Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 14:37
Static task
static1
Behavioral task
behavioral1
Sample
09f8d85bc00d3fae628435f7a30b403b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
09f8d85bc00d3fae628435f7a30b403b_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
09f8d85bc00d3fae628435f7a30b403b_JaffaCakes118.html
-
Size
21KB
-
MD5
09f8d85bc00d3fae628435f7a30b403b
-
SHA1
47d52a764f47e5b426591b6aaa39b23e2d474130
-
SHA256
5f390da49b37510ef27588d158d9efc9cf9b410fa8e506b4c88072ec9c00ffcb
-
SHA512
b850f2f4ff41dfc5b458b1aa03c9597aee204ec1ec0fa8f65376d19c38978cbdd1f953e38f1bbb37a4a51961b799e6c63085d7207cb49b9f38a3f1036a7f91b5
-
SSDEEP
384:zihFKcRAa5r9DIiXbWVBD8c03RmhACQcmEfP4ycbp5wzVcrNDJZTO4ua:zika5r9DFygc03vRcmGP4yZ0JZTO4x
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4051ae0a0c9bda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420649733" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000c1853767f7dcb27d95dc4e9f12eacab94f58aa8263d7541e8117a390d979737d000000000e8000000002000020000000b4a423fe0ac85f02d76eb51cef8b9226852637ca574b4745c72f9ee02d3c32562000000034a6f826f6dc927101b3857e06e2e70322227ec3e243ce9b29d0e187f123939c400000007741f2c8fadc59e074ec8d1c425464ecfbf31feee640bdc21287a4a8182e17161ed0dd156e6773232a5530feb13dea996a3d99ac46804502e34bafb703526dd4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35F0BFA1-06FF-11EF-BDA8-6EB0E89E4FD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2980 2940 iexplore.exe 28 PID 2940 wrote to memory of 2980 2940 iexplore.exe 28 PID 2940 wrote to memory of 2980 2940 iexplore.exe 28 PID 2940 wrote to memory of 2980 2940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09f8d85bc00d3fae628435f7a30b403b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bae339751c2e58316178fd2a79dd59e
SHA176fa4a7f98f3bab2b321f960dde08d52b4807f35
SHA2561ef8b19f9439746ed754ec569caea556deeaf182be8e1259004ae4bcb172d735
SHA51240ce091521673fdc3e872c052a2ecb047549c0fb0d2c25702ae4831d734670dc472e2aef2804a484faf5bfe936e2aacdc3cc42bb8e8ad14edd3b0f9ff73dabfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518edffdf5122a634c22516d3ce41b805
SHA1b15338f63e4551c4b18746fe86d3038036836b79
SHA256813d31c3514f5554e9768d40b6b20d97fda0d7cf28100640ad6aac5671dc1d0a
SHA5120c80c039b0a1dd9589e52edf3824ded27be751d55ba0b735957daaabd6cf86898d9f05fc9fd90abfbac8bb6f89c2708c179dc922265b6f12f3eeb6601659976a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57008ce9e2b6d83e07861a124a8e65875
SHA1c9120f399d1dfad363d9530041f1761c7f61387d
SHA25631623ab5d2650cf0c6bb3fc8ba9fffd8adf72288c0695989d3bf3fef79916d6d
SHA5122b843b12a7bbbb03fda4111b9e99c46f8f47ccfba58370695520982d92e1e9038e1cedcff1135a11da554d98b8a99b52ff029c0ccb3730081fd0e8f29b6e6bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ddeb2e580a29086c1fde2d445cba1da
SHA138141e7d90e4a3b6c0ce607c860478d6d03b9b2b
SHA2560b9a1d2e7af9478a96848ea7465e485b7cfb794bfa484060ca3dcd3f9cea46e4
SHA512b90d7cb7877c86a3e87d84001eb3daa91a93a2c6503d3cf34dcc5b5bf820e81ffb0c081c6d2bba8888d97e3992d127c9fa7a5147e2c093e5ffe379472d83cbd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebc9b38f51898c4aa9faee50491b50a6
SHA1162fce67648f9ccd359872a7a8a4ec38db1dd0e3
SHA25621d14fe66b8373a58d3904112cbd7d81c389be6eb95503c46fd836ec94221625
SHA512c1256fa6d07e3a2797a6e309f0f9e0c354f318696ae5868b9afd9597b544cec92733320c78e560554d01747eba836fc481785a3913bafc0dba3345a2458780f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570844301d7f869b6a9bb699e4ca4ba33
SHA15c5aae9848f48c2e292be434a58f135bb8ec262e
SHA2567af1516fd66c33848deb3366e67efd00dba24c42298412046093d8213e764e86
SHA512dea6dd9a4f0e2b0480adc624abaec06f8382246747ea8279444cbef9ce66b01f3c07b2be63f08be4a88386aaf272a234d32763d6c6d418ca96508b9177264342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb113bcc7984fce3b45e43ea7a26d9b8
SHA149f2d2d6f88913eb418db284060171784e079e77
SHA25672ccfef44c5e7b62a606cba95ab6521118e45cd55ccbd0809e38fa9d1dd66a1c
SHA51260dae3493e020d9131965ae2b78e92eb5ad01b4fe39f472d8f36055e020dd777435befe59ceef43c956816a523d9d25f92a04b386fadef21fcafdbc68260d502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eebfee0f40135a2a3ac3f5e387412a22
SHA15a2c4f175a03a4bdb0a4fd49d40cbdf00c27e1f3
SHA256f10e2d8eb166e1da945249ae3fad6e6efd146706816d8d7a515b2f20e77d163d
SHA512e1aa1199d473d303a8f071f1f37af1784872479d7542986c2120ec580418a3cdfd1b6bbd896d93e90ddd2e85fb02edf1f5b464d91139e60fe22887b5bd7f72d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cacb3788cfbcebae2e6b8d0119170d5a
SHA1ca2f7b7e2de92b0ac97ac4c881ddcb7a397a9529
SHA2563857745f24652b331e350a2b2cbc22c2e9e372958ae1c8f792bbd7a16b025012
SHA5126f9b4e6cbbc54daef797ee9623e732d050c6e6424479801accc125c6ce1d2af4284a43ce8fcff6ac23ce331922988972581a2da2c61b20e0c8ecbb2de0e30f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fefb79874dba22cc73341aa3b039935e
SHA1bb845291c13625118c6dd5ab105d0cbaa7d7e1d7
SHA256df05634d11ff1b038d3b3348c6454ebf2d2215d138e1b29b3ab9f0c51b66c442
SHA5122b9aad5e685e80d05e0a87d9cac7b8a5bc36304513c42c55184c93d838e5bf3841882a716e9678ea4b6927aa8595112b2747ee17d92a0782e8118d7ccbb53b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5106e4ee16545c1e6b7899af5be45ad4c
SHA1846c8f1fc61c5caf5a622b3dbcc4864b9ddda411
SHA256961e29c90287efe861bd18acd39ecf34a02c0fcd34ae4428caaa2fa6fb07977b
SHA512c7a368a7f3d9ad1757346c804433d8f1cbbde4834bbc3d0830cd72f8a3073aa5a1a5537f439d481a7ec4e9145cd43cbe3df81d2dbb357120710ce390f51183bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59464f12460285d58b24427dd38a06b77
SHA1a81bfd34d24ccb5611ccaf77697d6a91b326f3b4
SHA256990b56d4d3fb175463bfb0f80807dfffa2e52beafef078070a567458ff69eebb
SHA512dcbec9556a10e0459f88972f3a193833244e9df150fc3bb28639864301ad0d2fb3284bf9bebd2dcf2da88921b510dae50abc98c13dc2ce8c3f78df74bec77760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee6066c669c0b4c258c1cb5687caadc4
SHA158925423a4bee380f87c970ab5d205301a353047
SHA25678edec8c14c58c5fe7c193cc149c2a144bf109ef1fde28ff615cc1a172b4b64f
SHA512f697063ff83efc05fd518e3f6db83c618f18dd5ef14e747bec8da6297dec3b1ed6173e07ccb925ed05158b5dce7cad748e80f2fe6bebba38ead3bb2c509fb918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516ec3c94f834e549bfe71eec4ca9b372
SHA1ce3ee50bd427421ae834b4abd50254b1cdfcff65
SHA256561436379792946ea5bd4f2490b6b18e58bdd486eb3ca90438fe221d74ea73ba
SHA512e6f1f72814071d6ee082a563baf915e260f2c7828ba3972287ce11698a934b80814136cbcc2107f40071bb979f22c069d0ea6becb03b371592b3c9e6b2c2b16d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569456b46917d2d7cea3cd1ee50bd84ed
SHA11ecb078569f980940f94357f8338727907f9cd0c
SHA256a4cf0eb547eb9662ba2b457d8ef2aa0229cb85bcdf623c8ab8ee92e67f448752
SHA512a132cfb12b6e4b9183da8f674b6b3460696d72a03086e8b624596fd09b24ad7caebefdea5f896117907c06fa979ac94eb3b65fe4323ae7d8999b5d371d23ee43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f85335ad65e22e41600311129fb4e01
SHA105f5dec5189871c5add73d7c2613c1f9d24ddf83
SHA256852842e9d9873a4a3f6df40357cf43d0b6870f8d9c625067e177225e43ba6a44
SHA5120cce31c9f55f90014c703b04b6360372c0c6bb84922d1bb2764e5ff104424a868c185f3aa8c16ea8ad28e1309d1feb602d90ba35d3f6fd5d9aff4946e1ab58fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5493c2973f26e371b757203ac6ee403a1
SHA19d9125e6d71c36146485156bbfc2d72c531b1ae6
SHA256332aeb6ed6f29e35c8430f6050d85dbd84f94b04f26c13dcd1bfb8b0cbafc83e
SHA512752ea3b1ec3e73929d74b8344441591720e18e5473857225db69bf3cee849eb15a9fd7211db3bce6f9d0b16e841c7cdc98b6ece77940dc155a54e898e25eafa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bd464771263af08754856dfab53f0a2
SHA12b4408f1c4b54ccb860e30a9829ab2b0a342d46c
SHA256dbee1f7c598c987cac1b1631e5baff105fe997c64daf32609dd0104586ea1c7d
SHA5122076ea65801fe39984856f94717421b369ddd90280d9302e9db654e5870f5307f56881bb2f3ca7a6452f904b276ec84876925a91428ad4e1f3c0313b16bcaef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e07a61fa22c111b8baeba4432cc3486b
SHA1323b09df907a98ba9cfdfe8987e348389ceacc6d
SHA25686e0163ad984eefdcbe12d7718072a0ecbd7f76ba2b1115906e50adee8494a6d
SHA5126a0711ecb3c78720ec116b93950b5d198ce3fc794045b75ef3a326614661b872ce608de1f8358c1a3574498b42f8a674d2e0cc956bffbd821982283bbb8243ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a5fcc3cabddd18b6467855c388fea3a
SHA1b69191e18d7e7d08d9b66bf746db3524ef358294
SHA256421e1d8ea81851fb4fcd758dc7d59225eee7156abd3707a624243e46268c2cb9
SHA5126cc47d9782ecf2fc1bc55c436184f68b40f400d2bc0906c6a93e8b768f9b11f4af1baf0c4b406a8ab5caa881e5fa005951e45f69e1410d829bd945a869e95da1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a