Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
05c4d86c3ee617f9c818a4b76249b0c6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05c4d86c3ee617f9c818a4b76249b0c6_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
05c4d86c3ee617f9c818a4b76249b0c6_JaffaCakes118.html
-
Size
28KB
-
MD5
05c4d86c3ee617f9c818a4b76249b0c6
-
SHA1
0c630b0cba8adc4512db65b32e961db7eed36153
-
SHA256
5d5d2a0cdaa249befb98f934236ba032ab7b1034ceb00478fda602cb75eefc33
-
SHA512
669cb0ba10374ba8ec6b09d1bb364a068793bf265bc80249f0f58a3d239462cbc56cda43c4d6b0e6d155af3151b0130b3b965ae57b9ecb9f02bbca5c05a8cc42
-
SSDEEP
384:2aRTPzqobSJC+d3HG/5glEC1CFkWFIay9iGWEUnM/jNJ0IM:2aR72mSJs/5gDglIF9iDEUn8jNJ0IM
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000043fb38bb6b302332b37cb9596fe5edf08b17944e11656f18f74af9ac04c53aeb000000000e8000000002000020000000557cf75079ab628d4a995b71e2802fc23bb0f3e0a52c94ad8676b1471fa17317200000002d311059a7792835c1502542cd4e05ef0a68b03c0387881f84556e285649d64240000000e147bb5a3c215da86e59db1fb37ffb38363ec421958a8affeec0b7e6e40c41a9d9f8eccaf258d50c2bb7263c60409a1fba6706f9304c6814276a450b870c386c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1CCEB71-0589-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cce1869699da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420489310" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 3052 2104 iexplore.exe 28 PID 2104 wrote to memory of 3052 2104 iexplore.exe 28 PID 2104 wrote to memory of 3052 2104 iexplore.exe 28 PID 2104 wrote to memory of 3052 2104 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05c4d86c3ee617f9c818a4b76249b0c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574da8b52ccaf79679ced91669dfb973e
SHA119a754712be8f920018a38f79f0c212487ef162d
SHA25607d13da5742a1a2c7db59d6c66067a94f77d897f51c6338cf10d6fbee4e0820c
SHA5128230f3522db371cbb322bb71d9f0aad416af00fe2a640d7a25a96cfb3deef8cf0e15a6586540854bd634007ad07a85b52cd4dc4bc52f9e3df09ea04de39581c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e2a2951cb7791551ae5e08455984d4d
SHA10e618069062db86832db171775f5bf30979c9f11
SHA256eeec99c8ecb97f9919064f01827cf8f32b17ecf14855ada207da53f9d38d5b5e
SHA5128eccc4d6fa0e5a3e40a814c2811b6c95392942f7e969cde2bdd8616217964b151075890219d93ff93a82a0ffd8b0c0aa1288f7b73bc6b0d3d5eb39f43d7ce988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5da27fa18d23bc6d4cc6261897f38d8
SHA1f4bf63c187482dba01ea23add2bc78a8e1a5beec
SHA256a1c6828304456c339b249a08ea2fa1dde563f21d22a4998c63016b421b2737a1
SHA512db48fec42cfd48eb6a6f79a5a1dd581fdb6ea723a400e50407f9b56f3d9a780a74dc5dad1d44061919b091447519f1a719fecbaa9c01d8e5d543e427837ae1fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591b5cb57c3ecd4cc105565328be07a6e
SHA11f40d965fd17075b7c187b106130b494d99a4906
SHA256900d073e9ba8b1c5585c6f0de4c7f620721913c825197d8705db10c82fd00ec5
SHA51209b6b2a8bd663014615b8d9d382c8c44040751db2d2a9c71c63f987e389cbab2fbf365ec8de4dc7b091eaaddd0d8ac4c54715d782c931410cf1cd7e9f6e3a850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fc3d94e9515333855a88a132e16e428
SHA178b40563b51f6e2d1522de918042f8bfe2a3f87f
SHA256e5cf30d8197173ac7783c5de63db8bf33e9d7b1776f7bab960e8971eae313b34
SHA51278ec95d059c962fc12dc833044c81df8270c489348d693f688685a16b038ac17f9a6b800f6f4b4dd23b6d28c6e4cedff7db5da2f6ec0cfd290feca2c00452b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58479f1f9cf831b6cb6fef3c638bab60d
SHA1bd1dc4d5c981f899dd45cea77d310452a2323136
SHA2566f0ce386e9049b79d74321ef9964bfa782f1dba07874859c4fad9d408bbf9224
SHA512af966d7eca7477deb085f728d46e0c12db44cf4761cdd9f42d694d3bc7c80142dffa297db297b40f58a292b5edddebda97dae56b4e1c32fe9e95f343018291e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e810278665d1eb6154cee83f8fbe5579
SHA1b0acf1c936fd97f2edbd003943ec602692315b35
SHA2563bcea776be2d6706fa207eafe517a7cbba9ac8978a891a941343ab9ca40a3288
SHA51287226ea1c6885ee4a7c7d44a72878cb9b4b59007c2db77dfaa3e29098f0391647fbc01c0b776521f069269d4c050b41f5ca2918a27985468d9469418fc0e62b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af72f977185dc9b7bea311eabc259ff0
SHA1f599b7163ffdcea3df36c0bad14bbf9b476338c3
SHA256b6354368e133863ee264d51c323453d46177e8d1e1a454de03321c2fa3b2c8d6
SHA512325c6be515f194cf47ec814fb5d555f5b0b30d89b2413dbdb5dfea64159763a595db3bf7d0907718feaf799d00ea7cc1d3546cee013f9d0af14544e96e6de3c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baa1c66609b3735ec9ed593b4019a833
SHA1223a230f794dc53e19e89087622f45db0010b890
SHA256875764b5a4c01f3d6af5cdd09eb2aebe646f73941c6e28b2e53757ab5df44845
SHA512143f1f4423e1d60af73e5258d6c0ff17a311976556e451966fdab44245ae9721b3a7d75106af532a4f51e4c182863753ea9785f4267cbd812258dbf7216247b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5366120aaa369c774434b7aab84b7c95a
SHA1ae4d2482245a611fcd71e4a10072ae31db0ab6ba
SHA256be7aabdeff8b98c468d797234bd997c3b496fcf06bb284a5c1d6bb4ba921d354
SHA512f8ec462207cc0d09fc444cf0d491bf6f5107f859b85e13515c167e89f4e03b77a43f965ebc0c6dceb86ed1a90fe05e1b43a6ef19e9c3e4c69cfaa94eddd6f99f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e4bdaed5e54c5f405bbcfefbeb03893
SHA1fb210f42ead8cf4597d17c22317c9f95379534e4
SHA256058915c13813d12bcce59929863c12d3ead7fb19cf1dcaf2fcc2c8dd9e74fd85
SHA512df708f2dd13cb5347d7768b6774f16bfaa4504e35e7d7e29e1fc848edf7678050c4aef7f8496ef9781d6bb96397872995bb7d0bd2e87ae55a825a8d11ddd13cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ef05c7c6498788df9883d33eddead69
SHA1596a7e7b6dd70949c43f8e8db01848c22a985135
SHA2562d11c188853f6f93c9dfd9aaccd94f70668c06730779cb127fae90b205992d4b
SHA51200c6b0e587f5c5e32cd2c8113452ad5257a34ebf5f8d54e601660d2e951a490e34a1513d76da0c1b6102b52997c0e28cc0d153ea077872a175e2bcaa061b94a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5999162e415b39d316a321e616bbc48d0
SHA1f02c66d4f5a8b1f2811aee6d984c7d10a912e785
SHA2562579ef721b764728292dc98727acc20123d79e91b2476978c4ab2adca47a88c7
SHA512c60bc27b560c4790b0646af8c72a1871c3f6a0a99440d5017c1b7a09293685d7cf351dc474384f48010419cf8549c78b240827ac49f9be53b5b7e723ce750f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ebd76cc4fafefb11a179e1d39c252b1
SHA1b80c18c939c09a80aab922213fd142078eebb49d
SHA2569f64d4c14b9951480d386f962d9442bad91c18b0383d1377ce46813437afc955
SHA5124550f5c3b6f7ed78f0f15de6c1e086dff3f2e1c7a64bed73785e43328f4d1bb881473339307d02f640b769466a7c9907ea2d78df912f5908dd4d9ab7ac5adb03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516e80a9afa5523fdde631b64b53fedc0
SHA184b59770c81739fde9adeb0cdcba9f07d076dbdb
SHA2569e212a0cdb8c7d4f932e91c4ccf456ae3bf85944e9bbda1a9193181c0cb32146
SHA5120f4bd6bef6342347ee312fc29a3990bd7fb312ea9ab66c7b2b88a4634e207f0272f33230ca423f537f97d0f30cfbaec5301cc003a4d4a4f8be77148d909f9aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50735b8383119953fa35890979e2671a4
SHA1bcfe498ee7d76c91604f00dacd7efb2da428a3ad
SHA2569fcbb1857d26d8c9215f7763bf94dfd1b99a4cef76e7b4501cd15e2a20405c07
SHA5123c31beac69e87598895c2ce3bef8a331d3b124309ca5d2de30640b957ab5525aae473450dac3dd1e3978f4717d27d9d4b1f50088e426b126105b414bb46ce72a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b895fdefc5d29772ddcde98345525077
SHA18e7987f1f8cbe5ddc8a81702e2f9186879aedaf8
SHA2567f4bb5dd792c0fba2ba404036fdb60acbe25f49d6949742a5770f4bff05fd685
SHA51287bf14d4b22e0da337f6c82253d2e40c3cbf881f7f520dc9f31aa85f50f54bb152fc271dc741d08471ddcf0a8f6c2b569da4caaa137fcf4c19c07b4e0e60670e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5e2d99c4a62653636a62494347d0a04
SHA1caf23362624a01cca3f6615c5b35a9e727b9e7ac
SHA256b20cadaade8f0eb75779d08f5dc4e642905cddff148aefb0aa145b22ff2ee5e1
SHA51246278310fddcf21366b3e9049ffa7caed536090a8d4484e3a4f44169d1fa7e1256c24c82f846b29f11d313f06845dff409aa9f671b8a0bb8d44881b0b77f6e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f1f2f80274890b736727e89f345ee2f
SHA1d5c1d1b8687d2f4ba05e8ba2a6f7b03b494bd25d
SHA256b7b81e87b75cac1589bc6607b37d3bec5f1768ac6887393a9da958ef157cec6a
SHA512a0cdafbda372b3de135606c59f3be822d5a24cd6eca5916d72323911bab3d1bce75d9d1253b74f7c36114937463ab2c7026f63898ceec2bedcd461794c1a1cb6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a