Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
02467ccc22100431249a019a55edfb7d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
02467ccc22100431249a019a55edfb7d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
02467ccc22100431249a019a55edfb7d_JaffaCakes118.html
-
Size
2KB
-
MD5
02467ccc22100431249a019a55edfb7d
-
SHA1
750338824e542068984a631ccc86a0acad8581f3
-
SHA256
b5fcd5d32e18b6384050b10105372be604157b4331caf74945a6f9135da4c171
-
SHA512
f4d4dbdae9f469c1639f5ccdd0c20b05039d7452288e7cdb64e50906a1acadf4c3b5fe55b198ee44d6617861e0fde21ac1f2f4b5569822c262cc81624fb34659
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{175A98E1-0443-11EF-BF93-66356D7B1278} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5083baee4f98da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000a97b706fd64069561e727971f62bf1dc25fa8e556d9ae38898a8659c61e8a42a000000000e80000000020000200000003896c4f0d49f5884d226e6df2cb3e2720d58b9a6415fc9c6bb380539129b1bcc20000000efb88b5c0dae194311c0e06f91477d638b4b556505b6a281219cb53b76ed027c400000009e05a1b53277622191cedeccf394d6d5218b93be0ce798844efe52b63a326627c7b127dad958936e4a427767a46aed09e38c68c357e3ffd9545080598a5b8a7f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420349034" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2500 2040 iexplore.exe 28 PID 2040 wrote to memory of 2500 2040 iexplore.exe 28 PID 2040 wrote to memory of 2500 2040 iexplore.exe 28 PID 2040 wrote to memory of 2500 2040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02467ccc22100431249a019a55edfb7d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55647627be49a0a52ef303613d0ab42a4
SHA138866ea53a0384882d3516352fb63bc6ea899c74
SHA256d639a39dd71ea6ca4e220c82513036fc2ea2f23a1e417a572e7fb16f178554fd
SHA512ad7fecbdca566f3b7cbb656b7139907056aa1009c30b9592b0a3ed3cb6bd88755b62d50a0e89639659813be86107a53f80293666126f0fe509f3ec491fc89aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d4d86d7f9cb996f2d63d4703102c0e0
SHA19c5a4df8148c891c8f18e115d04ab9403ca3a458
SHA25651799e4c078573c449dccf3272e6f343c50e6bee2e232a3a672e793e09ebd737
SHA5126ade488cf61bc5789ffa48906f983ced0d3c81c16b5763fa92053e1883cab5d42b90fee1ea1a92c528bf90a03afc6ddb493a17a330e7ae91b2a291d2eece22a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598e21e5f98b94f696c4954bc11c1b283
SHA1ba039bd9d0dc297287ee160610b19a31ee37f758
SHA25687bcf1c570367e7f8dd4e3d869a70899f414d4b622004dfbcb97c2cfc14afefc
SHA512a564d50d593bf277e4831884b87c12e916df1f2bf02a6590a7ece24463feedbf9a62a7f27b8f6d5345402a5a8caceb44494f8426b21bd4198ed67db444f8f64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5217fe01142267e8cbd0feebb587cd87a
SHA1506f648673a52fe4de4669f4a412c9f7cf9b2ea4
SHA256750b0830153026b7f9423b23311e616242f5123ff41438208892ed0feb31323e
SHA512ffc7e220f9e23c4a212dcf7eab66482c4f7f355b9faaa32c52ba2736031ac04499f6edb2d33777cf87e6f6a6d58d50d7e80a75a52af9df6f0b7d26530c3a1107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f85828ad9d9db7dd8ea1218bb2df433c
SHA1c337f8bff03b6992c9dda37610f71e6d15d03acd
SHA25647592eaf39728135b1bf5916c4060ba42ebd79961351ad04f1aeb3928bd0233b
SHA512cf1805ac7e4344af76e1e0efcce94530484d5672d34f6892559661e739f2cfc12f3a4d9983c644670f8fbb984e3dfe00b3da63c96992a5e25f4d2d9ee7a5459c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd49141c3bcd7b330b0b9dc63255522b
SHA17cb23b725be3f48e01300983e4bd566b62ef1be7
SHA256d00cb4a5ab7f2a6e10337a0e624cb7ccb107f5d0e81bc4a3b2f0352e3acb6e7e
SHA5129249ef8c9f9a61bedd00366410d9ad5523a10fcefd44807e96cc16bdb89dd505e0d5670eea9b10e9cb612f9b880709446e4967dcb6efb5d378d0df0538f579be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb6cd481a29408584e7919a5082c8940
SHA1aafdb0f50803676272ba5b88a9878efe85e9ad4b
SHA256a8ed22d28441415a5d6eb91c81249e87f55fe7b7b99fd636f0b9501355dc9f16
SHA5123be88d378473eb31ca8ecb0924e5f55346f98a21dd7d046a986bd922487a0483f639d763c5b3db8e37c5f1ceb8c0596c989a3fd8acb787e2fdd717041e01d099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cb9f668c2fa265957f7502b1e0bec50
SHA1ec5bc1c4a6d92a68d7dbd154562ca8f3d4770637
SHA256dcfd0be13691c342bac18bb16bb9ba18b00985cf2d8e3904293d70dbc175b185
SHA5128797188128b13e2c2c07396ed39923d4c00d7c75fd717e30ba0ebba45170d23d8e6eba0a255a2ef309ec4826367ca77e62a4c7d5c3d47fbe312ec5cc3d8ba064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5652f45e8091bf466d35bad77f94c00ab
SHA1f6fdb50a977b7ca81c9e0b4e851b4dcf97fe61f7
SHA256f55b97763b50b5f93772645941a06c7bd034650f18211300d8c2fd9a09c44fd3
SHA512cb02a936b53d9a4f0e136a267c37cc8c803e7d86f2ae89694267707beddf83751bf93811cd4985b92fa4985b242bc77e7da1d8a4f06dba16294b305abb99378a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564798a012830ed6d2105fcd646bd4840
SHA1e46c6f6aaae57ce3c43d88f4c2e9852051ca7a01
SHA256ea04d0dda2f1e554d926f9965bf56cbe6c5528d51b809a2e10057ba0e58e47eb
SHA512363d39174e9d472ef3bebab3074c9df1319e9e0fa4575864227f37231d522b84609d9ced45b7f564a175fcac65b6486c2d832e4f22ddc2e8145348614877d510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2a99b5c8ca7a0e8f265e9a31fdc4bc9
SHA1746bcc5d248401fbe4c8066cee5dbe234dcef27a
SHA25697ad39334323d430fbe4f2ec2ade50b05c9ddeb22cbaef3fee1ecf298efc9eb0
SHA51227c520327b22cf5aa6c7670e5dc36b1a9765080dc79c3d19d4801556ac8f8bfd38888fd9dc1a64c08ca59989d34ae3594aac098e23cea9c765349651d3bc10d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523ff1b5eeae5868302bd4c18bcdffd92
SHA1c2750b88d68db4be03e2b58b8b57875cb32be4cd
SHA256c54976f729f6ad35fdb8df5a2d321ab459b60966755a8cf4894acf5f0a4bfafe
SHA512d23a2f5e287cc7483fcefb27f3b2790f54ab040b11efef5386070305a3fb17f177c6459ed2c4c5f53aee0b62e6136e3bcdb6303447d2b5e1614e85ea30845c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb0a624c10ba50531bd17fe91f17afc5
SHA100a8ea91ec7d646feeb4e6cfe12790e01a8f303a
SHA256512a13f7235dd153f194b6654e4531052a1769593a85a63e1180c643420dff6f
SHA512dcac189c4abb6de08db069c0282a4fd9e14766d06205f7a0ecb8e588b1c98a9f7e046f925cf1f0e1ff311f5bb946e3f8f5fafb549debe6508dcdb25ec6d08e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1c2cb263d694e3a511e362e63479656
SHA1ed18476afd034e67166372d020ce8577980b2ca6
SHA256fcdfef96c95d08a393d2deb2cb6f810c2d261dc20407a43e0f9f945efda3cd6b
SHA512db74d5318a9bcedec6b4488f7878ac3057a90c36e98826ac8903ffcff478182b09bb6de38ed60e5fbc7f6219d78a094f444aef5a47303db50309915163ee8edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b88584fb5c08eafb4b3095076851e6a
SHA1c97e1aeed81748861e38485d6fac5b92869e7c63
SHA256515748c529c490e97ab845f398c90a2a9afd81a320d7b95de32abd8b09c40bbd
SHA512c2a66523c1d94cdd40633a0b8e7880382d2a51a7af5096819e465b5748a57904c8a39e7b6d355953f79f0b386595556a7fc3a84b38a9a30c48525d12dda12ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8536b8848568e8e552861e93f8558ef
SHA197e11c22a96c9e2331f81ce325cba0489eba77dd
SHA256b0bd7c36210251f255ff4a1f07d6cb0241ce2a59298a0c9e7adfcd18b6096f77
SHA51280a58f52643673c26aafca9207ca406b66e93ea0b98a6730cea5254785c0d6d238a0d15d827bbc1af36768bf2efd71bb5a2222366b996267c326f37f53aa48a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5517c0271247ff403d625f2415be2571c
SHA1356ca62ceffd3be734aff3bd401c01e85d38808d
SHA25629355f044922b142b5d0c673453f90d6038df8bb559a1a3d1e631efc66ce4419
SHA5122acafc8c25dcd63087d7975aced2653e5fd9d577157f62ff13763f21d0caf7ab18c6ecbeb28de1a8e9282285305d3e3c96f211d190dbe6453b8afa4f66449470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe030a6dfb59b94a00722cd391dc17bc
SHA1208c1fef265c8703193617baf86d2d6e0db6d915
SHA2569ec594828821b18fafd4a147656009be87f151d3d64ee097753057601f7d34c8
SHA512b88cd1d39332743fc658684ef90f5a68ed1ed37359011f3a4e1148c86846b4a25d102f5f9de1a17a19508a118bd8ebdc0a4b79448d130b0e39032ef57e7998be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e75f70c41ba66863278775ff385f185
SHA13cad50043d408c86c4a0af94a984407d22381098
SHA2564ccceeed9d1f137c34f88ce976da2c0cd53813e26d457ac8f465080c793c1e55
SHA5124ed3371e792d59a6694274cbffaf8d393e152255e248aa1cb4f1d90a5b7dd27b8823b8e297491877b56765589425b6fdd7dc7f309586dfd7753e669cca6597d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54915578db426b0adc8e9559c1fca8bcb
SHA1ea5ec0c17131153627bb25ca1f6794e60486baf6
SHA256b9742a89048337af55c5d8a7572d57ceca127969e5b211d6d2b154ab4708fef3
SHA512e19d6e712006b6b358575fc891bf4e884962292ad4689c9b71bcd9386c0e31967af627098dd1994b7a6deb4298f85f0cd389b9f47b3632aa2abca81223e2e9c8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a