Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
044c82db43e92f723df5e9da84a5c934_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
044c82db43e92f723df5e9da84a5c934_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
044c82db43e92f723df5e9da84a5c934_JaffaCakes118.html
-
Size
4KB
-
MD5
044c82db43e92f723df5e9da84a5c934
-
SHA1
b46ffd63e962d6053cac19e6bfb00dd824259871
-
SHA256
279ed00271faf6a0b1134615222862d0ca3a47305d42f0ab25889d58ca789486
-
SHA512
2321691a3281e9212c423f12b585e875479bb785ce9f3e890ef521c7f5ed86c15cc537633b960427efe39d2116a9f19eb1fa7c43fc7ba11b9be84c146c35fe82
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oZjUV0Nd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97EADFF1-0511-11EF-83C2-E25BC60B6402} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000072a596b5f225656a92489d0e988f9733bfbae9666bc3a4c32285d6c699b7e0b4000000000e800000000200002000000073ebbc31d13ffda4db1ab03efda9430bbc04ca55593758596e56fd13d910db9e200000006a4a9cc316db7578298d01547fa7718744849c0868ca803ac14f5d80415c635f40000000e4c77cc6e9ae0d90898dca8a257c3b402a6bb1bd2ee07c0279f7916ad834c51a0b0ce66da055d5e24c5d253fdaa84ecfcb32d8f24644e3f50ef7583a3be927df iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a03a8e6c1e99da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420437727" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 3004 2212 iexplore.exe 28 PID 2212 wrote to memory of 3004 2212 iexplore.exe 28 PID 2212 wrote to memory of 3004 2212 iexplore.exe 28 PID 2212 wrote to memory of 3004 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\044c82db43e92f723df5e9da84a5c934_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5968f5d0e93b3b86b6607a80748911b6c
SHA14621cb1c65bdf4f9b0c207906c2d61001a78d00e
SHA256db72963e3528533b6a8d37b2e0e48d3c147f7532e2f10253df17db220c28a4db
SHA5125dfe153bf1e0914b0b6327ce9f3ab441bd6ebe067901c128059a0f8b76a0855575335a6ae2003dcf1f0560d81934afcbd4af3602b5af85919488ae78bd8af0c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a396b180ca5f36126b24df39d2aaab42
SHA15bae8b92be4129b401d7f783096e4a4af7a2ee90
SHA256326cd9bcba7bf81c03b141aa88f0ae5c39d34f4c30f36ed778a93d03635dbf5d
SHA51278df94a61003248e20092bf5694be846c286a649a9772a13758b8155cdc05f22f0618689882fb99edb7cd19e0a88b1f095d64423124006455d5e0849eac88a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d67688fcf0ef4ffe43dd929947b23cef
SHA1924a3c6491f4d1597b0335427677f9f73b91b61a
SHA2563d755438add712d4625c690cb734c21b7ba4e1126ce90c0f2c626f17c90c0ee5
SHA51263387f263240e4c3c03d4eca79f2753693f9e2b49d57187814fa6cd85e94625ea284078b56f19b9eae1f7c3a33a75861e176e392012b551c8a1bbf560e4310eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54b19eb16803369b51dc5512ef232113b
SHA15af8e6f4ca3b6a41caaf74f763b3c4c819e644b8
SHA25673a4baeb3b5b33d51ba287f12c4889fe178c202af3797f76bd92b938935154bf
SHA512b7d3c05d23e1e62ee2e1d293bc0f0ea6d32a98135ad80e0acfeb4665710183c722e9f795c15553fe62b4c8ec9a71d5df274a00748ed5aef33559ccb5f746eea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e6d23e00e76970bb7a1197918956de66
SHA168c65c834c57415aa885e1f564c94d7f4a6eb0b0
SHA256f6006c5ca08c4f0815ad5f28e787ed69269acfb0b3f3f6e21671765b9f140eef
SHA5125c13c46d8f9a060825a56dd7e01d2ba213c0836b654fedfce5b3dfb394dd335b53cf08082c46eb85517df1c8898b3d4cfecf71ad0ff73d8a9affa08ceaa428b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dfaddf68c640ccce172a6b45deff9927
SHA15984f953b37b38921d61c9a773168a56943d7c05
SHA2569e7a13d3ecf0bfd758eead408d6346ade1848d2bbfdfda7bdb529fae3c46ada8
SHA512da50842536101dfca16138de6d64b097c1aa42103974f3506d08f576d576736a3a9e0fac1d9befe53365088a9b9829c57efd08e6b6a02ce0ddb6a9643a38676c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD556c5c59aba30610eb9d2d014ec5034ed
SHA1775087071a9f996a98a97b89977c785c923f67f5
SHA25680db353f6a4c187f5d314db406523a8bf9bb697b44da7d8d4a9e3c64bd6a9f3c
SHA5124be626e4af9295f86952639af98ecd1acbf924babc2409680c12d38c1d5044ad6e0c3f43ead9c38c2f306e8dcf1203f8fc2cda917fbce5ef7fb57b4dc8e899c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD588cae49760eff989c6b7e6c154751382
SHA1a392574bb927999b5280e3d8a504436fc4bdd430
SHA25626c9f9db98a4e2f30768d71d97395f3affabb5bbe60e3d5b0f5ecb8eb21b65cf
SHA5122753f280173c97b2af816363729a4403a19d794fb59fdabb7b6e061bd94e73e0bde95689b819e12b886e1c54fd67cebd1380c624c5e64d394b8ab3ba75a7329d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba6652e56761626acc70a367256bb2d9
SHA1d8980db3225fd407aff18844cb5c50218a86b893
SHA25643356bf86f47d163151f324f73768a11f8f79a0655658740b04dc47dc66b3da6
SHA5123b10d76eac9cce09abd4aa989ad9311de57231136865fc3b00a5724c9e1956eaaa792ee8bd3d955d41c012f8082514c60bd8922ed0a64b7b381bfc3b512259e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba8883f5fd4cbcf75813784a99954e5e
SHA1bf93b15d3bec7ad3f60120d8f3a434ca706b2fe4
SHA256dd01fe93c367a5a347af8a610006142e46647055b2e53d0606b356ad5d37cf9b
SHA512c8e7b1d288da4f993a8916276809f5b90de52a73d1a76ffc59811f1a7e2a81a2272a3c2255ba144966d067eed76ad966b61a391dcb97aed689bbf6ae590b1513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51a7b0c4b64ec9b5317b8b896859be1b8
SHA1b6a854ccee0834c5e4e72d8b43b6178261a8a752
SHA256c61fa9a01da6bd6cd407276208528af3e3b90a4ee499003791d0c834086530e4
SHA5124e621f8f57bbc4151f8cbededc36bee33d2cf6e8729d029c72c2057a8c3c3fa66ba7df60ffc717c608267397382e8bb2c5687730401e5cb9b9ec5767be4c1d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52038757ca674a0ed7289b62b79e182c7
SHA16adb9890497d7414972ff0658af79494e399b774
SHA2567bf81ddb289858d32c09b7aeb6cd323e53dd2b9d12e47938f9e350aeb0dc1268
SHA51244e61896b4f8291914a91fb1cd70793bcd8495d2da3a558400120d5d298804efbb212c31eb238b578c22c88d0533b42f50cac3e0aab271d12749a1f3c19ce723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD526b3e6b96dd49d9859e26a7b97aadc97
SHA1b6cda7e6aa0f66b05575ad6d4e7f8d10b3b9ebb3
SHA256638cf17f12df155db47dcd5a2bb04ce821f2fe08251413b0a51c5690cc671c08
SHA51203ee392bfbf9f74a0424160e9ec89219c7e1beefc5b29d3028f5b0aedf132cbc65ff6b97a18b82137be1f241887cbed0d6c564773e589486cd3dfaed098e57c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59573e2a7fa0fd099313b59f8054d10bd
SHA1630f5db6f15b6c553109d37c8243e85c48490d84
SHA25636ff05001c08a8ba9bd37a161aaad1dd10ab55a81689e8d884f6a9a83067be6f
SHA512453daa6239eab64b0998e032813435da225bc5047a1a2df23879ef9e3a221954493501499239a442064e0a775fc748c02b36d49ccb20ff14d5cd2f98a83b6fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c103b9128a40fc473e21e79df1c6b6eb
SHA1f76b7d738cdd0992578e81dfa3cfa63a08b190cb
SHA256b597088e06dc3221fa7e855e65fa71e8abd55111a60c5183b7ae37ce7843f2fd
SHA512af5c10928b9c40396135b8944dd70784cad05c01624c28da1d76b29ef91eed1c9e117351b388475790c9da915d568876cb1e50752e5e3024679df5b1b4b8567b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e2dbfc61d5332fd08f6c35ed2128caad
SHA1b4ee85482bfa5eb270cb2529af8fbdf9c71359bc
SHA256529324c7a15c0c05d45eb2a7fa279731e7a72a29161a4080a53b0cdf26b12719
SHA512ba3c579584183ce86ff279a05269f0d006bbde03b0a59425c4c9db8c017813f495a04adac39f5ffbed0126b18dff0b0f8b123317f6d58deddc79c734300d969e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5661556611578b19e1c5c9af7d882b5b2
SHA1a59c5c63cdbeb118a2956b934c71f3810599853b
SHA25687ff1348dab99dbc60fb16f74fe07a2d4d426d62b1ffdf75137504e6a2328bc5
SHA51294727f9f103008cab491ea20d62e54d3ae75e5734fc9bea61b7dd38006c5e67e32f596dd462cc50beb801641b13869f3830ee1d87f3eff40d1f49c061e356e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD544a14dca3321bcf48f1b7bf099459350
SHA18e10727db5df9288794399f622b4f28187d05e56
SHA2563edc0341d46882e29ba5b54dc1afb024ca44d4f625c84727cad13adaed4b9418
SHA512bd00704f79265ae28a4cd2b32573adcfd7f5d40bf4b97f1b33d6dbe9d400994092d1dcc7314abbccb8ba2ef3d15b97bf5665ed23351dd64f2529710695c2fd9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5edc85e94be67c1fbef4fc85e8fa2ad35
SHA11ead804b15f5dbf0943b6bdff363b30968253417
SHA256480d73c1e99e3cdcac2baa42f83a15b4ba87dd83a20dc047568516280c197860
SHA5128166fa0d934406b4c09cdc7a170adba0adfbf6348e58cae84c99b2046dbaef252ac2db18039bcd4c2306de98b16242dd098043478b3304a6de81ca10aa8524ad
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a