Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
10e621cb4cf96d7c54e908a83a6aca08_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
10e621cb4cf96d7c54e908a83a6aca08_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
10e621cb4cf96d7c54e908a83a6aca08_JaffaCakes118.html
-
Size
37KB
-
MD5
10e621cb4cf96d7c54e908a83a6aca08
-
SHA1
175b6c80392dae023836af950325eaa5b3b1609a
-
SHA256
cd29fc0d8cb287feb59e430bb2c11306724bb0a2b8cd9d2f858f537e6f9a6a9b
-
SHA512
1d579bcf589940db9007b4b6d062a135b8d0b115bf81d6fa6e4200f131b5f463c6da37859577fb4209b61b59691145a305074010527fac63b4c48a5fcb38226f
-
SSDEEP
768:xEXN4kV4xjepGaBEkYAb9vEfbgQ2dST4WlP0fjjPnGob:xWN4kV4xjeNCVx0v/Gob
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000a912d5fdbea3ddc33d656dad020acb55dcd2d4c07d5fa6b2aafeade9882f26e8000000000e8000000002000020000000e9f872e31d2da8db8e748585961433ff5cca253c930801ca1e6bdce1acdf44bb20000000bc4bcbe59782e742259b72fdf746ce47655cd79f95180f6e5ad942aaf37877b340000000adc16b596c3d2667292e1dfc5b8388b9996e9705ffaebb0b4a892018c178155d66019117181a68bbecd1c40adbf6acdc093e60a8bc391b1b492f74e59599fc12 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03f11c6739dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420914198" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F16457B1-0966-11EF-8B6F-CA05972DBE1D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1844 iexplore.exe 1844 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1844 wrote to memory of 2972 1844 iexplore.exe 28 PID 1844 wrote to memory of 2972 1844 iexplore.exe 28 PID 1844 wrote to memory of 2972 1844 iexplore.exe 28 PID 1844 wrote to memory of 2972 1844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10e621cb4cf96d7c54e908a83a6aca08_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4f538bbfe0d74b83760c1d99ebee628
SHA198aced9b72c9829258dae8454bc07a618f745006
SHA256c9769b45e95052ae990717b77b4592fe7842ff7bb36eda6d5d89dc7758af0a33
SHA51281a15b552de0347c1858521aa67b3cbf0cb8b9dfc058769e6b4b0eaa9071cb04647adf652f39fd313c2333a0a55fe836890865d6fc0fd7e1ab9cd23afd9a04f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef15eecb7d2de95091690106a0d45a28
SHA156d8d01c84e2fc7791f61290e13e252634eff535
SHA256a53771822799d7061fc9e102c96819867987d9097b2625f128dbaa0ee1cc5149
SHA5123b487851fde11b42ee5e07bc301551fc9a1042c10e3cb3e912e059e9cd1fd2e1a52918fb6d01d2835627add166937816506fa3f6015777ad373eaf203c489bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b32bb862faa2e9f3d902177cd27d613e
SHA1e3331fa5386e3892e7f4dc22493604cbdfa6d3c1
SHA256b64647102dc2609eb67ad28d1b8c3778a4d55d3c0e98d09c730b4ca80d3b0b8b
SHA512642b90a794170dcb0834c79dbed1014e57faf535c05306bf3878c1a282f13c8891d517442b366d1d87e183234ecf58195c9bf93b160001be4a127ae3e6e1d5d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b32e62a13a6fc832aa41cc04f507984d
SHA15ca7b844c8634e7337a0f31844f5477ec2d96674
SHA256b4dfee1b45b49f64988493b9759c44e2283602e0cf2301b7d2d03ea892985460
SHA5127ddcddfff251292c44d8b8410e2e937b6adffd812fc48814c4286796522f1bbaf3ea74ce7275ff4183804132b3d1b7cd633a7318be4e0f2a512ff1e2313dfa63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560a2b3062b140fdd1f6f1b5dbdb3975f
SHA13e017e37ba5bc377a7c44cb8d1c04c3830aaadec
SHA256a61e4b4c5c48a1f24d4b8c1461fa635c81bb89c2d0a2d9f77e16612df181962c
SHA51207422cc11812d6a119ec61deb2f31aeb673b8b6560efd5cba7a5a114926f76b1a2408e385c188631166808eef33af6b839321a7a642114eeb1165e76f33805c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3054ca30bdb16b2f727985d3de7aebe
SHA1205a74014f3e03e9e3dc3527e14802a8e710b76e
SHA256118829dc882340be51ab22e6fd06671a7d512c2e316d48c01b6f482780107162
SHA512696c05b30863827cca4f0dc0b4ec0d849d9c472fd04f79a33f8ed175c08b95229422614751520d7bde7ffa1ccf92c06697ee05a290fb654388a48544fde0ab89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b60f1190ef261685347ae9c4c0a0c676
SHA161edd1e1c499ea81d395c21eae748681f9416138
SHA2561d9431285e0225494744546eac067e871fc2acecb2407fb4ac225e1a4b1c16a5
SHA5126acf1a21d0596d48d033b4074a38cb8d31fb160723596ef7905ad7ca0a4b74dac87e874200909028341a630053ec9bc591501eeb7bc76ecdf994c3e38a72766d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57abfa85206efea44f36f795ce9b34fb1
SHA1856608d728007c4a633143290cbb3bdf72221168
SHA2564e0e9dd9d4ff5be802c6a2e460dee27be42e49d6b2b4f968469cc411f73a14d7
SHA512b573d7d9e0a915c4e31463aeddc2e6254f684ecaad70a11f4be1bfd7476721520745e26c5b2cab44576cf839577e86d11aa46a67244aca5b7c3264c5657db8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b32f33271a6fbc352233f3efdfcdd215
SHA176fe195c7be3479a66f8cdcd38b5f3bf517b7803
SHA256346d41e6352ee61a30a44b0eb119ccb8b6763596b71db7c56ab22ee7494f5751
SHA5121d0b965d804cdaf3f005772ecc47c9d20b390964dcbe0e895b10eb14d5e56c5f70560e2b6c3538294a25e003cd10418368094edea11a8382283a23d983542a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5525dc972d33ec923fb0e96ab5fb20b
SHA1cfff1ae33d37997d00c5905c0048762ed2e83c2f
SHA2567f241e0c9834659c3d76123f8fe550cc6d14d62bea28baefdd28ca7dd4ed15ec
SHA51288692a306e44176116d8b68483f4e4e62a91abfba6b35addcbfeb50d3d1984ff7872b8c9747850a7410049325c9985a24db6da1e0a9a275fcef6ac8ca9258b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549801220c14bdb1b4625af02a7ec1042
SHA1a5da8f4be1a7ae153613c80c9a0b97fc85c18b1d
SHA256cff3fc19f528e16e2f4467d433e6fbb52ef42b9091091fd985c452c385cc95bb
SHA512acdf5d27b996b5d77c9ec69fa73554ed0b3199721556e6b432450f99d1e92fc5f166ad28d770ed89c5677f70c2be8307dea7b2ff40551d2858cc1c25d2181008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebad8b4de6693b4143edd6ad50f2057c
SHA1f59ada125e12d39dd0233748ab399d058f87ad80
SHA256c1bb3c1c834d87eeb7c9533ef6c22c40eb7184966e9de8201b3f635d62d79237
SHA512f7879e4a008ee6a7d89ee61fa295634c8407eee1d19cd32f366205dc8376b2095b8388efc35ec52e7fa94fc1a8403c7f1bdc1f30eb674c600fda26a758aeca05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50695d694bedb5b420711938d58be671d
SHA17df5dd61e23928a82e25cc30aaf121d049582b2c
SHA256ddfe17122ca0c8a8a75dea930f422969338311c6fde3c062ec4810c0e40081c7
SHA512e34b66bc928461c39425177e5b40c6200027ded00e010729788cd2a05597b615420705d16bf117a46edaa84df6f4b11991e77ee28f367e43093a0fa85e096205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deb8d3d4a1c4046d15c5989e07603930
SHA1074ff4c02ce8abc5a72cfa2e80b03d583596d67c
SHA2569a6e72088623251278f92c0e093e30d92c20368b8ce49890bac8321fd28dcf76
SHA512a41db34453e0dbf88ddb965bbe3cc0f8197b7d829a4c1ada93c81a82b6e6d93c22200144c4f2f923159d497d5867ba0860dcce6788aaa26d83a828bd91ab25a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59632b4d8eaac4a5d8c91ac250e9dc692
SHA12ef520c7d0d1964b5748b7f09ab33678ceba160f
SHA256c7db5f8b432b6f9988a54e717237af4a8df41ea0727fe368239348a00a95b0f7
SHA5125d2896f0f4052e3eb2828b2d712e0502d49222c4042c3cdd7cd8e2e6c97e486079fe43408cd9985561f3b115896b0e2a92efcb76ff38ec8ab979b2e4959c1e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599b053812380e46bc2760338b0114016
SHA146ea26a5b7c0f3196587389fbfda3df395736a38
SHA256d2852b2c19ed8be35ed4488557a843e91d8ea061c0b6e3d72ec2d36b9e68aa34
SHA51219e768e1504c034e60bcee10a470fec6c76a3e98e6ba1b2e619e4d6f0121356165afb28ef8a9c3fc08fdebe6bd3555612827f00405ad63b732c8ea661b3fee64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521031e92d4771931bf5abb27894dfbc0
SHA100e5a2e7ef835d7226a509337b42fd77a0cca061
SHA256d82f4ec94c5833d362aa5c2069724b169be9ae3ea4f82e66091d43ddf5c970d8
SHA512f4eddca89d0ab136736c7d00aa789edecb3f27fadc857313cb63d8c57eb908aa8c5076e514d56cd636a212f6a975b831146b3580b0dc84af3253d7962ed58913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584742e92417cff91ecd47571f522de8b
SHA1d8d19e042390055d0f83abab80a225fea0dd67bd
SHA2560d95f9310753015e09bcfd97aa954ca105aaa889838bdd964fb9209395eb8fa5
SHA512916b4154b1527a703696c7011e5a7482662735dc26f87302fe5b8680b32f5cd566675b49c7465c9844816f1e1fac0386e6773a745098d7bd1352c5167f964f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569e2cffa18375e2df3d85bf667021a5c
SHA1b9d77cb248eb62159d8b003ceb69b6e10c6b0cf3
SHA256ad99604628cb286f3f21098b76c46447fbd9fcd171326b57ba433d75004e6dea
SHA512ae96a4fb3f45ebb57d1d6661def3362fbfbde43349d0aa886d6d72e29158b892b81d0293a905b6cdfd0928ca0b0071764a70fed5327f82f1c9f99aaf3814f32f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a