Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
040c5306bf52eb53147f89e521df27c1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
040c5306bf52eb53147f89e521df27c1_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
040c5306bf52eb53147f89e521df27c1_JaffaCakes118.html
-
Size
934B
-
MD5
040c5306bf52eb53147f89e521df27c1
-
SHA1
d8f80fc564177aafe7fbdf0ed4f5d748f9e8be27
-
SHA256
8a292dcfd28ebbc6451f447207d95d58ee9c7a0997633b89ea279d647b6168dd
-
SHA512
e578c720bbfb92d65d2e7e12b2be100098c06e694da0a523038448b62bb4e9c6f74b3d6c73cfe96dc55bd55e62e8c2cd2713ad8e529e8e5c9fe506c1f338a2af
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000000444e9e3b2c0343657026881031af3af8a2f79cc4b716a433435cc32df7dcaa7000000000e80000000020000200000007445eba924f92458a5b07f4a84695a1023e01bd2daf7495b5cfb80d7892348bc20000000149fe8a43cbc33ba9cc7e8193e9f5c18222cd5cc41c524e97472d63aeaee71b640000000e7d3cf21d845dfb034557453984689561af8242175a9f92c5e212bd46012d0def99effb689f1ec2d0aa477ceeae6f2939a20710a5b1fddb8786642f8ba5ef2ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801d50b70899da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420428432" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3B0C771-04FB-11EF-8303-EAAAC4CFEF2E} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2340 1948 iexplore.exe 28 PID 1948 wrote to memory of 2340 1948 iexplore.exe 28 PID 1948 wrote to memory of 2340 1948 iexplore.exe 28 PID 1948 wrote to memory of 2340 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\040c5306bf52eb53147f89e521df27c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2e766e33e4f58af14b639bcecb09384
SHA1377424b7e3c5efb35542611f6e9801ef81216749
SHA256843521dbc7e5c2f506a98c7ecd963885da5162bd5d3788e26168629a5dc29f42
SHA5126b3c0cd8a16ca85797aceabcf7581318ebf4efe73ff619e3db59daf58b8baf01ce2ca3530bce0eb8e963c1d624a16bfac4a5503c61be38d97ea86e1d496233e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adcbf8a1362e40f5e1bd6b3b9f3213a6
SHA1ee5a7748aa9eccc6c4b68c4d9c691ce6b2fba2b3
SHA2569a137a6ee4dd780284442ffdcdc0898dac7820536264eccdb418066d37ed93fa
SHA5126315c45489430a890f72d188154baa2e356da397427ea53fcda70a93b13a2c2ea20a57b94379f1270a0e053469761df2b941d58e5437ed3a7998b07e57552736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573f4286f04386261ea41d36b73621279
SHA1ae77c43ae8170ee1ca23159be06196ad3de4632f
SHA2561346c7c01d9f8d12acdb4b6df7ba9f36d2a0b307795f8f528e23e851d9507ed5
SHA512a0f4cbeac633205310f26293009a408087df7b4666de68e0de18eb69266a94b6737554507f248ef499e376757c31499555b4e91a4805c63cf05e2d6eb1e38ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54887a03a6f98e3e8ac8e23f7a2c0fa64
SHA13a2a067483bf17ae63c67033f21606dc6615cd52
SHA2560eecac90499454ea2264a41027eae36fadce7f35e6769c7fdf23a605dcbda5ae
SHA5122fd9b4ff50098d16c6974ff57dffaf69a540056e25f8768b19961ef570e94e1dd20956479d5f9fac4a66ba30d0525dcceac2044733be0df54432c482d6a7f1b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3dd2ad054c4d0fee529ac0e456071d3
SHA12060db29cc4a977a03d67bfd2de4bd7c84c744bd
SHA256092dfa965295f1627f4dc8041013e8292f8fea11da0386635debed54b12a5b4e
SHA5120b4516f41d9f71663fe6657940db174087001f9cd388bafa11186c79129ffcfaae4c54f77b15242c4a59814edfba7deba66c414e883b4aa74a6af9150e02b5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5652134d86d0ae7446317b56fd98d0543
SHA1339c0160beadbe1182be1cfc31b72361fa1ae3c7
SHA256b811f81fa65b79c0822f5a65a670ce36c076a777f4c23fde03174e57cdf0d02d
SHA51200c27343bd8bafb24b9d01a0a2ffb8da951d6358d93d1f4fb9edc3b8b9dd55cc8ae27f874405d0dea05d20cd57e96e359a9ba34b1f08825a50c7990b7c3835d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54000fae660a556dfaed196a4f9eed88f
SHA1fa3b43d281610a79803127fe31adcb7b5895b540
SHA256711d4dff5935e24c7cc7b9c5d4ac2c16a5175a8ff27553b6de9b3c4fc695425d
SHA512dc902a7bc6af29395e4c9e7118de4df1baeb380beccf54845b2c0f5578695f0d8d54395982c224a94c1b636412c6daa6f172b3a5b80145ca62498516afc9fc5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d487bb5bb5564b4b67ec69276072420
SHA1b47d1f1748b6f2dc8daea5343c3b97754f565d2e
SHA2562a0ec3935991287c222fc77b3b63f7148a327f9573b4d6afe76572df07967a1c
SHA512568764d1f164bd2671123891bd0c1f0926b976ff2edd802a8a165fa10a1dee990dc9c6491c64082ac5c66681edc96a1bd48a704ce8dd16a0cfbfd56cf291408b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c0b32a460a7f7ed0ecd96a2626728e6
SHA172f5d2990d1a1a235239a5adafc8b55d21f923a7
SHA2569f4d7ffd024e75ae848550f333e1df2b76d8c0ec59b573602b39675b585f3f28
SHA512b46dcc7020d8d47e58e77e9f6124622756f7e173af8ad2e3e8590c1d0cdf721f403851bbda78f29c1722f01cfd3805dfd320460c1ddead61da0e6a75c05b0e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3eb568f84828bd73a506357f755b462
SHA1ac6214688ab84c392fa83ebaef31ce2424fa0de5
SHA256d351400e4131446f93fb091a4b2d5b989a9714989bc59ee3170bed936fb87f3d
SHA512c90cfb040784af479d65f0c9ffee94b76e840cb705dd86722dc5313d6d0a4748027bdd82d520ad060344b77076ea0704daee92d56301b73fb3c70051d9740347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd48ad10c2bd929d60caefd3dc007e4f
SHA176ffb4e8f821f2d0147413ec2ca9f4d7b305ab1c
SHA25640ef9decd785a14a55233932db2a58ffdf5801704745fca1616eef7b0b48ac81
SHA5125fe474ae857078e97286e149d3849f3d35b5efe34a37c712b958aa0f4757164161394bb02f08b10d5922d7654f00287bc705c13575436b4905e9827ebd3f1c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d5851b0d874b43bdcec9a0d28c2b5b8
SHA1d4d559512eb0b40628cc60c9034fb47addef20f5
SHA2564505c38b64591d12ff2a1e735fbb2e6120d2efe09482fb08f740851a0ac06acf
SHA5124c424df3541ac62c8ecd851ce43438e157de8e8ceb2444256a98304b54ebb50d7ae7d9928c6f1a39a01b3f8b0007b20f5704da9c4fd2636e2d1ecf913009737a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5251dcad199a0bcebcdf41c6726936487
SHA1f0ae293c78deb254a7f8d33d67cd532b19df8536
SHA2560f6793c699992706720864ca25013cfcc4694be7d57fa951ec31039f5317f255
SHA512c5fca44846898cefcadfa0ee7a4b6d5b3caf05cc8768580cf33195c63c3ca37a6cc3a9d6f1788582efe69362788ff99234add0ec99014595ce688210862ee731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1643d7f2986929f078d1aeeea4e7fbf
SHA1c81500932ec51de4cad87373bb6e5c66eecaf311
SHA256a57b47c64f1eab2d668e1877088232f24f49cf6dac2493d3c3e3c69baf0b509a
SHA51297c650dbeedf900e879789dc331f629a74442546b28b78fbbf3e423cca1229b7ad78afd4aed55aed8d9894e3a9eb6ef614e3827a710c4f6c680b86a21f321c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bebbeaaaf0cc3314ef655aeef6a982b7
SHA145eb4d6bdb56254dcb45d42ca76d7808d97ea1fd
SHA2567107e6d991d917d80bdfc098a3acc1357bbbf24c29862d343a0c180a1a07f4c5
SHA512afa28806355190d606a8ddea47c56c5065071f8c07917c0f5d8a8dff49cf3a21a8a0b1f0df5b014dcb2490ebe88d22730de3b40af5de2f8e23001d012a69208b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b516a8b1fbfde9da33b881a96262a6
SHA1e4a9105a79bb4461447730fc9f24d7a411008d13
SHA256419c5e9988202c02f84d54d7eb78cdbd50783e99c0b36c1efc5e9e1f6fde69d7
SHA512101d4eb278c2177a134822b16b0357360e0f18f2f40edfcbf44dbd8a4a66661ae9a7eca5316f1395bc00fea74ccd6be918080071be6b43aea5a745aed9651fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5534b334f77775bb69afa2e6ffdea2c2c
SHA1962df338c80dcb1916f063d7c7c3f6e2097a5a58
SHA256f0d153ec73f14b8615a8623409192bb2dcff6aa7ccec9749b8fdd81152fd14a1
SHA51296e7e5112cd0727d19129fec34d118dda654fe3a950e312ac7cf31db87a49f3cf55dab36fb52f50813d2a9c5431049c67141cebba021e68163f8426014cad880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b9c8b8a6d38489b55f8e492d08b5cc4
SHA1fc0e74d6dcd7515611424aaa62df3221ec00246f
SHA2566f2d1db9ce75d847796bef2caec019b86ced7bfdc7eb7468b6dfc689d92e73e5
SHA51236cf24610392f80082c77abc0e0851c31d70a762106de7ccc1b204d2ea6dd1f8011cb858ede292cf047035aa62d95121e53c8e0809f9a4fe9963094ccaf5d690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f5c0ec58e1f88d5dc7f6f5cf6c9e0ca
SHA1b17bd51fa3ac39d96d59d10594fc99d3bba12c8c
SHA256f586deb6674dcdbf712ff031ba2607b59d2a632bc5e67248e4d727790576c453
SHA51269ab6f77fcb9bb7b3d0b08a3c96af4d1b212c1d5c6caa0b840ee906f86c36576d24eb13cd09a5ea554b62b9cec46d573b635a97873a407083adae36ed0d00ce8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a