Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
09660b7f93cab76a8e52b30add227d8d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
09660b7f93cab76a8e52b30add227d8d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
09660b7f93cab76a8e52b30add227d8d_JaffaCakes118.html
-
Size
76KB
-
MD5
09660b7f93cab76a8e52b30add227d8d
-
SHA1
f1f2f2108fc0e989c604046544e79345b69843c4
-
SHA256
2b8afc4ab768135ca3ef559139e67bc740cd3c15ddbfba2577a0e184cd894cc2
-
SHA512
699b693f9da25a7fac70c9c32afd5d8976c7eb0b73a7b18bbb0c04a63f02fc2c7937c0d871eafbe8a43adf118775fb75ad35afd1f5a22da54ef42520e864c938
-
SSDEEP
768:JiMxgcMa0zZAx997IueRCd3i3ySoTy7CZkoTnMdtbBnfBgN8/Yyq4gcRBQFVG8s+:JKA0zfRCd3i3ybT3ec0tbrgaWcMNnRzT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000002e650d6bdea996ba7dffb450798a6d6b26b40209f24a6e5980dc29aa4ac688bf000000000e80000000020000200000003b5cb14be13a684beea64ce468b731469fd4d1cb4771a16b20a462ab03bfa50720000000877243b1f3032439b2e8f732d60b91d9ac65802fecf6ba9ca42f757d9a030bd04000000050d71d7592fcab91e87981b24bc8e24e59729648100d8752904a59aa50fd0e3ecfb837694282660a5d3c18b67e126ff1233d81d4f3d7062fedd6ff21b2ce0563 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420626334" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA6E7651-06C8-11EF-BF93-66356D7B1278} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8049328fd59ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1028 iexplore.exe 1028 iexplore.exe 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1028 wrote to memory of 1332 1028 iexplore.exe 28 PID 1028 wrote to memory of 1332 1028 iexplore.exe 28 PID 1028 wrote to memory of 1332 1028 iexplore.exe 28 PID 1028 wrote to memory of 1332 1028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09660b7f93cab76a8e52b30add227d8d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a264cb8fff3196b4f6cd38ddd2ab1ff
SHA147c4c16566ef723742e3d34d5e5fb76368875b69
SHA256adc68c2532cc0daa590fc7d5ac9165b5eda0a11964e38e57b694764a696dc8eb
SHA512d752bac11a535af1855938a2c7f8e9ea52cd7f5a952f4d95c4c41ddcaf99540a4dc9df765820994a35523a5fb968c3a3c62730c3a6f8ba93340585a68cc80f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cfd717cbe10e55ecf009152956696d5
SHA112d0d3883a714010bb4422a8e04ba25c0d160b14
SHA25667cab6573ab5b401ce7031fb6058115fa03ea186893fca482bfa6ab01996f665
SHA51295e10f435d24824933cbf102909be9775ae1c23bd2eabf095fb481ce1634c32022e875724f8f9bc207df0a1f31ca4ad1ca2cb198ad03b50c9e06444c97f18949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9589b6cd5406576dd4cb2efdadb1f17
SHA184228c24d8e74cbdaa94132c3e1a85ba433b2d01
SHA2564b3ba49ea8bf1d905c06d7e0d85023e10f6fcdeccbfb5db0697c68d0757261ad
SHA512ea0f613e390bf231934afa475fe453783fec3c81a64f1aa99a2e33aaec839f3a60f7025846e48b6991afd754269ad12dd952ab4fbca1c22f62766ffc1e8202db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce484cb0fee6ca7470c07ae3646d60e0
SHA10c72cc959903c46317482dd16d29bdab0d3e1dde
SHA25626407121662cd13e04e1a5c9fff716cf34308acd48e2dcfafb3d20af7e2f6400
SHA5126bb281b5fa8888a83f6af952995d7806df1763abb01fb864bbb3a3c69fcf42eb59db872d288afb764947b9136cef460d9c4bfe21d689e9c3848ad3c09fa55607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b0cdd64389fe85794405a8b8c7e735d
SHA12ad670432272cddfdd145aff7c193fc5974cb9a7
SHA2564d912223a67654d26f7353e64282820036cb16802784c711f497f0ea9f6332ad
SHA51287e4bdc2cb4e843cdd7e9614d0cbd0db997f2ddfe933b6459e90d8de3ba2d18dd0d00cc6f42ae718b76937ac392f414167f126b4f98509b06616b8932a1b14b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581f7a9bddac4b5e64bc8283656422333
SHA1171ded74b4e78d49b4517b05d1032038191ffde0
SHA256918164a22b81f49b677ab6cedabc3ed2d52445fb3a553a1aad51767443e918b9
SHA5126c9f02ad031e33384da06786c8763cf723a4caee3e646b1ddf246425088bd4416f570885bb00d3a53825432b53d9cdb75fa86966705a86fdc1211eee72a67b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c38aa0bbfe4504103ea70239cbdc75e
SHA1dbd39bdc1da532ee27d85600a8ddb4bd4b283fab
SHA2562b4517c5ac43ea6cf5c5c23ec39a8434634cf06d8ea7a58c7d1dfa9bad8f00a5
SHA5123c4280b550297708556de4a23da39ae54d669ed99a5c8672132360aed03561236f6f41e92deaa7c25257465e22c689273cef799e40c6a5429bccc1534fe18ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534370677c0981d41692efe16c251af71
SHA1cd0323b632dcf6b27072778d471863378502391c
SHA256b2db60e10a2ce4d1c1661732ff490626f3e9e32dca10caf071ba3b45623248a4
SHA51270be9dc33604243b1799426eddc9baf7365c42f07ee95678f25eb7b6e5c6b445dc0155442f815beb4f6c927b9516b4be0cdbfe52e0117893596717dd15ffe098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1fd76bcabaedc77fed81890c3bb0e87
SHA194974a7f01f30ec090ca8acc0c34a1fff9f7a92b
SHA256a1b7b27584d2673f3070b8331192f8ebbdabd285f74be02829de5a0285d5af14
SHA5129793b152054e402ebdaaf8411fc13e4dc7b55497d835a2641debb6a35d5ae1fa286189dfcdef4bc9f8b5eb5d71cd191d696231201482a95e2203bd277d766dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b006a84abc4f12f6e23f99725034d76f
SHA1887766990f5cbd05866a7231ba27cfffc647ade2
SHA256ada5ca7f15c160e7e9fb74cd3e9e4a4529cdd235ea366308edc35fee5f00f447
SHA512cfb93ae9f483c163bd2d80d494e81072bd02445cb041c90e1c29f58b18ffbf553f36243c74a84087d87e7d5a2425ff1f741c7621b6bed42da043de2fb11e9e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f81c73f9479b35a9a9ab3d2139a07496
SHA1ff9d81d4bc8dceaed2c0bafe8f99608de2fb3316
SHA2563823202d7c649092fee022f2b9c7627b43a3efac939cfe88d2b38532277a26a2
SHA512e8c99adfa4c1ab4681785c44ed7d682df523cbe8e676b90f0a6d86cfec04f5dbf4ec0acae5085a5185a8ddb745685402fc3a49089ef9af71eee948ec33cffcf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506a20aa4549c1e3ef04af076f26ed2d3
SHA1e015fb8c12fb04ad8f9cea1f599dc226e89f99ec
SHA25639c506467a543466b5dbd880d20b77ac3b342c2ecd201f66b459308acd1eebb5
SHA5123b5ea87ba1b1f30cc38141c1db454c051a28cebb46add8a2eb777beaecee227b08282b15f1e1f088a68a23bf74d45ec3d8e43b56d9543a533a8596515eae1f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d8afdbb3fa7aef26301b7eb24e45775
SHA1299e8535a2f3059bcdf503cba6e17f9f0a8d9f4b
SHA25683de68f5186a330f3fce29c40113fcbf3500c60363ea9347d01daa05a4989634
SHA5120d107939916dc9112eddee4df62611d11d1b777bcb68b3df2e213aa66388843ee293220a4aa31fab0b433c30a98db463726d9dc5277470074c7467474d7e8a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5621ef73ef4923a5591aba47f7f1e9cea
SHA1fbc65114fd669b182ceb9da5e77d9d574c6e031b
SHA2565bc4fcc743a48b443d1778421c7bdfda04fcffd1a8c547fe88554b2a206422f3
SHA51238d636f32aea9f69cb2bffd15c4b9f67f29efda592edec38074312370f3befb30ddf127f5cb6e227c908202416ccf79b3b1a18ec8e0e2e12de485e7db96eeeee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e5e4435bdfd01de5c82c8dce201482f
SHA10e22a658a9d47240bc45ef51e72ba87169dcb785
SHA256301d91180c83c706a9a23ab5be5c0d028e2b023103454ca8d539e99d491071bc
SHA512c5d31875f1048defbdfd7d379e1def3a48e9417b34bf3a69b182860730e23f62f5a258a6d0877bfc453faf39dd728798a98d89f93123ba199a3042a625ca3c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ae060b173f557c919ad76434a91a2e6
SHA1abd5ab13b4aa356849329ab04a1b1f20b6a8d941
SHA256f986c25e678fae471a9c552cbd1b6571e861c433acfe17aea261f91e503dd856
SHA5122aaadb36b3d518bf2f2f01da16a0f8d03dd663da64e24379a120002a53b0212b6d8dcc4c717fd50fce545670b3eb74d45dbd1c66b1d4c639875f3536e48711e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cd561c2578cecd74c32f0fc5cf96d9f
SHA12495816500e8ce4e23caa26ad2ab2f298af91779
SHA25634f73069c4de9cfd6c4a4612b331c721070e1e46106065c162f6d3b580912dd0
SHA512b03e7e23bf1258d2ab863f6f688e742874e22799d5a401ac8ea09fa80300ffc8384a3a63fbf6fb5208b59fa57773f316531ad013da57365b003f133c0d0e4138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5482dce2b3e0b152a1bfd3a37cda19964
SHA108f839a80772fa0f0448e57ba7bf758058f0cc2d
SHA256f678e2c4b536d9a568ffabdc6f9e8390c612d8b54649bdb5cca494dfffde20e1
SHA512ccfc8176ecc181ceac4547283c343f17b5b3d2013f12aab6f691e7a6235abbcfd9d8e152d302a95eef59fc565b46aaccec45d42b4a71ebf4b7ad55b3963aa27c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0a4f2e9e9102d76f7bb09fc01877125
SHA11c0a734911c50609a79519f0c88aa4ccfe5272a4
SHA25668930d27cda58f15c4e01497210fb25c05cfaee764d046ecd765cedc751cec71
SHA512ff6bb26e4fd6bf32e9bc4f66c8d0fb2b3a8e129e5d611980751bb5023c2be8c2209dc114ad67899c20511e3791733800ed71b702dba01c9ed9cfdbf31de23189
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a