Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 13:46
Static task
static1
Behavioral task
behavioral1
Sample
12ff494fb19736b0af988ab4575a7bde_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
12ff494fb19736b0af988ab4575a7bde_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
12ff494fb19736b0af988ab4575a7bde_JaffaCakes118.html
-
Size
462KB
-
MD5
12ff494fb19736b0af988ab4575a7bde
-
SHA1
69de7a54252ba0037e6894baebaeeaa2973b90cc
-
SHA256
e58da57766f7d3a71149d6f84352f4017af148e453b2baf313766c77f84be37b
-
SHA512
1e51fb6873e145bdae7cf26f6276666e8a0249f5f5d2c511a22958a84d1f617dc6d175351d8dc6eb2ccde21896c1bdc2c388b0f51ee0e5a9dc90c431c074fd4a
-
SSDEEP
6144:SusMYod+X3oI+Y8sMYod+X3oI+YEsMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X3s5d+X3Y5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ae0794299eda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB77B001-0A1C-11EF-85B9-4A8427BA3DB8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420992266" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000827f040d843f0aa3bdbb581ad340efa82f564ad1a69e2c978a781a75649ed8a3000000000e80000000020000200000005f23926e60fb147caa002380a0d63095354eb197ff7620e8a1c9f15a79c1750720000000d00d1a6f47bbc019c2629f5b5612cf6b56876e0175ce36ffcecdd017348ddde140000000bb8d687e7865597a995163cbc7b162b5236e47a769026009c6408f9c5567b813d7d04690b0e1bc2c848175848248acc5e46196653e5f218a90db21eeb45f0fd3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2172 1940 iexplore.exe 28 PID 1940 wrote to memory of 2172 1940 iexplore.exe 28 PID 1940 wrote to memory of 2172 1940 iexplore.exe 28 PID 1940 wrote to memory of 2172 1940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12ff494fb19736b0af988ab4575a7bde_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59850f7917e1d9c47e2daac8f42e13236
SHA17a01b3c52569787e97b7af3ed626e18f0a844437
SHA256f884a040a225dfbe3df7690697312e7cbbb2ce4b1061ee9635467872c3b3ebf1
SHA51269b09648a7c89de8bee15cb79ebac2153d1b656d95c30a74408c45b0936332a0b84926e4b7655d3c3c69a6096b6df73759f1e66c213e53a24a16fc5031883f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546ce8dd646700f7e1ee9cc0fbeff49b3
SHA1eed422e8a359a92f76395e69f4bb5bcc762494f4
SHA25669290e8fb36b0f613fa340bd4b2ee6128d6c01a8d9c603693f7a66706bb1ff1b
SHA5122f064cd061c713aa9c1a6d6a5b248fa6cf89ccca4362c173f48d1b516a541cf8d6429bfc385d98ece22726d84c464f493b62facc5580dbcb22d3c57dfba9a5b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eaa636d7cb74b2c7353d42de05b916d
SHA1364b88a0d920437503241ab9da6b1c1070f77915
SHA25652b39cc9649801fedbf4bba205969db6c28bd8fea438a8627b778a20de73d7ba
SHA5124571553a0480b2a990b4c7d0adc557e80d06619f1f463f5d00d6ae25e52326b843d66c1a4f3e5ebda465eb86dae5a242a83dff28fb97587e147a332cc3663895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8fa7f2a20523459d94020c0df1a72b3
SHA1a9c6e2460908b0f95bcff4f928a78a8f5b2a28d0
SHA2561285f5d499fcd375c0b60c0eebf38be1057556e30144ac86afa617a4dc54fbfc
SHA51251e4ab93c0a6e89966b2ae0e89acc06940fabba169dc23c02ff0a0b03d31e608a49da4fd870a83b0934c86c045a27fc7e16620705d430e506a50acfa6d474f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ef054567b5ac712bb0680f3caa4f700
SHA1b097316f48054631c06673ce91add28147194a7b
SHA2561aa10b1133c66c385fbb292c5faf03abbdee48197828456afb04e6ff99d90134
SHA512833f78e3acc73c11770ff37eb4600915ef8db00f7eae1e5978316fb8e344d2b5a227bc6079930ec75ad133c352fae0f53a8e27a042901ccb97039a5c68ab7b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa92040522a27ff41fa528a3ee0c57a9
SHA1c8cd4b98f850147d84e409304d08dd0fc20fca93
SHA256c04b991782cb924f20964d9be07ff4b3006d7e64f52efa7d12f2acedc01bbb1e
SHA512e16de03ec6af988cde6376b9bdaca688e8577625e65d6d9714510e10c8c6a079ffab63637f0327e66f5c16b4ff3a0c07bb801cd831b0d7be492ea1dff93478e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5113a74e9bc498a98725ebf9c88c5478a
SHA19e49f093eac07a1908d08f2c7c9daab0e69b7c70
SHA2561bbab5e263f3f9483f21b2441e078723c85546f2f8b116b158227ad76c759503
SHA51227b4c2b0ca2eaf4f2550fcd1afba2064344c7a8f152061b2143aa81de58135454a0bd78b2614ca64bd58940e19913445f80c7a94f443ed5235b5ceb8ed906e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5970611edb80ed0cef2dbc06836de9cdc
SHA1dc45a09ce8e95871b90ae7fb9ca561b71cdc23da
SHA256c3198da0ada534bb2f255178cf60576d5d57d86960ff6720a1224276833d8660
SHA5122db81cdae7641605816ebb0ef8640561ce356b778a30d4649faba6437d94a768217e3ff4374ec7e1abf1e5f0c5142f38e3bbde7969c94282829e824ff25ed234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f1d4b2cf6131122a61f5d64dad78447
SHA17b2934081fce25165144a3812c877aaac54c156e
SHA256438d4149467fbe7bd910336a452046a5d271169223f11adf035362f3f5ed4e5e
SHA5125180ab70829182997a6cda55453aa2568f57486ae9205fe65d45f73f955538ef5ac7e07682b80d3e3763982ead0d3c669624a0ebe5ae844dcb2ff0b39672b59e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59df2a834f321c0f830823d4549acc08c
SHA19ec7776a34893a8cd8ed9f8aa637b9d85daad816
SHA2565110888a5288f991ea8f1c394a4ddc4c90578933e78e953d3fa3a1e0f2a9f17c
SHA5126f1097d49c1234b01d625b6f82b6fdbaf7ee6a6ff0b25636950139c05dfe177bdf505a9a7483fb6262a25d432e6f9fd91c04b8bfa732fa8860fabb35ad7de083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c41fbb28db274ea817ece046056339f0
SHA1a42079754dc2c6b85f84788b21d3d1c30437b14e
SHA2567c2cb0af592d370056288008a72586da873f3a3148ba9b3c6d320050eddefff4
SHA512b6c5ed5dd8ab21fb3c082dbd913f8b54ba03e9163dc1358a8c2d6873888a1badbab891f0e1e391ad596383e24fc50d89a17170f1620e0816a81f99866ebd9b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6288eb03fe6a455869bb9d959b63e7c
SHA1a584b1899218baa01268f17f0c4699c9222ba898
SHA25627a1a8d79c0b8872701bf62ab6e640038344ba2f0a41227d444a3fe3476f024c
SHA512b898d59e53afdacdc4166eebffa8defef6cf14737b9db675b018aafe716ce39b6eb7bcabc3f3320660cc61176869c658d55eac3ba46e23129f3af5614f4c8c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9dde076edd004900480f99a770e27d4
SHA1813a4397e5baa77dfe63f516e77bf13c2d4d84bb
SHA256709f945a10c3da5d9271942e806d8c959a9a6e314d5ce71307fc3e1075687d4c
SHA512a466d277c91f15829d45c48e5a653a00d306626a0eb35b904da87d2e56e246ba5423c8de8614846061280c8e5780c90ce34c97e1c95213015fe58d3404dfe337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5930d2f91089ecc3853c0678e858f286c
SHA1571e74a34c7c98343d0c95221c1ab80ac3fe3221
SHA256f9464b143470dad7e27ae8299106669748d859893dacecd7b3a5a1760d129f75
SHA51268bf003f4e32a8f08852f7e270cb8c13ad300ebe093a2526a997d30992bf59aed49524924f82edd56135594512501175c99ef6579cd5d86b73918a4661ad30dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ad6a4576ece622fac3c7e38c225bd53
SHA1a5e5e92a8cc1395bc0a7c64d893c62dd6f8d18f0
SHA256b03165b213ed5a7e6881d89c3fc2505957ff3bb45dd4bdd1bf6f3d1dc2c1c395
SHA512ca6d7425a711269bbc7a6f13bafac98f136a7e016f8aa5d1e494e03f013a818c28c7a89eef46de23e7127b2b97348c53657f7bdb33af5cf3f20d347fdc05a055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ade745fba8cc7356abbd48a8e2e0d6a7
SHA1c6499f5866ec632944e3a9a7b743d332ccbaced1
SHA2562eade67e9ebb459f3103c739b394d9e36414cebd2f202cd3abf89ce7cea0524a
SHA5127c21a05189a795f9511ed3eed0aa15a651acd45327bad7c186efb4cf125e2c1a08784ef9a94f90d3990cfe28992c837f14c874c8c635b279c4f13aeebcc7e643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553856bce00203f19b34d68fed9020bf8
SHA1401997593f37c7779cffef8d151c1d191a188a6c
SHA2563cd4f075b5d6024d2c3f4a1a2206adb662628c60e469ee16c3d8b52f6a7bdc63
SHA5125110ee60b5e7de15b5604d25054d96967706c9d380d5fba6f5fb4af10af7ba674364516a84987a3356f5f796f35af7f45ce74957806fc5d651a2b71e58bd6457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2d88e9d3b3faabb7f670aa370bdffe0
SHA18d91b509f30c210da2cea6d3ab1c83149aef9314
SHA256ca7633dd49d4d220fb2e2eb3d2f57992dddfd10fffa5a2b135e04a4a1475eb7c
SHA512414c46326f0bdf68206aaff4c94b5c144ae5ad26723893de738bac05c61f3880fa434270e853b1492fc0429bd04c24c928ff0b58b51f8b408d34e6a3922c59fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d2aa2a6818043b179ffa40ddcc02f7f
SHA1ba71f9814cb6252be348b0cf614fc2aa0308ca1d
SHA256c3bc88766bb32823ddbb3419a73b9e637001b7c0d885d52d72023465ef6f3189
SHA512654f09bed057ae83ea10f9f4cfb97a28b018963283557856d7bcff3b60413620ff1b92359a4b9c0832215550041be69813eb5b9301c5f3054f2f194da83616b3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a