Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 10:43
Static task
static1
Behavioral task
behavioral1
Sample
174f7088502903cdb68d9258043b767f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
174f7088502903cdb68d9258043b767f_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
174f7088502903cdb68d9258043b767f_JaffaCakes118.html
-
Size
4KB
-
MD5
174f7088502903cdb68d9258043b767f
-
SHA1
81d88da86c65aba94b4b8e46b61bc04345075d5d
-
SHA256
feb3bcfbe3ad585f3bd926924caffff2e9bde7aa2f0d5cac88c8ebc50c789cfe
-
SHA512
872491c04210396aad031a80ad3047be8c2184900a280d90cc01043cc15aa9463902d3b560a28e9c7d763573b6091fbb13dff57590836b973680f58e6695f412
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o6rhBId:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57B77E01-0ACC-11EF-BD10-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000060e6981ab7ed48822c9b0b8a8768c5919be0d3c3541721debc36116e99ca4dbc000000000e8000000002000020000000604859d61a2e1a4ccaf1cff8a40057e330f377af6f6a1d7e37f821839cd4b82e200000008627572a4bbbd38e30cabe685010787854956771f7355a94b22e9be758fd7c7c400000004c636c333200c957e322955878660940746835448f37c7e882ed6181e26cf8b043539cf3047b7d308150ac7ada97ff7491d6ceff9b7a96b656699a69a8019336 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421067691" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407a512cd99eda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2664 1948 iexplore.exe 28 PID 1948 wrote to memory of 2664 1948 iexplore.exe 28 PID 1948 wrote to memory of 2664 1948 iexplore.exe 28 PID 1948 wrote to memory of 2664 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\174f7088502903cdb68d9258043b767f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5739fa3b1e7301f902823a7db3d5feb12
SHA13d7e96d563ef83c48a5d72d144f45720a4027140
SHA2561b8826e4828d31704bd7485495900544b767591e13706bff4dc6692880ecf505
SHA512c17d224b1ebf40828ad600ca7c4ac152f0cdafa56208c356da465a3f440d563c7a5daca18716513e97b181800b7e69c83b189289adeda4af9f5cea00aad73e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eac33d8baeab6940ff36238f6d6f2a5f
SHA114add377a8de0bc23eabab5615ff8369f7ca3784
SHA256fcce6782538a625cdd2d25ad998198a625893c353d397f0154984ec6710a8691
SHA51233583bf1e70a2d601ec4afa0a9bf6b4706814a699e411b0ff6abfbe879ca45bbd21f20230a4d94668f7e67850f81527c514c50eb022c764d807b1af43041dad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5399466172e0602984dee212b06732f4f
SHA1e02a0b597ba029aa62ef6e38f3bc7dd982dd999c
SHA256889737aa5002ba1feb813c8aacb1c2b727dc45b1a02f85dd08e45747194bdda2
SHA512201113dda062a655d745248a01111346cd9e83d920d8f2699fc3b720a0c3ef454301884a94560670d7c03556820a435a9e1cac7c896d44cdecde1d0eedc5d4b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f40246f87076a907055087099c2327d
SHA1eef2b19f20a4b8844a0a42551a238016f1150078
SHA256384e6e4aa92224f8b58e9718cf8a7f5b26c82f25b3c4872bf9e11afc4d314acf
SHA512de36feeeacd07f600bd3cfdfb5687f65b065f62f553c0b418c77df51f341583d2006dc7f78244e6fd7e3e4427cb8ce119d30c389b61f2ba37bc9c7a8cc75ff5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544f4720e9e2b5154fd98bb24ea2eaa40
SHA18e861b72c2bf203a03003042f94627e7b26cafa9
SHA2566ac2158df90606cbc55d11cdc1a76b85cb4a1da57e6c82b9864df3e0c08c53eb
SHA512738601743ef13003bd94b32f6a4360d7b735718e9413159aa01be813c613f87d6bc0b634e7941b20e7886b0f41ee6d29afe7ca7e0a9a81246c7d4915566f3007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594aa3971df69f3e0ceef4dd8072e7a53
SHA1dd79a8d3a466b7b8d0856482e581d3b966e2d1b7
SHA256c2517bc722c1c1e015fef1e4327d49723e16f3607b07ed6d7a1584870a2fcd6e
SHA512ef6863237317a6c8498cf596543ea1d747da96b64d7901a883d3867582e0d00500cbe56c8a9e85a6b38530b35598d3acc38c082768a6a35c77799e6d8ff72a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509994d34c36436d43e693bf569769241
SHA1d67d5daab17e81cc8de58e97869e4adfdd2bbcb8
SHA256694b5196d1ca6707f0dc403132065c831eaa77962454fd8ea77586ccdf97c0d5
SHA5128e7b3b27d10c4902f0583059d93355e296a85cfd72dfd5a404b3accad6fd237388f7e726b8defc6feca0bd656d7f5b903599e5dd677853ac3fbc0adb6664ba6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6965df96c84bba694d76530a0b31a06
SHA1fac4ae825a99192a7373564214e38ae1e0a28452
SHA2563017ffee53085991b2afa6555883d210a1871da114a98d26edc83fe5349f8fdb
SHA5123347c0b1fb3821743482ee4ba3087c9927e16ad469cf03ee0faca52cbe5ed264d312d3a15b9cab30f85a27d3c646a25ddcd2e224788a738f7962781ba9badd3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5e790a0845856ab7e010c4698d81ca9
SHA137ec20f3b4edfc161585c56abde10533b184a20f
SHA25686d4e1500cfd72ec485ef8c0ca33ad9e8b9c5c9a33fe17f4aeb30eb3a7464c05
SHA512e22be56d35780b511ac3c99ca057e37fff57310607081cd4ce33d261c9831283fe2dd1764cbd20beda705eb2a10e7e18b8faa33807e39a6f3bb933ac6058b768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da451df89d71258657b7b58aeb685d7d
SHA1d6aba2e46bfa07e2c7d15b02d741305514295ce7
SHA256941859d1197a4b0c30da45a7a18abd59346ce54f84a1673b07b7b9a9434084ca
SHA512981866b0c2039ae77408c0b8e746203a85ab2915207733e0339d81a9c20edf351c61fc9c07deb5bc13ad3c0e53e51cf9725d26281256d315c7e2f4248e468a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52df5552c6456dbb44a79682e7f10b4e8
SHA18dfc3d76d3cdf2d1188ca49403462e5df4b7e6c6
SHA256a4e364e82cf01a2efee9105d33d62fa622e2f92624960c24520a7fa94ee50977
SHA5127d8396dfc46ab3df09c751211b2f447b36eaf045a46aca41be15274874667c26e3ade514b9c8a10c7ab6b8f01cb7a010fcd8d9dab531993ece35e01560a8dc88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546c2ea2c311ea835e2122590934502c1
SHA10c386046331ffedcca0e0576521dbc711c9ae2f2
SHA2568a8d6aadfec775053c1cbbeb51fca07c23c2c9635272477777a8436cfa83a5d7
SHA512cca64a163b9e2228c9afa414d1ef4fc22230313f299813f33b8ec201d69b75c9151e8f8ba07959413fbd1b38c1dbfb9b93aac685c7973c0d59820d8bcd0d4194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5731a961bf6e6ed7f7f8ce14ca196929d
SHA157f7c04cfadf769e23460e1e54cd3f32bb81d5fa
SHA256447408976414efaa480d033dc93bcd69c02e8b77c84b4b63933f259aa02ff0b1
SHA51289607366204bf2a151d86ad78e8813b483e3aedd5697ec3d0719f72cb2bce59da9f46b975501faa7f130108eee9a8bb161ca42c4b87912d6a27243761b498fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b3fabefc1bcf443e0987d483fdbefa0
SHA110a435332f867ae1ca53e46c2b50c685f6c9b8aa
SHA256e76446faeb38ba8b7b348b9c848b2a7d71780f030a8f80692801833ff5af00ec
SHA51231ea951bd59ff143e28467a3d331793d3089f8052f9d5f9905f340a059a199e2acf0c2e55bbb5c027ae0eb4ba640473458cc92005a86fe9b30e6c81c5ce4f1fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acc1fb32f6c6f51991640a7fd3394e1c
SHA1dea33d0d1a590a4682617c4d3b49eca6a33ce733
SHA256a4887374d11f1ae877054ba91313a9966f6d0760d23eb5f3edbce00c40667c3a
SHA51262f81d498af6b590f35d6d30d5646ee894146e015d906d9c74430e1dcf7dacad20fc299cdbb826809723fae3d54a1c4fc46ee3145f6c5fed1e3eb6d2ef081a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1c77b252956809eca2e6445a2d3a509
SHA108e42fad3b6b46fcc7ab52693d15d684a1dbeed7
SHA256d43fed498b2cdf20c371ad008a51770bfade6fc96cc410e365b91b6ed1ab9a8c
SHA512b3e88319e1c64e9efc35627a47bd2067d4486e7a2c873cf155b601ecb59cfa6c8e47ff18a8e9b9e6df3ae48836d08f8cba6a203befd4e179cf3ab36f2842425b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59338e893cfa5e3126c3ee89fb21fee48
SHA1a6b152dcd46557f831601462260fb46498900d47
SHA2562ac0cbfe05dd3059da2aac1eba78abe3c9a4138c75760c6318a97cfa9196d0f7
SHA5120713c3dd95b39d429fe6c7c9986e635d32b2ac4a33d784803702a676b515210090508814b7f647f123237f042bbce2251736b683fb08dc2d67213e307cf5eaf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539cdb94018305e857337e56155ce47a5
SHA1cf9b86e3efb895b7664a0b418dcd6ef9bb781e3f
SHA256a1ed31d663482c695562d8980c952255d76219143282a4c758bcbb2486861b75
SHA5127f9b3871d93eb688b14618f8d22539c545e3463a101a63e21cbcffc79a5a4b0c09d74de72557e41c47b7e3985be34693a3c3c9c4d319cc44e3d342a6ebb324e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cab550a65a22f3c4cc00839aecae281a
SHA11b37f5d4433fd802942133a9549aac57f8f7b859
SHA256e9e51ea9115c54c7a0a80271ba856436378697f8db36f7498e20f58501c3b482
SHA512b11fbb6245c2c62f137d76be291510e330d85c87c024e5cfc927c77b60e243520474007a74f50303dc41dcf47791edbe4a1ad224076f524c24edd0fc4e46715c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a