Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
0946b4a005479eb7a22858880d8832aa_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0946b4a005479eb7a22858880d8832aa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0946b4a005479eb7a22858880d8832aa_JaffaCakes118.html
-
Size
25KB
-
MD5
0946b4a005479eb7a22858880d8832aa
-
SHA1
0fe10ac4b0382f5efee320a0299ebaa571735343
-
SHA256
6c3667bafa4af3ee3b399bc28cbf86eccf642f998be83869286bc43dca3c13a7
-
SHA512
c278d91d1e53e171c4a7693058d16a7bcd754ed0f7a4cfdc18a6c805b93d957f1413278aef45a5bf2431b7892032831fab0f84834c08c716f743de0b79b70c4d
-
SSDEEP
192:NULoZt8b5nAnQjLntQ/onQieOn2lYnQOkrntitnQTbnYnQnMChAWpdEOwuXMynFj:qLo/KQ/3lKYr3/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420622128" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000065c0111bd5c227f433cb615abc7b794175b8d651b85f26911944759f1585cd2d000000000e8000000002000020000000f2ae7d441db7d482608adccfcf61059a87cef30570aef8d0b3744e94609cb17820000000fb8884e47126b9892311b376edaef62c0ef023b7816971e9904623f62a10649040000000ea5ffde518f01aee1ed41a60ebe0e98329188599d17ef6cde21f99fae1eb7fe82e8db3df0bf77e893aaf8754daf899bc3f3fa3284ea58ec546af26d41d278987 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0090AA1-06BE-11EF-9BF8-4A0EF18FE26D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c020e5c4cb9ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 3012 2300 iexplore.exe 28 PID 2300 wrote to memory of 3012 2300 iexplore.exe 28 PID 2300 wrote to memory of 3012 2300 iexplore.exe 28 PID 2300 wrote to memory of 3012 2300 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0946b4a005479eb7a22858880d8832aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56800e6bd020832ca50fc07c56a698c25
SHA1441424ca47e3556254d4d02f8de601d6f0a8587b
SHA256543906c6be2f22900cb1dd8b15f4863a582e0d8601268c7efb8a7650ee1edf4a
SHA5127bbbe678193b06c87124fee0186d6d85d295d51a2ad3b25228b2f7d596f0fc23bcdb1bdf2d08f6b59058603ee9044d84a773f657077e6f0b9ca71a352ed91f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2920eb51a5fafd03eb383551056da8b
SHA19894b77d0580cfed01b3c1faff36f1212b017dc7
SHA256c61c4c4566210113a0a963b315fa0ebdc24fbc63ad58828f78fb2e849669531f
SHA51253053fff20053439c340252a11d5dec2d247a3ff1cc804e1ebd193e51c58654642d37bb6856486357861417f884499acfafcf5cd251cbe812f45be98a8756665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ce92b95deedb69c168d8413f91f51b0
SHA120f70e19c6891a7520e2fd1804d9d156b0711710
SHA2565c7547b436c8374aee1fec379eb9274d43f1e30f286431818b1ecafe144a0399
SHA5120e3b338f9e8850d49cefc11c5d5704018824573ab095c0a6dd82cc7582002e6d9c277b25674436c7fa509b3eca983a3f140a26e440cdf2bc1772d8a13125edf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529186cea596ba40c77e18aef7764e156
SHA16e0dda507403da8e9c83cf522b9019926f9d3534
SHA2563ef979092f980f4c3b08f5434c458e2b53260723bc5860cc24094d7307bedd74
SHA512c0d5594726d059ffb2609c54686d8284ade49cd48d556fcc434de0bf11e79fbc920ec64c742943334f8981693d8ee8fdbc9af68c291a087f91911f5dcd371825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519adb1cfee3539e08c70630cef0ed831
SHA192c2d84ba1c7dc625c0eefc330a624a53ca64551
SHA2560a019eff9d3460f025b04f82ee68cbf430d2c4745740a58f4203e27f866a3c47
SHA512709d04cf2f0421dd8638259010454b91c1348c0139722825e7d70224881472095f9d7731a6b824f355093c80eb758834dbd8bb67bdd7e03e305e5a2c7f6a6247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ce8a5a8956a04822b95dcb816a7094d
SHA1c191599612522703e8aa76921567880e1147717e
SHA25638477340a39bc998b0be21a1d2a4adaa29e3f2756dd2fabb74bce418db6e5423
SHA5129a134ae950c5f3ede440a48fd425d4943a3ed0488f47fea804a5448661b2b3222920544b86a319b56820bac9768d508604e144a06de1e64f546ae505588a0afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52266e1a05a543fa5ce932105098623c5
SHA1ce2a4161ca228a2227da763e07654f0c02443863
SHA2560b0fa9145f964e41b332e99aba761b1c8ba9464f401ef8f7d14a6ab16ecb0451
SHA512fb9c21ebbe561a2ab21cb1de047cf2343de49c92897a29ff15154ddcf476f0094b01b3c3c664074649240667c2663f9b53f59408cf7eabc2e97ded0ba8c82a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8c05361656cc498534b1af6357b09a1
SHA17abe453b44c6c6b5fa7de529b0447da36dec68a8
SHA2562ebef71bdc5f70aec5044ab1e123700fc35a30002f2c5bb9d89c88403cd3f239
SHA5127a58f0a01b47a74686388d3ba6b5405e520e490622580ea913383679cc1a3878991d83a5ac3a97942b9fefe40e9fa6c4ae93d8f23bde7fc3f77144eb2a1ac3fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5699a466b2f7bc17866a7415a90a1c7be
SHA15e672e9108cc7c9c365510c13e7c733245adbeb0
SHA2567d6260148e052c79a73c304e276c2b9de31b7b63a142b2faf2e46ac860de05b7
SHA512705f2600381a81d0230f331b966b4617dc3d7af622b59ec36e0f0d8e6111d33d01edc2b04c4f56ee33c9a6abe689890416ede079bfd8398f7cbd0e5ddb794d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564eff7e7655833a3051bb6db0943f358
SHA1b4a5c7358ef08c80e64d85e463581cfa8124fdb9
SHA256eda90fe4882b2b89b0f697c9c04f42b7fda8e200036326db1b0dab124b25cdd7
SHA5129c2cc43567f444bdaef7ca6d32476ff894ca1b4f7209d881e56f3495cd44e7209cf4f3daf68fd51f0c8f473d0144fe3a9856fbe41d0455597e6257ac8ca3cb9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c263c128ef86e4d66f7118b785eea7a
SHA1e394e543c0ffa9cb0d4207cffa8e2ce2e5d0c654
SHA2562f31f4fb15468e59c2360a32afdd61d44dd8513ff7619b58c49a440f9e045f13
SHA512a646f3ede2bd37a70097fada09a3554d612254e4ac882fc6d7b84e4f85cccdfc44ea9637ce3912d819623b9a6816c6155b6d24034384495f953a2be10a3a8306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b68c54e419a621b9fea092921beae63
SHA1cff771441a41fbc9e968013c0a1f4f40bdc05141
SHA2565ee2f25a014ba82ddc43ddd773e2e437c8bd634811c176fbdce49292e2f86d1a
SHA512765a54b98a7f8c37deccd0e10df873aa1accee5410856210d658ed7bbc787d8d5b2f7fc3661b26247a1123d406acfc873d6fd3bd11f0c59c23b22418d2ddc7f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53db6e4a65186aa85e923e2fc126b1d58
SHA13703ce49c0a94454ce62c4c64c0bb9b082267a73
SHA2563eba5dcc7b1c2b53963748cc965383ffd9b8a28cef5137229d72c3cc80969c8e
SHA512018cbc6c07b2766e421720b044fb4c2d4f38d024b6a5b147c0073df491fb995dac1251f3339acd6b02049994316100f6b385cd378bb4ec9b03a9a8d55d967bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1f018138cd0ba0dffa30eb930d1d707
SHA10ad7639c1831b00cac6f9dc5c1d3b39a7110931e
SHA256a37f6bdd5e77fd3c2df00199eda8402d0a5fcefdd0d8cb988de2de17a68201bf
SHA512cdd8980d205618ce543157ac1809b9e4bbe5f992e8bd030953f00a4a621505a5732b9ac661fc67c05807075441aad976599009082e6dcea1a7155a708d3d119d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53465dbd516273c8c8319f6bca8846897
SHA105096251d89d5b9b6bed1aeb1ef41b5b36b487b6
SHA25639bf562fd24f63639219eef7d88a433a9ce52b7952bc488c700082f5208431da
SHA5120a9d198d2f9bb2eebbec8d33d8298299f553bfa223fe8bc62c5a7c11471438e85eba1139f2374f29dc647d4a12cf21b3fdc58b9cefd0a5668d6fd5ea64e89ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9a78c61069da5471064823c163311f8
SHA1c7c6db083fa1cc4dc92019d803beeb27252bd61b
SHA2564399d7abd6298e8af950e6537e6448458d3ac3e2c19d42a58a26d2782613c38d
SHA512c9f5d7527ce5e0e44b0c9619de1e67c2663181b7fcf5d7a92845dead9b12dc66a307c84445e85f6eca5353cc6455710314978a591c3f61d881831e03d264f6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5102e64533769f3a4c22ccccd18a293fc
SHA19a5d72655a2e2030c2b56637e9a6145b2ba8b816
SHA2563ee50d35ed5c831e66f85272c668faf0543a3915358207b5de193b114145af70
SHA5125a4fc9a2c4b43980b81ac9f8b94b72436948e47c72a4c852f28cbe310f8b679e4fbd3526b587935308c887b228e858d6028a34caa5f46777feaaf58d87d50543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529964c8713e11dc32aba5f653d7d9935
SHA11f46ce85eb9c3f16a81cb59f1eb719c7870a323d
SHA256c51c91af69871213ae1aa2b7a14a0c85d859505de413128c9c4a47c76b1d86fb
SHA5123c5c1638ed563ee5ecd592d426cf7a29d30e9a495c32cce22c83cd9599dbcede627100f97452283fcff44ea94c4f14b0b961bb780c2921034fd0fea8c13330c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0519e9232fc2685cea49a400f921f71
SHA17b25aaf173d39bac47694228579fbfd6200e93cb
SHA2568a2c44facc0eed2488bf5df5655250ba94f2982f2942b2822d80d8fb3f236892
SHA51245cace3ce9e7520146bf4c3a9a542853b1680c40195b00f0af290cf785259cb21cfb8a74533823245525b3543f2180e2e23913de526bef8dbab286f419776b34
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a