Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
03887f61ba19c62729e37154ad4b36ea_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03887f61ba19c62729e37154ad4b36ea_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
03887f61ba19c62729e37154ad4b36ea_JaffaCakes118.html
-
Size
29KB
-
MD5
03887f61ba19c62729e37154ad4b36ea
-
SHA1
f7bdf66107f8eb18eba6ed2a771c3fb614abd5a6
-
SHA256
7fbd39d35a8c2deb452387255742e4685343ba700c8d93d5abb5ce63bcc09ebf
-
SHA512
4199d66c50d100504d9282158f01d7ded3abf5b6c0e602c0abb4e7768bb002cbc438f0f55c574c6cb5f1247b0343fb87fb2681028d0f90b8ec6363086ae40a6e
-
SSDEEP
384:HO1980H0bro7iX01sAKotJiLggB6BuoWWE8auetxgkIZd3Lv8Cc0joM73s5BWscU:uvfH0HcsqjXe/yvxv3s5cscRvtY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420410603" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000f070ac43705beeaf2d2f1e16901d325cd708fe841082d5036ce4e391ccbaabeb000000000e8000000002000020000000357c88020ed72cee78b6a29b89699ea584f6152d2e56ff1cb7b7c92efd8aab32200000009a15e50f631904f8309e658c35f4eed54b1f3ff5498e591b77e2daf268db7601400000007b33740ce20a20a36a4542b6e50263bf31d98499191eec6974f4c6202f22c7acd01b17d26998e424ced12f2c86330153ede12378bcc302e407f26f87cff22681 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{700B9FE1-04D2-11EF-8706-CEEE273A2359} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a0645fdf98da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2232 2172 iexplore.exe 28 PID 2172 wrote to memory of 2232 2172 iexplore.exe 28 PID 2172 wrote to memory of 2232 2172 iexplore.exe 28 PID 2172 wrote to memory of 2232 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03887f61ba19c62729e37154ad4b36ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594926733272096910c3bee79fcca348a
SHA101b632f0f8386b11a17b4c1977d713cf1e465577
SHA256458e0a8383b8bae0db0d182bc651fadd0f705fbd71661c2dc3f1596ca1f27ed5
SHA51244c0a5735e008187ee55236ac61dea871371440d013e9a662917313707bd435632022cca32e5da2127e16ff046f56f62ef675dcccd6557a99d2d775f6b710412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555253bd40c12ed48e724d8c0ded2fc75
SHA1b1dff420f2590d313f1f5ff509492a08bf34891c
SHA2564ecba734746d7ef4e34a2e3e98b3294e07f4dd5b2f726003e06cc2c9e0957fe9
SHA512ee5840d641dbcbb6eb9cf8a22590026300936c7cf9a808150c045e07370d1eb9f2797e389a2db9cec6c32add092bd102bb7b97e523f127d2e7d0e40f3e3672cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f751baae5acb645b8a226d4a028023bf
SHA1d7a8507e2c220afee187309a243463f0b9b04bc8
SHA25623198adf833089f1b4668fd625bd839cc2852c2fb05843e1c42c0b6fb030ec78
SHA512df3c65af2009be74fe94065d31e568326f7cb3daa2b29c85cfbdd43d6bf84c7ccf8e185d11f2cfc6db5d776b156477b1ec94ff8cfb32e4cf7a10410f130fc3f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b33e12760b3b192a2c828f7fe2fb439
SHA165d23672bff65fe847cb58bff3a5338f27bada1a
SHA2567f75f72ccd6d9ef35b2c3b4c6b662508d7faf89dc7bb501536c85e693db7b9a7
SHA512a84d8b9866dc271675f7f3e3dc216b980e198941e555049a4e05677df523c8a72b83d9567b8a9d0a06dd51d769f0c0d1ffda68408e06410e8fe101c300099eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508bb51907a93b3a938c8970f5216372c
SHA13c0817baff28aab576974c44add0cfb765c1b0d9
SHA2569ecfb13eac9e715ec4939c53d8a88c6f49e6a88f3e53eb65faea74c98d614ea6
SHA512626b3bf5274790db0e5ff7b95851f7762d4970008ffed5f2aba0da7fced9f1d4f708bed4c99180173508e6516f94de720a5a0edb111ce6618da1d6e7a962fa69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c80ae53f6a8179c5aef55761855309c
SHA1b71c0b826a8ddc40856874ad7b2b8392bec3c915
SHA25636fe544b242eb822e769b6e88b16be1bd81516c5064e1c677fe4885b2d388d83
SHA512239de5263e4c2143df1dc5fe12e6fa2b815e1cf472221e0478607b0f79ccc99b8c9d856c4b2d45d80478a3c003dc874eefbf6cbcfaab6ba23e736b95381d95b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abab9195940071358be89e248a7de81a
SHA19c2c12b0bf391cec49a6981f210c40ad8bda8756
SHA2564818eab2ffd5ddc801abd649725bad6b16a196212e7735e69fbf3abb53e5ba5f
SHA5126dd483ae69ccac0f7abeb13655e05c4e5e7c88a55ec6b32fa5429aa411cb7e233a5b4d61ca679fdfa6b2df590e3c360c98b5077bb61eeca22735cd5aad1db0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a1c78f8813e01bc7d53e59dadeb4d26
SHA123fa53f20d8bfbbb6e1fefe2d9fa6770de03e9ca
SHA2567a3a8a93b82aa6e0857e2656d643d435a8a1450899f901a8f697d68f85dcf5d4
SHA51282dc2040d8b4b03a5aab939abc5dbe25149dbad57d6946ee16763a9dd60f6c16eabaeb0a838e72748197338e2e16db210b1ffd73ca515706e15bc0bd03fa074c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586781807c21ebcd7cb9af5e7210976ac
SHA1e0721112a2f73b07f2ea9571cab3c5674597c526
SHA256e38eef5eaa42e037853a00f0ec42b0edf0d8291b3a10b5e6dec9a9e9ab2e570b
SHA512cef3f4460c92505fa08876b0ccbd6790d1a53fa1e253f773378fc667808b0aa48fb8882bd13edb502db14ff5859ea30624901f4affd14bb0d2c8df113e45113f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6665aeacb0c049159e950597f9aad97
SHA173d8c4df49682f5aef04829339a270b1e5704c98
SHA256279f6cfd170a1f10cb2befcee71c462c936de6789927e6c79f690f506949b762
SHA5126c07830129d32f091d02d8df792c0f696602b2ed35e6387d0b61d75792fad8ba35811fda4527d89064e716e0fe05324469363ea54c78b816305cf67bf47d46e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56767b0113388b5e3ccda1e25c6debe37
SHA12c2621167fdcf99eaa5874b8b4b94fb210259c1b
SHA25638caee0ed921e859ed049ba203e7a6680faa22a64b44f9e4c9b82921add85c01
SHA512f5e0dd39f75231a18bb434d282fb3c7baae0fb7cc5f69a566de3e80efb8aae95cbc6460a96bc4aa0ee251224c9766034450a0512bb68b6c7672a0f3ac412fcc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551736010e82ae68e587e5fdb3e2537b5
SHA14962519e76c39b3250b888a4611d1e9e9e2b7358
SHA256f18d7063c7135489eb91dfd3a4e1d236f5a894deeae16d8c92527456e1b87553
SHA512a5f38eb63a0a8b855b3bbba23cdbf120e21d243acad8774ccb8f836c15e41d9685074dd7ad65d0ff6f40d5ced8a0093c76ccf2e5edc5fd5a5203e79e2131bca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5182002f324ae43d7b3645f8a214a350c
SHA135f2408bf45cd8f69923cddcb9bab2863432e366
SHA2564c9dc8caedb3a52e090b627c41117604348c89f5aa52952d4497070f0bd4aac5
SHA5123fad6754a663bc0d85794ab1023a9b8bb55327cdfefe77a04690de1f90d7ff748e05a2f7cacf8741d7b1a97eb5e1aff01d5880f3179a47188fcf153e5a1c25ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b3bbc6bd08e64178ebf3a2dc065a390
SHA1e0328a29f4ac037ffd7e3cce13f8acf55c335961
SHA256cc14d42cf4bd302545393063d5006e1e0010ae30ee9fbcdf40c32979055c6937
SHA51289a98c2f2bf6520133f2fccac7b3f560b577ba15295d89cbde3edcd30c6533eff87189b623a3bb4b803c8185016f54be7de49874458ede4330b4d24bb7e1e815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac9c63efac5e87a54c0611f8bafaa39a
SHA10ebf64acb78e688fe12c0bfc1fdd9db7c2d92c6a
SHA2560b17ef517c92e637d3c2a96e5170e0be70c1a307a12a728440e8be9918c7d6f4
SHA51251078417c74be9a693b64c598cb65c20f15907d7f04fe5a645a1ff15a87f9dbfe96aff9df02e4d0102a2a37a4553a65d776f05829014ad37858eef786dac216c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0b62c7b5caac9819294ec043fec087a
SHA1ecd38a0668550fe3abea60c543cb707ccda861ac
SHA25627a79b3be1a2c4687fbf001b02f210ecf55b8e68cababc2c7d49a882749b00ec
SHA512e734804b3cf7e7a3b6c7994f00c8fd0634834bb9c43e1bd9a0fd7d3df1bae6267059b5ebdb502479a8f208ca73325a687485eb0a4c4b190bb834f9bf631390bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5529ae0375dc88f880f23674b3f245df6
SHA1e8d146d845ef91f8ec9d0dd853e3eeb63c26b24f
SHA256fa95c56e0d87b6b5df01bf5b66fe55bbe7cabd7cd1e8ff42311cff539f5c0dfb
SHA512f90424a25d3ddf621828c8989ea87859ac6117226a096a981c0a83a107bdb503514f54750f16dd46f7f8b547d818c9d35aa3efaeff7998c4aa8fbc193b4d5a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9519f177e84aca9950a53b5661b79f2
SHA1e38dff83fd42e606af00a25ad807a57e17091e78
SHA2566080504de2a50d6256a778181dc0989b2491acf159bd4be0bcac457031497b3a
SHA5121b0f7bd044aec381e91844a46ed36f4d0cb2e7e205c2a2d091ea69514a02738264881e1bebefe33dd9d78261561bb5c16eef4338792a490458b828426e0c1286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deed737ae9e7da0f0f2cc72da6cc593a
SHA13c8305ff8fae46ade7c3ed3be3ce8fc4faa7e781
SHA2560280b846aa6d66b4e219879996f6e5a5bc370fb35c3d4d4f5173d24569a84970
SHA5129a32d436f276c645b8eb89a2f4b4d3284284e8feeb76ed2906b4ad820ceb3642c25d6f4993ec339fdde2b6a01761eae285334535aba33f3c8b37423a96ee9af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5199c5404007c84e02e8c92469a24fe9b
SHA120bd8dd4cdfef9306b576248f9819501a60c1441
SHA25678ebbc83c69f99a115d71c6a5ca3df46ef3d884b5f715dca1185fe6cb30b2066
SHA51249c20bc7095a31dd6bfaefe7e665e4b5787d10158a0b08247be320b838627fc3ee52842fbc7f5556d50d16bd66f5208cd9fb990b74f175017b264d8f9e77884f
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a