Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
0387b18b5f762d7a3b2a8c5892bf8476_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0387b18b5f762d7a3b2a8c5892bf8476_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0387b18b5f762d7a3b2a8c5892bf8476_JaffaCakes118.html
-
Size
4KB
-
MD5
0387b18b5f762d7a3b2a8c5892bf8476
-
SHA1
3ec3efa80f9d1fa2d1649090c4ad4d3ecc49ff7a
-
SHA256
ad68ad1e4dac98d7d472aca6b35cc625885ec7f63cc1bdc4729c8a16656eafd8
-
SHA512
f1ba10eed3a63965f24e73fc170f7c18e32c0964565dae98fbdf5c1df740230cfc362073420ebd95c640ebd18723f3f9a3bfd44317a031e0fc6bb9befc5371b6
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o7YjRd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000c93fbf017c125c002bce37cd6d13c20dfa0df52a18bb6c0cdb8e5de7779bbd4e000000000e8000000002000020000000e11d077bb8611c376fcc8dd365ee9643d5ad53f8a90ea49e87662a5190b65180200000009cc3d52ffbdc39d670cfd24b82b30543b0d7fce6454aed5cb3ec9bb53766e87940000000c16dafb67005b8c31e71e7a389e78416770ef97c34dd3ed3e5745e96bd8367ec915f80ade68b86e3b30ee4397e39ec775ff17bd9c7c44f91e51d9c318c70d511 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80cfb8fdde98da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420410482" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29364B11-04D2-11EF-8A5C-CE787CD1CA6F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2096 2080 iexplore.exe 28 PID 2080 wrote to memory of 2096 2080 iexplore.exe 28 PID 2080 wrote to memory of 2096 2080 iexplore.exe 28 PID 2080 wrote to memory of 2096 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0387b18b5f762d7a3b2a8c5892bf8476_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5747c40c9f349f7723d68804593f0b380
SHA109f5ebce0fdd8048c2ff21989fbc908974b3a830
SHA256f97e7585c49f713214a40eb8f9d03f4086259dab278995579070a0ffab11fa41
SHA51242a2e7f7b3e303f3733bba6ad043d51c30f0c5608c3991194878e0b1503aed2d51684d23b790c8e658a1488bfad39500d5c1e3366e1d790ccd528d7ca5a7205a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5673e816d51d1d3d019c0caf3065ee21d
SHA1db0aaa50024b8405679459bb607261212a62fcf2
SHA256c029437a6633c93904bc89630169d5cf46571c9bc0b1a96d6cef3e46c62fe806
SHA512c88c948db683de419f0399b7f3bb8d0feecabcb61549d8a349ee9e8fe046dacf6c29104b3002e11ee21d580bfa01112c17eaedf2a8ab4c73765748537dce1820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD507fad3490cebd226ec02dc63afeff747
SHA1d4201d2240c6bdccaeba0c32b45ea41f8c6725b5
SHA25642ff24f757217e98cfbca648cd9e9131408bf4bed8f0a0ff2dc40492f40a0cc0
SHA5121f05600d82b315545cb2b50b5a3d1be20a7be6f7c6abbfb16ca124f43d41146da4b9823652e292d5427ad435ef197586abc2e6d578505eb5a69050719e610f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD520572ed88bcea2211014096fd97bf088
SHA1aa6ebe4149ac26424db274f5ebc72e07a944ece7
SHA2561ea84232e3ebd6b124e0a7715a0ce1de86e4ecb0a8659a1d2611cb1dc8a17f23
SHA51243ce4d3f63355518f0271176a55f05a35c15b0919b9f74e956b27e8ff398ec07022557d5aa4c09d8d35cb7f1367e3d0667fb461f65ff7573b69a920ca9b6a0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a361da22251153d51134f4525b2c957c
SHA141c4ba05a526d7da876bc3240d53a8e4d486a1ec
SHA25672f2f543324ea1a196bea57da21814a86f21d3a0c24b7e461244ffe19b811de9
SHA5127fc54f512e62f905b0a47cc0e26f7cab42863c28302bc760ab3d9cc9e147a7d659f41b2af041a2bfe0c0221c13d352a3b8d1754241bf66bc955605934830caa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56829a574db35bc51bf2c2864d34670dc
SHA14f2f9a3faeb91411e7ef02a33d214c03626e40be
SHA256449bc0530d198fe34da180d864f4bc0670a3b91f3efe70bb27525e20a3481904
SHA5129a72876005feddd671983091e734773904af8fd1a5e0135db2722c1ce887f2d6423941421c003a3c25554d343c9ac8b9be111606734d581da5d38249379a782a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD503fd9da4c678354eccf29e01e60242bd
SHA12ec7ad53c12d4a8ae070c59240e5a1d1510cdc0d
SHA256406f0acbe54c67044541c3ea228a45f94a9359305d27fc9c34796614ab63a638
SHA512ca7a8e271062660c67ba8f0cbd13b77e9420debadb9f658edc00b948a56b48b6ebd02061eb590f9fabbae86fe354cb65ba2aabbba68b0da4e9617e99c7f49186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD570c95cb3b4399061cfb910cf3163fd1b
SHA14a78619286d255959ac1ebee207f21b3e38816ec
SHA25651b13d9beba050057d1a0029678eb7eb825be166b3f87ac5116584956d67bd60
SHA51225d8e978ce8ad8940389f8fd107a78d9e1a7f0db29f2a49a555af06b3e79d5d2cfa7087a9b2b5e7372d51b4af7e013726383cb3108a00c75acdf4a28f6fa14f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD514b4e78d08d8ade1704010d77cfe3f77
SHA1d2dea0050c45e7adc8c7359f26fa5dc31e0ee19d
SHA256a1e36abe36258c8211e5bcf603f0a6e4291ac8ff6207c30853f6fc362d7aae2b
SHA512499699c03e89b4104101448b7155c3f86449e4d67d3eec7032e4027e5eaba703a1fb482d35bdded22260b97df76a525d638b4d3a17cbf9847c82cf59a6fd05b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a4e3ff7163e6f554945c0bea0dfea5eb
SHA1c26f4478a1b28e40e76e0a3f7a034c463834a588
SHA256d068a568913c564b33b280a08b184633bee355aad290746143ed983a635ea4e8
SHA5122e65a6f52ab41ce1738267fb969ece8a8e65bac79d6369fe6381e977ff23a8cf0c778f88c175ed0734540d27970179aadfd05cf9fc9f35c390e20bcf130ec5c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD564c8881c07927b56a4682ea9977d6f23
SHA15c802831da9e8b4bd1ee7f80ebccc8bfe302ae1a
SHA256fb44360cfb9709889ba709af02f010a8a7ca21bcff54b53164e31beb105c0065
SHA5120945ebec89b899307b33ee61f81e1ecf712284f9599cc863df15ff67705df4247feb1ebd1255e4d0d24e271f39d76764f2ba78ff876b4bd8b266e271e139b8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50d70f97cd17edac0a3129fda7a2003ff
SHA16cd4ec675047cb551ae3d3392d9f195df0573c96
SHA256587fc68db21ae17a0ee2388551c519bf3e362cb8be95d76948cf32aee363ec60
SHA512e5e64c60920767e1be9e0610b5721b6f6cf984239563a7cf790557fdaf11bbfd8c8afd3e58a19b5c5c3d2b6a6a88dc57375b8f92eea65f1b16a2885121d49130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a0e7fddf21db823d6c81b6a5b2bdd04e
SHA1d21e9877957b8b6bf2e1158f7e987c2291f1ab18
SHA2560c963856b7a4bf8d3ec22b1f3a2609180e7cb681938d634c1059163226ab889a
SHA51237700f5ff853478b3f64b1e2d003fda5824deec78126e7125149c03abbea7fc3fb5eeb7de42e2b745b2d282fdfc93afa72f2cadb7442442a64479d25113d0acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f32b7de48d737429c2507bd7c5ac190b
SHA10ab13ffababbcb40753f5cbca14140dd95ed7a38
SHA25606d30fefcede618440aa3fb96487c1b1580204cfbf38083e0bebb9d2e4169562
SHA512a425685e5bf36501d4e56b35893cd2e648d1a23a2c18bf14f49eda04ddcd0bdf9a14b34373ff8928223affa64901d51aa8be3eaa85d0beb26000c4f2bb42d9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58dd0a7117e64792e338fb06ef9dfe522
SHA1c114651f066d308e68a2a7646665c08132e52323
SHA256dbc59846f3f55a87a2115b3702ecb2005fc68f34179a07127866b74aaff70a70
SHA5128ba35b5034298b1aa405c49484c7f1c7c33f1b6eab4eb00f673bb0971fb2c699ac9a057fde82acef45a0d4ae967032de7a890e077eb208d246374e3648fd88ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD535d8cbb6144b3d1597a2aa5ef2578aac
SHA1119d8b8a75eefe153e88c0bcb38d00a2521229ac
SHA2561931bcf0b2bf7e0048f9bb2e095582f16fab3268ea95fb9ef9d288c8fd4e1437
SHA5125830927a95d9d3a669ac24be6f64d1a5d417c87eaf37d0c55de8bf44a0b12a4e6a15121f9d9d70fb31ad562911fcbb108c09cf252242c283ab8659d6e6f827ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD526e3e5b57c1c1d538f8df27d43113f70
SHA144471e7a2546d6746cfa6004be40e49f1bcb21c7
SHA256e30b67335df873d6dc3c003b68accf8c06ce65827d6c05f3ba46c6d52f593fd6
SHA51276bb4f9529dfd99c122b0a2c9d47de966eb51bf9e2e747a11ab1be96bb8669b8b9ca927a54ac4518d7e5682014dad7e8620e1d076e53d7366d640dde02ae3d08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a32abf57561ca73102cd4652d7ab2aa2
SHA19ae3d75a132b8c27bfaab10b90edce3952c76faf
SHA25601cc07a6d5c6f84245890bd32838079bf2d68dd018b2043db2c1ff84806effd5
SHA512e65e2c8ae9fc8fd3192d67b2741f714e3a3f2363b6e3c5a48a2be8e6fbe8048325918eab26c89cb4468de550b96bcbdc02d2876814f5e3b24cbe7f82a84cd88a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b7d21bca3de035db25f531dcee9caceb
SHA1ff53d283d68c4610886d634c4b170862666ac5df
SHA256ec0041a8cad5b8c1bcb7bfb919cf0ff938bdac1ac190bfb6305808f32a1a1506
SHA5121ebf8e4dd83a9edd87eb616e7134c45740014fef10dc3ac56e06ec815282a86a51a02db9396d56030ba11b826f148c30c29c6ef58c535b8afd899601b152f62c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a