ae464885065e
SHA1c3a6c43fc695b0fff3ddd049b7103cd8c7c8084c
SHA256094c08bb048a239d58189872e95c788a9843ac9140eeb0ee4ba6a1fba6da18a6
SHA512e7967d97c739a75cf25c7a0ee87aeec7d7600e06c51f60e9309b8fedb31c8db1684dfdbe32f68647ddd9d8bac0efa7738a66a0b31352689c7c75a22e2e6940d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c223a2984792b7e4e1c542f4edd3bc1e
SHA1a4e5aff1bed6ae3fe65dfe04b1aa1aed84da6bbc
SHA256eeccf25cd7d6a3679e3fa1772499db4b17a97fe58ca96370f0ce778204dbf748
SHA512aebb4997f2619258fa71c571af6c91859e29e650d49612b060a9e78c8680da181f1839904c7141461e846a50b24e73dd506745977d0d916f64b8a802f909f63b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2e5bd1a57ecfeee31c9de166d012386
SHA14374f9bfa129953a6ab32fc5a7e0ce498977aa1b
SHA256640cd243156308c8b2288f9c1f8aaed87679a90eadaa01448f9fafdd13faf9c2
SHA512093eac4ebd231ff54341f4ec6a245d45b0db8e6206c68e2905a32d2874b205aee2522f64e5b9a9092dd7c2811e6b46f22e7ca8144cd3fea4f287f42cc15f1f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f04f4c161f6ac52a0baee0254366413a
SHA19b128dd7337d2b1343875781bd6f689900e99774
SHA2561804d0196f33898c72d2b1682b422710b285f2b8af7172e432a0faac5efbf37c
SHA512548bf6683d137dd6cef62897ec3bc80c60ce0558f509cb80745149b949b1b5b815f2837ce8e9f0b9b8e79e0a73f68d83d98ec504b9decb2d8fa43e73041c3f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f715379c3d8bd2298be3e65a6410051
SHA19d7b4009f5edb005d1d8985938ad70de26726065
SHA256b1e770166674930284649797f4810c81992db732ffbdeb60ec5374835a4a85d5
SHA5120a8083223487c0bc617b7815b14a753381fba7d860fbf4b888b32cd2d82783cd69802374ac3474a6191974bcd854e06f72d773caa19f36fd93552d1797c2b172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c81b1a34841a9bcf4c94b82bcb7b8550
SHA18762cfda5f7278c1053404e0c5cdcdb454cb1a35
SHA256e8f2ce647b52095f7f72c677d80d8362647aa9c476f4610c43b4d10722f99a2e
SHA512a1bd5b650ef4eb0fd8a424e20ff9942cd5a4483f3a6d4e5fb86b4430fc75f91a679f91b1a0fe249b7ed50431022c98fc5488e803d214401e86a95df407ba6dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2722620075cb3c18aeb23334fa13b0e
SHA134273d6d9966aa5b5055900557afd79633cfd3d8
SHA2564631bcce92b2adc29ac75d3f117ccebbfedc15dbcc59e3d116bf1ecc399f725d
SHA512b327156215ec0ef447fff8e89b082f26c24a255750d972e256f92b5bf065150b0f2004948bcca85df53eaaa95f5142517dd5355903a0091c83ff87603d4fadf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dc3f9eaff55329d854b6dc82c16e8d7
SHA196e7000521d8c1d14758382e6b1bc1cb1a5c0f91
SHA256e5507b9c693acffc09bf0387b0c67e9cb9428f27bb7bd2b6c95dcfcdcc522f46
SHA5126e4c49bb92dd5f0cef0e254ee1c9f9786dc1203e0a18a1f53339f8e39e5e1c615a1cabcdfc6f23e62d79aa40e4112438de5052ed30632060cea952f4baa63c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cad412557d18c6c32af9f021ff15e8b6
SHA1ebd61eae21b0bc26ea85fd3a3d3607b469001da7
SHA256e22049a33ce1f4230c694f4d8bc3a83e096d7947c1ef44145bec1aed19f2d48a
SHA5121ad1b2632ab1e24fad11d5ff61300a04e34d64d6c11013c86f1f8315bf61d026d4c809f0b26a4a3711f18236ab35873a0350fddff61a45f5d857cb2c3cfe48fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fe320131f55ce6adb7c9a04ef409bf4
SHA12db2524173b3f49a963e29d4c571e629b5a4f17d
SHA25621a8537751e44ca36a0ad45461dbf1c871244d68592cf8f7b405ebff2775c5c1
SHA5123abc90fd3c1fe2d50195f38632a813e5577527281b70d82b34b7b6a2ae7a39be4bf7bc92c9f19d12122891e2b1f7b66440e0c0dd82e2f50b6c162e0f0793b04f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5832e0b7ff0450a9000972fdb6615502d
SHA16295928c7e45b5c100054b72fb3d11f8dc5ab649
SHA256f6e60e4fce8bc333586d17074a545440fac2c51010c98caf2119a964775884be
SHA51239277cd65d03c088d6736e86a365098ed261b3faf1e59f33049cc6576d6455ab60fbc413625d23721a7a2ce1b69f3c6f603c6b3f5752c966fe971e14481e1f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae30b4f88d52532d43a789592eeae539
SHA1e23de65a6471cc6ddc1a316ae6101fc1e53a151a
SHA2563389f7a2d658f2d5804c5001ca09609514b3e35b4f556c8100096e22b99e72a8
SHA5120bac4b75b8b6a6cc50b4b8274604403cd3e03619e04491ed779ed929a5ee99ef4a93f087bd7ac857826d84e38ace2d64e263e6039245c7156a74eb7ab4f3b30a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a50dd2834c5270b1492fdefa3672bf
SHA1c8af5b064fa5c72c731de7d964658c92fec53aa4
SHA2560f644fbb725389709a09e2228f6cebb5d7fe46d405b7ceb2f97057c264e7804f
SHA512ff05be9d6d3910138c86708b6ec4fac70d4d90837447f9fa58c29d569703d7c8050c601f557969f8a7a794c95bf32026c3b77cb93978944c0e5bdba519cfc5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f435d9e68bd8d8d78e9ca6ba539bed99
SHA1105e5790e3d4bef1aedf5259b48312038a211fbb
SHA256c60ebb050ec42f66435617a313ed93f5452c4f2a481bac1e3233d4fe1a808d8e
SHA5129b36f2de81fba1bca30ea2f48bcdab7b9fc289a657623041986ce93922128a9f22647d9ffc4c546227b6cf2ea6022e797e4258f962481955e2a4c96f85808732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9a021aa350d0f833421539cf630229d
SHA1bc952c8ad34d22a87347ba0d83a5e8cbe1467e52
SHA2563517edaed455d9cc7b8d434b952881d056457c9a55a8dd210b815e63bdc153dc
SHA5125c597e310d68d357e3eab8cf6f5caac8205560ab6105f85a5be9bb00510d7f46fddb3a561eca792d31c8f32cd973805ede83975025923c19f250c991c8eabecb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a