Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
0981c7f62309193200bd50257fa82da6_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0981c7f62309193200bd50257fa82da6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0981c7f62309193200bd50257fa82da6_JaffaCakes118.html
-
Size
1KB
-
MD5
0981c7f62309193200bd50257fa82da6
-
SHA1
1d301588b93eeedee3d3679634029ccbffe05099
-
SHA256
e3955cc2f3995d30fb59b1dc53cce24e560615b15a320d5e84e6665fc65c6d6a
-
SHA512
a14de03d34a62c0fd13476295469ca0c373ff1b7d29a13399bab5552560a688a86fa7e8a74c97fe30d5f294cd40f2709a6bd41c8393d0d3e5426d1deef950a48
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000dd7d093aea509ecbf769026a3ad36b0276ed421469838fec215b665f83d94ef4000000000e8000000002000020000000f15249819c1effcecd1eecb2b77945d89413f8dccbd203cd0a0c86868acc177b200000005ebf0547a341c11ba8252019448eb82882cd8ed42a202fc2ab53f33578bd4d5a40000000aa2ef5f2536378aec4166a0b8680d46cd826582b7d8ece255b1fa54a64f06e9707e8cfd3f246f24947f8086b45906695d90f4d8565bc78a4280654e6fe08629b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0236745e09ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{821F7AF1-06D3-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420630964" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2988 3036 iexplore.exe 28 PID 3036 wrote to memory of 2988 3036 iexplore.exe 28 PID 3036 wrote to memory of 2988 3036 iexplore.exe 28 PID 3036 wrote to memory of 2988 3036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0981c7f62309193200bd50257fa82da6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f80e4fb970827d202ba1b2552e326bc
SHA1ed4ed46613119e77cad440a70f8eb375e978e877
SHA256fb6b7b7e20a7501f485cc44b61a07fc9712edd59da968b8410b78211dee253f6
SHA5121395322857aefa661f982699dfc8eb2267296886556210ea2498a6ffad16e95b9b87da3fc733f9de109a4b2ffad42e18f3270feca5a2f09dd1cbf7461622594b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592a056496115d96a428c9c602eedcd0e
SHA15fdb5dfb3134f29136668440e054d3e60437661e
SHA2568e12b677fefe5cbd5bf6c1f13b60aef03e18e232d90e24beded142c35ebddc67
SHA512dfd7be0828942757eb5b061de908702d05f9e1eaad723775ff2d2a80b2d7be0d9a15fae7380e5977583ee336222691917fdb1779b6e853d4192f06fc4201270b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57de77d0f3ccc8639075055747fa1c96b
SHA166442c2d60d7f5bdb35706767c04495a5203d775
SHA25627942cfaf199e9a4225a3fe0739ebd1dbe512680f0cb0132886cbe766bcf7a64
SHA512f82f793539c2e0f690484402e0b90a5423b264769571f6f37f6818eaa3b33e880ba5ef9b36dc5f128cda91bd2dfcf66873e43a96eb5869ae05d0fe20afaba9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed008e66e70731edd6a3c3a6f97761b6
SHA16160f2c4bd5d1d6f44fb30a8edc51e62d1e7ed92
SHA25636f93555e57733837194db61b3d1d469c5e02b1c763670f825e034fbbdb71660
SHA51242e969fdf71e2811359f8e6829a99fcd1d7119a20b2e54211dd851ec9a94f9782880100d3c10f878515267ef0a2ecc0795d556f0b2eddf31e42843ff78144328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7678968c4d422258789db31115515c2
SHA191cf30d4b69b140e17608a1bf8e119e1f361c355
SHA2568ca3c3a5b65d8754b1aaaeff4c3550154a93dd0434c6f7bba936c3a0a1e72ad3
SHA512fd8d984999939e3634316e064f8e6f7fcd0bb78a5af429eadd1eda3bd64296aff22bbc4182df3fcb6cde9c593357c0e1ae9628d8e9ba12b4d05354f40555c5e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfa048427208ebc2508b6bcb1557584b
SHA1ab937e8337f6754e63a5f290603d046d81438666
SHA25634ec7f963b0003e514700bc4792f4cf4983d14be3d3de19e69c9ccf0eb88296d
SHA512bf5a89e576a7c61f7e2f7194b219c562f374291ec33379a95fc4552b1c305f6e7bb43cb64a0869b0e84f5e5db6caed1840bbc24ef60f78d56d29db72b958b6c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db5b60fb0b6ff362838ae41926424b2f
SHA1ee7c61f79c725519f23a5de3a75dfa8e4e9dafc5
SHA25600af27f25c2c65feba885c8703ef6d98ea5b13e6e8781e73de88686a592caa38
SHA512017f4b977f31771fb7f80092652c2f932ad5fbe312211ba3aebadd0a70e5e445418c43ca27c60b533f766e7b9c0d99ef8285a9a9dca86b6c2cdff3f4ab770486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d90c42ab4d9d153b6220da72637b104a
SHA16993d0f482ad3d5be1ce111f9aef298195913f55
SHA256b9fe3120ee5f58d8ab31fdaf35329549eb27aa51fd1578cfd90c53ca102f3d1e
SHA5127d9759d9258f17ad08ee91a6d887974bf11201128c0d82086c33c393c1856b987b88a40f03360b752361d26e2dd26d8991ae2c5577d9ef63b94ad8a38ba16b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577fa507410e8e5faa1c0964fb12aafba
SHA17aa1f46b4fc1dd6cff0ab251fefd5a501c1fc6b7
SHA2568f54849a618e773d572a485d8b69eb5537db19242b3a566f9f70b4de160d56f1
SHA512eca798802940465e9228672bf2d8e753eabea468719881c28bc2a23c3e829c3a460be0bb343b77f228c9d838bbb76ec0ab7655a78008df1e54964384ee59de00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5537df66de5698295ace95ad71c4279b0
SHA1f7147336962609e5d58b98f2fa16e4969ea8130e
SHA256894e4aaf4cbf480ab33192dcca3bb67de2466a9ee3e648bb898c65884c63db26
SHA512a1d6dc8b37c0a729f139f5e1a964910f508bbdf3614f836bbe9f582fc5cc5765ceabfd77b3fbd32f614f431c34f6829e90fa9af1c1c7217af239d67c71251bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544b7aafaa8c6022b588ca751c35f59df
SHA1ea6abc3d592b2bd7aa3a2f9236572d88852e0197
SHA25672a7c76b319047266192c4e115d7be6b759e0b650a4a255d1404af80997ff542
SHA5120fb476355b9cba43bb03f391d42633a5fc3c6ca327fa67a5a5fc085fa58448742e65ea85c1d0fe75dcade68a55711d6c25193601877967b0693b70e41d34d60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd78c34bb6c1993e4b8b2cb1b8a12625
SHA10c9e5b66e61be4a19ed5cd0052aae8fd1d55fd67
SHA256f17656d4143ce28c8e46c4c5e17d1f52288e6db44459424d5136787e60c7f37f
SHA51279410e998cb4aae2ae93cc05bf03a091956a6c2675d73face3220e37ef015d3766aa4f1c97a643315fb57e111d35fdcf08b0a48325e25599a3c41855630f56ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd7e82897fccc12dee084e49e13b8197
SHA1af58c67651606c64857b445f94b264d9fe3c5ebe
SHA256bf1192bf1c1459345f61611b3125c35dabfb49949923998eadf26d4dae8efe5c
SHA5124c2fb7ec530d33bccabbbe73248bb3c44d1bf19711701ceca32a1e5251cce9d2af35057c3ff6fd8dc05ced371cd09155a32047a11e952a957b48f63f8c2bc352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca07176948d58d706b5276192070b033
SHA163ffbb8e5218034419f73db776d21b5d587045c4
SHA256d2ea89de9b5374b6e51429d5ae9f0be4ba30324fc77e3255aee047304526bd9a
SHA512e1a18a93e9cf6ef344b0a52abce7866e33ad3a80b78b6f7d6cad563e8f242b8528fa3ce689cdd6a7dc9542e6ac3b8fe49f427ef4f70c9e4e93f2a05d407fe2dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bae6040df8a5a8785e39fc823e836813
SHA1934edbfb4071e00feafbdc3b9b1b34ef9634ab14
SHA25609b8ccf00f597189f9517f4e387fad9dcc7716e15ddf985015826dddb89cb94c
SHA5120e6668317397fc05ef4ba20109971cb03c5d7fa677e81c129c68763e11072f91f2c386a80ddd9950af2f581ecc1fa25760410561db9edf9f4233ce7ee632f15f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eff2c07ed189af3918d093ae1a5de2a6
SHA1a0de421ea02c7bb559887a114b3517523f2cb602
SHA256e00779358feb6bc386af18b0ff52b76be2e20d1cb4dbb46a838d7a60bfa059bd
SHA512b356ded6a57e18861436cfe186e971c3ba4961371423c066673b4b3f4cc1fdabe2015d5c05fc17cd89bddf7b514815435511261b38e4edfe7c291e630a943107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b50362a53f297425dc6619ca7e78cf6
SHA13c34504cf94b5a31527c771b9ba9078562f9bf43
SHA25693e0369b11354f9a25522ed026ae0ca11eb5ef5b3f2a67d9fff05df0d32e3597
SHA51202225e5cf07e04733d97505b0492184707079eb48e0d1718063bbcd50b2beed238bc776adc57add1e811a98f9c0d8f0bd628f636032d37feb7779349b9eb49bd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a