Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
09044dfee4c118652e773d0baf213332_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
09044dfee4c118652e773d0baf213332_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
09044dfee4c118652e773d0baf213332_JaffaCakes118.html
-
Size
10KB
-
MD5
09044dfee4c118652e773d0baf213332
-
SHA1
83bfae94295bf84d668927fe301bb140ce4592a0
-
SHA256
33cd15c4b3647bfd537863d2554351a946e345f4756d7c86880d19b9e219c5c4
-
SHA512
05300a3584fd7cba05b5faa3b61191974229801106ffe8dbc4d093ac6ee7fd3d234c9833131bdc48f42f040f16ad1ef998e5b2dd518d3c0244486a2e2c1adc59
-
SSDEEP
192:hbKPllzaR+DwmKG7byz/L4kHmc3oIqy9JOWK86HQOHPLk6:lKPllzW+DwmKG7byz/mSYy9JvnYPLF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8B006A1-06A9-11EF-B5B3-EE05037B2B23} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420613123" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000f1e9c6b0260c54eb9566521418b09f421511ab02b180390f144306feb78ceb44000000000e8000000002000020000000d10f37c8739d497361fb88ea0665e46a6ce61d8a4086933f528bc325be0c6eda20000000fe279246e06593841433dc08b6dc616a47723b0ff0e693f8a4bbdc58fe1753eb4000000032df0d1967386482c6e3b927e8f314dba704b8ebbbce6a62b103a6c16b963c83151468f02463525af7408e33bd1eacb5ca7cd68c502da49fd58f4f16baf85662 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b2f1cfb69ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2116 2300 iexplore.exe 28 PID 2300 wrote to memory of 2116 2300 iexplore.exe 28 PID 2300 wrote to memory of 2116 2300 iexplore.exe 28 PID 2300 wrote to memory of 2116 2300 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09044dfee4c118652e773d0baf213332_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b9f18c9ee22daf77e7be043fcef06bb
SHA1ec1baf8457435d1eac9fb1bdcd8b8de1cf57767e
SHA256b958ab7ae2bac3768acb4ec3cc6111625d7f7131a93640c14498a0209d5cf7ab
SHA5120b03961057c22e7178e9f7d2b13770610526b6a3aad9b0407f77a5b689b66f35b89b642e70680de63f10c429792286cd24839a74ec1ffc6c3fa130eda5612ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df220b18fc7bd8c403423ce24eed806f
SHA1d98f54a6ee61023f29e0b358d647780067147c80
SHA25677fef64666a228085728c23de3f65ead5981a0b5f4817b19b2c5efbfe98f0641
SHA51267cd9e0fe528f45472c8ac443858f126626c400807963f586212b74ac406f67091ecd65b3e18c149661f4596fbaf41c75efc01b9589d4326db064da5d83212b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531cac1d4087bf00c024f9b8e48608d4d
SHA1deb8836f8a8d4eb47b9f2d37a7b9581d67389488
SHA256ff285c0dcef296be3eb5f2aa7a078ba6eb9d19085d78a87b668388ba6364538d
SHA512cd48068808324884deac3e1eae2dc304d6a364f6564776eecb41f0f58454346d05a21611e38069269c6777db140a208cec05b7e26795c3d1a76d74dc8c9a3749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e92ec059931c2affe3ad837e99a5812
SHA13df7964bb7dcf18ecbb9f427bd1c7a0f0cb74afb
SHA2567f0c61c0fc39d209ea5320c878bb6a5687161ea3569ff1c729133a65bd6ffdd9
SHA51213873f8d9c51c5bc8b701cda2fc52dd27dd32f16516f8cb155d5821a6dcb4c4e1b409f3c511734c09d200d51ff76630702d9e506125c712169f2863795a0760d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539124aabf08e6e7494cca9a78b8ad0ad
SHA15ee7cda801949b96924ba045e377d46adb4e88c3
SHA25635a3f608127a047865a8eebd7477e9b6c6544329a5770ac2a5d042d0b832781a
SHA51218e52425cf381710787de255024c914fa180664850d7797317b90e99685859e4794572d1d2c48cd6794be1dddb02476062c21204db45e7a3417a81b0bb63fc94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504da9ea1a6e812b58f5a50715dfc6e78
SHA12cdfdf39d5257ce0025fb4afb6f6aebaa8eb4163
SHA256305b9cb24a04b061da5e66ea618482c3de2e8859d2401318a5fc95f78a8d0cf7
SHA5123ccdfd418459522c32756060ea52634dccc61f558487511d54e097cce7362bd527b1c879c891308a1c0a3644ebae7e1db59dd04aa0470fafc79e0355f32868d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9b2a9f777ff05a1166964657b9ea9f4
SHA10f160a637e80ea09cb9c43db3ede9d3f1ca96986
SHA25616c03ebcfa104d701c4a43f3a1431ce1343bdea38b7b56256a64901c5c5b9ece
SHA512ebbfe19df560db579d4a918581350fb5600fc1ab68cb1c5b79d64e0717a862381aff12e539460bff8029f20f2eab1383059c4a422ac2b4a75e7e22c0815e50a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfeb62aea836f2f2370291e3a1e44f9c
SHA12e789f6b1e3a7b23fb26ff9fd4744b898ea8198c
SHA25662d7c506ed4e65b866e702b3e66e9e748cdd81b0951183c9e286cd94ad13b372
SHA51259d4fa39dd0444b66a91eaa92fb27053cf9f4a11ec18bbb5ade287558f6717e1e4263efea0c447c35b52ae5c78ce6deafbf7e315d9e2699dbd4276da237e3a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515b465d6284f32a6d27337caf38a86e4
SHA1b073188b0fad821f83553ebd6f6b9e027701ebbd
SHA256d548b7b8ff5ee077f579e07396a35b426e8082ed28d78d9744bcf1f23fe1b3b6
SHA51298ac8a8ec1f6f3c88eab5fafa3a76837c7b32b23c51ce869663b46a22561f1f76b241f13b8aa42f9c030543f2d5cdae7eef5f546967d9dc221c2caf3d9950c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb968aefbf5d55eed545d1e771a1eabc
SHA177aad696adcd2ab9d5fa615c6003a9263e0448e0
SHA2565fa0aa0abb86f2472f2795b26a39da064516f2c976fe640dfd6c04bfe162c39d
SHA512b770001a3896a5db0f199b6d507a2f089791cfc9d96b33fb68dfe9629e3b26046e483778badfda299803224eedce8062168001b94edd8a16fb40e5a86b8e5935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a69e1a8cf3cfb67a34a074304bb13a84
SHA1b513daf1e9082033cd40feb5a511273d2f104c53
SHA256baa513d939e780b7b0cdc06bf78baf13daee911cc4f6a0b9dd70687e42161ef6
SHA512c4249cd02d5cd90e0803c56284c447c14cbc453285c0834334f61d550a68bb19a0bbc8e87b9e0f056d448091ca1c88cc7feec4fe07c40318ba0c792408ddcd58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aafb907bac4281d693b8d0fbe3b435e2
SHA1764540c570b04740dd4128d2463e582904a887a8
SHA25662e5d845badd77c2dbcbc2398f8b9041ab9e61a30a75e5f3cf557b6d6d7fc3e0
SHA512fd824454011d5d41cd97353339db70cac4e755b2091ee56f87e695ba598a7b7720cc06d384392c36f86118e6b1a1c70f32051fb4ffeb2ff786ed4643a8125236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fef3b0032835c91e872d4260c893a86
SHA1dbc8d232437b6ab55e4e8852b7e8ee75f959babc
SHA2564b8f5ae02e929c03421263c582079aa875d7e8e664c4c5347917ffb08cb1faf5
SHA5122813b062eb274e3f98003ff4801f433bd37a3c38318b7b24d9bf0acba2229946fdafdd1f37cccbaa2d17fd89ac4d955926802bea4acdbc13c455877b93e54e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b65efcac3ce84667fe5ab9c227af73c7
SHA1f17064b007fc8a9b3acd6ee7c07d34f2f6b58159
SHA256d3617f0c487563f9db6e8d81b8ec79e8b1676b03452f4fae541436dac3b149f2
SHA512ae51644b478b9124778ba35143c53f475ebf97ab6a9f3209d83fb36aa4e47f43bf73aec46652a4a1c97895349d0c7d2ef50f2cd0331742cbda550438cb16f078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d50371ddc44749dd3eb5578c2882a504
SHA1199faa6c1f1f036ccdadeb52241a5bf1f3e7a16d
SHA256fe0538bc9c5d231143844e341bca79fffec8ad0c43e6ad04ba426dafad93f276
SHA512618dc9b6447211e0181196f709f0062cfa3b664f304b8846751296ad4b72bbd1705941e872f019ae24ec6dbe8e962c44fe42db9478138ef55ffd7ff17386dbb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ed3259f3068adf2613670e8546a2e11
SHA1ab2c7f9743ce15355b53ccceda752a2086a9914e
SHA256c3a9b23d6aeddcdf8e19102b10d17290480f346111d4ba1cd80e7156433986cd
SHA5127eff5b0d7dda74377e0ea39bbf8c84449d40afade8360431c989bd85e43f56b703ddc5c62d17d1e2500055c794e0d67d5cff03526eb434d7a30d6d191b6fe125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516557aae89d367632078c7040319f577
SHA11140d3f6ef88fea1627f4dcc6fe7905adb972c35
SHA256b946ce1d678d14d86f062765df867f99ac26e1ade9b3e776e93a009f63e1b773
SHA512181a8e7cb8fbeee133e5a874045c2aff8ff3d6e5e9ecab02f04c6032dbdf974b5953435705107a696879fc524604394167ba1dc8d9c3b9d36a7c979ca70ecafe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcdf82e900660d721a87e39c07eb2fcd
SHA19f8d08f5dc9a716c68fdab5a699a81c084db52f5
SHA25696700013f3aaf06dc80bd331ef18b3470bcd8f270617c9cd82a5616b49024e03
SHA5129c4bab52b025f092484edc0ebb2393526384aff21e541bb73f47fcde89eab01c7f9556dfd284ae7de0a7d41496a8fd9261884883fb3f878a3eb422251902a197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f8fa35afc4ccd13f5600e09d87cc78b
SHA15296c690524ac52419ce655cc9a70ac73165e468
SHA256d4965bc3fbf784aeabb53d808051da82cf69689cb8575398dc4d357729868d26
SHA51258c6576770f866ceb6f631874ad5b36c1f2497c3eb1cde2a66337cdfe251773ec7ebe02859f191a421c7ee8a45cfce1477da5d043e5d533df9401043955b5cf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f55d9b3f11762d65bec236eb3018ddef
SHA13965867ca55461589afe6ba5d43487fcba4d5bca
SHA2563ef13cad7ac1a513bbe72af6fcc1a2303e49d89f8f720473ca7f9a4c34f43737
SHA512267e1bc4568c4f3825239cfa7df4c9465d1d545f029f67b4211815844e4ab78236f59fdd89a25b5191bec0b6c37d074a6ed1d70ab4668ed8187026d5495cfae2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a