Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
047b0db86239bc2a0ce2cf9f9a77b1ca_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
047b0db86239bc2a0ce2cf9f9a77b1ca_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
047b0db86239bc2a0ce2cf9f9a77b1ca_JaffaCakes118.html
-
Size
69KB
-
MD5
047b0db86239bc2a0ce2cf9f9a77b1ca
-
SHA1
d9a379a2104d1a0fb3fb930f15e6b3af73ca971b
-
SHA256
7b2fd119bc44efb5ba7a4cda69592e6c5251abb650d5b19705d1a57e3226160a
-
SHA512
15d340c2b05006a159943843691ad34caf6df39d5a026ea031528db09ec8b8d7e7545b10eaaa52fea844867f60efc244d2222a5a1e116d0394ee907b66b5c046
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sz6MRmJtoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:J3/TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF569761-0520-11EF-B33C-C2439ED6A8FF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 006cf4d32d99da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000f8ee3050497551736e7945d1057f36f588f9049f8b6a36c80a58c278a2e4bd39000000000e8000000002000020000000edb98d29ce2dbf662c61bcbd96422032601d24414c3c0e4225f9a8a68055b09920000000568ccbec32b2eb5550962e72068667137a01ecb56d9722f86508b15ddf09bebd40000000a49f3b1f814f15492609fd3e10e6c57134446bba1337987693777a482db95ffe333403396b98482f953f9ae7ab4088385cf3e7fda37a37d3db3727bf1b7924c2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420444343" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2368 3028 iexplore.exe 28 PID 3028 wrote to memory of 2368 3028 iexplore.exe 28 PID 3028 wrote to memory of 2368 3028 iexplore.exe 28 PID 3028 wrote to memory of 2368 3028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\047b0db86239bc2a0ce2cf9f9a77b1ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c5720dd559391f3c414c81e014b0136
SHA16b1db3b360ded628e06c8c8fd8934cf44e1d3b0f
SHA256ce2b9ec1998a827aba090ab2658083ad4bd07b6330e4c4e58671843f7411eeed
SHA512d5005b814a6e052b575bddab8f4a33bdeaf3d3035075944f10b9434231da8af9415411832d586b157157a3aec6039adb8bfa20b90946bd3a1d7de07afbbced22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5910a93c5fb4dd9edb55ffe588a436b74
SHA1d436d19a1120c092ad436bf6a8bede2fa5523331
SHA256e6921c074fe6e70cc93315a39720a224861f5d35333bc37ca19005512068e6fd
SHA512b062995678742a39dd7129d415ee0ffb9eb87e206c52873f8222f011b71f46025a6b75dfa8dc9b4d2ef8862683a53f21c7ed7cbe5d4de0a551629f42936b56aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57db3c2d6de457832c661dbd49405c581
SHA110ce6f6deb7b864b0b233e090621fb9c8a3b952f
SHA2567b640df469ae397932e47540e46c10e9f10344ef80f9d7986d972b8f117113cf
SHA51212f0b20def7ecd32a07f7a3ef10f5b3215515c703ff812305e5d6e98541e60e5cfd2d9d42d4a4da14b1c326ccbccb0b7ddb7648a0ec52cc3452ae85ed9fe4288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573dbdfb8a9ae5353a8b6dc6442412fe6
SHA11d14db0876913b947cf26b1e250576b2aceaec35
SHA256048e2c242f92ebd63e8064f64522edd113559109a5129a5b80fb6c27e35fe34a
SHA512202ecef217d8c2342a8090759e0c2da655a65e996d76fff8e5895d7152d809854f458e5e7e4725e7766b450345631bcf807619a030e24754e7352f2b109a07b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fce44d25ecc6f637aae8e5460f2616c
SHA1beebdbf21982c1f143da9f61ef81877313573c31
SHA256a449356ce09cc059f7920e7d7928945172cc1774ccd3091a7ad2c290fe6a75a3
SHA512f27c02618b3d2e07aac25a584fc788084814bd26d69f403455a85f0a22adfd8d6c712cd9516438ba325537afac92ac32bbfbd68d1e675650dea1e203155daa83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586ae0425212f9f373c682949fb68fd37
SHA18c2760b2e375288df7deb60b2b2c8f0725f56cd8
SHA25697b0241b9c973fe62b9a9f626837cd4c0a557b400b3779734fbd6568191d9c19
SHA512ba155ff68280425b3cdcb62dbba82787048290fdfc16b6350e6142d565c00a644dc717496593d94e8b4157a8b3bffa993f891d9ecd5a0a0d31c47c739d475b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1bb2db4d7fadc54a106ac993e303864
SHA1fa46ba86dcf1de5c14cc2e0c96f6a771a3b85c6f
SHA256bb89ee050790eea86ecc4e8fefaeebb626e5a818c37516d19c852461c295d753
SHA512f75efd773b373f15302f3e38d3eb8cbbd2de35f07c0ff648bb0d3a5aba44d164a5ae57dfe0f6c2e30794162c802c20df76798eb3e74706e72fcd42629d7e09fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5969d81f6afe7ae3d96c06efd25042e9f
SHA1c53445d4dfa03e6c0cf4c671a82f4429695c4121
SHA256640ae0ad46c5b6200112ff191f51f0cff4666a8acef47432268878b381c179c0
SHA512ba6bfd1dd5d5f9a807b78f2df09457760369a20dd7d23d51ad3de4fbbb8df2e969c2b36d5557a18a0d26e822cd4ce0ec607d2fea00c957f64f2dd19f257af44d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e709547183a4a01edbe74a664cfb1541
SHA19e558755ca9b356cd935c79ea825ff3df280a3b4
SHA256945d239146ee393dd693c88e4ede499c27e28a42c863c9bf0acaf967136ffd99
SHA512b4097434cdd63e755146f798e75e7341d4daeaa27792dcfba9d9921d99c0e1218f886b11d2075c52727eedba55b41c88efe6f34b4a92fcc60df393fa01dd4dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5404ef1cafb526c9244d874db398b5e3b
SHA10e041ba68fc9591edc77f7b1926e2b292b05fb49
SHA2562773c53ac72bdf13508b715cfdb22573c91b08b64208e3f5b282d81df65d71d2
SHA5128e831ad480e1c8ba0c078e2331b215263e1f85d89b81a7bd18a51c3b1d6655a99a31275443137c11be245c1a6e2c8de729ac8d2c537059f96da2390b61b24ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590a93d684a0c9856da231c8f76aa5c62
SHA12dddbcd146df3699eab389629726eb68c14520a8
SHA2567b383ba8b3ab6ae3bfcf90989c9dd7f44b125930884b85787909f305bba0a5a1
SHA512a9dfa10db27e98b2ab974115b5403a83ef15b120135d7bd4bb143ece87e53b93ca057b478c2c71dc484a9962166bf3e4321b7fea58dc32004c13eef9f8f9f265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc95cdb30415a57e0575f55805232476
SHA1e1def13f244c0c5f9ad3147e882370046f22881b
SHA25663a40bbf3ea163a6c02f3def53b85b3710d64f5257bd209e53e9e358a31de7e8
SHA512660565821b5566a6e7cdf45fe8d5f02284083b2aa910485496e4c5a580cf0fae6701616837fa379aa6554170b234777a573e1829753dc2db0dfc59cb9f08c61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d8a3cbda2508cd86cd4f8afea65e919
SHA19ae335165b5394b8385a64ea6a0a2ad4e7f18c0c
SHA2566d0f2d2f7b37dcb9716e9790e3708604258a25b8c180fae2593e5bd537f0ccfe
SHA5120377d68c4876f0ed4ba1d58a664b140142dd0637154d1a511f5066a20efbd9835e21a2e0388b2558b3425208b0541d4800c09643f332fac7f0988e6e8e50fa99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59499929767c0978c99a096f319c1a9ad
SHA149ed63a4319f79ffb661af0a05040a31f6463830
SHA2569256ffd2bf7c8c7be285932aadc734bdf1c1241ee2948f83d98d0ac8d8c38289
SHA512547ad04db564d32fe5f0a6149f19f7ee2c87ed64c6a9d6a32525dea419a97fd3012ed9a1de65da39282fe4bb11aad7394df4af872601609adc89a2f2a88d16d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5327bd73fabcff2a9f0c033638e19afd7
SHA1fec3bc69e3e5f52570df5c8e68454eecec5cfc08
SHA256a7106e816d326d7afc16913ac9ad94ae605218184ce540ff4522df7c9d0009ad
SHA512980f978fc93aacaa17cdae34924a301592cf46dd6a5010f5c8f3f32adab0c08f9e73c169a541fa37001d7e1531c23006a7c04204c2dee35546fe8a0afb50c4a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5871fd0e975f41d6762ea681b716e3536
SHA128eb0e9530bb30503a36fd4950b666cf3354b23a
SHA256234b549284c561819f1ac64c44a43b9ca34cc46b93c0c927912013b6b4327a01
SHA512c38e1bb5483e3cae359088972632a18f2185a5e36d0118132bf58d85b4653f40092019c0279d993f3964484cb11396591b7ba44f1c98cd409ffb8543707207b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5418238cca6c896119f60ef6060c84b8b
SHA1d39ffe6bade4315c2af7b4fa9b0c7d0bb86a9249
SHA256288a8e86095e91dd5b5a97b5f71298936d9c2f44498254e60cdcb70cced0d13f
SHA5126ad5a48f6766aa46354cabe44e5c7b8be5ffc29a61c0e3cf4133034cf2c6a5c3729b715573dc632f95414eb83f7c9cd6c9b91ba7a5494a0b7228e9bba2456432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565e04c97bc9b5869e2947ed558bad73b
SHA18dd67f574311f0089d991be7246830583a2a8776
SHA256aafd1cea9a90a3747dc77c00b527b2e18ecb4f1a21bb34d5f3a7fc96be9d046b
SHA512abdb13db1b5c89028ffbb473876029856ec36c628bae7511843ea34deefdc72d049edfccc0978498ab75f4634cc14bba97e65f8d7501c5cb8b4fe85d3e5cae2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ee44efab10e43f7de4b61e71e31b1e0
SHA1e67bc21aaf3b19f375003e74c2ee7aee98aef1e3
SHA2563734f58ccc36d56a89affeb90702be26c5237c153d69a8c06cc999efed07ebbd
SHA51238b063d4511c65dd67b261870cef1905db853d71ba52c24f14e0a7cdccdba1005bf2ebc0230816311626ca166ad3ae49bdea90bd13896ecf812cb92da29d681d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a