Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
13065c3f044a6852adb9212f37051638_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13065c3f044a6852adb9212f37051638_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
13065c3f044a6852adb9212f37051638_JaffaCakes118.html
-
Size
44KB
-
MD5
13065c3f044a6852adb9212f37051638
-
SHA1
0c7af4c621ba0a90e523bbe0f53b6aaacb044914
-
SHA256
0a298654c75d368dbd6c49a42ee1a761684affa38eb45504a3aec68fc4ff005b
-
SHA512
3f1ffc851ad8eb5ed7c59642848473d9bb6cbf9eb97911edf0dc7f14d578ce7616d37bc109e2699a4e39a1de0e030f2176c1785c6cd56826316d1976db950b6a
-
SSDEEP
768:8iu5DQkzNhFVGQ0ybTkdERFRCsCY0JRhlcHCbvh2oO/EmB:8iOQkzNhFVGQRbTpX/CY5H8vEoO/EmB
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c084d7d42a9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD65D771-0A1D-11EF-8303-EAAAC4CFEF2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420992807" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000ce3a6412b738481c324a027c119f7d4b3037a7bb9fc06bff73453f844437c953000000000e800000000200002000000047bf4b7691f8a2e8388d4a4be55b372722dd16d344256cf5ba3ec5d2700576fd20000000b9362126a17fc63b0eb55c350aea74a9abbf3fa877548569091d60f5a3be593240000000f740368d72412a239243ce69b620f8f92d87d7f517ade9e4224c692aaef420f96aa9061e052c8d17fa7a3683c989b0c695721df7611eecee50fe73076d582ec4 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2224 iexplore.exe 2224 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2340 2224 iexplore.exe 28 PID 2224 wrote to memory of 2340 2224 iexplore.exe 28 PID 2224 wrote to memory of 2340 2224 iexplore.exe 28 PID 2224 wrote to memory of 2340 2224 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13065c3f044a6852adb9212f37051638_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab6c805aa0df50e936fde915ff8a99ca
SHA12db7089c00bacf94988dcc5f01f93cf5441ceba9
SHA2563af66a8efc961b80326a1cfcb4525e57dc8ae9758b73771883840025526cb2db
SHA512066438cc6763846378059e70981a63a877142371fad3728008aaa5a98357aa900b2f9100ccf3f3b1148871af146be8d87b9a5b27541fe7186955ceaac99cc2b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d27add31f83b42460fb1e1943f2da97
SHA149b22b89809cd838eea96ec5ae502e9feb7f097c
SHA256c87871ba3a39ce96b76a0fdbef7eb5dbb91bc29dbf0535b6b3c40587302ead70
SHA512b07e5b8cccacc7da76ce96e31871cc821f429c44c4f27b365bb17feb9f67f5e9700a3021d4573b3d50f458f2ac1e3e87b70953065dfb68d1b28634aefffe3f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592721c9202a34f4a2d3915101ab354fb
SHA1dfc4e2ef01a7cb2de6a90476d53dcb7b15f6b38b
SHA256cb575ad35388851d25c683b594c9fe3bc549b548ed5249bf341cde7ce6ccd767
SHA512dbea58dd2477a3da329c70ba08910bcfcc933009e0d004ab7ba972d603efb5aebd1e0b0eba96aeed9465907386edb79d9d93decce50d69bf64ab1a9c78c18c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1d708275a40abae3763d5a744dfe0fc
SHA108835766854be44057b86c7671180d016c191cb7
SHA256d69a5d3633d57c87fa6336f8d2ce76bb5c965cfaaab7e0cc336d99d778264937
SHA51214fdf1ac1415124e8e609a2c09e9fc6992eb6f71bf35609412613451bcb49515c99ea52af0435872312124d4e619526e0623256dc233c7bdf438b3f03fd1112b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e79f6cd7cf1c03b1dfbf55caa1fb8685
SHA1786a0ec65bdeb7c5cbd17ba8878e8ef5159e06f2
SHA256e2ea438f3f3f3ebec655b19b133ae5b2b6cd768a4bfc12b45dfb10b0f708626b
SHA51248fd3e2a02babe07739520f6879e8a62d07447e74102b1468f220cefca07218fcab9d265c2fecc1e3dc3b6f4cb7e3b492fbf0fe5815d98416d524e1aa11fd060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9597a4179bb8b7ecec34521a92f61e0
SHA15dad6bef834e3ecb17e302cb22413abea7302d3d
SHA2560c7d7ea40ad3d11f9a4cf6fd8bae0f647b5a79a92a1915ffd9dac693c2573a26
SHA512cf795059b0b945816d63ec33c43071321cc957393627672b3c510bdfd5dcedcdcb051295eb420985fc0f338120b07975b4a69d2cbd89cfb6a38a90ae8e169dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9dd028a08939141779131a42ac5daec
SHA1e87c180509cb2a756a5fc582626796b070ba43bb
SHA256dfbb303b24e7587d467022bfe9983c38e4ae55d64e0b5b43ec3bc21113d4f9f0
SHA5123f1312409efea546706fc3bf772b81d97c0bc1e7b9f78da08c40946cfd0376a537d429510cee91481074e47d8736c7428fc78c3aa84d29475ea833789946bd6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56750feff1dce52adfa6f1706578ec566
SHA13828692a2bb7932fcba214893f70bef1824c369a
SHA25674258894fa01b98926be9aad6d29fc100e41b45f86e1d8e27e08b7230a4cbf0e
SHA51252193a4c1b78e5002e769ffb6559f38e0563a37e815d9cfcb16b24f203ed4b928ffff8fe4dc4daf33643decbe721e98c9f8abf8f468eefdaf759b15fcc294182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a97097a79efbcda493a5bda9115b234b
SHA176a253438161a2daf6581e46aba2e5be9eba00d6
SHA25694d4a1f21795175cb9eb788ddc38ee03a762c8385c54ebe45bde204936f639bd
SHA51254a6dc599397285e8d06652b6b55711779835237d6bbe0cc1d77dfc72b3259fb9a867a59a033c4ded1bc307cc729af7c5203afbc5cca757dd23739c2511a4b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587de04728a8a8e25c76a4342391218d1
SHA1a658c6e21ad7d7bb72732fda03cf3a720a012d72
SHA2563a27ed6d631ff0da5882788513a17ef0a34ba08904aa2e00040702c518b85557
SHA512da51ea9adbd4ecbd10f6344699ca67e06119c258f2d31a65d54626dc57a0a1d76bf664d85a8fd7320891a0e2596c50a811a11fdaf98225f1d476c270ad422900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52baf3c789a10a101dd2adc8b34b823c8
SHA13d1df18cfe7d688ae815b9036e2dcdcf16baa31e
SHA25692092f0d5a0074eee0936dddb0e8989efdcc577f948d811316a0f3a6636f37d8
SHA51243469a16e6569bfab7eab1eccc270ea7e5e2db60bcd2bc9fb19ec9ac6f57e1042802bf9c37288213a93216830e595af1b99b2ddf9c47f3f1678675ed7ccfe4c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d592346e5f98849d5d1cc7089b7fedd
SHA1aaabe53f33d642a89d324b652231fa43e37a4bda
SHA2561aecf66d4ed244b897aacf4b7c37c2b8cd2ddeeb7747918390a2866cce0a828c
SHA512c24159f3bfa61973c3eb0c0176abcb2a1e6bb39f53295b6e28ac8165bfa416a0f22be14976cd3c4e96c52ff7519d727672840817f8f69585fcc7a68b427f5f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a22bc9f439b1501887fb14b1e7246c3d
SHA1108bc2d45206a9bb6a5a4c757a895578c92a5f0d
SHA2565855c9089cc1299d9b5f7f1c61c7580e96424aaba569b1bda9f7f8dc9c6b0b82
SHA5129c2167b75635a524ef38185d4e2a9ce72fadda473e7ab9dea71e3e5d9591fa60a32706ea9844afda12559bbc826ccff19733d31166bfd8bbb3be2e1298a30bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5537d7f50119da0d027be7856e1b97593
SHA19094cc0a479fb9d1f06c42632b50fe43c56942e3
SHA2565d7dba8965c8d4c8246d31589d8a8df69991ed1028d017436842756a2be4c9cf
SHA5127d57eb4ea115594f79318b1bb059361d920855af39bff959c14ea97b29a65ae773cc7f0c855510f5adea587ef5fe4b206a4538b018b246d148b75defa4a58ce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce05b45c393131703a5c5d69de8bdd3d
SHA1f1f270ae4bb9dc5d58324c8796446b6d464b3f4b
SHA256298fb7b4e5cb2ecf77ab070d4e7ab8a025b14649f9b0b1d4770362964e6a6234
SHA512c859090ef2680afd7b7d126ee3dbf1648bc7f16feed084898593b06cc0172a64a048c659dc433d174153547edd6e04a721c1244537b6bda4d431b0a26f0b6c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ded18a90ba32d72220dc06bcc5916a3
SHA1634f20291926752991b4af23e1738c3a4df41ce1
SHA25668c51d6b1d8dee51dbfb98bc823a9c27f5dd1a0481252c642b95a88e850e282c
SHA5125e7089e98ca3a3abe471e61c4495a3ac9ad74dee3c00fa50741f295167cc6ba0b3517f0831f112541b50045a46dcd371b9786a6e118b2ce688b0365143065da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536c191c42e91ec7749cb599aae843c44
SHA1f41fce989e91a14b00c4b7eadf3f80559fa0f880
SHA256d164bf310414887305d356cc4fcdbe8dc15cb8a55521a8be44735831510123f2
SHA51291e98965edb7fc0f81d7b8b787d596a5ad41be0809ff7b4f00755225185ddd46d4b50ac2fddc834a573d71bc570431765459afb97775c5e76b2dbfaad4d1798f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5612b5ee1bf833d268fd002a73347cb39
SHA1ea7cbc14f0f901aa87691204bfb799b1d7a831ed
SHA256ff2c9e33d172c060efbe5f3cce2c018693474980ee2e8880be14771f0cfaf5fa
SHA512b346fe51eb7e6cadd64a5037230d83664d0e3cdcb8d73cebc8e94dd70de8ac73a6dece5a41419c3379d805d5583238eb700729d36809dd68b502c2bb3e1aed6e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a