Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 15:18
Static task
static1
Behavioral task
behavioral1
Sample
134d154450ee54aa505419870573194c_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
134d154450ee54aa505419870573194c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
134d154450ee54aa505419870573194c_JaffaCakes118.html
-
Size
812B
-
MD5
134d154450ee54aa505419870573194c
-
SHA1
38df86abad3b6b54fefe25005894537e8eca4b10
-
SHA256
4bcb7d39f609c98053c40c47a458bdca87deb38636aefd7d28a81e3e119f3130
-
SHA512
63349ddf4aca09cbe74da3bc8407455c31eed90371a36a7c8716f20ff3104d3038f22e6788475cef77fe450b9dbcc9cbd30723cf5837325c77bde09c79e70e10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000000e865eca44aacd35164c97f70d51d161beee86b091b6506af7b7272b24bf4c2d000000000e80000000020000200000003f4fd4d2637b3ddf09199432f3e435180f8bcd485edd6b9fe8ea12ae68bbf34b20000000bfe55cfd1534da78d965230f2e4dead24b116cab193d2ac2ef449e68ed01889340000000f9975dc3fecb56f10f65df7412853b9a14d0be12c891b7affb56c9785395f3d0e57c45ed6953c55a587f8644e6b8248c52942acba133dc02d16634b434ce1985 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40743759369eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420997790" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95B49741-0A29-11EF-AAE3-FED1941498E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2456 2108 iexplore.exe 28 PID 2108 wrote to memory of 2456 2108 iexplore.exe 28 PID 2108 wrote to memory of 2456 2108 iexplore.exe 28 PID 2108 wrote to memory of 2456 2108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\134d154450ee54aa505419870573194c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d03a0e4e046a8a83bb969e2a471350c1
SHA147b56e534079714754c4d436bb5b474a1dba6e48
SHA256c12070e3df174fb80a3739043c09eae88dae0bdb5ab2cd6ee6d65b21300d3e93
SHA51286124f840e8ae54cfff12c009429feaed9351cd128b66f6ac6948594dedc99cc95b2ef08bfd5cefa29eddaec58a72a68f8a6b00d0782f7499ee4f4362c41792b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff4d03582758bf518fd173d476f85bc5
SHA151bb5ea4c72754ffa39cd3034ac7e3a7fe4db35c
SHA2568d03852c2cec9bf0fe17c19c6b1a3e5c7e9b37b5903b35dee15bcafc827853e7
SHA5126acc22abfb06fbdc587162dec63d3326b10b9a3da93c7e05b7338b46a06c1a821b92029bc4c4390fca9e28374e91da45e83d8285170dc1108857cdf45d2e341f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faf1547bd46409e70202e7e6385c1c76
SHA11a47e6edc385c6414f08267037cf2298a397df4e
SHA25683cb72d85b1549a2cb768f98ae6563030083f107aaff23359e38d44348c8f69e
SHA512365c50561ef16f2f31fb80153a52bff0d0f3f52f70d4616757923a353e1fb8c8c93342888cf7b2a677a1ab98e5a4b2d343c99ced18f4e04bc0193a8eaa4d87f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ff92b4d5be35da46a4aea220e8aa0d3
SHA17e6cda6079cb2c3dfe610382d6cf15fee2f56bc7
SHA25636c0278f344239142f5cf55be8aaaf0483c6d44d3c1a22cd2a0d840a14bc68f8
SHA51229cca60a1a5bb1490372db7b5d1b939d95c203d1bce3a377337a87b569e8cbafdbd5fd84f62ef6ac3c0065b6c182d8305ff5ad384771b7eff53d8b629abdaa93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5ed4acbcbdd438a23aac09a514c0e54
SHA1900813a75aecb38ed9134ff8beaa272e81b3073f
SHA25651f6cda7c0775538376141d8d840f7e3289be5839651a155d7759d1f7fcd3231
SHA51270d1a31e8d216ada941c320809ff61e5e61330fa72a0b0517d0a5b9231a147c890509dcdc9fb30fedb203ca391f7cbc6219d041eee6afa54887ebe44b49d1abf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bb3209379aa8c8e2e7ab6c905cae508
SHA10105352a4334c496e111d864467a1144f38b2a85
SHA25673430950384f44c80cce4f414bfbd53aba1721665329ee9c0d02bd31eb23b433
SHA512a68b410fb3ee907b291cf026e0903c1cef299c8c37c6f9338768438222b17d5a6882cb1f3b3e12b2bf7fce667faa59faf3f3bfc09b48d9b280f1dcc8ca93f3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59246c51317bea08389e1f147dfba5f8b
SHA1c9544370136bd3248e2f58de00026bafd840c82f
SHA25677830bab2d45818c4c05bc33c446ded8cac29d4e9aaf01ed5fb6a06ac827057e
SHA5126d3a040ec9b21717ab30ff54b7fa15db8f66b47e198fe56caaf8885302fb48ecd40392e4e70cf8c2fe6ace45f4ae00e3fedf4937f9dadf466fbbbfcd9ddd1924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fc9a8c9446c4b27195e4a8a1bd7aac0
SHA11e58c53ace61afe7b572c420cc3922ded448211e
SHA256deec00eebeb365541c7ae20d17d5a47ba06a1f0544ca9a5617615b88d31b5896
SHA5125e86813c5f826e886dca48771f259b540ad78cce866fc5ef9e42c9c9f63722dd0321a155cd849a678ba593bf077c1401b8527f6a788addc8446a1c757547d7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9b6c70059336f0038e0daf1e8a34135
SHA1fe41a65811d9cc75d487c284d99a068841710c8d
SHA2562fb7c6acd44a39497f5c93bde4e33a357b0e035c477ac4f45bdce0a2427bfeac
SHA512f7d32554d35496b16868a4dc8156170986abf411eda2676fae1387cee88797e8f70afd19311bea37eb4d731a3d9b2d6e0a7c5829f9b75a8d682170b91a7874b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f40419b78af6bdf98fc715cda2b2e70c
SHA18502c96889747ddfc52b30cb0b028051257770b4
SHA256bc4357de501b9188da3c32efce8e9a7a85f76bb6bdd7fac10f48449831568f71
SHA5120fdaf6b8ea68326049f0f5605f0d8920d89f5684e8474699e697b916e78a7b4d90da3bfbbb3fa2635cdaec817003ea29516a16b1927b8da5f7d08cfd857543f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fdaf43891d37ba9afb87712fd58da44
SHA162e879a1d874c8f67da94b0d7f3089fd8adb33a6
SHA2561825553cc78dfd9088d3f171b6220a147eae14001ffa862ed668a0966622f623
SHA51215503ca5ab8509e57cbff26a82f959fd153ac12aec36617ecb76058271ae48b4fd4b463c63998299e10ebf2faccbd155bf8046527a07171c4181fc25e78777fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5732bb7b5b88d63a671c8479d5d827f19
SHA12edd677a41cfaae17dc6f3eb88e5d599d36a54ea
SHA256105152b8ff8bb680ea653aab624bb67633866f58710751b19c4677866481fe11
SHA51233cb0b6ace26cb707a313e631e5d3ae51543b58a382e7581a8f9eaebdb18fbcafe3f02f553da2f73bd1b7265b79d1f82dc2a63b2460d48c477f35b5e0545953a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dbf366ab4ae02719aeaaa4b758442ef
SHA1241d30a61acddf5eb7f4f664f52cc70b2b42526c
SHA2567c127af84629f1d923539468fa18333e1c1017624c01dd5505ce3c03ffad339c
SHA51204ff9f927d5d046c4dc265ae298a11f0af487b246631437a6dc3d89d0990501b0fa269c0e60273632dffd016645f54e225bf098fcb36cbdb0fe892820d4ddd04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507b07f3c171c0207b37f4b21607cfb89
SHA10039cd4076cbfc7a2c7e69f33a1eb6036d55c6bb
SHA256df415a7b853cc82143bc7840e324656857f9aee852addd05f3b751d49cd551fc
SHA51272294c040163212392bf03f63b837cc32abace14037525d0910d85410a38e801e16059f398758c99821c14d978029d97a7988ef4c5b8b48f45ded1a263afe4ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56308b7d2d1cc12ce027b63e4d718a96c
SHA1e6e08d36d90b40cb9ffa094e9dcc7b2919e1e625
SHA256f72290b2d01127a4156dc1a21fa9bf55ff5d34de3cc107069cc2499c2d43c028
SHA512b29662cb6be7bcd2bdef6e3268c1ec241ebdb19042f3e17dec8e843b7678a933b56ef40fe7f49c2397a16cca8304f2259eae723ba8aa7b4e763758c0d6c3cda6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56130f33c1a85205c716b26fe977ac6e0
SHA1a05af6efa573d796db0f7f38ac5a99fc5569e36b
SHA2561e4bbccdf51611153748cfda893a7c056068fa0a453c9f20f7df12e846dec78c
SHA5120f671536c2d13778886765e573a05543f45e7ec7cbee31f0e0f51c6cfae35991d95fb140b7ce10614e7fbce8cb1499a022fe7721e6093c7ab0f5104589eed60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550354fd08bd9c0afbd532a8831782724
SHA167240465a4089ec920402aff3e20ab6c20ecadf7
SHA25609d8490e24e20c88fda91306657d40be99d594d707377412520fa9c971c65418
SHA51276d8a8b436aebe39ddcca69a96f07c6ad220049da7733c1fe14c941dd984b55a9b1e62c775b08ac04998e936e9a2ca5dc0ef27f5ecc5b809dadcc2c9716c6e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500ab408ac562f1ae298649471a779dc1
SHA1a2bd271a1f9242dbe10f39d618abb7f7429db0dd
SHA2560f23458dd047ff23b6cbbbfb76eb69749ecaea9982310a265f21a96193462df7
SHA512c7ed82403f00e02a03f38f3f3eb81cc878095fba9da4081b1e16b983b20edb20401ae691d839ea7cc76314e9fdf9dc1cd34c08bd8d6198ccaff13f834d27d563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58df55fb24a0012bf5dfd0a49d92d23e5
SHA155d136c4efc99951bcab1d7a2a0648d0ca0e5fc6
SHA256126c8218b6003bfaa862f129bb4af61b662486b564e2762d64b045767e430372
SHA51298aec3a67087c03738003ffe5313b61da75455b036698275d52af5b12c9ca463682625b8b35d8691a7d01271ef4cd20cf4f77ba92fb59e75488ccaa74198dc83
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a