Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
031654073992dd38cf76d96b2e67d6ec_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
031654073992dd38cf76d96b2e67d6ec_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
031654073992dd38cf76d96b2e67d6ec_JaffaCakes118.html
-
Size
13KB
-
MD5
031654073992dd38cf76d96b2e67d6ec
-
SHA1
32a3b447e6c23ebe2bbd93bd87b0c4dc3095f17d
-
SHA256
327a1394994fda7cbcdeb75b7b55517f0e01feb061bcc142fb52eba7d9800ef1
-
SHA512
80deacf11686d8f924a3aa010b235c318adc750c331b92d6a8d342c22c993cb571d4ec8dd564d2907f4924e9d1ce2817df9e66298b1dd7a1fbc27f9f3566128d
-
SSDEEP
384:CyiWyXU5q/dRmC0uRmCSdqhAi7hy1wjPMph2n5NvfYCp2y9Dg6Bht:CyiWyXUYdD1DSdqhAi7hIaPMpMDv3p2W
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000d09d1488b31c1d9403e6c832435978424e5f379cfde49d6b9734f08e00d58e67000000000e8000000002000020000000137ed41b6a1cfefa0faf75eb3b05dee5945d45e71a3438007ce5d11bcd60208b20000000fab51db611308b524fa19b217302de18f2dd97754652ded312415e3cb2e88038400000004672ff08c9e5e5ad5e011d6a914a2665d5f5374b3a36e145288f66034417a8192ca0b0ef550bf5a41fcaa5c8d7eed88ac149c8edea648457e9f60e91de685cb9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{578CEB71-0484-11EF-92B8-52226696DE45} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70cccc2c9198da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420377059" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2768 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2768 iexplore.exe 2768 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2576 2768 iexplore.exe 28 PID 2768 wrote to memory of 2576 2768 iexplore.exe 28 PID 2768 wrote to memory of 2576 2768 iexplore.exe 28 PID 2768 wrote to memory of 2576 2768 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\031654073992dd38cf76d96b2e67d6ec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f66977ba20a178375bf1e7fdef2622a3
SHA1ef98edfda7acf31b47cbd6b7eca9b479d2b79c9f
SHA25682d845aa5ad9fc619e3d2d8dd60cd6808edd698588886f89d4409fa07a3173fd
SHA512a07efbb45e059a1c33315d93d24f9a1b8458cb26765e4b76a3ac1bb3c940e70d16dbee8f8434929eba6c51c2e3f511175ac432374e1ea7d0e6b1568d527f0e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54504a3814234412cabcc1a5c7587ca0b
SHA1b3053bb8767c1e2faf088807aa78c2f03a9d0f35
SHA256efb74e7932663e47c32832fa9d6e2cbced16fd01e08589bdc765757bc0ef4c86
SHA5129b9a4ec124bfb053ed09316a80c435fd6531f58be97e6eb3d7d7a136406fb8fc80215cd1e4bf690c86690942fcd1d54d3c95bbbc98b36de7a4900390799b24d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57083eb767b68322784e72f9ec797a13d
SHA17da4b566dfa51a2155f55f6cb0373b24fd7fcb8f
SHA2562a1ed370b15e378ab690cde1256ebe3dd2365ca433346e7f7efeacd8fb1dccdf
SHA51248a7a21c8eeb59a7517de4c07d336ec4c66f994398fcd3eba5704d929f789e587ef6f287d91fbe3921db548b95db4be59e3128ec59d317188e970d6f519236a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507d219cde85b10a0babcfdde95ad987f
SHA1bff0f54735ef5154cae8a4c5d0ddf14c4244b565
SHA256a54b73e4e28c1aba94d91560179a013cff8e82824d6915956eb317cf34ae4554
SHA5124dff305f676e17424f241ed48336dd74c9106a55c2df05f355a9cd884f18e0268f023bbae44c507711a43f63587f4f1bede5a45b1288cbbe851aab1cb8578aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b412ac4dcf5ae1c7e767f4dbbb980097
SHA157b95705e273702d1ea493497a818e80181eee7b
SHA25694a0a73058b5c23e9cf778f5a7842d6866c876500ba914a8681bab2645bae64f
SHA5121362821bb003a458ead6bd3b8603a56762c36288a79d720eb31fdfcddab67ff39a724226a3892316194f61851b74fa5adfbad1938b5ab0578a54efc28785de6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b135323a506d1018399aa81f6ae5c866
SHA19fa20b6af04b3952b85e766fd60874203dead7be
SHA256d174e0cd36401ab23942fa6b70a2d6375e83a086acc166ecfcf129937363f5bf
SHA5128ca30ed5ad297560a93412f22dc3c97ec5d67790cd1d273369a85d106b8c6e39c5b7e690cc63641f59dd79268428c935b3fe176e7a1414784603852251eb49de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d50fa2f7a71635f3449b37ae36b6cea
SHA10d503dc66ef4681ce80bdce773113b955b83d90d
SHA2563d03fc9d4b976ebe5dfefa9ff39d5b21860725bd8b89b099cbd5faea60fc387c
SHA51254d5b501381fb781743a797850d2b4158efa1b1ba2642b83b34128ba435e334d9121dd030d19148d97b11e4a71eebc07bb025df7ab9e8c7cba88a2aca9635e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55958e2cf731140acad5db1330dd3e154
SHA1fa763129bd4c39a2cda7803a267a5f805c20cc98
SHA256d212f38e327d964fef46c80c01811d1b4b480bb6e00e368dcd10f20e8f5c3a13
SHA512deebdb580b192d4f121d743098e24c92b77d7ec2c3a0521c820f9f0ed86c4aa1e9494744a46ca555ffe7043f2322b0136314b100d0be6bdd791e4d8651eee277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b626004fb4c71e892e7781136572b9c
SHA13152e78fe6016220e2143d756e559daa8cc37f2a
SHA2565da52186a8fd54787b82c79aee2c3f5ba72de8e9fb4a37f33ae5c3795a3e2537
SHA5125620d768c6a78bb0461c69ccb3dc99109702b92f450ada8bf8ea91137699b28b330c7594eec4a9a3fd8182f23fdd08a4fa6099d63a2410f4ce94e87cbcc590e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5002c9475536fef41883f79696b202b31
SHA128accd5c6ba1ff40f204319930f16c99ffb70601
SHA25651e88ddf9cd5d937a0607ccd4257d2c3cb25d818e7a0b53e29e0cbdd3ff98748
SHA512346c0be94a93a82fa0acde82b64e8213b24d82771a52ccf903e64610dc79f5df9d062aa1ab21575d5c26bd21a94652dacd3690600252aeaabab8b2ac36bc6289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f31cb4b7e54274a375af63360f64e468
SHA16230a82d019fd368d2e93fa8a22ad09682069013
SHA256535c85c80b89133fe604d547f32299610b59a5a3f41026c66b117aec0e34b20b
SHA5124bb445764cb44d865669103d98b31e0aa6b1c84d4e854f662c9148ae30cdf6fcb453b9360ff2f822925ceb5835640a21bff7758adefc58e0ac00b5f7d4803cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510f983cda3240869ed3176087b1f864c
SHA1c5581b3b1a023b38699fec9f7a430eca4e20cab1
SHA256216f3bc7f98ff7092cde8309d3fb52afbe88d0f98f40c8329a50b2e7b597542e
SHA51259c4415dd2ef1a039054114531e188c1e19f8612a881d669d13272a3f936bd41181db837566314033858db93cf94d072181b3e0b7e32ca50be86a5c1879feee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517d72ab074e09a72f31a154d91655243
SHA11bd724a4c6185d5d4388ab1eaf21cad710ad11bd
SHA256dc902ccc05ac0864d26da1eb404b0458f4d1ff0e53878a68fab2fbba540ae450
SHA512f278c55ac8b28e8d034a2f19ae656b086ec10a16fb6350c3267e1cae4f77dae9025fb428823d15f9de98e6143930ca4d57545f4b44249b411cd3541776b4e1f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539813d3c3a7183551c9e52cccbdd0f71
SHA1f5f29a2876724f6d68573466d376389ca18b1725
SHA256ac967a893883d31b4a2084ca817d9eb8158c51c5dafa7c8718973dd767c813ac
SHA512fbcc54e5f876023854afa55e3097f294548780d27c1fde522e21d54ece4b3d0aeded963e1ef04d976345e3fea0df7528cfe11abb5631be7c27f65f1a903ba601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef80422612b368564e3fea8749ba877a
SHA1cdcaf7fdd576702321cc58554e52ea061557efdd
SHA256e2fe3210844a934445d86b99f0c1416694a5e8161e8b947b921f56c1a7f17aa6
SHA5128b1f4d45a8050ce8216455627e364c8972a0f9efa0104cc1b6eb31f3a454f7c1c1e625ccef9905354e92f384e8321f3d1583de709e4387f470365ca28b893249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d028114bf5986aaa62635e874d5318b0
SHA1e6c66f3453baf7f5ed8baf6ca7e96cb9af0cdf2f
SHA2567744e57608a8eeb165352ed1edad6eaf7af0b3ef8050a64e8987d6e8f6b5f1d7
SHA512c20a37e656f53401bf09113c41e86fe5b6cd374b8a2705efcbd514bebf4cab67501e23a724afdb542c164326bdcac88c476cd336f711b15281e1295c8fdf36d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c33150548eb385499a4ffc543d8a0ff
SHA1dd1cbc49ce0d0858b69a7f090dbc0bd15f480b61
SHA256c25090e79b12da605ae81668d10b5729fd2ecd5ef6d99013420bb4dde72d2b86
SHA51268252efe602de7ffec07ca8c23c9d98fbc00c598b9e5a187556847d96bf50d9a81dcacf79efc6a8c37bfcb0beaf6c29bb0c9f955d6730a843073833dc33dd9d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b9e62af21e595885b7af9fdabb15334
SHA151dcb5cdd7491298f9637ddf356b4464efa48149
SHA256092e2e699e5da2277541b44ed7a789351585e68e3cb5dfc99b25f929290103b0
SHA512995741c1f3edb7a196ccef50ba053215fd6f54f4d181fc59f1c8e96e5da0645e23ca644660782d6a62fca41eef2082fcfb82fd4f1341537fd2efd4949191fb9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccbdd6ab113e8fa30d9e408deeca037a
SHA1d57cd31f93e4b8cb75fa468e28329634cc024002
SHA256cf40e722e3b22afe8549f43af630961b6767b1a6ca41f650c707d68240c4604a
SHA51225ed83a54a990bf4da2800642a70c90aa4154a8175d6af6ac8b28569053fa28f2e0e7cb1add79ebe9a51751367323957073c691a96c9f216024c140ac0ba539a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a