Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
12ac3c3624dcc28e9de1c3327e512851_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
12ac3c3624dcc28e9de1c3327e512851_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
12ac3c3624dcc28e9de1c3327e512851_JaffaCakes118.html
-
Size
461KB
-
MD5
12ac3c3624dcc28e9de1c3327e512851
-
SHA1
290c3b0fec97dd90d589ddcf9b82714b927f614b
-
SHA256
6d1275ad132a0f212882f8366a728724498e2c11d17a6f9e2fd6d30e1ed6c28f
-
SHA512
4b1959f6be920241f5cb377f7b141802753c9451ff41f9de52f112bf4a5157cfe196308a191a9baf1a1d09203c956c0c4b6f0ab81c4bb74bc4803fb22331a06a
-
SSDEEP
6144:SvsMYod+X3oI+YPsMYod+X3oI+YusMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X3x5d+X3u5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2AEBDAF1-0A0F-11EF-8547-E6D98B7EB028} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000c3d23b5846a061d3ecc86c84e7c1a0b543ba16e1fc3ae19d50f0fbc1c8528f4e000000000e8000000002000020000000d66b87043513497d8f293f49ba3c154e8133d50f572754b396a9cf1b7935746120000000f08ff2d30d08a207fc0638f248a6e7820d41e09a0c63a02097343b1f2073db06400000000043ee733a4336b5c513a1593bec9b285a7e346382d8650426181cf576b1eec9b4894a16dd851f442a34b70304c702c304a49e4f3f6f9c1a55325016f3116718 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420986440" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c76d031c9eda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2504 1992 iexplore.exe 28 PID 1992 wrote to memory of 2504 1992 iexplore.exe 28 PID 1992 wrote to memory of 2504 1992 iexplore.exe 28 PID 1992 wrote to memory of 2504 1992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12ac3c3624dcc28e9de1c3327e512851_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6babae2c7cce5a23188ca8aededb621
SHA19c40331d5633b8c4967b2e6d74ea608a88df09ce
SHA256e4ed15bb23c45671b54670c427a35bba49059d3051a1ce08f86d9bf1407ccaee
SHA512a24b771624105f4740b3dd634b783673bf0014c20d439e3724b4b02392c79763e64252729c3a769114c0616b31e2b5ec3ba25b3ea8376b96102f4efafbdac208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e74f85cda5cb390096178c35cc297685
SHA1fbce8cf13ac9f7cdb79a39ebbe579fc6453c58fb
SHA25620d3d6f3b6804115b4877b81bfaabb3b12f967109199aae0d5850211d689e841
SHA51286b31a896f19e7207c91ecf1dc7597aac8aa554652511c16152abc226a9210c521645d1ade8e4ad53d616f32b67f3379dba301e2028ae4a95bbad986163ed1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa37d1cca16853572ce5e1882e3a401c
SHA10c87198dfd9db8efb9886de79aa91a8be1b1e0d8
SHA256464a9c62d7637607f5181d4cf388a9d1526911989454c9f7dba7db96325353e9
SHA512901aec23705ad7d52e1e244079f5a4e482d55854273aaa1a21e5bc2709fbda67157e94f953c63cfcda71c0120f986c7f21f1656e59f22e8132f804893eb53b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59efe34d177ccbf68431a6deae7f2f523
SHA15ef3a638303bcac423e2672011a72780f6becd39
SHA256d2211e3aebe6eba7908b5c08568ef1aa55acfbe247a5a7866748104c22a0f3c2
SHA5122787ddd2cd1bfd00c533e158b073479a99324f1601905c6696df0dfa43e060770deb98f942cb24869f2b429571d7f4fca1f308d861539c1f3aa9f74aaaa861ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af649e2b84cac60e01bddde30cd9a111
SHA184d7b3d1eb52b7cc874a7464fe479e256b23c356
SHA25636c828862c8a2ff5235e3b4f522f9f9f1f6d86a72d6f2c7262abc187566fd050
SHA512ac0e168fb00d733465d4cc67db698bbe074affaed44b5f746ea1273ecddc8f179c84f568bc1bba6be57dab938b262bb9b3edd197a51a3e5e919797b05c88de84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5bf176c179bd35edebd0108c0fa2c34
SHA1d6e5b737050232e4233b43d8cd31bd4df139af92
SHA2567c6d801e29991265e8fd1cd11b6f828d763d80a059e9be1b506c373356ec35a7
SHA512225e9dcae9b543cdb89f14c5af18660ad13091948bef01f2332734932e1815a5d3137617ffc5ffed06bb880850f884aea6dba0a4d3a9d280e7acfbbe6ac27651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8b215fcd8cb7bc1815ca998c0426ec6
SHA154b1cbc6cd43f25b8535781b4acaf81d932e2ebc
SHA256d8d5bf1092d2afd25cb6680e3ffca340f7b55ee991d1bba94850ab610c0c8f76
SHA5129670a434efebe5d5ec228e0198c39eb872876d073743bdbc9606f11f76f9900575b6428da9299937ff9687bd3d34b3e25a5531becc9318d5abb2d90329bfcf80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572a2e5a19279b0d82112659fcfa12ddc
SHA1e1cb6eca8567474d5c6737047d234919ed508a0f
SHA2562edadab2dd692136ce9a0e58461d2e5d71682ffa79bea940d98a10800d862fad
SHA5120e26573c0b876bc35baae927b2c41369bdd1a294b47d1d835764903f34d5180a6c7ad8ac68b72a6d0be72d5c1ba1277e0f69210ed3ba6552aa63c87d6f85616f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a506191789fe02694addae157a333d08
SHA13547131fa65675e3384176e7805b550b31a972c0
SHA256f3054a528481ad207211093413502d738c7b75431ecb20948566fb10658f4c00
SHA512c80041f7b1ec9d96c30ed529f9de898674569e5c2926b4cc375c1e0228e18f7f2b923a947c23d95a40f257426b7f6917fadb52e038dd224aba3a0434e52ca780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e1032dad3059bc48c442990ac254d65
SHA17f72df6bcef559c3d588ae0260ad78f119011e7b
SHA2561b281418e1d0c58cd284d2d33e528aa7becad4dc4bee9c63b2eb4bb30c8a567a
SHA512b14e52412553901152a08017bb251892c09b6fc7f0bfd363d25207d7d4bf1d6e6d4cf7945ed566bdf3d3d1c82ce85759944e0df4b9f6d80eb88c25aee9034990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc636cf8a95e9d4fa23fbdd41ecfda49
SHA184353b5256c548c72ab2e62a601ce6c27e00ada5
SHA2566e6fe1784f019de734da6d3b46f9b749a1f2dd676498cebdf276a059d913bcdb
SHA512d512162ef79615b5843bfd66738441e5beeb5ae4ef1b966ba52230714cb58eb4f8c7a399c96e6a833393e9edd4ab415bdf7a45f28061bae952c823d019e71649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587c173d5311e599ea9e563d038b63d43
SHA13c0a8d5c3be9f864f86c7d4234fcad32c2002881
SHA2562ce3d423623daf052728a772c5c661426ef12802c4b4cf02569630c9975e53b6
SHA5124a5c5914ac761a4dffd26b7041bfc88d2a1135a8742a0cd8a21fca06b08220fc4420350b2b568d4da9ba536a13f1529fb781860628f0647a43382d649d8c8fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe635585beaf7134de8d05f6d0f4c9d5
SHA14da8607b6a7db6cbca490dfa84275b3397399344
SHA2563ba40340bb8d00809ff21288379dc018281da1bb1a920c08d863e965538c64b6
SHA512d1cf260289d1ae30efa1e062b78f01f1295f1fdc4cc0a0f32c9bb7c65cf71cea0d12b8318799e52202a50d6412c934aba298add14ba7580f61883c898b0a1797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cb5e7a3d80894c7956f9bff9483e30d
SHA1901681b0350b4b93496d4263f2a25ed2789e331e
SHA2565388a3d478970026dc30b390216c6bd36a37192cbf29ecbe5fce923b3a71c1f8
SHA51221a60bb223baa49b4014337d5fa2452c22e0e8a87fa3634daec43e1ec68bd885ae6e754e3667369a69cfad45122215771dfd38b0b4de445e89eafa6d60d63fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca1d954b561da5d0906215b51c67b611
SHA1d2ca41809e3707d3b7793726a12f0b254926fed6
SHA256ef2d829ab374f9a667714160f7033a1ea3e1fb5f1ec5844cf53ed4591b056939
SHA51224da79ad927f209bca956e53dde6eb843938b4eff3f213800b0c465f48aec1cd8f63fe76c05fbfc76c12a8cbc43228c34d82e7f4d80527a7531549b321923b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5849e65ff04b4ed9be4b42d64ce35af87
SHA1f90ebec85bac42a82e990a8e32861d6f97b9d59d
SHA2563448642b95234168da31c94d62126a8ba090884d4ba6b3d78d3f61ab16e6a8ad
SHA512249514adf5fdc3c5425316e39e767b92d9ae61f01e3700d58cdaa6cbf654ff09111d0490818f46ecd84a8e4ac6ed279c7cab427ed850193d0c07a35dc78a32a1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a