Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
05449543f514a6f0394e850c6cc13570_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05449543f514a6f0394e850c6cc13570_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
05449543f514a6f0394e850c6cc13570_JaffaCakes118.html
-
Size
795B
-
MD5
05449543f514a6f0394e850c6cc13570
-
SHA1
8d8f9c28a4bb2274d09324bc2406821bc400e5c8
-
SHA256
e38bf74a7edd347355fc7e504f25603af5f5d7432f0cb46b9c6121d283d33901
-
SHA512
56d9b53520d5f8f280aaea53c745211794222029557bcd4f7b507f4f988e7b531c0f347bafc882b069ee68edb62c47a523e4caebc9f245aac48f9e1b7f9800c5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{289C9DF1-0561-11EF-93E2-EEF45767FDFF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000074446777dda0975b0be5615569c65b5d07e3287a74e43ed80cfbd7438e3a6d1f000000000e80000000020000200000009639ab7c7a19ae8b6d51be367d19b62f448f6dc2bf05259797c28a93e5083e5620000000e06805c91f380c42c9982619bbd7b7283f5a6e2baceec2c6bb9fa254fef03d12400000008e6ad056b3b3b93f47fe7a61306ea3dba8211ee795e822517ebcd9127adfdb2a29cdf24ee65cb8224c8f480a6224d802ea50a6ee64285f4002ffd3376e45414f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703d0aec6d99da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420471900" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1580 iexplore.exe 1580 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2476 1580 iexplore.exe 28 PID 1580 wrote to memory of 2476 1580 iexplore.exe 28 PID 1580 wrote to memory of 2476 1580 iexplore.exe 28 PID 1580 wrote to memory of 2476 1580 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05449543f514a6f0394e850c6cc13570_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50200bf940af4c7e3306bc3878d8cbf55
SHA1dec4ba362218cf435be9a361d7692c6d0008bb66
SHA25636f174f0db9c5bdc3fd76c7ea67148a18c5259c7dff16eaefe6de461cb2d0c93
SHA5129492f41aab00b0c9d3f65af447d580489d387a0dd35d7fbaf83a9270099fbf547cc9d14c99483918fd38d584de8bc3d2c343236c743396537bc1fa043db75b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54195d24f51bf9e838d796bfa0c8599ac
SHA172b29839c1e6cb11d881debfe21d4adb4317a356
SHA25619ffe59609081868a8c2a7555afcbb8e73b34af7bfe0144dc8d0fb366a7e2c72
SHA512680f58fdbabc5232d14aa478f41da6c114e79fa09d7e647f52770d055c7a4555f13ade705d4352c881b40f32ec5dc98d02accea71604fb330877bf1c63dabf15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf9df9624887bbcad4552b6a3fee613e
SHA1d0e56784aeca8dfc450f4cb0edd77b243ef00630
SHA2564d47926bd01a208d4e5ffa3626c95be02802ac88959f7116b0e13450bace08c7
SHA512185165811913e74a910b18ddee4ee03c12a883d20ea84936ead28a7b7962da3543c6e55d372f26449ba65939091c84b78c1491da3fd30cc28322c59d8d0938e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5380fc444904816d2e0027c9c8cd89c37
SHA1d497a7f5d7960dd41fff451a771f4911521efb7f
SHA256e4eb8180cb512af762f8c6334eedc969805a2f316d44212da8044763be4994ea
SHA512c4222b2f13f89cf2164beac2fc1b0285f2da25fdd8aec17bbc92791114eb8a38268bb43ca1aee9b72f9ffa235113d9f281b3c276e2e57b64fb6c19277e867d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffb63a046f66b5954365fe549a6f381e
SHA125343d89f7f6f52c1aca18247f8aea2fe9eb638c
SHA2561241548116763c563891bad4f40f26c177e5dda8ef1d8445db2ad543d0117c6b
SHA5125daddfa90136ed94ac827d7f0016da4945b6304357e10b0848c9cfd89df9bcf40e57d3493aeca5418a0a476e67c51d80a87a29e746a11a6f2eea48bf3e13ae1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c0674020ffa9f282a987782034e4879
SHA12eae9cdbbfde4f7f06bcd9f3f6f88c43cdc4cd04
SHA256b8093b2f718f90dee65e297978cd04d1c7756b68016beec156b60b8f71e2ffd3
SHA5124711a5118fa13665512820d84bb9794ba94f23b672b901158c301678a60916b41099c651aedbc0c64eb9219c1dd48c5739f5c04d43f12e4103cc09b6764c40c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d4413bc42a36a62ef6915b36b0f46f3
SHA10cc1b6f076514ad7f18efead4e0ccb2da6f51da6
SHA2566354f62a5f71eea5cba9cff6e4fd4ffd4aabaf5707626f88e739152119e5ab40
SHA51241d148407debde678cfbe849875c96c883ebe50341c17059ae0730cece4ddcf5300fa54618d8b76490b4ecace18b5be18ec42f108d9d49091f49a6d57c66f5a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574ea90ef4aa20ecc425b9ac84acc0eb0
SHA1e221489a6c32a358dd26db3636fab0a3619558ea
SHA2560cee59222c805dc7af344dc5a63adbbef887e98a53798ee131965e0a1cb3e09e
SHA512b092080751c34803ff2509c0c843fd7ca50af3b6228cd4de8c11648531cebf81094e96d7681eef885f87778962ecad4a58d25186088a204915d2ddd2bcef03ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c48bab4def8cb89ddd5b9b93caca80f
SHA13be422d0740e44a88de0408544fbd888beed86b8
SHA256ba9ffe29c6d9781c69f7109d5da7a7775cff88c8349f0f3fd78070044488daf6
SHA51209f8350a202b90b96a878f705b4b27bba9d0dbcecd428774f076ab5c981db3c4cce1a436eeed645c4544d8900df51dbd97112b30b901d4f5eb2ae2b2f3fa6a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1539e493b5ec97d6344c7d7bcfff88c
SHA15eab358037a4920215259be0d1813df34ec3f7a2
SHA25612722cc3df7de4ab5b27ca11d2b2741d788b3cba804e94f4b98201bb69a54672
SHA5125aa7cafc5aaff3556c157d67dbb1a0df655f2a10cb739ede8e6e718b7549af5211e1cd82313d89f4477e56ca781ff69802f3e17860a8163c98b61846b889f65b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9c9ad5a6480fafb9a6bdb0ed3d1004e
SHA13e23e2a4f48bf11797f506a731342776c483ef22
SHA256a24d415ee686fe527434062c4b426ac1b7b79b2a0f79717f4ed595f5eb9a838f
SHA512810916f38f160a4ba628c49ba50f9763b8f23832b07edaf30422875d13e7551b285bf8ac56f80b0c993fe27c1181f25fddd99f7ddaae660451730af5cd9cf003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5232a0333566108049524ca4cecb8c5bc
SHA1f31f12b4c06fb7c944a6469d53b728bab653db76
SHA256df675a9d61a8a0a496135b87726959a873e21378050cb0f024466561fd72db5b
SHA5129edf5f01f45d1f515ea7d7a4d42e2d1334fc73f10ccd14f462692b13057c5c29ffee7e9fd70009714c8278b34ec94c978c92d09d36a2b90e0af1c3fa6d2dfdf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511411622312f3f58fa9d243d85b9c086
SHA1a91f56c0316f4322b998ddfdec0f3b2ecd500a05
SHA25611bcf296bb9fb80abd00060232a716fda9992b3dc5eee3fa5f2d4607dc386684
SHA5123118d2ac7550d24f9a66e1b53316b959ef391773686fc8d9dff9cfa4b865352b966dda1f62545700c3bb5505a6fb3c8e8f521dcc3dd46c13535ff350a00d71e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53563a1ee4eac2ef550d6842916062e15
SHA16b3a8911bfb2fb33bd8a8b9c8a3e5d544c279746
SHA25610c449f601f5c011f08dbab0380a80be70ab313bd41230259ccdbc039d34efaa
SHA51276883f75a10fe0515f5b491b92a59026aa7197c5d3f275bb423f3822af71aa3efb25e268f606af922282a43d9a4b33bdab863c2f81d5d64c6bfa0d4adc80a5e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560968840319f9353686d1fb3626ee608
SHA1a26130ccf14b84658731cbd8a8992af3c3b063dd
SHA256e2fd3d79f240ee40b79e5a486f15d44cfcc44cb0ba9a0f87be6f264a4b7269b3
SHA512ccf109a55c5ee89df9f368c6ed983776699c096df3813c20c94dd70ac4ac8d3c4b1ccdd3b02fe16b70222083f6511dd90d7b699b3c8e9f1984b93d9e513c792a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ed1c3218d0350b863a318b381ad3867
SHA11f7542c28246ad54e86993887115e61410f7212d
SHA2561bc86f2757aeabd7d386f7ffae3dff1be4d5a421839da712ca06d285d40c3c7e
SHA5126ca5a1957ac08238e0cce6d0b5b6b9a4b224a7f89bb7efddf47c2a03e1d4ace35af1e0ef8461d2e600273895f95b4595ed6d97bffbf5e195af3e0144b64ac542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe6fd31416ba7dad152a09a50c8f3d8a
SHA1d7cd247ec0d6516090f2ea7bdba1e25c55fef4a1
SHA2560093cdca376eff46030e38339234dabf18f68a96854d3496f27d1e9304582b78
SHA512e432d338b5e83c9282542df63d183bd75aef0dfdd37ff5a6071c3c7551b2acd7cd3d82e80585bee775866204e947d1fdfcd9b2a9ab58b0a27955caf05e827fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5344b5d8077f3710e6f4b3972b1a5bea2
SHA157223602f979d7c0f274719a80fc73a60a9bf484
SHA256feddf62644a9dd48bac037dfd30e75852618f17c015c26cc4f82561bc8e0f72c
SHA5124bfe25a97367ca6831621a799bcdb410f0eb3de70bc8bf4d11c79501909e3bcf36f76cdfe20d6dd8e40e9dc312c0301dc41b7583f82f0c87cec1086ab797ba55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507047616a12bb8b8a992bd2cf0858a01
SHA1ea0eb233c6b1a277770258c10a1a331e74f208a6
SHA25657962ceec50002afa95109c0936bc6b658eca69e4c6dbc3a6f03e3b78bfdad5a
SHA51268ad97469d565a0d079453088daf57383de53ded5652b6c14cfbb4a3d3eaa4cc50ef3fd850ff0b5a683810c45c37f98edaf653e32873debcf9e36747b332c9e5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a