Analysis
-
max time kernel
136s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 04:33
Static task
static1
Behavioral task
behavioral1
Sample
15fedb9a8d0fcce159ac30a845df005e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15fedb9a8d0fcce159ac30a845df005e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
15fedb9a8d0fcce159ac30a845df005e_JaffaCakes118.html
-
Size
1.1MB
-
MD5
15fedb9a8d0fcce159ac30a845df005e
-
SHA1
154f6e824ccc6e9c119bbdafbeddd96bf17216af
-
SHA256
6da757f32725fd585cf9d2f7d058bb5b5b1612fcab12d06a29fe66d95be74375
-
SHA512
fec176d538ef63291f81ddf2cd25642848db6a3b8c271b3ae8177a4928d93043789575d27463558dae66303305b66422d3bcba5634e1c96f68c344bc8f17b325
-
SSDEEP
12288:s5d+X3ZrscWy9dH15d+X3ZrscWy9dHy5d+X3ZrscWy9dH55d+X3ZrscWy9dHX:O+1jV+1jE+1jp+1jL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000a6017d2e31b7ff896179d7f71d328d1f5e88cf7aad4ac02fc4374dfe27191688000000000e80000000020000200000008d6e4d8ab57a13807cb81f73dd994058e6599f4c3acf39bc19b8a014db0cc8a220000000c4b14a31af434a09ac3a1d7e69a58d6b1074528e73e382f8717585d54b3044414000000040e505df582b34dfac163f3a28f0dff46b33068021548e73dff8557a9e253d116f179e31e41f7e0db8539849dd91bafe88eef78c30762c22d018e13185e9b1c9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421045481" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A19E65D1-0A98-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b8fdb4a59eda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2620 2864 iexplore.exe 28 PID 2864 wrote to memory of 2620 2864 iexplore.exe 28 PID 2864 wrote to memory of 2620 2864 iexplore.exe 28 PID 2864 wrote to memory of 2620 2864 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15fedb9a8d0fcce159ac30a845df005e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a958b4fdf3038a15e16d75c7c07cbc92
SHA146d4596d837e8cae68b449cc8238c75c9a6c655d
SHA256114925e084d9d5130c663df76d3c8ae4be847dd045f841e718e96ea2266bc4f8
SHA5127b7508d1faafcf293b7951ab7a253cf8e68d77957652718003572b79dcbfc939cece4f3b9074130b0f25fd0667cfe3b765fb7405060fa4696e0784632bf8417d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fed45609c8337e64ccdac26c5e88509e
SHA13219a9c7460769326fb5cfd091b9d135ef8e8c46
SHA2561eb7e476bac2e02c10ea47d7068129662b05ae415eca9bc071d4966a26a8ec0f
SHA5126f0a73c36b3a345d377631f081d2be4f31f08ca2329bb976755b78d21eeed1353cda8ebad0a415c416d71302f10cb204edcc94492ea80c1d334d79e292088119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51548862f3dcbe602d9740029baa76f52
SHA16c740807ba9bf78f08bc0caa1baadf5fda834706
SHA2566afca3d1b193330cf6c30c8b4e18fae2b5005189043b82c497718cf43f96e657
SHA512a7708e9c9ad7ddd292a5634be13b14258082bb21c4a6076f196966c5f4b8de39927c25b3dd7041c3ee02c22a64da0ed2319daadc40086921d713c30910cb8ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a37f3c68b1606f5e351a864d676fd09
SHA163355a0b575999c1021fb2c870f10f131e97f4ec
SHA256d640f62bdd009ef5ff050d919fa3ef1007bcecea3084d5a8212baf68f545fa7d
SHA51277c70083f563070495c5298e67fac2460ab3e436d6b4ddd3b2652db0fdffe87a75a2b48604cf026182e6e3e17ff34fbc7e66bd6c2397c5192c27127e633d2797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5cbd1c50b80add93e903228ee95f479
SHA1d9b6dedb967e412839eac327bc6149cf89a2e0bd
SHA2568c2b341b75452e3a274473ce8d2d9191b1cdf612c1965eec35ea733638e49f7e
SHA5128f8efbd2775205894f76ac8c8eeac64dd5b4021eb847cc642a084214bf2facf8add347e3139ec4b8248f95a5b65ef81370c10a5e99ffd148b58a52bf4c0872aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53007625e7b6e0caa4b7139a25a1affa7
SHA19697b374b821fda519a79e3c6cefa21f97e0ab65
SHA2562b6f630a8e31ec2fd1653a197bab2f7d3e470da2613128d851a3f79806c1e757
SHA5125122612536cf6f7b450b0a5cd94b1528b232b198fda60bd6b82cdeec243c023f633a37ce8320f7d6cca3c702779fc1e1af10fc14eb8c196c04ae6e678287005d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553cb3ea647bc02c6f373ec4179791bd3
SHA128ae3b1b90a2f5b640dab41203f89fb5105023b6
SHA2569323dcb9ef66b6d8089deffc7a60342bb2e6a43995464fdb55812bca95aab34c
SHA512634604b67ff3ce3b887f21e812ffaaec873b53beece4d10d28baf2501229c390cda6052806bcef9269fc9cf23191c1d19e2ca31ec9c4cee27b7bbb0bc8dc275c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ef9b75f035a1255df1a82df0c0b0f33
SHA1d91a34c59a1522c259b0aa2abe1e549d82873acb
SHA25696f893e8e4f38ac87df902fd370454301ee9d292859d919784b34bc7d970e589
SHA51255ad0670ddf0e3611c54b8d6b1ba7c5c81bc40c79b00e847d064a9094bd4716a7698a2c8baf09e6842995fc574b09b03e33a70c6a6afa494bc7da4d7db6d745f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5528face6f69fe439f57f0dd273d02bbb
SHA19f2d70c7d7dd6010c709e73e7ab92715996461d4
SHA2560d1de8a93e9beda88a4f81451e1e4ed5e99e7eac17feb63117da868fe7ccc511
SHA5122e8606f638c0873dd181815e5913465af9d4f66cd42be1f64a2cbcf7c693b7b3ed7e4f4c8695248f0917c68562d05952387d4c499f9549a7aa4db937fa9d1138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54785b2b7d19d5fe9d6b611e5dced03f0
SHA16fa9686e118d3ace3fed8741193dc7b0030ecbe9
SHA256bfd49a7157d73c5eaab71572903ed1cfa535b118e2478749e32baec73878ba2c
SHA5124cf0c2601b57f45b9dde4b7cae90fdaed566da8d5570c8cacf5a5cfaf61d2456cd824c72ec529119d9ccc5549b13c3e2804b679c6690b7275ce854a06abc36da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9461209b89e990b132d810fa40eb9a6
SHA132afd7a509881fb35ab7301564ab34c5a0cd7abe
SHA256b43f6bb6a4fc8abc83e7af0799a84b7dc7fbcfdde393a500b0a918a85ed23756
SHA5126c6536ddeb1a50732bdb2932bbf88c3f7902ede89c43198d103cca6809eb5ac352f70e54a13bd5205b2378084d7540da2ac054932974bacc2d29eea3375fd46e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5262087fa1424bbaf30ba7cf7430c08c4
SHA1b8d3bf247108de61118e3ffc2785710b2dd2c2d7
SHA2569a455c3d77339b58859865085e5c547c6442f32ee800ddd3324fdd7fefb047ee
SHA51211763a0a218cd788df04b27021760bac84efbb34bf50fb2dc46a3a19896da616172045665c8ab7517f8ccd81885618ac20e1fa951ef78a4b930aac0121e1512e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbbd69c350ad33912cf45818f8c33e23
SHA1b57515575a17120ab0671d71657d03fd3b67c8a1
SHA25667dac9156e4aeb4ec137a2fb624e3396893dd569b30753be275c62e49b4b32d5
SHA51267dc149a47ebe8fb14870eb2389fb11a1b5c15fe9af682c17e5389a43ad07f613d27c5eeffe1baf30a680bd3b149625762856cdd23298ab52d13bb929b53053d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5213718e0044715fe115fe17656f46322
SHA18dd9c3375574d91cd25538178c12f80694bc5286
SHA2569f1e0cb2b2190416b418cc4b2b582372c470ad53aec60576f8291c66efab6fcd
SHA512f4d17d06103a61dccf599476ea324f89c191941354924e2cd96be58d2babe456d215b39e69742c46df7193b4c688a873fdbca1ab347d94565f0113d975b24f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59aa510b430f5f875eaf5651131cb82bf
SHA17cb446e30fca04cd6b89720997cc8228523f8365
SHA256d29cf9a61ba58fd3fea96a5aaa04ab537435e76a90666ab8b8dcdeb068bdbb85
SHA5124a3f73ba850c8019daca0b49897bd8e4455c0c6537001596ea93f35eae751b55283db3b51335bec7c9c800fe827ed89b0ba1ada2cd6c0d2dc1a099cc0b5b8444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5086798cbb889d38cb076f09d1973e9ea
SHA1fb6f2b8ea375510999151c58f37de776c3108b37
SHA256b3aacc067a79bbc4efbfdcf235c2f8cbb0a90b958d27061924ec9ea901429dd3
SHA512822ef3c957676101cde2062e31c4990ecabd8dc2f0a70f01f28cd76b0b73866645aab2e824026523e458c25641829af90b8b3162ecf8345d8e51bd0e6d2f81af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af12cc17e7b048fce02603746bb3c96f
SHA1ca3ca00a40b672f2a48424bdc715c4d1c0a80671
SHA25617a19d7a324008c389d1c83320692e2ca7a58d5c651e971a1de0280a81415b6f
SHA51219ce33815fb52ef62769516d5038deeb773a11abc993ad81165f0fa5c1cbc506ade6cb568d7b6351167f911c69b0d9dcff5ebfeaf177d5ab3967af389e671451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8c0188034e1f30c36e75767ca9df53e
SHA13bf052dd4d0fdb7ab5f548b156f27e3d73fb3abd
SHA2567d290d16591a0f50c8f061da8486f84a85a8ac7b51b141a201cdb8b752688a8b
SHA5123881fe92e17679bcecf9fea382f22d3cf65e3397e7b9bfa69c7a11406b026d84b64953968a46b56d945a9d22250196da50bc00be3102c2b24eec9499f7eb7cb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ecfc579fe24166b9ae123d8f6f853ce
SHA18b6723b34be9ab62facd2e50f1a00ad9072abc77
SHA2565df946878eed5a0d99cc86ac8f9d7663a369ac36eb97fd943955091aff2a1e3f
SHA51214ba7d69b75e69dfb61d6a45d828a51b946d5c36451f62ff4ded83b4ccbcdee5c68ee8aad1b8349f47ff8296524b72ffe56cf381ca04e7f53dc0b0f0dbd1d7ef
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a