Analysis
-
max time kernel
134s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
0662743d209cb9c7c1ed8b961c41c424_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0662743d209cb9c7c1ed8b961c41c424_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0662743d209cb9c7c1ed8b961c41c424_JaffaCakes118.html
-
Size
4KB
-
MD5
0662743d209cb9c7c1ed8b961c41c424
-
SHA1
5f5ef5c904a1b733904d13796a0f6b5741ae0882
-
SHA256
4a61b74801e89cf7118ab55d87a3d69a7a4c7eaf8bb9f2232e930168010882fe
-
SHA512
3c7a3ae306e092f174c70cb2b7ab0419703cc79847c141772c88b88bf902a858f94e90006bdcb7f774d601aec3a683385cfc7f8f35c880da211207953f353da2
-
SSDEEP
48:Im3vpAFKBSa1u8x1Tt1NabhCR+FSPFiVktXB6cHDUF+VMaMok1C/b+xuyilQ93N1:xmFc62V7RLdiWtXTfC9s+wyGkNQDOTnr
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000ddaf6d9a943fcc4bf44593fa152160743d5c8242d21e259939084af81d0757d6000000000e800000000200002000000021c2c07619c490b0af5ab34b77d956c4615f6382bab60a62f07add28719a3e1c20000000308555d1f05ff761513cb4d1288007e6847af6371f9658eb4f2d2e6195d1222140000000a784a54740169ed3d95803365da614bbc0f64acdea18bfa1adfcd5a4d3ce5c7f40b330055dd7e7a549c130e9642fc1d0f44fbae486feb16b681651f46f9c2e5e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20153104ca99da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420511383" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{165648B1-05BD-11EF-8414-4A4F109F65B0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2828 2212 iexplore.exe 28 PID 2212 wrote to memory of 2828 2212 iexplore.exe 28 PID 2212 wrote to memory of 2828 2212 iexplore.exe 28 PID 2212 wrote to memory of 2828 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0662743d209cb9c7c1ed8b961c41c424_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ec6d2515a680e00adb7a1fcc100de39
SHA190a6e17036474cc876be1f5c27ed56871b0e3759
SHA256a6cb3b8a3d8b6f428ad8bec180b85daed1142e0a13ca72975e71241c79f2d667
SHA512f8927c40eed4591a21c1788b7fd6a57aa58aa3eea233df57e2f84550930fa8a40fdd986366ad6c39bd469c967b74f78fb809532156a0257f510fedc4797d9859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fa87718411c5cb0f3a4b6649e39fda9
SHA19d7707b4f8fa0f2ba64c0f54664058f949210ff6
SHA256a1a076809b3f5295a6615f152353dc192613a704e8bb0201e6df7964560f5d75
SHA512e31353ad9893f060b3fe0de43bdeb721104666717af8a6443167df174b707f0dcde15d3c46a8acdf1de5671cff2837567150fa0fb698ce3511563b3643952060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531395f511d077307a75ce25b75f6b8ed
SHA18cd31bf5a7abbe03351bd456ed2593241c325988
SHA256635a613dd30ae9e7c2f6f73b0ee0fc250c3539274d53439b77ac1e480dcf772e
SHA5125f9c717850f822a06637149e768391fa1ec4409fc53e6b764148b919f85b09e29cb3adf50c7bb8628330302c79fc1bc9c0bf2da27883c22aa6743f2704c5ffe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589d2ae12e6437eee2005194ec8f4ae3c
SHA1a6ea1008b9e0cc477e3ef4a71b44bf84ea82c561
SHA256c5e6fe44d2702cf216d2e08743ef9418161147769bb15bf2d6492ac08bdee0a4
SHA512f93693224b78298cb1699e5d193494667f319c1a01a4d4a3078728789fc18a79c64cad0743954819e25e71ed2e75d30ab66d8eccb8654664757c033c7c35edfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bbe384f831b677cce81cb527a4b4f5d
SHA1be532f2aa86bd0b7da35141e89469d7f357120a6
SHA25626dd78f764ff9e2175b5e12cc866b2f94836d7b02aa598d996092b7db3e67655
SHA512e79e271f5e87e0f273d47dca39f67ec10451a192f36573271a18553a0c4460fc7a952054514df163144f22add944cfb90d9a1cfc898cc696e6423cab7315e78b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54baef25f58a449725899d2a7166dd26c
SHA10ab73fa25cfcd424127e52a4c1a365dec204ba80
SHA256a9e184fd841077c8a3b2c2d92a08ef2e938bfebe6304fc4271cadd06624418db
SHA512760ef40081c7809dcccd2f9fadf833379027fd296eb92d8bc4411d30448c82a6d66ac80dea18901f889f35b13ddbacfb5066368ab87455b673760bb85ab08a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfe6afffab703354d9ac01c219a7add7
SHA1da6016d9e6068bfaaf269506fdf26a3a016496f5
SHA256d91ff613e2638195ae483df43de1ac7129e7b2babe660ff0e47ae79e19ada6b6
SHA5129eaec1cdd788853a12ee87aaac6ef27bc7934774f7054964e9f1b568d4d2fee819c497b4192f759f428bfea78fd0b1e1e2e99e0d02626ac81a3bd8c5c898d2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee8d553f90766a3d40d5caa12f5e7d6d
SHA1bf60a67364e443e6fb4bb78b03de8fcafb0f2e71
SHA2569589cf0dc980759da49313d56bd5d36f91c6b3c4c89f82ec568b35e682511360
SHA512a10ab3e11c629be2d1f30405a88d9fcaa36b807bd7f167867ba6ef3ebb345127c0bf7c592aa9f12131951c1664bb8b9523c6a3165bc5f959de55655594062e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f09f0410f71e6b5b6ba5e771ff8746fe
SHA1071756a91ba7b138faba6b465a7a3badbe9225e1
SHA2565c75943d247294131eb9d8e49e154ebb4c0126e6b9f8cfb1fbc93d688b700598
SHA512e379e8807304b3048a81d1f3e02d1df2d7575616538f87c223e434faa1a4cfeca438578f6e6ea2ff21d129294fe5a9d73ff3963b29a114324caed7221dd1a012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56772d244ad142f8f8629b49013cc431b
SHA1c4784c20d12598a00d1c5aba170cce745d5d5721
SHA25696c472624cec345dacba6f4bd0a34fe7fc7136425c3a594956b2c56a9d1dcd8d
SHA5125859d25fa0822e8d97e1afe61de8a1de8b0bfc1c3a699fa676d587078cd0d018a40d0dd676ed3d30f8faf54bda26408660befb40f4f48f7db939cd55c74e54e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e7448366a6e726f74703897d3cf5da7
SHA1eec15f8ff07d4f8473a412feefa8f9941c5d0b1f
SHA2560864a2cedf984c79b98ebadbbf824d3e79bb25a2b4622ec30cf96e38d280c440
SHA5124239c0787a5c47d9eca8f01c3d6d0e6a7339f8aa57d122e00d9e5ddb6f2cb67dd9312cf06a613c2cdccf9b6d77fe4eb23ca6afdbd9d496f57f24046cd16ed4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e29b7aa847ebca7c21ac5c7f46ece2a
SHA1e6562099d59343c70f97b70f1ff9a99056d2b556
SHA256a65999c2bf58d8d6e7aafbb1e24ac09228251fddc4e45daa844790cf169441de
SHA5128f7578f37daaa5762c849827e00fddfa842fb05cf59aa45dc96f02892ebe4f53d0bdbaf9d428db83356fb5996e41c062fa4b87a16ec22af10bd7b39e76bd1fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542ce34cac7c33616c40a083590932b28
SHA1221050646b169ac4d6ca940baf8d250b83640730
SHA256020d3958446ccc4bc40aae09c28888d1f466e03c3ff25c24f54829cbbb8cdd63
SHA5127033f399d1cccad78c068c2d1dc32e4b2e768322ba39a4e8f6e8bd16a948a5a114c675c504c85ccd1957ccab793f1d77ea9d68b24f3c2f2b9a1cd7246a388928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5981925cc1d51a52077d95e861ab00c7d
SHA19c6b9892d6657213e42363763f602948f047b132
SHA2567ab959d6decc731f8f887b29368b7fa63c8c00ecdae88f654e8b8bb6fae9964f
SHA512998aeb1285166d64ac45a9cd2d988f100970af657032e6c2034a16ad2e10710471e4b9a6ebff663cdfaf9f561c2ecd8ae192f77c9f75f52ed36134456dc3ca61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d15529ff9ab6d9dd7a94c896450dbfc1
SHA10b974fcb04f568cb587c3539621774d2c67e40dc
SHA256b2da540a71f62b5cd52a99192e22ed956ca55571cfa20f199d2335a7b8149c15
SHA512e0fc876cd488a7616240fe705979afd6eedaf8b00f78e499fde68baa5461eb4c30b9d645bfc59c64302fd4f1908fd2c1e600b824ccd4b4e9f8a697408e48e9fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5501123bd0c3b6f2cd39b02f117dbc95c
SHA1bc1e2f80686f7ce2956e2fa34739665aab6a572e
SHA2568b9f53702d1b9c67b274aab841fd26e8a318d0b69b09891d7ab5decafd4d3a85
SHA512f7c2faf49d63a9addfc7dfd01a02f6cd1fb47547328a87694823a70d405d0ce9c53eb2ba3198aa9605935caee28b4842ece95a1bafc28f7588d42057fc6f198e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a6c41b1d8c5d992b10337bd40d9b73f
SHA1f128d518008d0ff5e3c7a364f540c2aefb85106e
SHA2565be7891918589de4e9d58653d395db61bb6761e6abf94079c82ff4789aea824f
SHA51203c38ef9089595f0ba202b87678bba34d9502ebe0c7eb53703e7c99eed9e9d8f855d6a21c5ec55f8aed73a8fa170e03b7d1a56dc52c8e5ab8c4b460305643d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5ee8b2cbb1c78f83a99fcbadf18d0e7
SHA1719a61e27940a53f414b00cb9a11b6addb64fd0d
SHA256b580b1157ce62b4371b64405d5ee52ca7a16345fd3f51e30d9c40768cd5a4209
SHA51233477e13ee8e1998c124e32dc6ebb43a26ab67abeb45cd98ba370e2a92392bd0161e3e461dfd379e2b946baa1b242e732c2777f33cdf58e080009bac795fc46a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a