Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 04:56
Static task
static1
Behavioral task
behavioral1
Sample
027902c1728efbdc867b0ea1f0500ccf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
027902c1728efbdc867b0ea1f0500ccf_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
027902c1728efbdc867b0ea1f0500ccf_JaffaCakes118.html
-
Size
15KB
-
MD5
027902c1728efbdc867b0ea1f0500ccf
-
SHA1
370d2648bb0ed367dc4abbdb55af2677f7cfa391
-
SHA256
87232c4653614a687396db4a23a473d1e1b78e037aab2cd6b538e913e7fa2f99
-
SHA512
7881fdff899f2746ede6447f9227c9bb13a4dae5cadb0519991e9341b8fc2a10af25f0038eb067e79100956853d9c02ac330fbbc2a443dbc10c6621be24cd1a0
-
SSDEEP
384:x5uw/TlivoTh48w4il9bvDAfqvuPrSaixWgWu:x5NEATh48w4il9bvDAfqv5aA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00347615f98da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420355673" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C835F81-0452-11EF-BD10-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000bffe47eaaac65f6eb8159da48db807cb3e0b3185575d775873f78b19f010c855000000000e80000000020000200000004af64649d3efadcaf267bb10defa75fb745e2eea6c21ec8a0a91146a99cee9c3200000006f988a446e778d709c14a9744c3343d3424c29889aca711d2830fc348dbcae284000000038983685f9f07ab6c47a4c983b2fe055acba0010d1067345e4afe438e8c732691a0fd89c167e0a96240db285c5768778cf20f145a6f9d9d09490e0d1e4ad0128 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2664 1948 iexplore.exe 28 PID 1948 wrote to memory of 2664 1948 iexplore.exe 28 PID 1948 wrote to memory of 2664 1948 iexplore.exe 28 PID 1948 wrote to memory of 2664 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\027902c1728efbdc867b0ea1f0500ccf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5249f4ae917064d6bf0e6b08bdf03455c
SHA147fe2a043af9840f7cac57debb0ec38ae5470fb9
SHA256c9ab72f5591dde2b38de1a7baade99716fb031d2a88a336cb10f8253468de1bc
SHA512d6cc5c15d589c567409a68d6037a5a56d4e7efe696e696d014088f92a9554c4178b74fb1170b33231d131bd69f638fcab824ad4c299bde929068f68dcf0d4268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d984df28399646fea4d55f388c7cdf2
SHA199d5a702995649e385c86cd5834dc01bea94c189
SHA2568b4e8e8dd71d03aa746084d9d388472994d08e7f9684b3216d380e4dde4f1a06
SHA512fabb7ce97c515abbd2875374c36541ae6906f0f20e496ff955b9c9ef1bae154546b3aaac4ecfdb344749353bef940d113934efa99d56e8c704954e637db9a244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58401aa94281e80e92622912a8e5ce452
SHA1b952ec032acf1a886fba0199751306fd1fac1b15
SHA256b2e1d3609a77284371d0f381d07054c8cdf5fc67616e859e0850cb671706b2a6
SHA512ca55f8a38ec21b7f92854fba159effa484cc359b8400b84a676ec6d5fc2c83e624576643cf2dea71ebef1097a8fe18bd606faa95c0f963e7f9c6b6b3edae069d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d910d4d456d19d71320e6f76d26143f2
SHA1d19f518e1a6e0f5e621fca09d6b8415059dcdd0f
SHA25628ad01837976b918e56944dfe4aa75fd0ba7647bcde19c1097ff0b279414aa25
SHA5120e4e180c6673904cd2d60c29b7cbaf34c13e30956cc8adda06b3f86caae21a0efcba40124437bcb858ad8fc4e3a96a9572d6fdd32323128fc8b1aafaeb329434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a2d9380abd04b465c2d448c0a4bb04d
SHA199c110854e2685c9f66c1f35f6fe401a4e81984e
SHA256a3ec3cb638c5c5cb03f6ac747ae5512ed7ac4bfdb9ca371baf710544322c854c
SHA512f97d3b59afd9e214415c3cd264caf005a541f81a5403e624004b5df1382a06c3fc7fd519ae41202889e0e538efb35faa0921fa40c8a7f16ef3ee52e0155f4777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f682f982e1c9bfbb8979471b77cdd1f7
SHA1270896dd76f9bc8ac88ac57901e0def992a31755
SHA2568aa215794abe46d3f98b215974a2fbfef1fc13dac70cb911cdf937e3cbda87d1
SHA512c0a950846a75585f6b7f3f293ff2c682cbb0c8eef2488c52fd3dafbc2c50b4370080b6a9a763180f6e8eacb56eb7b85587dc8c0cd4a6b57fc4dbb6f035a6e882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56744fb89786706a023367f4cd080b935
SHA170d9fdaec5e372a52be805d3476b798ca5386d22
SHA25633438c4c72ad865d9d3e899f3e5266c8ab9e214481dc538703aa20c7d3021514
SHA512c747b65b3754c1844cc3f047447c54805364340c566ac0370923f682e4e21cc92c72d66698e7aa30a0987321f357c26a64ec89d0d2a73f43421284156825cf85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5878a448b2a613847b0af7371636d0147
SHA18a3b4cf17cefc9866576b19c8e31ec4b948cab80
SHA256c1744c102de445ab01ecf8c920bc0c16a69641295d2e899e550a78715f2f8c4f
SHA512977d8d839b3db2671ba1cc505b000dcb832c0d65ea35fe2f900d6ae1068245125b94dd5621a6123d0a853aa9ddcf7858cfc5ef7d58a6cd7b19a64faab65e9cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0054da0bd5d1ea18fe0fd6cbb2825ef
SHA1a810a2a529c661278ebc744b0722d463e560f1bb
SHA256b645c91996d37ee3d126db5799dab31052d7314b7c262e9900540dfe8ffc891c
SHA5126fda7f987e44f4a7013c4dd8cb84705c719c515a966d8817b026d815bcafa50f207aab727d362e8be0b540215537ab49e10400def6dc2820283472a315069bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baf5634aa02c296f2f62a049cefca8c7
SHA1491170b5220e329f6072b79108502a5eacb91e5f
SHA25643437efac7e0498d1278fd1e9c77f84004c3bac0cbfccb6714f79b7213459f71
SHA512da60c49eb3e546fa6923feabc0159d2323b2c65a04aa51efbbab675915b2c7b001ee3510dd47fa9f56d9f38a22683f35521a8f2407d0b19c2aa370e2d050974c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b618a779989824503d64e4f6d0186100
SHA1d29f433052bde7c11c3555f1fa9ae79ae0eb9e09
SHA25605219bd8e7ace529831830ce33282ea9c152196066e485bc825ef38c0e1b27ac
SHA51235c92120ae5fda678306f58ea9360b1579b84d7f55d48e354ddea239e13c2396715217b760e757ba94d4d2674b34df075567aff8e9078f57d490017982c0c3de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509001134fa0cae5c9df28a134264fd15
SHA16efdbdeb5ad9b64dfbbe7e3d3151c7c9d3c55873
SHA256511b5adce75ac067f82affb8d001b6b973465f3a069b0951948d163a49b48d02
SHA5129f61f01afcef480b004778a2433c4f9c92544351f3105956118c4781a64f7638549c380fc10a93b5b3d1c0ccdbbf68f8be07851a28563e7a38d1d7b8d0c48c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdd0dba2a99ba2b00392c8265583398a
SHA176bdf570535aabe448222fc7cecc6999852284b2
SHA2561a8cfd15236b1b0c41e521374c474ec50c486c550e1716b9982745a97764878f
SHA512c64bbfcbe0c4027156a1753e0b4cdd3ba487c6fc8b65cbb550ca9c4453991710eeda02f033f437fb83ec0b6c528c132d29e23dc8e4102030c5a9180bb2420996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53122b0ed5dade3ebc40c025e063dd5b1
SHA1c5e2698e5215e67da41601754a49b7996188b2bc
SHA2566386ea4bee8b992ff6c668d4baa9a42278e840c91f2c871afa6a3e4c76463402
SHA512f74fa123fd7cd9a080ec3151c17f7538b2abfcdea2db672e03820580252706831cab6ec44b9600e6ea063b8c49ae819e4304264a54f96c58a441194408ec79ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f253bf76462f9bf7aabd9f7f86c88cad
SHA1a1596243b1a4f424d53ad176dff053d8a380e5f7
SHA2566be2cd3b14917af1b89d09b9b8d0304ae140a6433de3892cadaacfdbe6f2ad83
SHA51231291e91bb77697d1bd95185977b912cb0fc098279d8c55162407b2c4986880eb71b70a3bf18d7be2e7b1cd1b0b6a881177beedf56b26cc610494ecd8f7f2932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5914bc3cb43cf35b6d815cbd52a78f00b
SHA167d6855986a823c7f630f48fa04590717e8898a0
SHA256324645ae8e886d2849edd40cc87c0b3999eb8e67d6d811e83afce4b2a07d07d5
SHA5122ca73eed0e798df9e77f671705292394dcad2323c613b6e91d7e8f668d0bd1ae782a45c6ce13af32195ba059ca6ba2bdb85bc52a69e7c3d581874c17c148b7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3e94570dad3dbf3a2911c14c297d3b3
SHA16f4e0f82a272a8f9989a4a3ec72b304b6f4013a1
SHA2566d6c983e5f2bd9ba86426fa4d48f9d36e2416838bf650c0bd1b84257aec3dbb0
SHA5125e9139ca7a4bc98c12b34ea21223aaa068b874086d31bff35e6fe275dd2d877921c0ccdc32419106ad17318f8374225e48ff283d255e5486be9e0f3ef032fd05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5220f2d5ee683d096fa9ee23976f29683
SHA15b13ae545ac237ec2f1d1757882bb0136323246f
SHA256a627f4b27ba619581b47612b3521d535c8df580f48e7ac5e3e69eb49a75ced6e
SHA5126712c1ed703a6fcccc1c6fa8aa992e2bc3dd58a4b474953f0d0261067732db4dab85398e8f980314feee97d4090c2a29d6bee62fde09abcda50f4f71faaca9e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc68bd3f63d1c6d1be070419096c7fa7
SHA164e042b3a5e425da1317d133851f84b0da380687
SHA256ea8f32295fef1cefafdc5f34be495295b400cc58775c75ed4fdb20657938e160
SHA512d4491d21ac946ad99a787c56dd326651947c2a5833687eba26a430b86b10484927209add7c34cfbeb68087a9118b29945dd8599d7c1f8c5423b9f60db8801e78
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a