Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 08:37
Static task
static1
Behavioral task
behavioral1
Sample
1019e6b56219901b23445ad7b0a09b81_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1019e6b56219901b23445ad7b0a09b81_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1019e6b56219901b23445ad7b0a09b81_JaffaCakes118.html
-
Size
73KB
-
MD5
1019e6b56219901b23445ad7b0a09b81
-
SHA1
8e1f88267139273abdac780a56abb824f0c656fd
-
SHA256
3be4f26da98d3370808bab57bed7e02b5ccb3f6cf89d966cf324ed46fe665106
-
SHA512
cfb1798af9bab477748b3c3504ecaed53f25f09d278fbd935ae67de72e102a84ec077ad6365d63200e9374dc27fe18dde642848cec39e1ca490686494a7bf9ef
-
SSDEEP
768:JiY/gcMiR3sI2PDDnX0g6sy6IH1eoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:Ji+TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203ab43d359dda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420887330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000005cb99db29ea373deba34c84ca977ac2a916a4ea6593409f9d56183cc8f19cb7c000000000e80000000020000200000009f15e0f24cd984402ae0c34ff27766e5cbdc74df10ee3c1fbaec1fbd2f8b55592000000054bce7604c7bbe97ca526df15760a3a10baadf8eac85c9ac830a87ea101429314000000003149af75c3b58a7aacbefc87218768a7fb4207f82616c8db9182747ba73003fb0dc28b4937d2af300f782e34e8d43532e46818d7ed912f972db629d625b952e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68C1FC21-0928-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 3068 2904 iexplore.exe 28 PID 2904 wrote to memory of 3068 2904 iexplore.exe 28 PID 2904 wrote to memory of 3068 2904 iexplore.exe 28 PID 2904 wrote to memory of 3068 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1019e6b56219901b23445ad7b0a09b81_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56de42a172e2fe02d0c7796a7610695fb
SHA17dbd965d132c189c6592a94b9104dbee96d95d00
SHA256565775d76db621a8c6f1d10e4d47bcdaa2ee9931a425998cc031dd54119a1cd2
SHA512642f7b5971cd45ad53cefb2cce7adbe663cc7613badf244b2436892dbdd8a04cf345215557b8916d8ec114f9cbf8ec295a96852af92ec3e181f613f65d3ea041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569a2613da0c96acd405d75d54b3c128e
SHA1ccf67769b4217bfeed6247eecd4b53069a4811e2
SHA2568572d34ff83958151c5d9b4d7aeb0a304a9316b5275b16dc380b50139609c6b8
SHA512fe9f29d6117ad174fc7e24a4bac0fe9f702220631d893e8a6c2f7e681fb4d8e64e0916e3c22506d02dd60119fb834bf7c9ef72c01e84d5e061576e7a7ebc0814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577a8e5181a9a3b64aa1a308a2a054489
SHA16d9826e957c6b46fcdd93e34e00ac9a44a1aac62
SHA2569abc16f2ae928b5074a5e0608940d51ba70a9cfb861f8426652d493ba3666252
SHA512329316a0b98a960d2312790e7d19617a64bd57ea6018bf37b400112e2d5b0ca94ddcc60ff1178db4433f34f973451f3bd03d464bf2b61fceba16c382e70b3e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5706518dbe9780c451b9d2ab4da2db9e1
SHA19c1aa1d27283516d002f96d6c7846cac0cc09dfb
SHA256735a549133432feb0f83d49571cc1eea0a7ea780d3739bd9e6264cb946ab9a43
SHA5128bf4a31b672d3e32a52417ba925f558f62e040d51bc783c078e1692709da54795f3ac5878e81f2cc2eeb4637f3e2dcdb4e208394bdcd9bac9a1fd1b505807ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527f96b01ff6ac3d5a9e792c47c35d72f
SHA18b09f0e089c06a16a96cecae1a015941da8ebbd4
SHA25635f64fb76b71cab054cf6d9cfee9ecd4420267312fb30fbc5ca634b1864f977a
SHA512385c12a2e42736438e0127a028eee4099e3b7ea7a0dd0b2bc2387c7fe46b67fd8fdb3c2d75df359004597bbe8f760d3df30af2748bb179b9a11905e032b915aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea537a3556bc53a17810f095a99d06e9
SHA1c0dc212d2111d84bae4117dc675e5bfd81b21176
SHA2560f7c2cadbc845d7373c14b2fa2212e5a5898cb93d1973c9da92c53d192e7638d
SHA512639a691718dfbfdf2c30671dcc848afccfc2319760bf35fc15b6998e5d29977e5e4bb31bff7d122d4d7cb6aa6c7cf0d6dc64674c8ebf2b6b2490fcdfdcedc0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fec0e8d42341bde97f3065a9153c474d
SHA141f35d9631f2294a487a7ac4d3d58f4d6fac3fba
SHA2567e7477abeec30edfd9453f59c0e80d51d7d00a9721b8a93430fee9cdcda9131f
SHA51216e9075b47fd50fe4112306eadf4b6827ac41ed910315bddc5a732e8fb1fac289caa98d9c6cbb951ba7c8c590cbf554e7f8c92472c9ddfa622147f3dbf890f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50eeaf2309d8e7b3b4bc15bdd97ad38e1
SHA1ea2504bdfeb268a77b1fad53e95d6d13f90ee255
SHA256f315aac52c2baba3eef533176ed58208e76099cf18b7ce5b8348d16fc7e7b60f
SHA512eb86058877184df2015eb6a53a11c94565fbcf5b2e0aa7e64700894b75fb4c686618e80c75df7ff26bb632deaea4a1bad31447b1488399c4121e1a527271aff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c51fe63232f1f2d7a4f592e0cc6025b0
SHA11dee9bc19a1355f4381ae64ba266829f583dc2a8
SHA256e0083a9bb2812d65c1c5f3c4fcbffd0f9a64060feeddb1f6cacf8f5816154541
SHA512b4c54a9f9acedc07630ea07329ffdfdd55f0bfda31e56e58b6f4c7aaf4869d26d9d29bb3af3fbee81b613ba8bf14f34229d9abf4035eda1d5cf7e28d58a9f3d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1a54f124b4bd8c1ebc14a9eb3de92b2
SHA14acc9c6d417535c2e3a29c8da8e7d350965d4dd0
SHA2565112283c0357c03e07d97b346e756091ef3efdd868f3a1b5fafbc155cbd1d468
SHA512940581e895ab2c20ba7e28c148e55b2ec4583ce08ef3415925b8d3b35678e894970b3b02a0bedee885fd98218ab4e446a41f22c604a81a40245e354102f97041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a61596fa06fb84a07499f07de24fa93
SHA1cd4e6f5f6044e193760d08d5766b7253e01d52aa
SHA25695e372be7cf55de54979947b04405a1698dfaf37e2f4532224f7f7aa05d9d6a0
SHA51273383d6ef9623b01586c2b5e4b8225a42fdc036330ec7a9b7adccc62f22bb8d6d9c616ce7d985cb1bcc1093926b2e3e5b69935adcfb3067077022aa8664a5fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4cff62851eb0c476c1823fb9d9edf63
SHA1f45270549769744f48c8658faa702782573cecf1
SHA25642d8e1101f806f4b629c2ed7e81dd0d9a2e8c8c064292275d9f7075b478825b8
SHA5120b9949d3c09a55906a4acbc6a3d222ef36721bf831a73d72a77ab125955ed9050335c5b7e0af2ac739852ae4e9897dc6c4889e2b307b1d9c170087410d10fec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5762dc6bb59d6e961bd842714aba3a779
SHA16e2ac47a3d2ed56b4942606c3f9e5b46195f15f9
SHA2562b697bbbf5e9ac145abeb067da53d6053fdd79d1630db6994487e2fd17b70b7e
SHA5125206382b1352975edb33657988f4aad5d3775ae931ffcf2267317deb1936bf05bb9fd0c137d7be26ee6d16d62a55df297978650218e0649ffe51bdb065aba7a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e30cf3d4d5a2e0e82595a4d667be8aa
SHA1135b9b065ebeb2be14e8d6910d5509e833268978
SHA256a55950549f7ad5445ac9f529a1b5165ef7aa562a8d197564d9a9ec8f29cf5920
SHA512e8107cc5abe68a951604f615560a9af54441a1f6ef43b2cd0f1aaf8aab286285fec3c4f61904d85047c9c20f58facaaf02ba749c93f7559042e7e01f0abb64b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fa4d47693559f200de4b41fa043ea28
SHA15ca51c9051b9227a87bde84ef379d4393cd03181
SHA2560b916c28626a0c9bfaf9c451a64344502a36735d6eaa5361ad697628e92aa466
SHA512abc10fdd62e456843cc3cda62b2ff094a497e0f9a868892fc7457590dc2fbaaa1918f3e475ab6d3763a786f05361171c1176c57733460aa5d1a0a183dc02479f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599a80bc803d5ad9e142d99586c9ee964
SHA120f9603d8f1adee96aa5b651f72fac740f4c0178
SHA25623b8effbf444fd68aa5cdac4f1d29bfa7bb652eee733dcb19ac9c4053e96deee
SHA512ec33e20349fb34784bcfd9540b98c2671f91177f51008809a749031c3df03d733d88751c741d38f9e7f3161d5bf9c1b3f36b5e687eeb1f0c3e1f0737df4a1a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527e41b0ac78e92938341024f1cf1690b
SHA132f7c216f0acd7aa0e4ce35588c05d5ad29ead1e
SHA256b39795b4abe02b87b19b627a2e9028ed0be51d5ada47e562e2967a05929884fb
SHA51240efa7e8d04f2d3999cbc9d4c40b0b08350e38d0cce30d1eb754577dddf0dfaf9b44733e078bbc39ce0838af98462fec818c1673af58d39607e6979cc98d519e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5baf3ae358db3e467ed354ad5c5ea458a
SHA1ca16f5a10102020f402748fd13186a1b06db1802
SHA256b87928fc2c4a8f2f19cc833f901c3aafaecc490e9a19962c24a0f622b37567bc
SHA512cfc984280872fb98358a4cba3ad42801102ee7321370a13cfba280a635e14617521af46e7549f4f1465e984d72203312fba0ba764d2a0a7a76db4200da31e355
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a