Analysis
-
max time kernel
144s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
03cd507334c0392963f228f627604c57_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03cd507334c0392963f228f627604c57_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
03cd507334c0392963f228f627604c57_JaffaCakes118.html
-
Size
23KB
-
MD5
03cd507334c0392963f228f627604c57
-
SHA1
b42dcc0184743d367ca2ae12754fb5895c497ddb
-
SHA256
45a37cba254399ab6de6238112abb67205a6fbddd7d67552a1063ba0533ad905
-
SHA512
c190d7bd2752ee44e692c33287c3b981a3acde5d911b44e0276d31d2089cf71b4b02ec5b91b9855cdfa32d4c1921bf445e350c92a3c27f3e4b6d8e2a479d9014
-
SSDEEP
192:WLZLwKQtUO0BRUOylUdQ/uQe/gV47BlW1ThMB+gV4IuPi6blCgVm5WafW8Ohp+0t:fWRU3U2/IoR1TWZu3dd5ZE1Ty1T/nv
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000009ee065c9831530573cd140af03f3965ab4da20f03634730f039f980f503e98f4000000000e8000000002000020000000ac8f2664c9c0d0da04ae53a3f39272969c762cc57a97cb9c57f837d8ceb651742000000015f7dcb0bda49999ab0448fd4ef77f4acc371e78313c0aad89584f5f0cff1b8e40000000b8e41b4a19346aea74d77e868d51edfe2bc5c46964d24403d68dd7be87ba51ef9b00606828cbd6f1900727208b85111ffe890454607d2f34e95d1d68dcbf38dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{294FA541-04E8-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420419935" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20de20fef498da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 2052 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1628 iexplore.exe 1628 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1628 wrote to memory of 2052 1628 iexplore.exe IEXPLORE.EXE PID 1628 wrote to memory of 2052 1628 iexplore.exe IEXPLORE.EXE PID 1628 wrote to memory of 2052 1628 iexplore.exe IEXPLORE.EXE PID 1628 wrote to memory of 2052 1628 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03cd507334c0392963f228f627604c57_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5878f98b401540e972a2abab2cb5211bd
SHA194d1f851691ed79f6f28a0a43341c5b428e57a53
SHA256e5b8a54128fc3bced5e8d6c900f45611c48871f75aacf790ecdc2c74ff1b928e
SHA5122460543715964b3e52bd4aeaa44dc32991a8a33b1ec778400360fea16a8501dce2fed91839f3d2b4e1ecc62ef2c44c353f6f84210ae57eff60ad3ec5023859d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5beab8caaee896563373e34d25b5caf4c
SHA18a7e86c208eab8cb9e69bf59467ca2353a764fee
SHA2564143547d62d412434f388abaa3d099b471e1573d44b912e55af05f9dc596f419
SHA51233e2a87dc2ca876513fccc50ea2fe5c9531241f36bfb9a34c9b9d60f3f8e33921fa8cf333e8fb99f6abc1e8df53e8f7761f8a6d85b17c2579b0a23cafb2aa0dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3ba679490559974ca8bd52dbb449b42
SHA14ef8c3d4f96ee8b7e4d4383c46ce976d045b58c6
SHA256ee027e47c72f24600d108e0a6479d2b2d1bae0c2f27c247717a2da2f0b68541a
SHA512c986b2d9f26d605d000c48de0562c7f8e676ad0558fdfeabc4aa3355e244fa4e26f24e8d101a4a0d83998a96c0866e0c1ada380b392012c8fd15633c350e9529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2243bcd22b40c7075ee5bb3c6e6e5ed
SHA1410ec763a68790026d03ec9bef68d213a7d24534
SHA2564c46a3a269129b9e3896f4d437d6ecf5ae3e271fa69b94ad84fbb5963d4a188e
SHA5120f9acd23e43bf71f3afbeacaacb58393cfc0ae77084ef1f1d7bc6e2bab521807548222a5db33bda3f25768057f34af2b01ac67119f4884060acc389b8b9479dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2e9553e00b5034386b2b64240dfff36
SHA1debdbbb4aa52d925fbee873956f14cccba908ff3
SHA256082ec4c0ca44368b33c8c2013accdc906f692b3d66c4d81df81fcee3405e662c
SHA512c903052e1239d7075110e80ef47c4875d5234887c73d8e0b3faa14834396ca60c04f36048f550ff684389894b926f2e4ae93ea77db53c2f93cb9078a23b853bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523509123ab8134eede67df0eeec01d24
SHA170760c0e6a44cb14f91138e3a74b2972019494b2
SHA2564e264342fdb556230a6ad4bb80e5db229a4b6dc7ce716e04eb09a12df9510501
SHA512a8e92049371b5489f0396876a8e0afe2f12b4fcf0a5fbe4a692f5bdd52ba89b2968843376fa4b0a7991f20c24d3048d1d699f15a397ad5760c4f4cce59c96d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510ee63880233b0374dc36eb0a978c615
SHA14c16d68bbd7bb10627ebc49162b63982f809dd7e
SHA256c430f83231d806654b9c488011a3829e4c97fccb1ab963fef54fa510229fd62a
SHA5126be7843675fdee46fb26992ba570004bb9d8b118ed6514b0354bd43a9c773a1d8d0961160bac5ad2172aa0b8192116ee00114b37d2b3fab5d3957146bd6c62f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c81e1cde66b560ca4f63ece438a3d75
SHA13e850c69b3191d9cca195996b75ae6c3441048b9
SHA256dca3439d8beb156c1ebf6847aabeb08cca5a57991c13ee19eb15a79fff19554d
SHA5124da59353b778c0bf243f59059c024c4db7fb97cb677d9e215d799d639bef72646030272b80d3e6857215a6cedae27c5812d064ed1c66f4eecfcde8eef8e92935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5598920850777c7372b378c4add002e1e
SHA1e0faef0de9c634674fc6ed94b470fb32319832ec
SHA256d06a343469892c03dc74b05f5f8b0515fdb063cf60b2c2b5926eb364d4ff7746
SHA5120aa7ca30ee0e7bdf8237adb1d5ff912084c46157e75f0c4223fad10751c284f85b6102176df9f2ee874b47180f464661dee26fa9242407cf4e9055c83f329985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d68e3e7548bb4d10a7fc3b1e29709dc6
SHA183e85fcb4c584d34db9e38740fb5c8a60e886db5
SHA2565c1c642ffb429b7d91d34534fbbb140e64c912248ec899431fb9ade008e51ea8
SHA5122b10b98636544b995669f3a29e89eb54a578e498abea87e21ba13eca7cb0478a5632d1ca08f463731315438162dce3a1b5981253cd6311596d988b733841c7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5469e8ebb2f3353a3c0e63949d340c9
SHA1f9ca2eb7b0ccfab4afd64621f2a4e1f75b1ae64a
SHA2567b2da75cbd8acfc594b2a686dffe39c428196cbba64bec344e24dd98c5e96346
SHA512b6baa2d5ac4f7335fbab490c1253151104d2df54e40f84f1861a29d3f61e196efb44134a935e5ad6f91f07af17c7c6c3f5d88e11d99ae667754b5b4612915ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527c8e701137c4fe6acfe549a86696acf
SHA1110268af194d0f6b255ae2ba08f3de502dfc786e
SHA256a518303440311f937af27b0a9864455bb7bf82857ff4566636c1f86f1a3507fb
SHA512dcad537dbded1844b500f507f75044a4b20af6fc4b112c6e44aade7aaa98936e5051b0bb0f0f5c2a3e8d4cb8813c7612b4a036b2e85a35d285d30c481050aabc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdae0a41639d25046118524db7e402a1
SHA153daaed7b579e766fcf99ebb73683926af2c37e0
SHA25630382ff1a3a4222979bde03f44340c50004f9ca280a72b11f8b2ad0c16391045
SHA512676cd2bcde09ddcd80bc0c180e577f637b97c026818603ebd8435fbbc30653a87e1e09a51333990378bc8ce155d90731b7215dd77b7a1943cbba5dd0243cad7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ecf66cb4fb8463845dbec1dd6b0c32d
SHA11c877aea4364acdb9cbcf418bc0fc5e545d99f1f
SHA2567d945f11a4b382a38974200e0f5fde6bbaee590f808825083687f41657e6b026
SHA5121873b0ae7402c7e6d4c2aa69bf865604bc07f894735db3da8b01be2e0a8393b4bb46fed9be75327e8120ddb3393a171fbb689ee169f6119fbe35814adfb55719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554097021c88d246ee456ad0a4eaee7eb
SHA1a288e46128a2fbe88a4752aba019454b700d788e
SHA256d35936da81381ddb99f22ee78aef1e1fb6a94b6b276897a7ef167e04c9b62974
SHA5124e4b56fed2784ff33f08756be97219520ec008720a858d8f316db6aa005176d1dd957639bfec541c804fe21145d3d29107584851c1c245ebd088a5f357d150d9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a