Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
07faf42b7e7af8fe4dc36bd16d24a8fc_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
07faf42b7e7af8fe4dc36bd16d24a8fc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
07faf42b7e7af8fe4dc36bd16d24a8fc_JaffaCakes118.html
-
Size
4KB
-
MD5
07faf42b7e7af8fe4dc36bd16d24a8fc
-
SHA1
8c071ace70cad22db674e4eadfcfedcf531bba83
-
SHA256
2277d5cf69d008aab7efcdd99270fea8cc3a1ea23c832d26a1775b5b7e9b4e64
-
SHA512
a44bf91b822f7e762e1d6e0ab332b4e3279429520453f86afddca953d511a9c485b9a158562412a28ae8d4c4ee9124914bfcb3f75281737ff7b2870fd712d04e
-
SSDEEP
96:XgcJeYuR08gsAD3RNp1cZ+Nc8fTBAwIau:JJeYPpRN163au
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000f8ffc01d4a6a7ec95ce26131f45ebf12b423156f07b207f53dcb81d28451b41f000000000e8000000002000020000000c50af519d0c225621aa1bd6ca8570a68bd80fa53ebbff0610b833778eb4e61ab2000000066a9b25c5a3977e629641bf618456aae8571e4c0df95bbbd9a8799a321d50c54400000009bb004d56e8d7651deb790153e844544283c209a42ad94243796d5454262e482f0a7c525384a80a773192604341263350b91274c75921f080410a08ec31bcac1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ea6867499ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9240DEC1-063C-11EF-A346-76B743CBA6BC} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420566136" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1764 iexplore.exe 1764 iexplore.exe 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1872 1764 iexplore.exe 28 PID 1764 wrote to memory of 1872 1764 iexplore.exe 28 PID 1764 wrote to memory of 1872 1764 iexplore.exe 28 PID 1764 wrote to memory of 1872 1764 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07faf42b7e7af8fe4dc36bd16d24a8fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543e15ebc2be2a1bba7a7ba704dd718cc
SHA106ace679ed355203d95fecb8642c26751b83a3b8
SHA256668fd3f5b34cd91e0ff54640d1570c6be259f6df528f9d9f2cadc616b5bf3432
SHA5127051a964d53c3730d7f83f289e9a89e677d9e654bb542b319642383a9ffd8caaf8da91318f50496f7e06162a7ce07dbac82446f77b3e24d8563bc39cd4d8cd7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af135e49387bdf14ce147ca86a733fd2
SHA1ca77df242dff4a207a81204b6207c5fc69e0bcc4
SHA2568d668c13612cc8d8078f3c6de49bf478b447bca4ee192f886ddf26259cce0f9b
SHA512ad3d65537aebf27d16317932338082b6a25f0324bafb52c7beadfe6ae52f9fc39f48ea6ebcd26ffedc6ada9e17a693ef10e6ca6ff7650e503e24301789339efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e9de65bad4f01807a320d039cbd8cf8
SHA1e219b30d21e7aa05436d97ec1be7cb101d374e12
SHA256d9f4f1b02cdfccbe27d175308f8d562ed698f9c9211a1205cb2195e8c4f9ab63
SHA5129062f63e0a0540c6b62604fe0ec79bc655f6ff6a29c221b1c1cdf7ba23b9b920af7c3377402a09a1a4b6892dd8c4eb934db98237df08dfdfb1e4fd850d77f954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597377c2cce637feb3e6be4eb9c08c935
SHA1b978129004d633112d5e5e4125219408608eb136
SHA2566b523045dfb87699af8915d2c02a866c51dc786861e3f1bb8b93cdc4af153e0c
SHA512d40165b5694945df19a23d7e0b21c5a3d9880a400221dfbaf330378ed83fbdf90d872f176ec954a9959d12dcfb9b935eb6941a3e6d992c35e8ad269095bcc247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557c933ee403e43ad46a4cb378ff2dded
SHA191ebf4202469e5f9d33ab397bed0e231887d1b36
SHA256d50fb7f87f716ec185bfbf053a930db431bf503b3454051605c34d7c2bf970aa
SHA5120364e09304a48d386293356201ba3b2d33125ed3bdbecb29645f58170d0f27cfa8c72501f5353adcf36750f7bb04f2e71412390051f36483c76a558550ea40fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c49b1ec7577299535d195428e07062b
SHA145abc4e943e812c58335b7ea7beaccdfbebb1886
SHA25634446f64d5789c9bc7ffa229c9f8472bb43e9cea1ac6c18ba24113eb0ad249e9
SHA5128812fcb90d46e17ffa6a404d7299a426ef3e9d7fdd1f9a09aa91bbc0e4af9cd333729372a9e74ce851e6648ad460f2f32168af3e55cf4630d1a898fb08af303c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e99effd7877d14efddef2c742b9778d9
SHA11b8506fff58fd2790ae5cd3f65869d31c20bcc7a
SHA256d4e5e70758b4b002dac4122b939071b2ac13082c4e2698749f06ed5d0a2c78ca
SHA51298c7ea645b0cea504daafafdc6a1bc3d22807ce26788018a17cc98c38ac3e36fb6f930c39ab91337be5b674a24233e4d18b8d699a2b75d4c26cc71600fcf245c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3df7f7c67e78a3db275506f65b3c798
SHA1b3bfd9c5afc15e0246614e42d2c28d1f0a804401
SHA256d6434976537a9331b0f813753c2f0e05a279c2a4d7ea67453efe956b27e32e19
SHA512f01601a5033273153c17ce31ca13038729b7798bfd3ad6f264f2e3584defffd937536df849c6dd88c44c59620b68fabebd23a07e203db3993bd4d63be4236d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56619e00fab920c29436aeb7ffc68a450
SHA1e4158ae12d8d6f9b571465145ada2845cf446db0
SHA256364f2e3f44a5d0eca2ac145d7bf9e1db0e7523474094106b1137875e58618ad1
SHA5121fd918531a8681fd4ad170f6d3ba9114770fbf2a70de21a8ff13ad5186ca1e0996a7e342eb265667ec10c89c99a86112b1a7f92cb24bdff6654eb77dc6397c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4ee2c581dab2189f245200664ebb4a6
SHA1e4bfc2b4f5bd43115f7c53ee7b804219ca4e89f8
SHA256daa4c7b3af5821b0f97b812aa40404700146ae5077f5f7a98383bafc253270db
SHA512c16ee1a4447c41f3973474268a8739c57ff3e9029e569b9010e8ed7cdb11ca30c06f1e913df987e8b64643aedb87c0588f8c72d50061d2de01c631e86905a7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d1a8920bd547480eaa2758bdb6686fe
SHA133be1953d8056652481d9f95e5d24ea8ee297a7b
SHA256739a0797d0c070a20d3ce51ddb17e5d13d9efc1a21e993087ee212d5e9df5ca7
SHA512221e8e50f2cf72c7e326bb163c29c02b7ac13d7dbf212f78e306b2b33303a298aa4fda482c3e0257ea87a5671dfb8db6eea29b61d0a97a0e6ae15e4d00e5175b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568dee9548bbea66aeeac2b156b450462
SHA1ea6d4ccb128f70d75c82cec3525fa69d742e69eb
SHA256a0c2d9d5919855efbf4da8e9e3832f9ffa9588b2ad229c74731651f27c23ab8c
SHA512128e1b8506f60d5ee0ed4b1bf16157d3c7a7132b526cdd7b4c8d49114728e8630e53d5296eb64b48b8d5e98e2d19a66fe6c5031f29489a57b99956d82bb50ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3943b647fc7bafc9dea10d4dd328cdf
SHA1ace52c1dc236b6ef12c43064ef6ac193c159512d
SHA256771e7c5cedbee866fbcae93762f6a3bef2d60448a81bccd8b88ca4088419c306
SHA5125b6f3661a8eff50878621261eed331e2946bf9221e89cf30e944e2c2b7828b4bbcfc264e25b157ccb0638d7ea90e5558047b231b62a74f0fe16290476138ba75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c739deb3bfa4b6ff5b968471412efdb
SHA1d5b7f7ee8b130cb348f4e3e78f831684247dafe0
SHA25670d75c460cb2e1c2ae01490800bc66ff108cfa2e8cd71db4e4d61449478477a3
SHA512b4a348ecf572bc4a64be998354a3987b6a0667866c7d6ca2bb9e4f91cb5f3f60f4157cc3fc50dba4517565c62f87089a4fc31085bc90542a68e6e0e84e18ad4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55771e1845d34abc4c06f80dbdb1113c6
SHA1ad5d695f4c4f1028514745cdb2ca70268c65f2b7
SHA256fe73681113fd9b32afb0531cc356ca6264dbb574a6654d263709def03631a701
SHA512b53cb14e53a67ed6d42fe2e5a8a0262b2e3339bd97f880617221f5d50f035c6bd65c12f8f26ec79bf905f75b992dc70373c3e78a345193ab5bcab8fca85f2b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a4a0e6926c3688652690a7698dc2b65
SHA1a2fed3a49861a73208c75aefb69980eb4d65feac
SHA256f8388b3be4b6f938656e7017bcde0a648c8cc0b009556edef11427f511da96ff
SHA512da1941eb9783ccbd1e883acc8aaff01488d319721590a7d17343e816937480a6f71bc1267f092aa52fa9c10d7a9ad7066269ffaebaa7a984c7ff6241605fb259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc85b1e6d1c5ff3003b1979b90fcac66
SHA107dbce4f259d4300a68af4e9fed45009bcdfda23
SHA256361c215f894dcf8ff9b6fa68107fbbaa81fab55bc93058259fd81557f0611f75
SHA512545def51147f2f493f020636a55ceda61692aca5e8903b6222b712e1e8466f7aabd5b941453c0c93fb82bdbad5a14ca80957aa9b2f947dfb29012ca44b004537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8109ec1a789ecbc1756a63e788cdcee
SHA1beb6cde18e16eab74fecc210391b41610277d370
SHA2566f130783279114bc7a8e3745c89f667c64fe0fe3dd76125785d8d6f07793e97c
SHA512ada524ef1be8a148bb6b68b7760eb4b4cde995fa0ddb3354a08d2a8ddcece82c5bf708f00df5dadd672a3ff7ab38641493013815d67c08640c6dad340b62ddc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2d8fe196e06e0f8e827806d099892d3
SHA11f6385cf585eabb02c3c8c7cffdd8bf8744f8cbf
SHA256ee4badda7588363c8f167bbe8fa93d17496ffacf26ab70b17a5270a8b7f802b0
SHA512467957d9ca9a7f24ff92074580b198f1637043cb26ecc51cbbcac350c2d3714017cdebf517c91982c3a052f2d46231f478c9e134b18715ce0bf7517d672aef88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a231c92bfd0ba0f17ef011e69f094f63
SHA191a46fed75f7d9459b0536f3b8bc8cfa477cf396
SHA2566e334539f46ef47b556f81db038be4396998b07f13099fbcf51a8310b596508f
SHA5122aa894967ba5165d1db88a39bc56227861aa9b7caa400756ff8b0bd77495c8d757f638390c4cc3e08a30431bf5c54b6d45b6173cb413683258985aedcb32fc2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5108d92fc8eb75be24186f4f2fe559c87
SHA10c1cd7bb65a01f1967ebcf77e764b6e43e4b2297
SHA2564eb27cd8e95f84935a9fd47f4ffe4c532cc00670a26abdbfbf91b08c52e1c571
SHA51204aa762c520b32df8c6bcc7a4d4396320f3adf467c5703a11d91d4ae029863ccb043468668accd9437a6b34bb3d9aba218c107e43f6e785891e0e0da8b5348ec
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a