Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
044f52078f6d7558cfcae38b6f53ee3c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
044f52078f6d7558cfcae38b6f53ee3c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
044f52078f6d7558cfcae38b6f53ee3c_JaffaCakes118.html
-
Size
4KB
-
MD5
044f52078f6d7558cfcae38b6f53ee3c
-
SHA1
12c4cf926ad366b123cb3ac951ed9084af8bbee1
-
SHA256
92f3de6e36850f04ac803b8402896d182b8720a5a1e73800c953064f99d11ab9
-
SHA512
f74bf4a8a37b7c0dbd15131fb78b0e9af172758777a592c0da2b171930e6b38552b6814e3eb3f3f1d793991412efb6faeb8fcad8295c89f1db2c88b44d767eb4
-
SSDEEP
96:6+URVV+ff1X8YUwp1Lat4vUOrad3t7FJX5NaLnGi:6+K0fdXRHOt48Oradt7FIGi
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000004bc7e5bc885d229d7c228d5da377f3c397c94ff6a4637036939f4c6baaf755ae000000000e800000000200002000000066283b958766a2c297ba421acc16cfac0b844498952f27b2e21b76cf1b0e6f0c20000000f09a53cb70ef53b6b8debc4597b7db6f53729a46f05914a75a4abc41de17b3054000000083b868184b8ae81c76334bff4abb7d472db8f8490bf79bf5f82c526d80f4fb4de3db50227b94700df354e52a4d9f9144aa26505a358c249c3b91f0972d88f988 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b004d0681f99da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93CC80D1-0512-11EF-8698-5E73522EB9B5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420438151" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2808 iexplore.exe 2808 iexplore.exe 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE 1216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 1216 2808 iexplore.exe 28 PID 2808 wrote to memory of 1216 2808 iexplore.exe 28 PID 2808 wrote to memory of 1216 2808 iexplore.exe 28 PID 2808 wrote to memory of 1216 2808 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\044f52078f6d7558cfcae38b6f53ee3c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5645660bf501efb31371e955990ceddb0
SHA1e49f55232b5247a56d845d568fb6b8fd2d0688bd
SHA25694cafb27bc16334e6c62a40a39b72238bf54addc5431e4a3b84e27612f81d6f9
SHA512c2c86545eec0eec9d96f347ad27cfd857e831555b211c7d035e5e61a0eff859c7b9070300b290e0beb9e9351013c7bd9e250d5ea2bba245e85fcfdd0392b59ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9ebcd3268107a4c00e02ac11731249f
SHA1229bff8de30f9ebe82f7b7a3e7c567a624053adf
SHA256a8443c2c2c7f52d1658cdc0eb714ec0891f5a42ea092fb007f9a2602bfc63a56
SHA512b0df1007f1e3f0b108a518fd3720d312539e40db3d6f67e3ad01012750551cfb872e4e037f145b4aa717577b0a254a74159355f3df2fb2ae3ecad7fba0713836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cb533c5031fefef2b84be9409ca00f4
SHA1d9ca2b1734d8adba9d7b169080c5583198b25c69
SHA256027ee7a556867f3cf883222fc555d3e89f7260bb043ed9f56750de043e6b89fa
SHA5120998fd0c3ea584af29af23272c13aa1d63f3fd38f5fc38b2ff08a09599b53e6e9efe93ca2dad773f20ef9c2b2630274120ce65c97c455c8c734170cc2bb620cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ced91056d4e7d1871bca936ff4585b8
SHA1aa8c5f92fa603718cbd82d093a429e5bece5a2f9
SHA256bdeaa94abbc64cc4c8ad2cc318e02100a79e872867a45ecff9af8ef5f9dbcb99
SHA5126311e849ada75324ada6696a9d0659ca361a53d8a6f3fcc906e49e89a73ef5929689d64ccee7b4450d28537b3d9e5e855a177c8aa99d6f1bd19729005533f417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59830954ec11e03081bf52a535d8a5b68
SHA1c1367c4d4bbc1fdeb16f8b24df1d0458663d98c1
SHA25686d6a2ee370b25132fc927c4ca184faad57fc0a6d9e22ff7569dfa262c4a7331
SHA512c3418b49353647bb77d0990ba6368dff4e75735d43534a5230c6f0c45f1831035ca8ef1efb69338f436c7efbe9b194f1ebf480d475b515489f6f46657fe3afcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56da0d1a222917dadbae2e6559b7cf5ba
SHA1862e5d5aafcc64019fcaa51be54937379f3f96a1
SHA2563d8f226a3a59a932458c294e9509b60968eee3ef1edcf38a81a20f618df92f6b
SHA512197098a1ae9b958201c8e12e66c3755a54b5e8b572da112ee0e96846869c3a4b786dfc75fada70324105f50a32ccf19fff3a8e3536e7304aaea06354231414d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549d5307dd8244a1666ec790696425839
SHA1ddb4de70b8bc31da9e6d11965e589c95353b979c
SHA256bf43f8b037e1a675db39273bb8c253832671e61cb431a80321caaec093d373be
SHA5128f5e012f932eb8b3ed0749e706c284745275901eebb1e74847803372fa4d6689968de9b650d529dfeadedfa395f9cc2cbd351d3b2f28d38491c45505453b72d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1f17319687060b7537d95700c95ceb5
SHA1d6b2dd1d05494f5adff1db3c8531540a1b34f28a
SHA256597522c5fa1cb4af146b2c6708877e46a7e293161164a888560c912ec69c9836
SHA5129c75a120ada07ec33e0e9042b4ae11fdf4d46e84ec43506f97afc34d080440432413d1faa329806cab7feb5d4ee1ef5bbc81825584f6940c1b86ed190112a12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e10c04ea2b04d79a5ef720f6f4105291
SHA10a8734aec1b90604e61ce15ff4ac9ff891f55b07
SHA2568aaaa6b53d287f5101f8452c77034e5cd747f463c38c79ddbc3956a1e701f474
SHA512e86ee63ec5cf33f36129b70c5a615a65c5a4d102c1c469ff7deb68fc922ac65f79951cae566efe40871695b267915a32976e035d2dc1f1df405805f41b644a5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50394a62974c59ef38d66a2ae959f3ef0
SHA16d86b44b751854f579cbee168fa3c9afdc1f610a
SHA256237bf6b2df632fc0b761381094b1c4ca5af12b06d8c0b25a32f9aed394835383
SHA5129cd1c91cdf0e8bedecda40ac7d4582b48afa618821bfc09cf4f897ff72a1a054dfaad27df920c3d2c777080b490d48d3f741e662e6245f5eaad1d782b9d4148e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5894327b437e10f86173dd04730b04761
SHA1d149c34362184195f0ce15c247a19f9e4d414db7
SHA256c807fc94f6e19af53130c87bcfba220e7cb249b58c75ecef05afd2fc5a92c8f8
SHA51224bb0120f5843a0daae88aae41e1fd2d6a619ab34b718f301806c9b8f7609c040c6fd8c43cbb7eba088ba363785d365f95b559db9d90ca7122bdd4bdffca867d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbb02ea8509713e93e9ae0a947402ad9
SHA12d4ae3238b244959146d023b921c02973bb0e002
SHA25669f093aed4163f0c3d5da73445e4c2d72e671288dd3ec5d9915697cdf4cd5cc8
SHA512af36a1cffac31d934e911a18163a82abbd41150866db52edff5685e58a76a0fc737e5c50a19a40b829055ffa0e934e20a2862e84e5f17bb48ad0b6bbb85662a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a8ac57466810428c0607d29a223e3f4
SHA1b48c0f1aeadd8e94244a4d01c7565d7a0e39ce6a
SHA256c1a907f7a2a13fd95b65654201d511796024350741e8bb1e922941445273e0c2
SHA512def8d870bbd6fdf49b28302b6d2a122ab7a97af36c9d826ae377acbd63380f41aef8aecd70bfd023193259c19a736508cac97963f5ab0048e6d7412554d95ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529bb7aae995c4f50e300a8c7668a19d0
SHA10c07a512d9693e5759eb54e6ab2162cbb0132edb
SHA256a51454e0970704eeb3f33784ddbb2c77e4e31eb99372c17be11848ecba98e77f
SHA512f3482592ad1ecc57ff9124fc68aa91746e1d7a4231851d5ac2f73d2a8fd4a1db51c3f28f46299fce1e1fa7e9fa665be7507e673566115bef68d8ff05d4a8b0db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d3ce954296c891adc7e48e165cfd214
SHA103ddf5dd5f93078ea9f5e59fb50c1bd71c113df0
SHA256d1b6ad402135777e24d42254c249978ca2df81315c34defc4a09cd6ac36e87cc
SHA5122b4abe1874f00aac20ef595972e0f641ac90582928992b4e2da281ee21c0d59058eba75fcbd90f4b2863ae755450940024baebdc8c00db5919944ba52c88776c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b64e70146af15b776780aa0bb3d35ea4
SHA13a06bc53f0b92cbc98e4d50ee6755e4b99db1471
SHA2562bae6db601bc240b63763394ca43d79880360c399ae20d41d06042887c8cc13e
SHA5129e0c49a0de4a92ca2b9280fa50357713034abe2c5771b0ffd53a10d6aa69b15a1efdada356406c1e795cb103fc6babd19d7ccec87d8d1843212a78db4315ccc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c44064236e2fdd88c3a2b5598bf15dfb
SHA1adf1a78e0af1207cdef0b3216878ca67c3b72538
SHA2568f8f14d32176ec578ff596c603254beccfe98c0289fe4b338f5e6a2448e2888f
SHA51232746192ffefa4a6372cc51b67f2a79684146b85d79d13dd2ebb7b0b69eb4b1a31adfdda937fcaea96a56169cc3221c32cfc35a6bf51e9fad6f1ecd6964fb541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f59e0e5bc0473cac816ce5695bd5c2f6
SHA10cdc9f23e3f3783ef8733af5e67a60cd88173809
SHA2569b1fa43ff88f84ba07be17a0b6f3b8b01407c9511dee16c2cbf66e182451ae56
SHA512ba96c18aa8d246f1c38d3f2649279746924d002b5f447f7b43ee194ade90d1a9f6fe4de1d35c5949281327c686ad67f42c017bf78e958ca863aaf13c938d1c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c6c1c98682cff93db8d843e1ebedd45
SHA162eb2f79b48b273150f16e27b9e49a47eb758166
SHA2564e16339a5ec31ac0a4279e0198c3806c7ecf41c26010e9b211efe0e337ab714e
SHA512421e394e2423f0d7e0c0760e6e4a686414c771acb125e231d050f20d12dd6474f271df924627e3f192e122fb9cc8b41e5134a52c073d754a1c0a1bfb2df2c2fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56980c0a15a3458d93abdb92490c9c8b0
SHA1a71c44fb91810345dee08b3c0016803fa5620007
SHA25659d6703ccbcdcd66d30a9a26732052f5d3cf99eab34d956f371c5caf16c9436b
SHA51275133922eeb1e2f687b998e766eb8692c69a4dcb44390bee9c6f69dccbc70f737c7a1d89c78c74c8434c83ecd1bbb9d327785adda42c62d56b83f7b6a6198b6e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a