Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
07db556ff1a744170e9da741fc6e331f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07db556ff1a744170e9da741fc6e331f_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
07db556ff1a744170e9da741fc6e331f_JaffaCakes118.html
-
Size
3KB
-
MD5
07db556ff1a744170e9da741fc6e331f
-
SHA1
8055edc14060fe34c14a4010434ad274dedfe588
-
SHA256
7ea10e78a079d219f228d66d5849ef83e47e9bb68d43f6ab0cef703faa83fa12
-
SHA512
38a0610dee05c09213ea2dec0791fd9f883184d5b4469ed5e2ac6c8514bdeb21bec91b3d6fc9e0b6c7c24fa7667c94dc7bddd24518b389f311da44ebaee32557
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d2a3fd3f9ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000552f21d2c7e2beaebeb7841103422ee5940751b19e9498b2e74a75493db103d9000000000e80000000020000200000003aa304a8a5c5f179eaa76e9796fe8a4bf81ccb821c2daaa7d1b1ebfeec34c24620000000d13aa250664197b670d8b80b5c413c21d2ff7117181f1027e5afed2c8d18740e40000000a78a25aba0fe2cccd4e4c130e2b0802f058b34e14243d91aa015acd136ec2c4a4b66f45908a9a346ef554735901f9ef2ae90ac32473fe2c3996e2d80b2efb3d5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2904BD91-0633-11EF-8745-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420562094" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2036 1952 iexplore.exe 28 PID 1952 wrote to memory of 2036 1952 iexplore.exe 28 PID 1952 wrote to memory of 2036 1952 iexplore.exe 28 PID 1952 wrote to memory of 2036 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07db556ff1a744170e9da741fc6e331f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3cac1626175e316578df3e2ec30b8c5
SHA1e48b01ef7782605e234fbe5e9c31776225782bd1
SHA256b844b3fbc928527a503087cf8af9738cd11d5a405ddd9dacce9eac3b9ea7fd92
SHA5129d548d0de13fcb42d7b724686d6fe79f4ac27702ef79635edfe768eddd5763d4062e7b227cdc57f7a0bce5d1859a858036902abe14da16b7e7c41a2f8d45d023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5231ce6395657a4e563bc909daa7811fa
SHA1e1bfddfbd7167385b7a40163b09248648c0860ff
SHA25688047802baeefadbf38faea9b44bce94cf2116f9c9f4ea62567910ee8b280f51
SHA5128ad86665b477e201c821e3dc4660a60dfd1d7169fd74d96f734efe914be3f9aff4c0d8d20dbee32588f9a7403cc2cfaf333a9285e97cc26483bc75db8558033a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5046db64f7dd66168891e1cefaea57df3
SHA1834d1925bf82fd08542f9caa335648694d88a813
SHA2560342f4979796c85fc3e69b588cf3da76e77557344f6956da912c5b3f4c3d2ef5
SHA5122cf02a9e4d1137046d56e1dde5fe5ba72890862d196b4c4a1ed8e7588d8379b345510aa5f3234b5b8603008a226f1f1409cea1f41350604e802407a454c15e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592232f5a224f2dfa410661d2483079d5
SHA1b3b1be66f8c547ed489d6009b637fd5c53227dc6
SHA256ca7309cb28409812809f6b4fc7dec7752c73a0bdc57be848c08ffe287f639b37
SHA5128a811db85b184effa5d787ce3782fbf829f24ad6a661318501aeb8d3c96b4281332bcaf10458ddcd43f575c01f0e8b7e45ca566702fb9336e6abfe1f7c9856ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5e2eb9d210287ebb647cb701d3cf95c
SHA1a68c54d0388c1865d457b54b6cb92d776c2fffb6
SHA2565ae9b3b3777827c2a65173a13df0e268c523bff1cda2f326e0d815debbeebd91
SHA5123e7cf7662822f688f4f8159142e562c574a852e544d6fe3fedff6d1494477283caa964bcbe196a7c055d329d6887bf14a85434448be6c2873db35a0cf1df146d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5533e7fae5930fece2d47fcc51f74dd9e
SHA10e2e41dd7d7e3e646a28bac206b8b1b83ff14690
SHA256b398f48fa6cc0b6ecedf46cc6f69c62c3db80c4c7a05638dc7ab25af5507fd49
SHA512bdb41d7d8f1c0f47f9b26ce1d6d2077ac95ab006209e5b2bdfdf2c0e0d1b96faab54076f5f9d820cabbdba3f17f5e3308542fcef0ed0c1dc88c0771aa54d2ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504eef856560c613857f773050df8bba6
SHA1de95564f8f2ffc4296b46c4e7b45481e7d3ba54d
SHA256f97b3404892df4ce7ae5bfc53c463062ad03486b8402f709c57e650494668218
SHA512add4b5d3e7896a65a334f07dbaa89f6f2201ca6a1addb013f39db744218ea2551e758aecfb6ecfe4d35e3ec063c17dde2fc619aeb66347cd8dc74bf0f0520483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d01f3023d42c5d54cd8143cf75db5c00
SHA1eb150cf93ff6ce9fe75bd8b215fc05c94a5bb8e7
SHA256261d25277b386a25458d620c76d8fd67ee4391998460985de4d4864d5d112ca9
SHA512aa5f4be9f40542c81ec37fdc18cbee6345239eae87b130acf1dca54852a0d8a57a12d9548cf78dee6861cadd23fe3bf31a6685b106f95633e2b96bba948f1788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfdf5410bc0051933509476f440280e9
SHA1bc5fddd16e45a0d90884c2cdf17ea3b5f298f693
SHA25628ffa6fcf9ca490f0f7e3a7c411235995b3d64ac45da53064158259b76040f22
SHA512e896208bd4f264b0a4366ef5b8872327616947da513afefd832f314095fb9a5e8a8cd65bfaeaf1e08271c0f90cea60055d91bb59b104f8111f2800382d0e1943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdf27dbaa706c0cfe812e7ec3fdc3a17
SHA1ff52882cdd70c4c206cd2ed0f0b4da1c8f550f8a
SHA2566414661e89a521789d30b886661daff160e75482c8f842fd4b3000680f019c03
SHA512b7eba44a66cd8812e829570a00e7821bc90cb096611eb272dba599c6ba4e5d6c6f3192bbb855c462a95ecaea264ba7fbb10038d03ca37560da38ac071632360f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5338b88a10a2d9f09588d80754cb0c002
SHA19446e5ec98dbbb88e461b9fb8919252ebc3772e9
SHA2563bdced0898506157a1ea5768976ab60acaa2820ab732fc426e3cce173a9f6039
SHA512a1f578b3b785beb31633d159eca66fe679f6774ac59c0af1df853ab0917054fa108623d4254a929b66ab2cd8f3b0a1e44623e388db4e3dae35618ecf5c16063a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c63ce8f059828e29a25f9e1613b533c
SHA118d269c643abda5f4740b7ce26a8dd0f586b419e
SHA256da7b61a27083ff604106d0aa7886b9a836d53abc1dd8756ee88d3821161c6772
SHA51203ff91f07341d88615ff8c7388d7fe4f3d54534052378e01da524debd839070832dbe4bf8a80a09d94ebb70eb9ba215887c09dbd35299bba89c54b25bcbbfb8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a300113b940e6df910a397f1da76a31
SHA14a17d3c209aeb5553d0c67c135d4211c2d4356be
SHA256816b1f3d38b618521dd556049133fb0cb743a527828f5b3967ba2fa363f3a00e
SHA512eac7aaaf932bc69591cd563bf5e73044913cd8eab8d899222186757070bf33efa1e5cafac25ce6e9dba5df739e9f1850dd6a951d74c2dfeafeca0dd7329b321b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563f60ed2f4c7c525ea9fea082751e9ef
SHA16d1313282a1ec22cfdc53bbb2891d8f130ab70ed
SHA256f7e77c76cd06c91791e588bc042e44c7461660ed1498c8a06249292aabcafdbb
SHA512e2bf8af977c31410d62f92267a0160823b7c10861949b62adb5f63fd6aa1183c50cf70dbcff9bc9c56412be5e2327e8657765aaf12b472702ace6200fbb25c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e52effbb530a426e8fa5bd487e2f8e8
SHA1e6c4a50b5276e3e1a5291ad416bcdc17bc535cef
SHA2564f52c887ac219d99ba932777ab2cb5b378b8f3292d2fea8babd41857cdabd690
SHA512ba54524fd556bc0be3e73bad94587d55362ed293d7bb9afce516db4ec46ab3e21c3d6ed9a67ce888e6a42f39e6ef5593f2cb528614e2318fc7e79250c0544671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569941fc4b903552f90c166a460c5bc83
SHA1194028a2d6aac08cc95fe63ac0299f3cdeccf9cc
SHA256ca7781fb40070fde7c735e6397f2d9ecf3df0e3d17e462b59550f418dccfa52b
SHA512b99659b1277dd1bc3f1d19abff6371cd3386de9d9ccd8f5d91846474e145801e465c1463ed3cc209c2fd24cc0124f6dc49a386ff92405f4bbb32bf0462613005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5154d74b3e69139d6d954258c74a5a9bf
SHA1c725f9ba5b5465dcf2a4b61c0223533a72fd0d7d
SHA2561229428b00e7c3c37915efd560d8c6b805657404d52cef9b8d93700305ae33c6
SHA512387d41433b21ddf1b3f993dfa57084c82c9fda92d1ad6a6673cd3fe1e3857908aee5809a8437964fddb7b01cf3b025e1415ac5f9ee7f954921d49d22880e6e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569efc488d21d7610fbbf9b24fcbacb26
SHA17f1c9598f0ca554bb62521963ace7201d1cbc88e
SHA2564292e5e0079654289438a5b713164a85d71246d7310393b31d4c82aa0ebff3bc
SHA512e27c8ed3b309560893c4686949472582bc5f92f4b8f677244b060f2c7cb75675a3af479bc2a8feb683bf6d65b8ffa2a25ea8bdf5a7dd85d8c8c8ba5be2ca3cec
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a