Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
0270ea46b99af85e5acdc625e428468a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0270ea46b99af85e5acdc625e428468a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0270ea46b99af85e5acdc625e428468a_JaffaCakes118.html
-
Size
70KB
-
MD5
0270ea46b99af85e5acdc625e428468a
-
SHA1
d14877f5018d3fb25e3bce7bcb4e7398e6c04d78
-
SHA256
2aa9da6c9f0a9433f96b7f9fe7292e3d664c9650e8fbf42fc2a35c68c42b753a
-
SHA512
23c0512eef510416f95565bebcbedf8444cf4a419003a13dddf325af703526eaa1aedfec83c15f924eeb8bc8c965e7650b91d6db8efcd45c206663b3c29127cc
-
SSDEEP
768:Ji9ggcMiR3sI2PDDnX0g6sm6jwAYA2qoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpq:J6MXnTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000095ff997db519e557e227c8223f6338f73b0bad116a2ac39d651c8a1395acef6c000000000e800000000200002000000010b3c3d0f21e44bf5cbf7da58dbc0723b75ae8ce1797acf3f79b2ccc48fc58da200000001cc5b6547e4da9e63765043cea57a8e96dfb97df552acf155fee97fb6b2e045d4000000034bfed1be5e330a5101326a716a7e522b75b0f018c382fb6a295704923f268dc83fff476b3581f3d2aae48c6384b8daf95d030c27ca392e4da550afda80ce930 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420354691" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{429839B1-0450-11EF-B33C-C2439ED6A8FF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304849175d98da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2372 3028 iexplore.exe 28 PID 3028 wrote to memory of 2372 3028 iexplore.exe 28 PID 3028 wrote to memory of 2372 3028 iexplore.exe 28 PID 3028 wrote to memory of 2372 3028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0270ea46b99af85e5acdc625e428468a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f53f8342db8bb809f265f078c30420e9
SHA16691a3acf101a43ff24f1e93a3c41f2ebbd7a2a3
SHA256f0c00df8fac5578f15530e2ee7280b577be9b9d868357eb7b15d4d6c827c410f
SHA51249f0ca4e1e7d917a8fa485e4d5dbe846da4466e890b4b0a3896aadd7e9b12a1a3cf80e17b7997c6980ff0aa8978ae75cffb42100c47fc827869af452bc265eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598df244a8632db6c7338f29ad1b999d3
SHA1e5224776194da1614069af94536b0338e2b2cc64
SHA256ed5ede85512fa79e4058b32f10cd1be43a6c4c3006bb4d48c00c2762b6c9e35e
SHA51251a4466ab225355c4519a0a8d7b6661b85127558ffde548bd2c70394cab1970b4283a9a090cfb67149d6da1830fb57640be3c6b26b76b833f7f74ef66401e2f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591b4205d97316006264bfde06434f66c
SHA1e07ab9a6e5fe7fc5789d25ee8cff7fdd05723119
SHA25646f6d4184641ea3ec53c80fb18ba130159cd308356846ef22b8a731cc22e3920
SHA512d841960ea934fa311797e034297fb6d5903778ba0fd3aab0f7f0f361b3d54a4956a5c8b8aa1abfde388c0ed7bc80f8422af5a8972a9fae69aac3287684f53323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5199b5a7b05f4715a1119a329272ec4e6
SHA160e14ce08c6f899b792e1219276b244afe6e916f
SHA25681b0403afda35af0409ea2e00b5711a523789e6676c7cda29547c5a6d8122709
SHA512ab99cc9d9921e658cfd72c8c266f22a6bcad4217b688e6bb3015fb82fc493b165f0ad6333a147b10474b7b8c98270a32789e52996c08a534a2a837bc0d42d8d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e285194f7b1b2871e001f1c1407e3fc4
SHA128c3dbe98b0b0f43879b566a38507a9e9dee3a66
SHA256c14c9be3a1ff8bf98e2192159d5ac855deecf14e2bcd96533a84e34809ca02b6
SHA51230604b249bb518dc7cedc84254cb7bd965b942b8d80ae19235e3d3304476d8dfab60c7f7d7e162149f3266ffec53d74afb96d1c19b3c781467b7004903486154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e3c20d9682e40919b8286b33d269db6
SHA12fee13d06cc570d140a84d3c1a72ddd48d7ebbab
SHA25652166ecc1ba6ab1b510e952908499a74a5a48a876c05ddebed40d2c8fd6c38a4
SHA512194c8e5912e2a7b09341023bc29888d00455cef46acaafc567bfbc15da47c5354b89a587313b544607948356beed42216ff09a26fe1d04ac1750a605eb4d06ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2a3a00020d0b5a08da4d13bf608ef61
SHA1ef6aaf3251f65bd78d730b7fa0f7cbceebb6ee55
SHA2561643aec06aee9b30b888ad7543b7770f1fc3d484d8a552d64a9e853fe670289c
SHA512491f4ecdcf9d2c22858d41e4c9e55afb726dace3c7686375249d95a9a3d781c920654bb9d8cad517875ce26746fe819227e4b973557afe4343b39024bbfa0f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2461eaf72529476287e7cf432a9c9f9
SHA1beaccc0e0c8488932a0d84e32cbfca3b2fc741c8
SHA2560c3d93e5c90b0e620a92e39aeacdd46db354a7dc20c4deafac1844aa8f45cc4f
SHA5126d38be7bbca4be4e4026dab96a39be80d96324fe7222c95230ceba076d8c6454b728e5ecc0b064e938602fdb3db6302050a2f82c7b88437ee9d8a00612af73a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1b38fc23540a1dcc69563f32b8ac1b6
SHA159027a95003e50eb4ec313a41ec69004cbb4991e
SHA2566f541b8b3582e9623914d7f502f0bc3200920f04880c1abd5162eb2c8d70eb79
SHA5120c10a704d91fba308bc556a28b49d3d724f4aca8df5e67629197cfd76bfad3c09916b340e122482f6d5849bf188e08b9caeb7677b6a83b6a5bb9c70f75541df9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c354c7f31c7e468c9b04b8f76c2f60b
SHA1b127b24566739a0405f25cd052b3576202551022
SHA2567eef5565316bfd823e65c045e78db6de45f6e9e892b629e4920a6d8e83d0b904
SHA5123bb6bce1eeee9a4bd5adfde8089793b1ae4a760168358a882174be696cd2b3d0523db8bd122d81f9c3aeb0b75ddb4b155fc7f4b026f9be5aff6069f023b7dada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50724ba6abe386d4f9bb2c3f7684196d3
SHA186f3923e8d1652a94c53ecb23ae2be6b4b146a37
SHA256c60823287b4a4648b07dc145210165ab915db38632a23a836b597dfde8915b1b
SHA512fd021b029caca95b473368e1b80887027456f5376cdf9e943f64ee165a1e77e4ae6f3f4f653e8e4008573f9c35cbaa7d81618c50087b8cacafc5d7035f891b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514e31284ea39cd71c94d525aca9e1c3a
SHA1e0feff3dc39248d8b368c80f5b5fe6de127942fa
SHA256ec41058716c0d360aab9fd7272512b9fc3e1021714313562b4f65f1d7ccc03c3
SHA5126f7562fceea474be4192ac55b4eb7e7cbb6a1ceffb9146122ecb36edf29775f63808eb6011bc27a960c4dfe55e20a24ed8effeaf8f4d75b3a69ce5958ba21465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5182334ed792ad1efa53e8de0d76e24f5
SHA1e092795a3215b4ae56cd511f3364773eecd8e137
SHA25602f5c86306d6eefb7ee09e4c8e9c86d068758885498f9cb695b4787039f290a2
SHA51238a5bda0a7552c060f0ec97e30d535d6eef8d398e87106288ab86e2971987bd9fba10ff0a174ab3ee51091bccfcd6ad3e254aa853879649262d6b1422d039fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5461805459a3b90ffd350f55ec956d41d
SHA162c6fc2c85331c25cea1acdac984b1a5c4851d5a
SHA2563a5bf4ebeebb4012c52d36005d590567c1b5f8a7b2142f122441e37c0decf929
SHA51285e8e8a46c4c5e88aee2812fb875c25c36f46def19bb10056216d759e5b7c5a398a182007ad2905011208b679d69e6f523c13bdf4cc9a2d549297636b7d3570b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8e70bcb721504956b4fbd1f6e71ea5d
SHA12a9b6c5ff6144dd7335d8ce51e29c7e77a9706b4
SHA256a1ebac61808eef1c8b45405a89ffe04dd247f363b26697dcd96a02bf210defe5
SHA512da63642e89efba868312abf0a141f36ec6d85bd954e3454a045591d638365a0069316fc3a76b8beb673dcd1b78a83f376a1935c87140a98588b76571d57cf7fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2f3e6c0ca40c955706b35c688807225
SHA10eda5d86ade1d64bc8ed76bcd74ee523ef25536e
SHA25681e06917b4e9beec3531fdef6e17656337fd00725b96e0cc54b1f1553a09fadb
SHA512b5795dbab3d5e0511c799031c084fba0cc5721dfb4c87c48b686129f328beef452d851e0dca0c69bf4978b2d7c018e9c6f26d35d45999beceadedf3ca5870dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1c46c39f5ea406c86e281d76315b11a
SHA1b25a7723ebd2a23e81814c840d364700529b0279
SHA256d43cf73708452917fbc7add614107960006364fa1ae0b4118e2b47bb936d734c
SHA51268d68a14e3ac35f7d9e47175598a867ce15e1e1e79e5377be6f36727c2f1e5a36fa724b6f8669e95f3b558b8464766ed7388a5efbf2502b1843235183eff4a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534da7321df6c94574e1e668213869f8c
SHA1905cf40c20318c4bb05aeda95ec4e7840d9199cf
SHA256fcbc3f237ef9922046fad2b178b176a25eddf475567f0120701df5730dcd2da1
SHA51268dec0dff709b7f95c9645246ef1fc68295ff582f5762ca277c1f76cdb3336fb32632c02f11e5863834d4efef171176210adb2e1557203362e1a229feea94a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529ccf905b16311c5eaf5af983d98c087
SHA18f66101ba5599507ddc0a71bef4a535fbbc81223
SHA256f3c90e1b9eaf235184f69bf3018c9abcf756c4bf270d358b00c6005579c938a4
SHA51236b957b84970f013b2c5d686c2807d3766e0de7c0a6ae2eb908c824d03b9d1f83ddd22670f66927d9338a44cfc164729e0398309b9d5e1c6dcf50acf5f3b7635
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a