Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
067f1821533dda909528414d0dbc99b7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
067f1821533dda909528414d0dbc99b7_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
067f1821533dda909528414d0dbc99b7_JaffaCakes118.html
-
Size
460KB
-
MD5
067f1821533dda909528414d0dbc99b7
-
SHA1
5af478edf91a2588b01aa7319cb71c5af10a4746
-
SHA256
d75ec893087de7379a83677c22de4bf4672e9ea395392d6bfa41d41ea7915aa3
-
SHA512
1e0ba50470b77a9fd7ec0c92810a4427eecc4488202c501ee7413d73b6c9df6a612b3c7a5633a588b3265c81943bd32dddbe22516b1afacd91b12d28371450ec
-
SSDEEP
6144:SEsMYod+X3oI+Y7sMYod+X3oI+Y7sMYod+X3oI+YLsMYod+X3oI+YQ:v5d+X355d+X3J5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70894bf9d299da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{20BF1581-05C6-11EF-8E71-FA8378BF1C4A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000001f416a06ad39af1da50f2e4145253042cd4d895edc8a51fcfde0869e88b69e73000000000e80000000020000200000008f293e2b8c207da4e98f683a02e2067e2244b34e0dbb718a21b6bcab96ffb84f20000000dd5ac3fc77b5b687475c684a212146c3f6836ee06232feb63ae688e58ade3abb40000000b5a0ddd493b59b7cf945bcc4c66a3b7510179bbd0a3d9376ac1b0d12e5e94ad45744081504cf53591cf60852199b7bf10181d82bd5470ae17e5ab0b3a7af0197 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420515268" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2528 2236 iexplore.exe 28 PID 2236 wrote to memory of 2528 2236 iexplore.exe 28 PID 2236 wrote to memory of 2528 2236 iexplore.exe 28 PID 2236 wrote to memory of 2528 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\067f1821533dda909528414d0dbc99b7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3cd6ad4c2ca02d8b60623678b9c13a4
SHA1d10793afb6a8b3780fdc65c81ee364f60dee0ddb
SHA256b89c108d2722b85e40969d728b01641a8fa2187331f473121e97162f9549e553
SHA512c3dac4f828ead93a7a18915c7390f508479d14eadac159d96a4f571d6c49d4f3b679823217622a310810f3625af2b8f29076e056513590c13f766ce57b0bf992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533b19379bc5793453e43bea0806f0e81
SHA1ec08469ccbc4a1c3c6b69f4ba4f1530e31d0c9c0
SHA2561f6df35e376a96b9b34afbf05be433aef3b7ba95db4ca0dfd96f6a7ce43928a2
SHA512a95df13082f239363a58ecc046aa655fcc7b9ab581483de7673dc3f368a755e254f86a3cc062964c69f4e3228ed999c619ab70431b61ebabf7e2a1b752e8629b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ffeb3ade74a5c2a5452a49a22c75466
SHA1cba727f6cc9fecfc7f6cda8752809ca9d08e94b6
SHA2562a0b37e59f7fc198ad717add78574f779ac80a7fa33a5162a73da268a066b1dd
SHA512aee167010c0e4917d82a94f4c8cdfa96389fc5c096c21464586000d187526835cf0a9ad8b340d3f63c4ea9a0f288a8a3c72f06e44a64b3754ae2f611579cfbe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3a79e4eb6f2c3bbc92cb7c28d7a3da8
SHA1fb441d5e38bd11269e1ca5603a739042048948b5
SHA25652fc296fad4024c748a59cbd383ca6e4523b4545a54040ffee2f12fbd8e9f83e
SHA512f469f9190e673cf468563f02428e2ea6c4cdd0e7b03eaf3a9d1194e0b73a52638368b3714af1182037af43ca59cfeae9a12ac3546a0fa6ded5a21ac5598418c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fc374673281a69ad7bb9de9f3a3011a
SHA18e245d85f01e4c84342c6a533a8f8d1b8a2d715f
SHA256a7cc653415d831fa49ab3bed574d15e6cced51eb090050d081d6345566d6fb9c
SHA5129bb12f41b6a7f9dbeb65b75b1e26032266d34de0b4f05a94eb1603cefafc5a8312c9d3f38d58cd82f815211b09da29aabfe876a5cdd4df39ee2797d9abafd42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b67f572fe9a21e9b3e59535c11946678
SHA10f8bab581e4ab097cf3734e1b9e02bd31c66956f
SHA2564dae7d13f3a3c78db3f1f6a36d5845728e6f599b1e10cbe2778601a192be1f47
SHA512fa641e7c3347581f0d4137ac47a8fa1fd9b61e797b9fffb5a7dd29bf573b47f4352d5a1a027fb0815693152f4ce47b8353ba7bdbb32361a6b1bfb4d39e625b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54be12781b33e4ac18149341d084d43b7
SHA1e40e9c3f5d35b5dfab44bce7cbbfa022bfa9ea1b
SHA256a32ac05ea28a4036864bf537671d81cfd30b48c2eb22c092f492c5465c255df7
SHA512f687a211de2d645944ed270c8b61d2ee12de830902affdfb9a446dc8f0bfe0a6c4dc2cc285c0e32f3efddb720a03e53e5b35e15b44d6be6df2b29247a77701af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a2f246d99a7fe4b6f9d0152f6fb9bfc
SHA1120e1b61200490339e7f187d0a5d183ec5188fcb
SHA256cceb0fad69322be0bde3de4ffccf3d9c0e55861087ce64fb59617023b5781307
SHA5124b5cc26df512005327bf55a57ded34a936301fb349d4c31af90c009cb3c3a0e6c6b9ea46d1a92cf97aaf2028d337152d6273a9eecf8407a59abce21f5266652a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d2bca188eee0bac86327c30cf5a5141
SHA1f366aa43edc3d4111eaebd1b007d75a4cb6deee5
SHA25627e9a2a28f9d366caaaf8e05d9698926609050c1abeb5a2c2fa51e003cd6a326
SHA51236b4a918d125404bd10245f50fe2e838f1f540c381d3572442dc13b0912d88213d32d7c5718eee2d907e09afacf2ed7923ef12acb485d6066230978325be8ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57caade8b1004f8f7cdeb357feae518c4
SHA1be9f92235e8d84efe1635312daba30ecd865e273
SHA256eb841e51c984c395f7dc602a5512fdaba423930ab2d5f838ce9980f86023a524
SHA51292a570c2889318dfa4753e51cb4e966b971eab2f776ad635b9c7dfda1ad6782820159cc78b5842fcbf1cd48c0f6583c6bea921163c24c98d13498aa1176b1500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8cfb386387e57064ddf9af85a2144d8
SHA13187d4ee214bfb87d6dce6cd935c37567318c233
SHA256851b7d6a55e5f85bf6858e512c8e55a1974a7362925b73e746e7b5615f2d346d
SHA5120b5f7bf4ea3ae614cfce2294b4d82ad0fbe4675309f9947df6ca003719ca66d1d71b996221b624c71354af10ad15d1e67b789e77fd4a5e2cec38d711254caf31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5900fbf9138ae99f04c0f8c31fb14aae3
SHA1d784ef055cb53d6bbd55970cd954d7377ee7a43c
SHA256ce2cba365deaf99e0a4b14c73876827ec6d0ee968a86cea904ea880810248f29
SHA5128147416eb28a98cf661a3dd912a636cddab5fb24d12b79537b9262626dcfd03aec4a1454cce18fe285cf4b2d47d2bf9cbfe81e1a87021d8c6991179347fb1eec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582ab7a1b55243ce06d492f5b89054bcb
SHA17334c16524ae99e096d33298bcd95a8e44c4ba7a
SHA256d594af451cd6b7c4cfd4e6010407ed7e12047ca51ccef219eda24cf748e4b58a
SHA51270abc5b5504f30171743a41514c2a42359c19bdfce2c293dab3933060e2559e010148d0e002f94bb2233315a65fb671a6f37d09598d32dbe540d1c068bec06c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5921005b59483aa583a03a06bc0f913c3
SHA1aa3d6f25970d5ebdf5d4566edb18e121affa47bd
SHA25691f771733d521113cea677cc3ba1716ffdcdc98ef16d52bfae44d8006adfa7c1
SHA5122dfef935464dc76cb5ea102269bf76856e72848fcc28d6a1753da343a29ed3cce86c3f8086b9ead4c79a1cbb55462faa5fb6935d2527095dd07f46ec07852785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cad6552dccd5fefe72adb4045f708cac
SHA16d085d0a8107784fca85b1edc22a17a49ca7c166
SHA256b4dd393cbc5b4855fbe400ce13e2c03192a51408f46271a4898464153de9e0b1
SHA512926b4622094f9f8433c8fe8b7e70592b5bc6055d9bcd57032f7a04a8eed8876280de03e569040d9a510f2f3744b30613fb8731b71f14d1cb2cc79ef8c752701d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b6380c318c67ed95fed0fbd51e05595
SHA1a647afd29c4d4b3300f1fdd62ae45b54a4f59930
SHA256932ba512940ca22cdacc04e85a7c2dddd663aaf3aefc55a2c99864005e9ddb39
SHA5121406a8410becee9176f61e3e0fce00e6ae93c9375d4d973eeeb40f4f09e899cb305b08ec872ac83d3ac90b9e4f49a1a286be1037e107e4dbbf167c82c3aba417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567c57fc4e6cbd027738ba8a22866a06f
SHA139c8c0e712089cddacf4491dc759be26efef1c34
SHA2563bb08baae65c7dae372be07140db3d22e44585a9a08aeca07a672f688fb1dc82
SHA512e51148a5dd6ac3f15ab954fa51e35fddc8a7e0e61be4f2d5f22340a348e32c842f34eee0c6e016f374028d612b0829229fe1f05b3702ba1ba3db24294236044e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578cec63946dd36226f7861390189fc29
SHA13392d83f491c37758095a7d1bf42a09d199a1e0c
SHA2567ccc8682033d5236a39f04fec25981f94d7b626a1edd3e861261c2348f3828c5
SHA512f63c17470acad7168397da4c82b9b175a2ca9db7add61d11bb42a047a6587e02420f9cea901ce5cc7b65a6cc8dfafeeee2b1328dedd141067e4ff6f3b678b43a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5532b483a93b570f01e52f8d29d8ef6de
SHA1a620b902024920eb1aea8ddc2d9c152c8873d131
SHA2567d6a20fe7740701c7500ec16ae3c85b3c7cbd966cf4a592302b5f4c5f78d2e59
SHA512467ac7969af733c2482761c86cf926b09083055a6ae0ee25fd633af12a57975ca26dcbfd74ec86fd8f8e371419490a1562399fc661005611871906bbaf41ab59
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a