Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
03496cd0490f6c4624f0c344b7c947c4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03496cd0490f6c4624f0c344b7c947c4_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
03496cd0490f6c4624f0c344b7c947c4_JaffaCakes118.html
-
Size
4KB
-
MD5
03496cd0490f6c4624f0c344b7c947c4
-
SHA1
4aad07d1c417f55dda083031c18de9f95683fe2a
-
SHA256
e679fb66dd3177216bfe201a7b539d15150601644b52712d119201ac94cf54ca
-
SHA512
7ccc81a877cade60f4359c51229f05b3a849eaf587f8cceb62ad1dd0e1bb8440fd9249554d0bf9f2d1e0c42ee9674d428f6c7bf8b6b890d851600177ed539b1c
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ohFVQad:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000030c80c638d95386a17c2f499ffa967673a3641930d65e0c1344ec402cf7d25ce000000000e8000000002000020000000fe149f7fe97459db650904ea50faa04941a80578c160d76dca8c4dce42d21543200000005391b5d952af4fa436b26cfce8b565d2ec39706c9731a6fdcd168f7c3f782ca8400000008863ed1bb90fa409a4fc8b7dffd4e15d8b8bd101254b59ec7e9ae6c17d3e206ab9d5b3aa577c79eadd24659fe491c09c07983a94f2d9e8c1f3f6bd641bde3854 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{988EC111-0494-11EF-83FC-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d7146da198da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420384040" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2224 1964 iexplore.exe 28 PID 1964 wrote to memory of 2224 1964 iexplore.exe 28 PID 1964 wrote to memory of 2224 1964 iexplore.exe 28 PID 1964 wrote to memory of 2224 1964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03496cd0490f6c4624f0c344b7c947c4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cdd0a320f2561cc809e2e415428fe9e
SHA14029f449273b25d183e4b73f2fc35c072f1468ae
SHA25673464fda9ed427a2d93743ee08033c1d117944eb9069f8174425d3825fe37c24
SHA512bd2512bb9bd1ef8dc8b99fb4646cd02556fbf86a6f6b646a81e92d33c365a749ae6565111e38c314ba488708409265a26b51ca07f9d4160f2f828c2cccb9594c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5792937f1496218700f485b2e83230959
SHA1c91e508df4fe4eb5cd378b7ec7ea51a723bc5396
SHA2562231739e0a4430ffe1b5776526ae6ae48f3127977b9353da0d10f960cc3c5eb5
SHA5125ef32355cc049751823900b7b0193c0219d5d1432aab34851fe21b7be7b3e1515ff3e64d9d3277132f2c445f343a9aa26c43ea1adf2d1f078655ebb591829d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59460feaae72d980227ccca58e0195543
SHA17243a81397bef120601485775af21fb986ac7b9d
SHA2562958be9c66d810e33d0d0fe2f58fb5c8937f0005011ffa6cec09d589eb8b7d3d
SHA51283d1096884f79768e680c62ec7c98805fe22ddde0cf5676c50f279991a5a9032c29cb7424879f76eb0f290ea031a0dad5ae5d33a367d2a3442d4af8b4424583e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e3ac3bba1034b8ebbdc83d3ae1078c2
SHA1d255c88710a4f3bcc31d357d4bdba118f48c987f
SHA25628fc394dfe6eca1d103cd56c8e0aff7ea4174cad964ed5e718cde7442343e91e
SHA512b9a3ab955a797ff5347a826fc90a0ca8ac1aec7ec5f341891a8eee90952821983d65bc1e876f903839767690c6711db1b6f9c9388a068c8442d2ca74b1946854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcd207bbeb770f0922411733d5ea7c5b
SHA15b86c8aaab8477d5b25f1923e37cecc5ce5beca9
SHA256d2c8750b78ecccccaf7e94d1353f9f0fa4f6c0444ded7313238641ff23ab5ca7
SHA51203f932da9a97cea56ee5ea5da817fb14718d514533494b365ac8fa69aadafb47af422ef3b2697572e3fb67f4912e9dc38d592e8468efa841c1839ef2e637d880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed2347daafe9fb6136fd30d2474b35b8
SHA13eef75a145f02e761a31f79ca4bb832aab91770e
SHA256e83705f6e686e115c9951f5c5c5c99415095b0e6e8ae8afee2eac37dd4a54168
SHA512dae6f9ade12623a70cd86247e4d0037cade8d2423f6273049e2eb1b1ed080e4fbbe996825a32e94e3009b0fea4e2faef272afab5c3ea49bb22410ee6e2fa1946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4791bfe937c6a15203570c4874bfd8f
SHA1cac807598565c4dd1e7e46e05403dcf345df688f
SHA2568f7fe205262db728e240291f1b187dde97b52501cd854bca76c1a44960e28b9d
SHA512d6b6f22a7d32b1b8e08d53d1b9ef5a007b4f77c5c27ff04b5c5d14d5d430c22bbda0fa9716d016dc9d1f168b57f59625674d85662633bfec251caf0b87fb4e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59632f6730f08eb04120926e3e3853eb4
SHA1cb30e875288aedd62e1a0924dc6a356025bce9a1
SHA2567dd2726f4bb90c9cdb707d12cb97557f36826c7a24c49bef95429711b797fe3e
SHA512f65a1870597143517065d9945c4e8ce4f3cedc184a9812cb98c70091660b3c0c5dedc06fef1c7df1303359130d3efea08dc49cfa7d7ed30f3ad367c66ddf4763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c69f4240c4b5aeafc8d040223c09662f
SHA13058fcc2552555b13bf5c7988dfed2b31d43bf36
SHA256c78969d0feb87f50c3c33c666ae51c3d78ad3c75c93ef4639c15b562370e11fd
SHA5125e496c6dbf86910c770dd7d284b0fa692da3834671db0bf56152c0b5c6ca3a05afae719f17f2324cda3001e3c45c347d80067f2ebc769d7fedb0918828ba2ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dc73f9d4e27182fbff75c7bb6c4f19e
SHA15b8d7ac7f60a2de4b15e717ae245ffef7d252e6a
SHA256f3907957206985c8f4d3f54f76ad4b8dcaab7060b9e51165eda728312e37c2d0
SHA512d56558f70f8bc03aaaba2837b8583cdef1cd0ece23f5c8d04574843e7da7526062e6d3187436f2a0f797b214e20be73ee1df6797a7a8ef992588ed73a85a0e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5537749122c9a44fb3ea85c84022fe5ce
SHA10159065cef220dbeb94d812b29a1d6b2cd644bba
SHA256826e06c06513889530e91701637e6ca15e5e56fcf3d4848b2087e98a93180e87
SHA512058a54263aaa1f6076c52a34eb858d311621c3cd429672951d5095c773597fda4868c00f14d3af54ee302f39e404d0de97485c729afacaf8d370b6354d971587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdf50276f502c1ddb433281f3f8f9242
SHA1268f4b864400e6a8b1faf92fc913b7fc38346dd1
SHA25641c97a99b5bd8fd721e20bb05164a15c598b22bb7206aa42071dc0389c243b70
SHA512665514b7787a5af717cc44ad20680cb8c1883cec4cd0b6fc0e22cbfeaf48578ef5765360a8b96b075c408e5717d4ffc31e572bd6feea54bf6394802cd1a96118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566905dc5430312edf9f27c657df1ca61
SHA1b5e878b95be86122907f7da676eb65834ba73b4a
SHA256002c4c7020e71f8192cc34eb1daf998f0061074306568ab8871f2f8d4e234262
SHA512c0ffe97960c400819fc8c980cc2a08b28a25a5c8889f6fa986026f0df90dada87f1829aa74605e45195c090b4a85ea1d93af03ef18fe3e96ab69418bab48822c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8f16f1cfe57b36dcbae6a7258ade62a
SHA1da97b518422f254a0ac041518807666d7d36cf1b
SHA256ea1daee9521e9332ffac0bc859ab0d908fd69ebda4055e57a44d4e4d135fddbe
SHA512761ca66c6389ebd873d70e71dd1cb781285518beb1abc734f7bd0e5949168a9d46be6c7e7f41c063bfbc2ff4c86e29435e34df3ffaeb7a85cecfeec17015a50e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d247b3ccc5b7f0c920b06ec19b27b9f8
SHA195a64bd1ce731d67c7ac819b3d647967921e3286
SHA256e953de5616acbaeed724d71f7548ecf517ce193cd6ea69d521c3936bf3da8cda
SHA512fd865da8ec8a0b2eee87b6a2c4c545ab58f2987296461fc2aada62d6a6f8f96927c7b2e64c6ee5413c6bfde94cd162c2a924348ba2a967d2e35d90bc053d9f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc7f5541f3a6dc5d77c75d4fb464c7b3
SHA1dc4a4e213a76919a676a72e0725cf0a112691cf7
SHA256d621674da34c8434f6f1edc3edc49c9891b4351c42a62f71f071fd6302f762b6
SHA512bfa85c3dec66528b76c1a5dc0da1f2c541ad81301cedba7d99f8e0cba89404bf582643a4737bd7e8506ed2c745f602feac13ae59f4524c82fb6530da2557ef02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580d0f63f481cd707cee388ae33150e5b
SHA1a46eb29ef0cf32570f62a848ac2a6f1ca67589d3
SHA256174d851754a5abe506681a1d500839ead52b7bf6695b01295a524b3c55b259a4
SHA5128ef6b348921134d3eeb2ff3c1045445fb6b5c6710e85dbf253b9a33f32b9e407d40c983d955e6aeb5160774ee56e9cf2b5f8329a74857443ce25e63b78b44340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e6f45492cf25ebb1121229094a29c29
SHA1d204be939c10cba67c3d069e2d9554f62a0d833a
SHA256270d343af867be93f165a4f6754565501a81bb64ad1dcb1a09ac0ae49349a66a
SHA512adead8d9ae0e34dc45b5853ddc59bc3aed35236fc286bf90b42213ee97ebc74562dd50bcc78de760513a1613580d7b38f56695aa11239dde4cedde60af35fd9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a65849caf3291caa5f5edb86e9edd30
SHA17c8c390a6b911244d63d293b79267014b50308f8
SHA2569bf132899f8cb2f59448c4ca83ba95431c952005ab0c1547ff57c2cc1c8ee1fb
SHA512709610de84cc42c46c9699e9dcdc66117bddaa46a2f698792f576ec63ace0e98fc3e29fa8f8e5d17b8ad7fe15a269b101eb5a49b1cde27f52f2fa3930ebb6f82
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a