Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 11:53
Static task
static1
Behavioral task
behavioral1
Sample
079acd16079fb40ef2574bccb8d3996b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
079acd16079fb40ef2574bccb8d3996b_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
079acd16079fb40ef2574bccb8d3996b_JaffaCakes118.html
-
Size
461KB
-
MD5
079acd16079fb40ef2574bccb8d3996b
-
SHA1
3301913052392bf8c9eddeb513c76a3929282a6f
-
SHA256
47b3c80bfb3958740e86e7b2b616185bb042fce26e7bc9ccb88a44f007e534ab
-
SHA512
5e72e262914c0270c171dac2bc517fb2318d01cdf61a4304107029161227bfbc45dae403087053b9aa5f3a7e13ea4a17a614cb7b6b39a8b066a3edd0face351a
-
SSDEEP
6144:SSsMYod+X3oI+YqsMYod+X3oI+YXsMYod+X3oI+YLsMYod+X3oI+YQ:H5d+X325d+X395d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420553498" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a86efd2b9ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000007aaf36597f91fc4d0e827c946639a8b885e542c9d22630c18f352ebad2ea19cc000000000e8000000002000020000000d10660760cbd4d40dab57f0376dc8826b2b198653bbb1bb0108c5ce0b5cff5eb20000000f582f8737a8bff211ff5dc3a15d3da2d2d80b7fcf173872dfd29ba117e7deeaf40000000085ea02880b9d09d188490e022a0be34ae2667e3383907950e2c4a10afd9408b5e5a349921ac8c1beac9b07e40b93c08b5f65c30d7ab1c5e5d5c251dc4764241 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24D5C931-061F-11EF-85B1-6A83D32C515E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2540 2044 iexplore.exe 28 PID 2044 wrote to memory of 2540 2044 iexplore.exe 28 PID 2044 wrote to memory of 2540 2044 iexplore.exe 28 PID 2044 wrote to memory of 2540 2044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\079acd16079fb40ef2574bccb8d3996b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ffb6593f2e30f52c4f756554ceae454
SHA19e877db1b54ee98bd261579c7204d727aab6748b
SHA25602983a51d84b95f1a640b8304c487718d012bb36bbd55e5cf207c4e313c2e805
SHA5122e90b884470ead98450338430f91a590f7593c94f25c110327e6a602f02f7ac402a457700b4e86f0dbf50a589c3cb3a36e69c9c7f482148a1735bca64e1ee501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579a8ffa3c2b6a72a84b824606e159a98
SHA1a9d8eb75570904f3c7ff442149c414deeaffa41d
SHA256f5a20c3650546fac0711f0fce33627ae63b616a3b27a02acafaf95ccac525f51
SHA512184820131daf597c085160d7b91cba4b08c9b6ec76c4ffe5601640ce0f73b54288c910b36ce6861e127d7d28b3bb3e6ece3d2f4ebd34f58cb1276e389dafb758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccee769b63bd531768de451ca7375d89
SHA1ee535cda60ae1ade93d64398b06cd24e55aa630c
SHA25614811020edc3dad18c14409f3071135b41168e0fc483f00b3e54be8bcaa9d910
SHA51221a12ebea47bbbf4b34026a46062fb6fd02e33c860ea99c46561d0904413255570d4187fd757e7e9c466276d3080ff6bd1a7d2ba4160058e10b51b1cdf4b5eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52274954c33ec29470ecd86d7877186fe
SHA1254d7b5f4fb06a5eed539735a23a6bca7cf2622c
SHA2560da29f1eacde3bf4b62f34a16aafaa7f061bc089dda15047b2a499b1243aab00
SHA5127faadfc9d493f970923761988493db662d63ee01bcdb6e21c2450e992b59598f6c3bab1024be00b34f27a3c528a21ff87f555faea1ed33c4d2d75ec84f93f15f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bbdfea34640f8b91297ab19e04f4047
SHA15b9ca549e3395e16d018a0233d8d805fa2b38251
SHA256ef9eaa7fc0d3445f1d4b27a1edbdaa29ec899b241e82b7e1e72c678fe29ae45d
SHA5124f0fb154cc9fca8c47508983e50925b6d0157e02efcae0c5da25a90eaf9b396c5bfc74618902df7cc556c8f3277c3a6638ff386bcd17d4df89bfe66f8ab360ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afac425e5267b188774e8c1b7f10e070
SHA1a36b455e1445896678354a499785c54c39ca6056
SHA256b5f45a4048cd1b319f268ae312b3efbb9d5778c07df4ce030767423dc1d86528
SHA5121931cc4ac2b34248805a7dffabced86ecf6711e026794b99689920ea360e875cb685237ef321c7090921b335c4dc92ff8a31143106b0f2afa926ff43698ffabb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7c6f5d313f3fb50bf9cb5344edd80a2
SHA181b35485456a3172521a68d3febf30ac4ca354a2
SHA25674b75e6103fe81e27ca2af19896f804808338a2faf1b31801bc8e98cb65d9fdd
SHA512b1f00e6730dffd0d985879ee98ca8d29344ee49a6170bb4cc733d6367fe622fd775fbe7b05293604398758300ae51c39387866d6f70b26d3baf5d6ceb2447904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e47c70ecac47136dfd2c2648aa8173a6
SHA1894a456a65182d48328abaa254a579154f894896
SHA256b8ee4081b8cc76894b34d722f38fea0021eab51b5f48f1df8e4158beecfc3bb0
SHA5129fe40684574dbe306ea6e6c3da7d5f6c6e2e653889e8c5dc379d3cb29f835e69ea65e44b88fadd1434f61fdd10c458aa305daef6ef5d005c645d6b014211f6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539d1a5fe6c153c171217b6531c2ee34d
SHA1aca7d7b4e4a611746080c046aea02a9ffb08f580
SHA256e8ecf49218f6fa0cb1f8d7a5662af61df8619edc69cf10e04b801729c67ecb34
SHA512d061ebcaa01e63e6f0b67df09785a3d7941de514f4f6694e468eea16943bd1f611de4e4f739ab29adf44a9a711e87a4f3cd21af766b44136821b7bdc96f3f6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd8b71b1de91f080a6b99c8ae15c271c
SHA179fed8e04aa7bc871f2a4dbfece29f9ea37ed803
SHA2568fec2e1eb8470b378d50701774fa010397fc90e00a2c8b78cf347094ac26b014
SHA5125aea38428cba2cbb1db8a386f24f06f21ce48d979a56abcf9bbda0e6ed4fa123c7bc3a83116c0c712243bc09c1ba5a067e27a310ede9faffc5be173736b035f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d30139ff7792387a96fb60a155408380
SHA1119a0d8a6eaa1e1f8838693d8249117130060809
SHA256ea4059784df915fa0df97d05fa28443205002276866a45173a453fd7b87164f5
SHA5127debf02c43852b52c61f766dfb2bba699923a0b4755d9cfefe8a503ee7d066ff480e0edec6df6289f0462d2f2823e01410682443c5871463bf24443a79a6bda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570ca4815528099b3b7a4078d3f0fe9a5
SHA1c1efff270a58311be3d8321a721ec5ae5802091d
SHA256027fe7954e0ed9c9825b24d782a2cd9202c2a870887472c0fe989b387ecc14b1
SHA5120b5ca9aa3bfe8783d9651de864e718512afe89db3c22fc081512b208bc38033843888bcc87e89d53d86f9bb2685602573c82513971fee7f80ae10d6eaa2b2669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578900585553dfdc4ce05685bd439ee53
SHA185f0439ff55c420f68c2a7804b0196f3e2359a8f
SHA2562a4e76fee6520ce83f72b5ba3a9618759766b5ff88a7cc46ff7ad0a069c582e9
SHA512c32cf41626cd90ce6197e7a40295a69072ca3fadd2bff31933b37beb44b87d3ac2cbe4636cba3b1a95d2250f5e3a035f3a9b4fb3fea94579a143c40a2fe31322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfe37fdd24eb3f44f50bd1b6129174bb
SHA14918f62b75aef8a6c600c898bbbb61839d47c45b
SHA2566fc65ff967b828333d61165a9d075eaece1b14ea7ed0ecdd318051afa22617fc
SHA512ebd139caa01863a7776f7ae7cd40c3a506170262c1256279db4e50ee66c0e6cedd509de9d2e6478860f135a4fd79a517c94e103f9152f27222755a984fab742d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57098cad1768f8e35cd4089f4b5765d6c
SHA111ccda05fa157bfa8cf29f8b946a36936f9debec
SHA2562c7e846ddad5ba461d6dbfa44c38def46dcc85dfc451e03eb41958318945c347
SHA5122c12adadc57326b0c37694f57891601cc82c18442c9633b86978d55256808503b2ef369f71b90344eb92a7c0a063408fc3bfb7771154f0379e9dedb2b7057010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c712d6d8616285e64516cf49dbfce80
SHA1608583d60cabc580bd48dd3e2e0dee5642be14ec
SHA256f649d3dd25223f65c98aa66b730e0fa5c3783700a32b04407fe5cefe237b1a8c
SHA5127649f3a368eae498ee5ed99f4a11f188e7484303747283fcdf7e0d8dc976236a4239b6dcd697b9d61daaab53760b2e4eb8a65763fa694babd8fcf3a81ba084a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df622dbe300f787209f59ee03787e224
SHA1f83aec82cc823d3e35d1f64b94ebb9b64ed3b506
SHA256c8c7b361bd2c5a6c90117381a3aa3fe529e9fdf60bdb40c305557cacaa1af0e4
SHA51251af43f87fa814cecfb033f27745a3987d1b7d95fb1034b5214c576a29d5752dc99af9cf7ef0ab78d8d231899786e59eda914eadd79b55d7e4730df4cdc932c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f099827debf2356f2a9317d6e0720085
SHA1d43377702f758f55875dc38ffb8afd0cd447d6e5
SHA256469b56acdc1d012ab811f051c1a5e3d543a74b32fe1edb56da6d81b0783c6909
SHA5124e2c404f4e264f3c38afc5ba2c99ea42e42c7ee71ea4e0cef01107dd27945a3412e87a2fc323407f63e51fd83062ad178e2eba754b9624a55c7d23b63970a680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504006594cb45acfc1d901c5d93881e71
SHA1508ec33b19af60095cd4eccfe7e749599d1abf1b
SHA2565223093179b5c486254469577d16c61616d7d8e08e2af2dd924540c46e1c33ad
SHA512a1c02a9a1c7f2696470ed6474953362efac1d5a4839e602db898bfb21623fbcc1b0ac9cf953acac73c08421971b1f0cbba11180b266b02fad891da83cb240004
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a