Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 09:32
Static task
static1
Behavioral task
behavioral1
Sample
02f22519b1c35d3480d15c0e945f9672_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
02f22519b1c35d3480d15c0e945f9672_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
02f22519b1c35d3480d15c0e945f9672_JaffaCakes118.html
-
Size
12KB
-
MD5
02f22519b1c35d3480d15c0e945f9672
-
SHA1
cd081264f64c3f54e61e7f7744e319d4deea7fd4
-
SHA256
477c824b6659c4a92b2f93bc67a527615f0e677eff48d26240a1a196b5642c1f
-
SHA512
8b11b63b75807629259e2e1036e48882b5011dfeab341e52d979abcd5a45369dc841eff0d0cefd4c856fd35a923e137cea4d83e6e8535827e579c45e8c4a9124
-
SSDEEP
192:oRaDyQGT/aHa3tLXTRU525g4VK2rBTfB+TSB0qhZSDuphY:oRaDydTTDRVKwBTfBOSB0qhYEC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000b488aa87fb74eea578e5844d468d5fab3cb02dc42e21a2a4819af452ceb890ac000000000e80000000020000200000009a631d8033400c66ed3f8f8e9a2cbbe4dc701b31693fd3eec62bfadeade7553b2000000080fa33cecd200a31a6fd149e5d7f8e8b7cf14da731a26dcff9e57986bcf3defe40000000b80adc174540715670e90b868fb48debf72dae8ee9c02cc16bfe10fbd97585b8e7df0dd48f3d7c99dd8016cf53519123cfc9dd12dad54a0a4e7ed2180f4ee1d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{18103521-0479-11EF-AD30-660F20EB2E2E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420372228" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0790aed8598da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2080 1992 iexplore.exe 28 PID 1992 wrote to memory of 2080 1992 iexplore.exe 28 PID 1992 wrote to memory of 2080 1992 iexplore.exe 28 PID 1992 wrote to memory of 2080 1992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\02f22519b1c35d3480d15c0e945f9672_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae370f2ea2fd418d87a98a3da0005bea
SHA1c90b64bc2c2202fd3bf74e535de367dadaa7e024
SHA256aab5c917ea85069d0af0958d4a3699b7c5c5da70360bb09d5f2cc69891263d7b
SHA5124ea4854ef57d7e9bd5b840011fdafe44db60a98e0a3a9509c2a01c8542de9d23e1eda2f726c856f0ac125e71d98ebea441edf21e5f36332045949f10e6173846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c295caeb00f36fb7cc16c501b95f2deb
SHA19bf12b708e92cc6f4b42940d9fa7cb545ed41a59
SHA256250e38383a46e28f8971273308de56878329e728966b5ed6234cc1ef123fe8db
SHA512052af24338457f4e1f2f06b86302fceaa5f5a575665b0268ac0c2649298081d953b13decac4edfea6d654850269b760977594f0039e258e1e90cec8f233f489a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579db92c184e0aefaf5bb5b97140e2c15
SHA123949939eb7f508fe6722eed14131f26479b396a
SHA256245a2c70365b6e3e43eb23aef8b25b2d1c5dfb3522b84061a982118b633c6159
SHA512040ebfa798cea38f4b739fc4582dd0cfff74f1f4e0407b0df7ac2be852bd9c8585f59d96a03df1105fd4d6ebd3d885399bd2bcd66ee4a5efad30fb398f34dabc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a55dd007d623b82a4a7b12ebbf8d4c66
SHA1f3b9b710bc2aae9a456c9814cbea435a74c30029
SHA25646045e47d12606d76c5f56eb6fc12cf7e2678e6e74c6299791aff91709b4fa4b
SHA512897611cf5619b8964367450ce568e541974f7da0ee4cab376572808b2f7f7523a92e2683117a9bd9026adfd7089a92e15aeebb6c0d9e0099689118b2e8240b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b8e3f3eb5ec78ebe12311aea605d765
SHA104104e61c1ff3a423d3458046dc2f379e5399949
SHA256f3917d5ec49566884c9a1919ddab66d136ed8eeab65fd3d54a6c5689c23593f2
SHA5123474efd59e048ad027a63fa414a2aacefc0260266c9dd92eb7a623d3a5cc589a471ec06eeb6dae8ff68890ced62e9dbcaf75608227469c55e6bb9e012faa9014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b5405ef6f3dfd1b1a37aec88b130534
SHA1686b0da42e7b2bc79aab5a682d3031b42bb49fe8
SHA256fce2392b2f5a97c06ce6513abceff2a8a07873573d16452f4083a91bb18f26b9
SHA512bfd5bd3a93431c36ed0086363ebb8cd869ec851769928bab43e2a1ae4ff12eab92957eaf49ed4efeab2e4a684e006aa6613b8477ca5bebbbcd346413219a7780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b390dc8706b4f8024e64917a91a6157
SHA1c97f98795da54b37a7bc9aa9af2540b189f7f1a8
SHA2568da1d236be404f0c9c9a4b3049ec57c7cc27533e0746fe017ad23dc523348067
SHA5124f777fef4568d5475c97cc5b1b3e42a5bf44eb3aad4257061d9cb8981c9162a078fb477af34ce28433a6a61b6ad8f3bbdbd96e440c3e6c4130094e03f292bc98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5855ba9d5d573b57a193d5686a5dafe38
SHA180b93d46b6f394e543d1c4ab7382979a4d26326a
SHA25644fa4e57877105eb2eacb90b1523cc4999bbb5243009b1450f6a626d28cf205d
SHA5121d1a4862ce2c864546f37afc2226847956170683caa8d081185d7664d0952a977f7f8930ef902a77cb28c8876bc3417ab381b44183bb71479a7d648f38fee6bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4a19853dcf106511eda22bc7f2fcb7f
SHA1bcc4bd50bb5b5697e70d0f77a25476eb5080b64b
SHA256dca1788760bc8785ab42e4ca49ad6ba69feb99e3e1f409be0dea88a29f01d725
SHA512a09c1eb0f523a00560ea17092c9ab379e53acf19f442fab294bca2cc9af1ef9f1d23e97bace254f620cb5ea41c932fb87903867ad2674ab29ced43c3db0024cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad3a7624e206929c41151b879ffacfd5
SHA1186640b793e82e022ba1b205ed67b093abada7e2
SHA256a3f39dbdc0260ff6f87685241e99816bb3dc8b143b1d26be3e662041957e58e3
SHA512286e722af591e68e8b99fcb5ac76792ad1d41195bf50edd74a51afd275f8d52ec3cdb8f8c0675ec88bc8071b2c840ecee406acd53af1a62e6fe36d5ebbba1a02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5181e1fb0a0bab828755b5433218b1bbb
SHA1ee3bf113ccd08b773ffd372580ae01a37f0e3b82
SHA256520e4dbcaf108ab1d9ba20b604b66a1e13f44d42a630412cfabe4dac6047b9dc
SHA512b9a3e887d77334a55ad3e685915bc630e05d6f4799e028e4a19a6d3a2556ef140f32676ae9a5d65342c595df3377e6db0a3975539150a3849e8296914c13ab89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4b71fbcbf3af2622a73e30c2e7e4c45
SHA12e15b9f3c951242a1ea2dc3f5942fef98c1b1065
SHA256c926a2b7c2ecfda5f2a9c452b1c73d98e6e2e5dc123ff08905fff2fb4ca15cca
SHA512fa9920b99336afc5c8fe40843aa7c6b7d0cf011b0cb6e1127a9b0aa47355194ae4322539b076d89693f3e0b6368541a78081701648e8caada35349840b0c8a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54899e1aab420e0981211abb85e1157f6
SHA11cecc3af9b8ec35dfc530208e78d067ca5bb1a93
SHA256c441c0ab3aee5d03f52a47878473d5b255c85f5f2d38db406e070b177dc6dc24
SHA512401c7e1b3b9ac7ce854b72c9c7b5d00faa2bc28f111360c399bab60ba18e00c0c4587c68354a01fa805c64646bd6dfcbee74edd2a058ec6deb09fb4d34c3465d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf9808ac948bb2a325c81a9e273c42e4
SHA1182d8dd30da8783c67827ccdede6f98ee2c1d71f
SHA256a75a179acfd8766125c27a51b586a4556b7fc6546e3a6300f391ef4e77e3d6f1
SHA51229c7ed391cd057fa1b6aaf0f596977641e4142a315f60bb3bde8e6ae81a5af4bb653f47e6aa22643401c2da595de3d33895ee5b2f15be7c8bf7b91b8f5385d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8ecebb093d1f8f942ed473e98b80d55
SHA1be710f68ed391a2ee491f7346b64f84008c619e4
SHA256c55936d6fcab78038135eb17a55771c3f1c55d96b503b5473364a02458ae8f79
SHA512eedae20b349fb61c2595564f3268c857337c01e7d0cc3f77d36ee02f8d800fe7c5950499c657bab8398e91a1a29206c25b26c52838a595b9b37ba738065d2f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516ed2801c455afb1cff3cf325e966fc5
SHA18a50dc44ce17001cdb7cf40fe4aec64323a3ed22
SHA256b64a3b45d4a480af225a536b25604f5412c930baa865d243cbb0d2e0b9bf8072
SHA512bff4784f438232c70972e45e348b5b35565a14b96d795f529e736a9890e52ed3727bec168b436fd8eb2d1d12fece9ef5536d93cb53d1904559de67e25182eb6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df714fb42b2321741d62d930dd3c4f2f
SHA1624c1e546d639fa13f6609bde77b736cde1c016e
SHA2569bef45b6d3e0837eee6d3376301f59d9793b59943c50d7822afb60442f3aec7d
SHA512b2e916b738a28f0dce11acc9266b64755159437f455dc120cc0183fdfb55e25d988d29d99fdd234acfee97e2252afef670ef04ccc0d132ec9513b96711dfd91e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a85b034e284c1fdb28587f1f523ca6a5
SHA1ce505e5138d620ae5b6df3fe0323079a6de355c4
SHA2562ba185f10a88d0cb3616a0ee4a576fb3d3629eef1e9e0ee9009437f420b3ffbe
SHA512017cb876c7c3159b51ac038ab54e072320b02fb60865589ec485453f7951eeb3eaea77abba6395eee2c6804bea4d644753c8af578cc6a0c485daeeab52be13e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f409a87382e38f71caf11f56c4ad1479
SHA1481c4700ee65f16cd58d2819471501bd9942eafa
SHA256668d087cc5783226873cb841ad1dc9d2ec4f036c245b18cc048f22dd94141f65
SHA5124432459735a2c073833a75bc5cb48866b9432cc11af697211d8edc2035fca2d82069301f018ff4f2186b3eb6391b8611fd74bf082d2e9098d86c1282c378a761
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a