Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
0288967c53f26dd4cbd4b8edea29ceb3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0288967c53f26dd4cbd4b8edea29ceb3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0288967c53f26dd4cbd4b8edea29ceb3_JaffaCakes118.html
-
Size
311KB
-
MD5
0288967c53f26dd4cbd4b8edea29ceb3
-
SHA1
d409dd23d57706779545a23bda4583fbdf67cf22
-
SHA256
fac2f4cf48f9e179c503d24d773bc26ad760d5639683c794c6579ad1cab57640
-
SHA512
aeb555593877a650255b6a79b2468695e923e938e81698d815c7257f13f6e31cfba051cfec8cc5407cb1f0d7845811813b094954724dcac68f5629a465a6ab4e
-
SSDEEP
3072:IcFFsfuPeeXeSkigWdHtPlKtE5Pdh1jV40VPNM87+PysZvcP5R2f5:IkFsfuPPXdNbh1jV40VPNM87OyKvcX2B
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57C13B51-0457-11EF-BECC-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420357732" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000210e1c3b3b0bf0be6f154bb1513d2ecf52b430b67d042461a8da8b77d737d894000000000e8000000002000020000000dda251902fa26ec110d55bf3747bd4c2be80c6822e3773e5561a8b841b82293320000000534c40184cdfc0503ba3e30aaf0e841313316fd5bf1094a67d109b00d1db931640000000c36a68bbc1e4032cd1da97d31e920736fcf15329b40122a76623e4f083d76deba0df9b613d52c7f630c02b38f66d1efbe1cbfe04c238847541abcc58c599194e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b4232c6498da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2852 2984 iexplore.exe 28 PID 2984 wrote to memory of 2852 2984 iexplore.exe 28 PID 2984 wrote to memory of 2852 2984 iexplore.exe 28 PID 2984 wrote to memory of 2852 2984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0288967c53f26dd4cbd4b8edea29ceb3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5393a0489643dff5d2d45c40d5107e050
SHA143bc09a67357ed287f69eea15210be43f0d989dc
SHA256e3d01cffaf0a8842cb1567355ae20d2c792aff1d5ea1afad35aaf9a98278386f
SHA5121ac33636062792dcafed0add677d20d64e1a7c6c7319575258eb42ea59cb7cc3cd59dd2c0806b13c300f5531ba4e8cee200bab87b3f82ead367f09522f1e4cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0097af209bf11b8ebc7271b3d104127
SHA1dd8f3513acfefb1b2364155578f8ad66b51eb2b0
SHA256d62e0233b2871fc05617cbd724cee8f7b9fbf9d57ab172b0e99195cfc181d629
SHA512e756d3f27ed9ab49281ecddc2daafbc38a65961f47554aa6db495e31e1752810774722d09746394146ed7b278cff9bbbcc3d0e021867afe1f72fbc7b45d5095e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1f2afc114a0000d435025bfa6015885
SHA16a321837d65368f54f5b612fd8bc3900b7648049
SHA256328a3d7d3c66fb917f6cf8879e64e334dacb9e2ae196855802f172279b203257
SHA512339ab2dd5bfb4183d51fbbc6a1c034c2116824f940eda8fa6d5adc40b7d96e58b55c0b5f583add7a8c2ddf7084d149c89530c72a4e5215adcd4077c32ddd287a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50caec029e72d24d79d514462f7d2e5db
SHA1c9bd1a3e344ff185ea010e3de243158935df3b6d
SHA2565af9e6ab1bdcb156f3de4caf8f1e17658798509b1ab19c0af47cd8a8ddaeb77e
SHA51202ca6e2c36520a2049c5c6089327a45ff4f3ed61e238a900640ae84b7ef07e7221c2144ed7d1767f876ccfdb05ecde3df18c4babe100791360ee12c6f8f0256c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcddf4de4ef11d64a40911af04a7403e
SHA13301d31923af99d267c367440ec75ee2d6754563
SHA2569fb1287b66d3455a6da253eb48e642badcef97ec2d4d4529e075ef8b4e385782
SHA512f9cebbf81a850988f4cbfbc80fd96dc35418ffd173dc695219e5ae5b43b01b149bc5dbd4fa690b9343b14cf0764587ed8fd6280f35430928eb2f7dbc4a76b7e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abb950db706127e90cc0ed1950c9cb4e
SHA19638f2790fb250310628807601fdf3a1f7c16189
SHA256c54abeedf06e6c132c356c38ad19183644c208e8f9569f46b981cbf59988ca64
SHA512fe9c86dd95b96b2058cbfec1e94bfd2b22ff7b3efb6cafc6eb6cba61ebe95ad66125aa4f354a68c0a02fe860e3db6b40adc29f59b01ce8c5d806b7383f31921d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ff9590ffe90ec79b59504d177f04bd2
SHA1828ff2b5f0cab99550a541aed544beb7cf52dbc0
SHA25672f11f9d453d63f698dbb1feaba9d560feefaa7a5d3f6c7d7da450f668a22d92
SHA5127cef7ddbc6e5d925135989e6ebcd06bd3cb645a8594e3f7cd47e17c041eb88b25343a2f7a3bfff36f8839341b65b66475ce34b676772f42619759aaf80fcc619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ec961aeff2bae6a849589908c64b060
SHA14f06ad5e0da28a9981637c80208c24ae48e1ba15
SHA256ee3206bb4fcfa38b16c293a03a933ad7f7dd291870e1c073cc26d4a6874d4491
SHA5123d7ac5be14913cda02e0be96a0702961069e23e7030657958ed8da5567cdc1ff54850a6d141ce82565c235bcae0b1f10bbca1a76a0d3e6051507939c42e29bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e8194102978c8348cb61df99b837c9e
SHA1c6ded2d1596dd356f475905586626c530d34828a
SHA256515cd598b902dd35920a0588e83b153de88f59824f5258addf28d0eddb9c41c9
SHA512a53f46055afdc518f68f158a121dbe7e8fc7138b0573d504b5fae4653995f3a58e265546b8f02090e41a38f4200dfe11fbe966207c552e070f8fe7c5b9cc9595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ba28443d0626605304c1aeb52c59605
SHA1e2f761b5ac7b00594e7f1f64cf5f01bbb50fbafb
SHA2566c96fe38261439204d01e5c8c41cc9329dc77131c3bddaea70fec8abd233a512
SHA51247354633a4e0f7d26fe7eece326c0360c25b5fbaf969f7cee6cf48c42794402e81da7f7e8a2553a1641bcc9abe3b6a829a285d1a7b081591968e26034bbe4412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa86b44d2697862526b2e1b7b85ac60e
SHA1197abb607f7877eb6878e3ac70dad40919e8d4c0
SHA256211f2f328bdcb1564dad0a7e2e377f06a845db5a0d23f174fcaebfb0c7a54d85
SHA512d835155e4c31746b19987c2103835f86d602947a350892742987f951590fd9a1b710995de124cbc2c861d4cb961678b4370a7a4154b88284efa878edbb4ce103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f7d784346231e6dc36403691f84be31
SHA1b66bcd3867dc0ec743292adb15d04dc36518e962
SHA256737fd86e2481a500603994750f24e831da53c0fa48f4ef0eab91acb3ee24e9fb
SHA5126cde3e425283d634c67f6322015d67ec124e32c60083ea8b3af983bc0aab8e86e710601419f314178e6a65f51277b1b68e0dd6fd2fc1eb8d9ff36c88d93f02e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545caa719222a9078981f52fba9e3ab79
SHA128570e49d48194faee67f2fc93765be9e91ef641
SHA25685e6a0522a2f58fb105c984a54ce71863d6136afb7ca4349c7266eba5c6168d2
SHA51210ff75e457cc0596736bdf20dda12439ad1265fb057d756f142edb4a472f5f4529e0c534ac2cfeca63f1e3262e82dbe097ebd361c3f158c0391133ef8940bb15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582087f363b9502b1433547e0dcb09174
SHA14cd3bfff6902aa8f5f58645e1dcde7e2421d823e
SHA256c126d13511b693d770cc8756416e32f7517c47f3cf898ad1b08363c9c5c8b795
SHA512337c32d2cd85771ffd0832b718ad82597d5d591b28773a0276b105b5f8faf2c1508193f4ad6c1c072aeae1db488f79a0b6245158926a3ec726ddbe540a939c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fc0700c4e733cbcf31347db18e9b291
SHA1d0cbf51113d06097b9587e70413dae50a9c5136c
SHA256e187ffda8936341f1e459f7a99460f5de7a06859c3acd70be3107a3f3d49d5b1
SHA512ea2a05cb824b0ccf7f59199bbdccfcbaa4fdd721645c333c2321b8ebf9634081be739abb045bf33c627fd701c99822fc0112a1d407b747b1a95d8c3877bc2a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56086d92f2d54db52696eab8ab8d08d9a
SHA15f6b32d1bffabbc6e4d05405bd7d1173aac5639d
SHA256c7a11a91f3149b8860211420cf5d411ad91a52e09ff7540b2a28a401c876977f
SHA51238620c2f3a2c6300fd692899ed789d9164cbe7ca953e9173d014c3f64653b4657c917f33b0a610f1e73bb68a04dacb1167c04c101326f82399946d7f83fd62f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591bd7b662d52b291de2a33cb627d4956
SHA106ca3a85a9a3b88fdb46954f6b758943b80857ba
SHA256cecb3e68355090a8eccb8500cba85e4bb07688ec8b0a4aa69e522a4810b65605
SHA5121da1df809507c21500cf442459ebc6ba69f6c91b344d6918af1f8ae7a44107ab53417fa7e425cfdcd8350fb38077172ca7ad89d346117217ebc5f1b48c6deb0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffd67e5780f30924fe71600908fd86bb
SHA1749eccf0a630920d6cf313406661acb4547a0ece
SHA256d28fd05218a56d737ddbc7d4862ccb18a07d252bf5f2db5cecc322b8cade0011
SHA51272e98c760e2123421b010e5cbbf8f38f36d8d6e3dd9c3b5ba9f50224eae666994541702ebed6e27db42eb767166c29ebc9261dad9a007bd71637f46a8413a9e3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a