Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
0396cd2ff2518cb04c7dee9c2db7016c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0396cd2ff2518cb04c7dee9c2db7016c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0396cd2ff2518cb04c7dee9c2db7016c_JaffaCakes118.html
-
Size
177KB
-
MD5
0396cd2ff2518cb04c7dee9c2db7016c
-
SHA1
12b1a1bf9996c59919aa55a4694f6fe1b4256e7f
-
SHA256
b60df58d03e8737280ffa9194bdf101ca0149e4f38bee09a09990a6c26b89b4f
-
SHA512
dd0f170885858c6c42e0dc5f5263a69e1e2c0016513723abe7407314984af441df2ff029426614e1b34263f307f1d700dec8967d8cdf39fca640da2d9f8b1306
-
SSDEEP
3072:SJyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:SssMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420412620" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{22FDC1B1-04D7-11EF-8414-4A4F109F65B0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ec9bf7e398da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000005603d2619839a4c4d1d7626c7cfe3e4c1bd921b6cb90e7c940f958c318af4865000000000e8000000002000020000000828004c30082a9ed9d882ea3669a9389f533c307a0fac7e804ffd387728645a09000000091d5ba90dddf896aac658725d421e6d7a276a03556a36b2b62f509989162f412e7e456f7d7f1d2db0d484218e48857624410a82f059a8f3731295dc93314917a075361ccf8b43aec32ddd01225f62ca8f80b60b369a0f254990bf4d64db184103741af05ea0814ec3856a245555acbadefe3b68d18a1549bf2051e7e241fce261d84ab2b49ad1129a8f2aa0fa26c0c3f4000000067ca4caae17ff22a9dd0ff916b2229205c902c0da502c3de94abbc320ae4a2766f0b7b2819e0ceb46978b65d2be78afbd68da1f01da9f157429a022448f2a21a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000009fec820c003319c411646cce2da52e2e8ccd7e5beca547a33db8d91f90c1985e000000000e8000000002000020000000287997a5e3318a3d29d7e54c1824fa1dec456e5b55e15c91a68ce01eb5816125200000008973992c7621d1f56ca7d1c6ca606a82a8417da1330527d886244b57b0c82ff240000000fd9182db749d310be8184c5604f27a78b8944f59293f66aa200e3c4dabb709a4679fa54ae410dfb12203fe86ffb4aff49653070ba9e96ac7aa64d6263816a3f5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 1544 2904 iexplore.exe 28 PID 2904 wrote to memory of 1544 2904 iexplore.exe 28 PID 2904 wrote to memory of 1544 2904 iexplore.exe 28 PID 2904 wrote to memory of 1544 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0396cd2ff2518cb04c7dee9c2db7016c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5708d69980b804256bfea7f21750f7c78
SHA1c0732f7ba682ad9d17361fdf6b0aead998f1a5d2
SHA2568cbdbd576a6a40492d6b9b1e0d7277f589249c25f5eeed28da09f15048b80d80
SHA51282a529029b19bec27f29670be6eb8ae0678bff20fb85b566a1c170394c4929b0b3d305926c916a29a8b60af1b162c1d3daf6c8d517ee20a85f897d56280378fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba2d9e52c2571562a2934f066588547d
SHA1fa50799185a1e1d1edfe6ee613a46fa61b194de1
SHA256b6e231addd18b3ed704d0393a72c3194643d50c6b87088e0ddd46dcccaa5889a
SHA51203749f2edbd63d315a32f2ac96cfc05e620165335c4b3f7f864bcca48cde9b488f6800b05c15f39ce275053bb584ffeab7391967b2dd408694675a0e05c1cccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525d5d3d7e98a6122469110f5066cb935
SHA1a6714e5a304c6a11cca59b7fb10a3b2d4fe81414
SHA25639563dabf18e240a81b93e44387385b92c1d60e10e0db56a176901bc52199ec7
SHA5126918592350146af0987b1dad427f8a384d0e3300ec682e69b5983f8f161c892f3260128540a8d4f8511c0aa427f4a1d64b53fa1a1ed08122f9ec30ffa06f3cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513701e05eaae911cb5156aea6748be8e
SHA1aec8874e6c472a6279082705cf61085d5b564720
SHA2562798f4845f9d309be1f9985cfd90f04ddef3309091c5103730c9dcefcd874ae1
SHA512c416ab13de5841e5f0e3bc7b756ddf96274aa23c21a85c43fa36faa91877a2a5ee872abd765c08c8a286ec96ad35527fb4578ba6d75e57d46d9fb7990c4ce14a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5710f6bb8e2075f08ce82ed570b43141c
SHA11e8158b0150b27223918a1b7e61092c302e6731d
SHA256675fc211153ed55cc6a65cff4eb255d4a154c0c238130f8f922502837dfe153d
SHA512aaf4c972d88effde9c450ef032075bf8e63438153fed2b6ed1c57b508e95f383c5eb2f4e8745ce0444e55adc66db63e61068fe4a9f367a1a443b06fbdd1849f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b299811c029d783a641e0907411749f3
SHA1042daa0e060e5e1924868e563db7fc8077913623
SHA25651a9d4366a6fd20544718a08e08ee47fe0e069ccabaffdd96f15064fef1a08a0
SHA5128435ee0b199b4ff576b24d1a496544fe9b490f0cf117607950014bd58ccbf99aaca9b575468bd4a85049b481305470618f6f28b3b8c51caf3378ffd702bb3260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bbbc48fbeba952b4a473bd8df1b4146
SHA14adffb2412d698e69a4c389288ac7f97d9f0b952
SHA25633a7fc3e7746b51de5783580577244d750c60ef8e2d3f586314927cf60beb140
SHA512936d01dcbcd1fa99cc38390c9522de444e09d4ab739556ecd1745af56ef79743f0f25b72307d914f9fa552e274c21a95bbaf5adc86630c437671e3a4cd271d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50349083fd21b7c15782b860105a0754f
SHA1ee428ed7eb7c28417e32d08ed9da8642005cd0cf
SHA2568d86580907344fbdcffdc5f092d86c5b9e1f986ea1bad783d0cb7d68886615e4
SHA5125eb7f002282e8104dea9252041dd0ed9887a6366f9a47d911d215d726d6e6f6aa4b04bba7677eb2ab1c474aceb7c2322ed2bed377db0979998d2cf17c98c14d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1703fc4e42257b45652010bbd4d170a
SHA1d4e250e833b81eae5fb7bef255bbdf04a0d02723
SHA256751ddb16ac2313662d5360cfcfc8e5596fdf0c6d3243b8f0d1cd6ab47bcfb193
SHA51202ddf3b20595585b275980ebd810e6327b5785d79e1d98d21458db4cb074c4f172681fea379c38b56fcb2b2e811227d9e9d6113fb64dfcdaf4381503cdf7389d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4a5de5ff9f784daaca38b2559b1855e
SHA11b4e5fd88e9b42e6d4d0760b585067553517556a
SHA256ceb6f1b0c1033659682c135ec646351d88a70d53fb1ce703c643e7c9efecb5b9
SHA512c291911acc6389ebbf24533f1587a1fc7fffdefcb32e9d1f7ac047e54cb4a5e2ebd4401075fa907eb37f3ab1e744af686d9bab860e6694e8e65b971ebd28f2fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0cc4f0826f2a5a9e04b13c076593635
SHA1d3f9bce23a9cfff18699f4b20602b9626a32a9ad
SHA256c24b01504302d118fb609c5195c197bd3c23fb990fb61a9c7a1273dfaaa94c81
SHA512529f12d921d3815e69adb9a661b2ccab096d513f1b777e1427283fd4dab745ae9d951fa27e9719c40e8563f0b703d55bc970a15c583722cb8cb1d0f3eaf6d6ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcb4c894dbdc63b36482f70734f53cdd
SHA11cf3f94a5276afcc5e68110c6d626cd00f2bb6ef
SHA2560f7d75a377325920d66466025969fb328c5dba6cb8b6430e4fb43a22a376dd57
SHA512ba44cedbf648a5627616e699f74952133e304ee347265c92613d38b56ad2ffe03e6f97f4ad87809ec73ecb016bee6348208fd5112f6d89adff1c583ac4730470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533f8fb248a8012020c11b50312e8b92b
SHA19da466fa7d3b696fc5bc1600930b3ac42f58842d
SHA256b4d37dc7fae218f0579c46fb3a15b79ece289a525410de90e6f2b37450ac8c94
SHA512658e91a513decc7c90e04763e6f38dfb04ea534a75fb38c3bd10105ec45ba220fd93f617b0d9c77b23601ad77bb84c3d94161af46446636c827f4bcf26a98f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58edf94822af9c2e5c906088a5e5dda3a
SHA1508730fd0d6ecdc9cdcecaa60f55daf9895bd325
SHA256bf9705f5ebc9ddca1dedddae162dda244cb0d87b946aeb4039d5459b0ff4d3c6
SHA512f90679f6b790da65f559fc80621a164378dff25e67bf4d832db9be6e37f1253f7352f0c245def3d55e6a5153b88f571878b8ed15e905be042cc11ea5de714aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c58c0c573ea3a6264b30dbc8408e10b5
SHA125e6bdbeaacab0df5c6d7ff028e42c1d0599b578
SHA25610e861071384e9c5635a103614cc4777f0c2d043c4c7aff1072dc1ce7d97fe72
SHA512dc5b142523ab11e7c74efad3ea66f01575e4edf651c3f6352bdb3c72b530d41aaa768a6ad07ebc472c39bdbf76250fca84a02313ae02c287bf8056d55a6be31a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515d19c660d1beb1d4381d4df04ca25c5
SHA16137afaca36e275855f23ba62e5a86b62e0d128f
SHA256e02df2d8022f9b880ca1bb0d6c31ab06fdb0df7389815bedd4898cdd4aea68fe
SHA512364fce945faad8c0c8607197239075072082b62b110d2e488241271bba516994ceecb8253c94500fbaff3d1a376c9a5de7e6576b0d6808297831fba8f370266e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e28b03a299b1b1c28445cbf433ad1a71
SHA15c3f3bd8a4568fe8832917bb37ab178b120d99b6
SHA256186a3b17bdd62307d51a042fdd7055ad4c88e6236eb11912b70cb3058302c89e
SHA512baddab48b4530ffced509d0b5e7c78414dfc0accacf6977267cd1bdf1180efa87cce73aef72c028f5822fdef521f057fdf6308aa342194b571680516ce7252cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e329018f89c5f395536496056a841124
SHA1a7518bd8c1eee08a5468c5384d77541457e4ac33
SHA256e6e53ab3fae039fd886796d1ee722e22278fa1aceff0a28d22db8e2cb357f4a2
SHA512f113b6586f29fa9fc99983e230c2c5e39aec130c333b0b9ccfd15ccc44a70ed06d35d1136c6e59cb6633a162b14d968a39af63d8291f6ca0bd10d4ac244b40ce
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a