Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
03c25cdf2f67eacd653b03c5846da12a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03c25cdf2f67eacd653b03c5846da12a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
03c25cdf2f67eacd653b03c5846da12a_JaffaCakes118.html
-
Size
4KB
-
MD5
03c25cdf2f67eacd653b03c5846da12a
-
SHA1
ccc9c8966720a0a5a76175909ba17a1862537119
-
SHA256
da2cf66a31233dce63d84beeab19a679cd2fe3fc788cabbe546e06faa6f82662
-
SHA512
083a44d98a832b74659710c22bc9867c8d53d965360382b51f3a7e162eb463aee55cab5708b957ad5d8ed0e7d7b6ef328282a980328a1689a7fd4f77c68b9815
-
SSDEEP
96:ziEk1mV4MSEPBDvV0n47ej/hgOKilj7R1QnyneGhBpkfDHQ6iM:ziRcV4GD8/h/KiZzQn/GIDw3M
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c000f6aaf198da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420418534" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000050c58cd657a2f514d6c496d75675bcded0ea913abc39a111894a1d49b906c341000000000e8000000002000020000000ab2cf5572ad374a99dee72deb527ffb0e7ef8c91a7e80e30b01aae232e475bfe20000000bd60a0ac20e6275e89f5fd73ac542b73a707144b6946ec816d964f8e4016b050400000005a8a2c2b1744c3fdf41671880a6b01ba5c931fe57e52e02b73b03e6f033bab3ef76b68f5b10e3f9fd1fb4759c54193896cc026a4d1c694cbe9916f6f1f2141d2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E76B7301-04E4-11EF-8859-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1728 iexplore.exe 1728 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1728 wrote to memory of 2900 1728 iexplore.exe IEXPLORE.EXE PID 1728 wrote to memory of 2900 1728 iexplore.exe IEXPLORE.EXE PID 1728 wrote to memory of 2900 1728 iexplore.exe IEXPLORE.EXE PID 1728 wrote to memory of 2900 1728 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03c25cdf2f67eacd653b03c5846da12a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2928f2d707ecf0765fcf1ff10f9cbd0
SHA13110815fe2b6d67e3b750d9ab7718c5d85ce5b4c
SHA2567633653550288759ca68fe457bbacd1aafe4ee068326bdc720f5ee513c6ce8cc
SHA512f99a2be890527bc14cd366037e956f3851b67c56eeb858f84f08c7c6a1ef833b9b5b88933650c0088318d35d2c04a1b8e15e2cb6a480fd2f387c50eae224ab05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9fecbd5ce141cbbec903bea5b4f060d
SHA1356d5d44801eec73197613266c5898e8c2696ec1
SHA256d883fce5803596e05e404ff04c7a2a439fc9f9c14aa3aa1cdb7275506c7a6bd1
SHA512bffdce2ec3f6daa73706a86e918db07acd62fe32ba6153f759ee075a62f4cd7f9056aeb143f9944e5f938e95bdcbafcb38de312765c679ba67c6d6b9e813f27d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8aeb41719cf84cb74751eb8fa47ecbf
SHA126de1545ca01d6b46a090682b00ba9c194cdb5ea
SHA256a8e4eb18c7c18a2e1105f73e08e74a91c0b53af16668edfb0498d218f91b3b59
SHA512d0fc5dc0e17d33e131ad76916ee11879fdb0b08138c83b0248c15848b3db293fd47d4ab3d821472a97803bad6732a328aee3426537e24042aaf5a364b557b0ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddbb9b9dbcde92db52f31d5b1e62d7a5
SHA14950362b05163808e5c5c17f56e646419dba6328
SHA25682daf6b633e1e4e719943487be2624311b5a7f227cb276cd3883e6ef6c76a97a
SHA5125c407109a3d46da1b601131f4143ecef07247f2fe87bc3a0621e1d910def15baba0d186ed261210e7785af138773f49efc61c56c30d693fc6519e0165811a86a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4afbad70970218c2bf48e1ef2282c49
SHA1064de28ecc5434250dbb07c2e4e363768b81b989
SHA25623dc46a10caf09b2c3e8576c0955be0abd1eb6b5729d9cc19027a7674ca2859b
SHA5122dba82c87abc9b1045e5190cb68bed4daad1c180cead3398201fc1b36c409d08cf72f358a8bece0e73a17d67291f00225c77aee2c603402ef05d29cc46c768f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eb30f0258972ab1ebd28e186ea62115
SHA14f851a92e3693a898102ae867cb383f6a826a367
SHA256cde7fed3de95f3ba112f5cec8977d248b57f1d6d1e76262777c90d703fdf2ed2
SHA5122849c5b455e11717e3c5f6a7a7f50138dec66e4d3fa158c0b580b34df6391d310244b3888b172ee617b1be48a65b92668917742dad26defce1be371b9ac26cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7f1304e9ad3771156ced5b70000f3fa
SHA16bf9c41951580a59ab61a8324f15f7bd707f6a10
SHA2568b251c91b8b4c9ff3c408d4771b64963f51825b774b60b953752faa5f821db76
SHA5125b8115ab7ad3ba3c82386766681e7d24d298ca80cb2af4d5e99f6f53c2db489aec6412d37c5a2bd54ebdcaf1b045b23d28713476df4c9360352f52c67afdc046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5540420e7c1c518f966fc113924eba6e0
SHA165d37c549924d7601fb4ab9b8e943018460b14c9
SHA25633eb7f87cf79370430848289d2d80e3ad098e008e6c42a68bf4e3e939ec850e0
SHA512a0fb8aebf250747361df3e8c811f66ef27fe28f1d92dbb508c6fb3600cbd82f514eee7d78dd81f999db02b52a61083ae1a6d77d26bde4fa1248e6eb5b19f4e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523a9ddf1b26c94126c46a9754185fcbe
SHA1ad679001b21ba458df73e72353dffc8b37817266
SHA2564e9689b4ad6b6b0e320bca716b09285b9f31b4d69c2c1704a18011bd49f325b6
SHA51218392eabac0da1a596767d12f141cdaa1dcc12efb66e84fb4542da7e002b5d023f4ab3bc47af31afb50e8cd8c2ab0de09ee415bc04fa0c5b353317e688d19f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d68b3b2fd5a9bb168913e2df9f04c68d
SHA1b85902bcb4c180734fc7cb2c900cf51696189188
SHA256edf07ffd99c1b21f2086b16e180cd1862744e8380feab26e8a2dd90509bb0c32
SHA51296bdd7e08d887e385111c293e9803309b424fe546c964c7168dd4684c73895d7ecc3d8a7739f027d4c8f64792da64cde967b0371ef35268cde624b4b585c3798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a197b3638b03b84d5c7b20acfb5a1c3
SHA157c0349b9a13aeafed3627b7a751bba6af64e25c
SHA256934a853136bcd8d320d91eeaacc0d2e25365ea1f20bae4a79fbba061c20b9988
SHA512b4ac6437bc1ca76d33c369a7c44eb983412c5a823644e0c7504e45882b0c3551ba3fd62725540e9f3d29e3101684de69a3bfa73c25c31477895ccdbedc5f3d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8fb62c50cd02b07480699a9fdc4bf6c
SHA16216007be384b83976aed16926b7dfe7120f938d
SHA2566133be20712b15a676dcb4715e4c4af762039e053891172f3c5fa15752268330
SHA5121cb36f258cf176e23c459b510b4fcec52fcec4c45093f333bd67840e57c758dfc6d0067890a8433d07dc33ca26df507cbff9f7641e61272687296be1958be5b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad8e06b787d7ff1a83dae2ccdfed2b2c
SHA142329252c69a386f8515ded575fe96f742cc3e07
SHA256c1e131fac0846f9fd80bb8b4633dc939913a09440ff8383617cbb3cfadf67d8c
SHA5123a91e751cdc6588cdfa228e3fe5ec1375f5231724d664b689184bc26a88bbae2dad41307e91b6d0274d9a91ae32dee297a56aa4faf438792592016b378457292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f626a6a55e07a3a56fabd42c00e0f9c2
SHA1709ec6d3b6fd58eba7061ef8616eb1df631d3306
SHA256b930aa2bb76af747c81f1e731065dc44d31296960d9ce33a413f550160e8c1f2
SHA5120ff1bb08c90521a4097f58310655e7d621779b32c611cec51ec86bdd16d93a658324bbb61d85b750b19e170801310bb0911047c60420e339a37d4f74f07af316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a423610ee9e633e314b2a38616856e85
SHA1efdeaf77d5f4ae84815409b82e4fb910edbb826d
SHA256fb065923ee9fee48eb070d206b1d8c18cfefb2e06c6551b3b68ad949394aaceb
SHA512270fc8bd45271fe38102be7ff0d83a365225c4042922c41221d72d574dbf149be793527be53d3445bf23c293c9dffe5cd0d7beda89dcfa2780a77151b3d80e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5634948ad71022857e84a42479fddec12
SHA15006887db3d12ccc50ab3e0fe67cffd3e0dddf21
SHA2569b0b7f589db2c35db056dd4d6499273a963c5ddc1971006d82aee91f609d65bc
SHA51282d1f53c150c7cb0dcc28555eb687adb29c195b9668ba87309f07cd53d5d076d0aecf7470901d6c792d3d4f7075ac8e53f419de7f3a11b88c39988ba19530215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebb52f21b0f9565279f793cb718ed571
SHA1e660376f8d2cee5aee2d7e06b1f869619cd44934
SHA256284db8f0356df06caba10e0383a980bc36d53514ea1185491fdd108b47068de4
SHA512c257eb4b90ab5758d1762c03df6ac03a2d50fff136a607790d0fd5485c75c8845f340dc1375410b03c49d3a0cad07c9af8fc833e208e87603a5576a1edb9d40c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b63004b367f2cc52d3a941c29d3fed79
SHA1b75a54d4827981b6db35fe665c3f81653c88d569
SHA2563079311163a889a6a7bebc70cf72c0463d5014b3e4791653aa830aa8b7ca4606
SHA51211dd0a1b9b015017502f6088358f2230904ea670ccab8d684697e8900f82770b0a9339296f13e22226708facfb1e4aaaf50612bac431bbda90a21698a8ea4e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53658b1a5bfcb1d50636bb5d5c71dc2b7
SHA18c0d8de388c9f600bc0d8d33f1e04c92c8c34fca
SHA25675df2bd8657abfd8092913ba900482bfa9cc7d1029e436d8705e5632f082289e
SHA512d2347c8c560957566558d13a80795351177f7be2953c095c9512061aa48add2a304bac74bf8fb8ade9664db85b84edc7aa71ceb8f675fc3a26904f6fc895281d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a