Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 01:59
Static task
static1
Behavioral task
behavioral1
Sample
0691e4678b3c1b6253056a14531067ad_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0691e4678b3c1b6253056a14531067ad_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0691e4678b3c1b6253056a14531067ad_JaffaCakes118.html
-
Size
2KB
-
MD5
0691e4678b3c1b6253056a14531067ad
-
SHA1
518205bbda90a53f49c96f82f29f27c182da8c58
-
SHA256
d20414c37df5ff06844bd3d5dafc7f2cd1ac6cfc6e0cafbe4b0847462a671ebe
-
SHA512
b4f87aa30d9b223c22e5d9fae70948dab16c9e2aa27779cb82e378b46e48806094095f59b6d139313b957bcd568118ee23dba69bc7a78a3bb6ba3c890503e314
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D294571-05CC-11EF-8B56-EE69C2CE6029} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420517836" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000888b832ad452d3bd7bb5c35caa8b948870146e2aa7d3ebc233c89fcd3c34ff1f000000000e8000000002000020000000c9be375ea77d5a0e7c80f6abb6ecb6fd32f54e29e4376293407e1fba2f6c2c6b200000006a9125906e424d6e72d0ca06add88f98926fa804a5309c6f1e2d1b605c7d1c5440000000cc629da9fab2776cf58f3231ce5a02ecc32802cdaca764f2527567bf2f92fe2635778a157cc6230acc9f91d6b16bc0a61ca23153bb8ec61853c3b9fc31d07e4a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b081e2f1d899da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2212 2184 iexplore.exe 28 PID 2184 wrote to memory of 2212 2184 iexplore.exe 28 PID 2184 wrote to memory of 2212 2184 iexplore.exe 28 PID 2184 wrote to memory of 2212 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0691e4678b3c1b6253056a14531067ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b192a688eb1c07212502e990857e193
SHA1a90e21e1de145a3114fca4aba0deaf38696c39f7
SHA256fe3e569618831e9c90098f6777d50c4ca3271f77a5db485c3eb81374010304cd
SHA512233c1f6f92eb55e2ba44df5273733831dd0cc00edda6e8c27fe52def96a448b5a23f3097528badcb8c053aae3c941f4baccb48fc585de1601fffdf1baf842ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5960e6c8a9a6093bc9f3d9746aba48d2d
SHA13e0e681da6fdc54ac66543aa87086d9ca38c4413
SHA256bc17002a1a89fbe585581c4756bc6ec464b7d375df9bc053c78b68c10a9f179f
SHA5125276f4bcc7782b9ae6a3af4e64e8466fa26519e497984a45bd8e77e2d657b49ac1636c071693809fc325cfa502c6aca4b3002dcf4723de160250b79d16065a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546a84d65408d59099ecd762863ad76b1
SHA14b3759b7914fc77825f1eff28f8c30a39e1c0627
SHA2568f6ef4259bc9126c2704bc646cf162775380da0c27d38b0d8829c83536fd2ed1
SHA5120c185592b4eb92ca645bfbceb758ff4101cd502353d82d7aa3ebcafc0b94dfdc5639666c381b9325feea45146695e4dd3db0d183d8fe2972a62ec824710ed684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574bd5e2181f59ba19f40ac84c364b6c8
SHA14178586787a390631c28e9f4aefd67ff9eea2ade
SHA256c346bf65f6f24b7b23468cd64eff610cf19b334b1f850fa4ca37930ed2838598
SHA51254942373f9bb11861eab22f8ad82371edae962288ce49e3aea00d31785fbca969383cfe9bd93e1adfc63f45471605a794f3a675d5d7bbb5344f6078650e44811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553a214699560681b3db208dcc226587c
SHA154485d5f8fb00d710e7ae470c8ec6c9bbce14082
SHA25660e48a6529d11adbcd1d9937dc0a239522d4c65bd045c149ce78e0e3aeaefda8
SHA5129581434fd46d33385d04b7f8a0e98408fc19b486a0da31504974d5c908a29fba53e7d4feefa8576d79b36e4fa1f4b9ba8eb8a7f1deee50e270146c7607dada10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e2482096a50fb4c43b26f71e181712e
SHA13dda4eb2363572daf98773f5e84713287dca561f
SHA25634fee0069cf6470a04bde42fa8879ce98b767a5a34c6df4e53aacf9a67d4c26e
SHA512938240fa85ffd00eb1ba712b0d39a1765837f41cef19474c4bffadb00f91947fcdd53e5e062a474f10c44226ef47ff83edc89f7b8a3b00f87a1eab44955fa55c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a93578c6eda4afc8d276490c18bd779
SHA1f1bf6429d16d73da05721913c6ae91cd44ea59ab
SHA25629d228737f45ff25503b41d8d38a1ff6c82bfeeff10e894258e46e5439fce1ee
SHA512495df89556477c982d780115cdf19f26b5b8220db75c6c82e30ca008ed49bf7372c6fed7566b50f3983af5ec146898a814a215b31898e2721d48b03c1232529d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9a89dfabc11f43c3c4c02dd866db5af
SHA130a04a76c0d36038f1dd92298b978ac9ee38c677
SHA2564ef51f2ceb11b2bf388f1ec9742d3d7cfc5dd90b3cdd649125426b42f88087c4
SHA512a8e31c72af5e5ef8c36f7888a3d4e30a3ccaa222325450ce7492a5b5e9f6225ae9e9727100c94f647f220eecdaa2949d18bd8a83e2e9df9b6527682ac8f35c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574b8b4f2dab10c81ccbc4c0d546a7eb8
SHA120cc91bfd2b7ee35a013fa9af2812d2969a6143c
SHA256135858165e61485d48ddf783bc930987296e9fb0aec968786dc8d644d5fe40cf
SHA5125b04fecf8a6e722cec20fba1357cb1bbd45c989e6be7036db0316a41c3fd1521b1380f947d57a9606f183540f15c68e11030fd3f3faa22e866e80ec9be6113e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f6bf0509f389d55083553bf4c115e29
SHA100173eca6e66aab87b05d0c9d7fc7e4021cbd114
SHA256f97193cf45ef595ae01ad0d27ff46df374cd0738a0c9a32b97a988dda5ec3c25
SHA5128c118eefe4e73f5ac8bcf27251eca6b3e49670eaeb9d9b3a976f2f274a9c14ecbfbe65634ef4bcc5d8031b203a5bb9c2e905c4a9c4fb1f7784b50729053861e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527d0a38b1f8e4a676aeb3ce839e56c60
SHA17bb7ec87593a5a38456d4984d9d34400ad6e6e2f
SHA2564b09dd7a516d194fc02ac4746bdd069769dc3b5763d3900497728714417872ba
SHA512273092f3c189f547e94b06c2b765abb2eb597bd68344f992fa2088b683a739b98515e5cd9f20355f7272f23869956c3d1f583bbc29f908478873677aa8e5fe22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc7bbf2c0093225a58ebff4a93121d97
SHA11a6c28e3c7cf54a11f3b51c1005c0acab6c5e89f
SHA256006a867ad877ae69c58d0443f2f371b596d5ca61335e598191020af1891ab0e6
SHA51281125408bf5f0083c2fa65837dce74f7ff57a590a1d1e4e0760ca47648183b741bf9373b050e2573b6709de506784d11256637fcdf722f3085c9ccf7429b6ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1917583b517afe606269e73b6cfd317
SHA1d73555957f0fce8d8f066ac321884862e88f8e28
SHA256950aeb3ef5eecb093a9ca7c67fb902e854932924760bb20358a7b1e3b9025679
SHA512ae371f60fbce2caac942058f7a417dde0e935c201e16650019fea7eb7dac9cb60b3c669aaed91fca7008f6fdca65f66f65cfc1f89bfc9561bf6e974be1ff07b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b70830cda9cf3a2f06db45f81dbf7942
SHA1e7f12902dc52af1f1b583d8bd80f79ccfe4a519e
SHA2567f869445920ce32d055e238797aa775eb7372f4dc2586787fb419d707118e943
SHA512b69509fbb142b6896be582a3bd6b4b43787e2a87dfa380c71c4b7db24f6ec3d1b01e9410742c377cb10617f5a65f271bdcb92e1bb9695e7718ecba3bc551c0a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abc62d988b359526afdce5064f6da4ae
SHA151e877648e508eb473fd0347c490cd90423f862b
SHA25656b6c6319f981ab0d6570687c5c3b80e7e3aaaad2dd823f4c92dd8d0623387e0
SHA5127e1028b18e853af453a25b454883de952315d9ffd36b4a94bfb05b4cd51610f1b009386ee579f9942a044ba326ed6cf236727d70f677aded2f26177fd404ffd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52676d47f627067a0703fbd220b4a82c2
SHA144796f0e257fad68a097cee5c4430ef9412ee904
SHA2565266e5706368cb36901c626a8198d7e9d17905edeceb00c660e37e2a2822967c
SHA512b1b57e6a3bd6925da042db219338e669bc767494aeb42a8077bd638d16e59b48bb8e628432d66c31ba20c7dc1ed502fb2ad7a2d0f26a22eccebdc3fe282743b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564267e31ca0a688b8942c1b7860d1d40
SHA1cb2c03432b5c67de25d1aaa37d918a560d39fafb
SHA2566b9064d7f0d1b35155b34ef04644a51c18bbecd99e4b4694f0173b8ca6d43341
SHA5122b608fab618a8a9be0e29e518312bcfb9bb589c1d5df85d41e835fcc5db60ed355f797c3a0c4e1d8795339200d96e93b7dc5833e8fa5200828890b99dd872ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d988fe77386a8cddc32d01ae75775131
SHA1ab3769aa3376e547ccdfce76fc44a89e1f4eb729
SHA256a41dcbe7cf0b31f4d2e31637e98c580e3356c4c8d5c9a5a6c8750c7dce5c8649
SHA512d6a99677bd297a8cba21b3393221dbbf934284878bfbf7a78838b09ddee63ac1d56bbcd99ce08bcf46cdf6fa5619256d0e669d850ebfc372fd84bf179a1b0e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c133bb5647c68061413dafd5c41a104
SHA1f6c109d96c7dae1a88b7f8e3cbd1b216109581a0
SHA2569b513db8af791d7ba77a0c6857fa9af1548d2e1d4fd99b4a37dcabb6cec2f330
SHA5125eac2b098a1bfd5e85f56f4c9361a8910af9a7713cd63a31fc4da9d368afb0cd25af1fe7a57d3ff84239c28bc0e84e551e50783a0adeaa7c69ca9da99d77c3bf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a