Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
106da421d7d9bcb45edce6013fd48ff6_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
106da421d7d9bcb45edce6013fd48ff6_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
106da421d7d9bcb45edce6013fd48ff6_JaffaCakes118.html
-
Size
4KB
-
MD5
106da421d7d9bcb45edce6013fd48ff6
-
SHA1
6526f466d5af21ddabbfa6d25215b502ce423c1d
-
SHA256
c5b799a2459c01f9fc5dee800adad253e4ea5e26a5d9e6d84c0b07f9b01dbe31
-
SHA512
ba6795e91332c4e73c2b5910222cad77cebb04b1ab0251241be797066e3d5dcc7299cb31574070bab58460bebb31a710e287d489e647bd0c4b341489a37be5fa
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oBned:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDp
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000e4a6d6b4beaee02f0d58e1a32a7dd8329a180290e6647baff20c6602a573566d000000000e800000000200002000000006645ab57f3782a00b4bbd8686163de2513e5b17867f1ea53337ca791c6b6ff4200000001d7d37fac5b65275b646d14a962b5f23eff32d25e5e3ec0e361747d32991ac2f40000000d1c1531fc908e8016ab517133099f35236e39c395a7d674b829df4eb04fe22f121722ca4d0a5722855ba644f67b9be3810033c539193b69ed8398d0f3c7bfaee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420898368" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1BEDE611-0942-11EF-AAE3-46DB0C2B2B48} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ef5ff04e9dda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2172 1740 iexplore.exe 28 PID 1740 wrote to memory of 2172 1740 iexplore.exe 28 PID 1740 wrote to memory of 2172 1740 iexplore.exe 28 PID 1740 wrote to memory of 2172 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\106da421d7d9bcb45edce6013fd48ff6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e420348596261c6ba6764df67608842
SHA1507efebcff916bd7410c89a5cb965a9c1f5d40ff
SHA256056d326ac48d7419b13af15fb442c0d7d11c2b686d2a6d46501430ce7672ef77
SHA512c8f063aeb9144bbae72f821b39a6b3d2afea18952c883df0c2c378e00fd7881befa7eb1f41308db3b124ae7af5e5f0571dae6a6ed9e6874aba72f039cd95f5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b312040ee6627b512fca60e3b18130ff
SHA154875bf3c2bd8aeae50cc06a575f2bd9f415be54
SHA256027d3a4907f55e9f918e21087d331371e28d217266ee32f6b89967ad3ab2a9eb
SHA5125b336381a46bcf97f2404286443f4d01f837bda4d5a64bf37c6fc521de77b7ccda6ccdf3e11b3b3a57f1633c14bc2a8d2d12a98a96f7d95d424a6e20b0f3cddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e37a8148fa8996ca375a8bafc56f7b9a
SHA1cd1b2d458207841fbc5c4e95e408c65d4f08f060
SHA2564d84d536b372549d6291be0d49ea2537c66e795d7db31510af1f89e975846815
SHA51270a102ec68f62a1f00b224caf9ed2ef269698aa306f9b9ec4f6d4a81066407982b435176868c9440c576b342afce3c9390ff3d7527d26d1aa5968523d55457d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d03431f5513037e3f4f3235809dde54
SHA1dea755917564076699c0733dc8245d7489c3b329
SHA256ac7443c9db512cf4cc9dd377bec00e39c1fa2479e4f127f2dc14a4b4777176dc
SHA512b29b031c5032f064744858030e00f63a2a8419245c9229f15de97816e99950e4c3bde275afb16480159e2a8baf86679cede3c5991c0b0a301fbfbbffed779c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5159c2b6d1f190d43f298bba7ecddfc58
SHA1e37f8694f9455ea0187fc5e8a3570b00d4ff4693
SHA256173bf69d4422890be531987270884dc6b514e006dc9e3cc7bcd951e85fe3064b
SHA512f0073891c1b6ebdc82f8a59f17701183bb34edf7e2a1616e2007271047e87033119ca6dd5aa5510a957b2cf3d634f3e4de2140e9613ee3f78ac801c2875426c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aa951b86f70117fd89cebff933fe108
SHA16d6acc0d8ace2406a22c871fb829cfdcc92b0759
SHA2565ed4674b9d19e45b5a0cbbb7b7bc7e480e584d62d2494132abc324ad46d83867
SHA512c9cf71d279620cf921b42f45c81f0475e566a314bd4a716121d92152d2cd76d9afd05d058912b1cf63e2fd434559db5fa6e7997ef314a331e00b455d51286114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5834ad3f95d35ac9155f265ea2742e101
SHA1af9a04efdb9eb2332af2745a9235a1a56f0c0e04
SHA256ec3fd955a8fa1b32c7c81b11b5924856d8ff4ccf37dce22155ade97f516b0af9
SHA512dff3ecd555490ebd00c88a8f0e2b04a4610a8cdefa250301102040df3116611b8c33f5cb863fc24be9869d3ca7721b649a3ee4e630ec25a387f2b6ee1367151f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef10bdaeb796cbe1ce72c3d3ba6836c0
SHA124d70bea27d4488a6ebe5c7192eeb17837525e1b
SHA256649e88f9e01f77c16abe7c292dac587673b289aef7226500b54266976485329f
SHA5122e841bbcff8016207182ce80c10d151b931e2361016a098c9fba5333c73b7b280eeb270815369a9602c9957e2ae2ee9e1cbef14aa5993e4e37edeef00c7c00ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52921e8023ac24a31f7e4c6e2b49ba50b
SHA1da82e07778a12e5cc2c5eda63abe51bad3a9a076
SHA256b327e9d02f867057e5c7e2c24c663912ce0b0981a7fe2990bdd91cee4537b0af
SHA512c5240b0a7bd143269deee3708374997b972238fbe2c532da013e02e7cdff262a2daea99775db371618f98179b5859283acd5e868bea3c4ea638263c635cb0288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f6dfac140bad0a989002897639f318f
SHA1ad75d7c649811e0290ca3a59778b6ad96b849789
SHA2563e6e657584cee8134b0f57ed3976d0b486e53b66b8163a58d01c058ee80c6956
SHA51206dc8e9fefa103690836a0dfa6f8e7c3ca8d97b4e4332a456ba8fed30e1979e33133116606e90ea9239e2a85926f6c6115b9d7a667135fc6e9fb7b19d5767c7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd0b5df4e145006f975283c98b63145c
SHA16df5f0b035c65578cf989fc82b6be19a7012c3c1
SHA25602584316c0e36b23f973f8a831fc6341385335a943ebb48c2aa075df08724fa4
SHA51210773324d83744149411ca272c43ce2f94faf8d1ae312e1d76603b5be666b3222158bea867b7db06679f464e120e8e273065b2f9485c4a63e493af404dd817db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5622d9c5c687c7c67e694599e25d2f608
SHA151840b19e7a703442f251170418a0883be843a82
SHA25692c1ebad2a98c8fb39c4f3f1eb562bd6c5fb0e003820161ad4373e01ba331da1
SHA5126555743d246474888332a71070bcc34501b11014202ca44ae7dd032aabd3afa9e6cd443426ea0a3cf151579d3d227ef79f37fc2b029b43c6421fbcd0af760589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52647722b3ce025122f6a347747ebd268
SHA1540676317b2964714307d54d8468a725746da4f1
SHA25673293f1d5c0e47649eaee2efa157bf14d23af9bb12f2bf8a5c4334e96d9083d3
SHA512672986a06e1f56e0da683d11f491daaf9c0700e3dafba78840ff954eeb81ca8ce26b37076787e89bacc71fadbe2318644fe7eb26295ce8dae5c43ff391c50378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559acd8de4adab5c79771b760cb94ee0c
SHA18fd478035933375fe236aff3909c4cfd9ff3074d
SHA2560f2674fec7f7ecd2560120dd03ce9d02f41b742635f192dd356561d4babacd36
SHA5121d8f3b0f5762deca49001463d41f0650946863313f4015a18ae070e7c0dbedd6960d6b3f9af6c64df6cb2ce57dc54bc8db56e310b85d4764c657d3015722fe95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ab190f98a5c4240de40c0ebbbb9d297
SHA1ee99f9b633c46b33fccfcc3fae57c3a283c0da90
SHA25657536014002acde90eab2563028e8abaad98ab8477d4a62d2832d9bb149e7b65
SHA5120fda4622d8385f71c884c92cd2cc304337604b121179541fafed59db03536c45e33f8ebcff8a6d82745057b787ac2b3406fe1469e8212b424385bec3af9a3c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595e1491403d9a332403b528c6aa999e4
SHA18255ca832f91ceca838b5b22974d4638250c693b
SHA256f9781eb58937e2c7f1300b270f9996e7c343556d593d966f6c3c3feaeb23fa7f
SHA512cad22c7a112b36d23bf225fe231db8495a5fc80862023017a2a5cad38437d9774c5aee7012d4a585c550a156bfb95f8e2bd0ed7499960015ac16a4bf421d5077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a6399931703bff1d737790b83b064fe
SHA163b3d8a8da5ba4d8c3a0b913854722376acc8797
SHA25694a35d42f40cafcaa5c84fdb80fd65c24074dc2db3289dde84afa8940a1eea8c
SHA51260eb0e23959e239c975aedf5a729b91008915da280ee69e2a4e11e163bc7792b45623526d4f78f4133075b1d791946a925b59fac5f0dd9ee2b423fe09e7e2a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58006f37052e4c6fa458f5df2c0ef3e19
SHA13164b22a6ed8dcdb56e8bbd2b1d8483591cebfc1
SHA25624182f82825119891f01252d012d9dee6f18d1ddee5773227a3507c030751399
SHA512758f698cc4d8f9b5b4a5b9efc7c965de35954ec11584a866f2e97eb6a77545e333094d7140a8f13f55767beaddf8a495dcaa5290fd44cfa903a717d1dfe2ae1f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a