Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
06b91158e9cfd10c19da1ac0372696ac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06b91158e9cfd10c19da1ac0372696ac_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
06b91158e9cfd10c19da1ac0372696ac_JaffaCakes118.html
-
Size
2KB
-
MD5
06b91158e9cfd10c19da1ac0372696ac
-
SHA1
3438d025857592fcb929886b9f71b957aec85c5e
-
SHA256
db0a76413fad2d80522397502719542e82755d9e5bd0cb0c43167fb274b4b9ca
-
SHA512
50beaa33a4f35b38e210c38783d87ac3a6f31e739f2dc8b0957bd574016ba9d4661e2035b8e34fac40e9f949c92795497732b2afc2ed7741236360ac3fbf6cc3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9E79CD1-05D8-11EF-A564-5267BFD3BAD1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106a747ee599da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000d0024da71a85eae1d8bef21d0f740797bbabc482cb179d5f9ab27568fa69ff03000000000e80000000020000200000001ba33b6edb21734171c45accdbcc5da7cf5f8055cca32db2269b3b65aaac72f020000000d617b7bfc9408db20d81c10aa7968569f4777a428a70d3fe5ed6d700ae5abf5140000000343a24dbbcd0278c0dcb4a6ab349710e2a004d00a44a44bdf6dad17cb0989c24a46aeffe8a864636e9fd0589d5a5e8204c05ddf41a38f7598b6f930ad3af3db5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420523227" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1220 iexplore.exe 1220 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2092 1220 iexplore.exe 28 PID 1220 wrote to memory of 2092 1220 iexplore.exe 28 PID 1220 wrote to memory of 2092 1220 iexplore.exe 28 PID 1220 wrote to memory of 2092 1220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06b91158e9cfd10c19da1ac0372696ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ea2f9b67f8f09cdb916b1603fc7ae5a0
SHA1203c502d991932e0da8657b4e72231684ff3b2a6
SHA256ed5ba77615b3f27b2ce065e5b0f9b168bd469cc792142af1e4255db93b25b0d5
SHA512813eaf8c6982ad32e2434231722da63842fe3dc40d8d0d1997f834ec17a3c2cdeb0dfef6a07f3e1a708e9a24f1769f162836cf6146bb0a77f3d384a2a895b8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD520aab5f51069e5bb54811a8696fb0b89
SHA1166ee19098ee2bdedc617f716bee952f5187337b
SHA25629df2b2f928221e1087fb0055da7a9d2ea4f38d44690c61c9a39bfe8a361aca8
SHA512b41109afe920313917ffc38c41914df47b4d73ad7a22d89cb85c3bedf9b7d6f33aac06ca38af378dd4cfd0328a1b9a9ac39c5d0559abbfcae04af2acf6dc6efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50bc00f2cd105f780733995356d961a6b
SHA1692f6ae05d68c6a54ae45b67a64505d5fdf0611f
SHA2567290be01d82f2b17d09b636e75778457e5c42be878365feead90e83de7212b27
SHA51221870a6f61a169c4dbfde2093154fead34ce11228acc4462ff664dccf304420404b0d5ab8744b63f8c25b68413d1246c935eab293447ffbb67f44bbe375fc072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52f216765880d7c97e62ef525137f4406
SHA13a09a3b073c84a94d97f3f094dd19364dc63507d
SHA25696af64c4595bd22002470ba5f5833c7e28220638a660f1e52be4180be91fbbda
SHA5129d296a7c9062bcf659fa6bcf4067e110f910e38103720d7734ad58701622a87c9e3fb9f3c7823a381c09f14755eced01edb1e7ebdad68598fd5aecf8ee936066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5242664d9308b10cadcaee3085f25f652
SHA17da561af9da3536b6c8292bfda6d9263ded06576
SHA256ca507db806703427d876665b1a6798fb0c1451da152d8b03ba49bb0be224373c
SHA512690d37776dd74b0001fffd389048d9d2dd0cfdf3b8a650acd951d5a1cec4317cc0e293e63d457be4b18dbfa73fe6ff9d11f890e351c56dcddcb63cbe0f5c53d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD583d0fea1fbecd6b33af649ab012e48d5
SHA167841d51d4e943c18d0e996a6999e3321716e22e
SHA256fa12f231cf23c967472400256b108c5319ba51fb51914695d8acf3742757a780
SHA51236aa71bc798b8ab9597d6e8c0f7b4bef6aea63cd88a6b1fab1190bbab820475166c34e2ccee151501ed0be240fe7f3e72dc0615789d5b7e83642ffb4a5129639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57f76919a6ec2807feaa266290ea83c92
SHA153d3250cdb07a444576c4ec8ea15c2e876e51c68
SHA256667ee95baa2b62d8adbe8341050c420887fc16e7a488b74247306f606e78bfe5
SHA5125bcbab6838c7b01427904bf09a27712880d2d28af4f59adc22f2bca6909496953dc57e35a54459d07a375a3b8731bcf224efdab006212581e9c5a5241a464a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD534d9ef24b09f120f97b45e7cae19e97a
SHA14caf69cced06b7094d903b45588f78575cad5aab
SHA256b7cf559f217c6e5d1f5a2f352ef39c81a5d63d4afe58bdcc4457d124ef9b1cad
SHA5124b1c39db139d86a60e054aee20b40af16b33d5dfa006f7ca5bcf93d59e10ed363cb755423271d10d14e2e27ed7e90df63bdce152c74b1a80f829cf18c7c75f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fbb96955635cea9ac661f038dd9c25ea
SHA19bcee027f68e39ef28e0e5dc64d0c52323092a28
SHA2567a674f6db360968a360b9d890e95b75527fb955906502f824b472d448198b77f
SHA512edccade76b0900d8fb96faae43a0dc7cdaa622f66dc0061745e0873e8365d71a7fed0e7e7ab5a77534ee7373aa29e42c1ac9974c05914ac2323eaa1e6c80bf0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55d2c331e6720dc8df6d0baea8e706923
SHA121a24f7a0c8010353865c660415ed913da1bb977
SHA25698c60f4ceaeab871ec025902795e5b8daee7c7ff6cf3dcd9303b5ecf94d90e01
SHA51228f7b71cbd97ee751b6c43fc3240eef8fd29e05f17fcac2c4154f1e874d79707973359b1b0dcb563a06b0df5a8d5e4ae48b3a266caa26ff0b186d2843aa1dab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b9807cb35198a7b887409b377c7b763d
SHA1647e549a5ea64bb8694a2d8bec565b3bd55c54cf
SHA256c0e8b21c485a250cc7dcf32886b7d0c6509bb7c3f891226a1a13b6438498c57c
SHA512b762d30a19f7c608547a22bb3e999e1519a172418c03e986702832190c04fa41ab941e5abdcfc06c047a154d5e6b3e855e69f64054f35f525443d7706c1ade27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5422bc3915430f3904ad5e57ac1dd501c
SHA1dfd6bacb0af843f7284e7e4652d7ace7388ee0c3
SHA2561c25b3efbe80138c3ad96955be1de9e37519c60891f2e86831380397244fc34d
SHA512ddee45d05f98b9d0e756c7bf6c98bde4095c82600f2c31b743bc63c00a1a3bdad27710fe14b3d1987ff0db2151a6a8e53016bc68da92daec2ba3942d8ed8c6e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f06195f9b9d58ed94ff28921f9d6965b
SHA15ee12d9c8015346152181e7da4ae24745a3b3cb0
SHA256d6a87020b86aec816a9edbaf374c4b6cfc2798ebce3c30379e03af6cd91fd771
SHA512b3df94619224c450d6f5fe0def2879c9717c39991e54071c8b535e8faa7346c66242782e5bf3704b330bdddd0f7a0e767c659152397b8e2c1c2344a925447ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD574ee4ea5bfdc08959cff5b6d3c8c7718
SHA118a6213cac46961409353547eaf0f03391e4f064
SHA256a7da7a49e57a2ae79c8f86679d3d8e1cd6362659adaf93cab5aff35910664f75
SHA51286a847034b64fbf6b42785d8046f4c77716b000e4e4c4031d475e6efc36612c0d8df542d8911e80c7be9b1445fda0ac566e699088344921e763d4bd871e71f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5df003a29e933d2355424b3b48b4de08e
SHA1bc11c16374acb22f034c9947c8c18411b50b246c
SHA256fc8a99ecd3f3f8916a1cc366d490ba88ab80620b5522f589b760b194a3d46fcd
SHA512e692c63d61533dcd617277f47c962472473842ab3180847ad39faf88b98efc951ef4b6aa1206c2b3fdeb70dee09aba29ff9231d68a487ffce1fda390d0569924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD569b44fe4af2fe3c08bcb5572933856af
SHA165853e0bfcf17ddaa25b8b5eafbbfb82e755a4a2
SHA2566139d088fdc814a03432ac68da2ab3d40107f2ab67ae0902522550b058672e0e
SHA5129b4790f7598039b0d88ca0256c9a15e4eca0d71f4131f72deb8b4861727133a6e2c9bd9564b405c747c58a9ae846fe22c6953b859d4a718e00d2625492f96ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b9c1d15010810142a439d0afe8030bfc
SHA1308742afdd3019ba1d21f1ff46db97cb20ebe47a
SHA2569330a2138b8681f3e5fb386e294feb31f9ffb784b44d7aac420c30ac5f986ba0
SHA512916887bab4408f20052e5698abd2d76c142f0b4fcb2bf989afe1e897d187b85465f99c9f4ce5ca8db32bcd9c473ad326219ac3be9334649eca0b23262215d68c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55a0d088c93ad8c466ede184b7ce49966
SHA145a347edd5c36b694fe1a09c870832ebc354d5ad
SHA2563c5df79b6ab7e6ead3392105cad0e473a060362fa3eaf689500391c1b81bbb84
SHA5127d0e8944b72971297a86cfec6db813993ba780de9ab2068a36dbf137853e5b626e9144083ffbe997db96c12c2a263ab49087f285d4079ba6366d54a1485e433a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52b2911950aa1b6cf01b05c925ad44735
SHA110a1f57139a5d5604f17ee8af5beb94ebcc81849
SHA256000dc14bbf0ff656170489756924c6bada709c3affd185ed35f066c6e04677df
SHA5120e2b91d26f348fd6fdb149ec1c092955e018168dbd20feaeedf250c317cafb8fe786052c6bc3ae54be0186015fef5bfc4918b14e2dad3e728c6e1e7f3d2f8fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51fe5ebdd0d905acc023bda965606f9aa
SHA149f0ac48a30984083f5e6076ea64302c5c6e57c2
SHA256dce538642911ed8357936d8da6ee119c22f99411b69a99eef8f36ad8d2d23612
SHA5124d4735b3e4e96649391a1914b2f610340cbdb5e4a75bf167ee21f30c2dcd3f62580e288f9761b821d2ac61213bcff28d1e1eb7e2c5f0fbc4ce3b119719c3aed6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a