Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
1806182aa8137debcb45af22c002b14c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1806182aa8137debcb45af22c002b14c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1806182aa8137debcb45af22c002b14c_JaffaCakes118.html
-
Size
925B
-
MD5
1806182aa8137debcb45af22c002b14c
-
SHA1
d16f0536f4f91d2d03951b8ab38e7b10e2837fb4
-
SHA256
180376c2471bc32ac0cf70b721e91e08f67608df0716ce51d3c237fa55ee1329
-
SHA512
87870821df1829ccd85766b848c499cd87e7584c6145a58a8986c44e096d78a929f5297a7cdd55ea120476bdf5cd19945add5d367499ad7040ffb47527e1548c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000003f37ee7f39060e6d705fbed1c275897a0a4f1ab9346f568cf510e09a1ede6440000000000e80000000020000200000001309b3a621877aea770f8f37aa5e83875e5042d7e03a9e79bc3bc8ecfcc22a75200000005e0eac43bb546b1fbf1473f0d209cdd8e171f2900e11395bcfcbf229f41eeb154000000000f01f6254b94eddd776e07acabac0fb6436b60a0fdc96372667317ce6a03667218dca21d0faff3acf2b35c26a22bfb71265a64d3dafa17a50939d1060bac03d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421079711" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54C58541-0AE8-11EF-9F07-6E6327E9C5D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0804929f59eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 3032 2012 iexplore.exe 28 PID 2012 wrote to memory of 3032 2012 iexplore.exe 28 PID 2012 wrote to memory of 3032 2012 iexplore.exe 28 PID 2012 wrote to memory of 3032 2012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1806182aa8137debcb45af22c002b14c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e7b0bcb5fee675be527a676a3c2e5365
SHA13acecf2bb1498b4ca1e4347c446d6a9d2b94e878
SHA256738b6278b9904a7d8de990544309255b1ee9b42c29374a36a18cb19955c47e0b
SHA5129facf6c75df94bae85fbeb7feda25f2c8f3fbf55a79c8642559f2a7d28f11b82ef8eb2efffe59941477821d9c4c2d96a938dcd9dcd158721614d1b61af528020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD582c70b4035d0b92995e713b6de983aa4
SHA1a710e2f1388445b3fad0162229ff3fd7b4f88363
SHA256a2bb4dd22cfc2ad363a9a28884929d8cfd9a0239922a554a37cc35bab5e094a8
SHA5124e14e1ede711e7801e55108044bbc5025887d4cf112a41b3cd715316febd70b3b04255269e2b69bc90981f1556a111ae7062783ea4874faca9f2b6a71d45e2ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d9804ab16fb23f433b3de788e7adb864
SHA1b12aef689c9d084bc2933f3d13bdf536b9cda640
SHA256e15e71ac6a96aa2389b78db5fcac134c0efdd543bbbec9190f7062fc6a6a2118
SHA51240ee437903681f3d5474052bc2e6af7823475081d599da46466ce99ad4586d5fc2e46f9186ea984cb557930b4a5cbb62d487235aea0c6f1da0d3402381001344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c958131dc6bd296c47430384019c7f9e
SHA170924a7dfe4316fc7332210111d5443d37ebe7bc
SHA25647272455e03407602355a58e63184ea92d8dc9e9013b3e83b1380182dc956ca5
SHA51201b14f165ae3555e9ac358cfac30622a9007d01b51be287840a7204cae795d78f6ce2ff3a5fb842587a21dbf615493a7b9ded214e22660234ee45bb9f0ae82ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55103690d710e32cc3d80ddc040808d5b
SHA1ca344a4a09c752fb0b4fbc410bb0c392c97f4577
SHA2564dd2d86e9ba6b4e05dbc5cbd904f64a4d0d874305a8d588aefcc8610270d8ab1
SHA512db884b83a21bf0bc86078d87118f5b5a3dd5cd485272c6319f9fcc4324202cea7f1e59bc7e41bac1cad2d92be9b77f57ef63cf1512bfab90e97d2c45b27c72c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bb1a8b5142b5a0b8805bc1c42a51e251
SHA19fbbaabc2eba564e33fc64b6170d8f22286242e1
SHA2568e3a7d4d3b29524e421021cc1870f150fdd5443fec391d6c18aebb359c31b522
SHA512f9c7a27c4aa9918146c9ddd808001f3aecf577eb35225b1e188eeff5bf7193899f9bf91f588c44e933e3111fcb5199f6331bc04a67a8b42a511f0797f8f517a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD551ae85cc389cdb10a9ab4621dc8d65b5
SHA12a7ba415afb7f473f1d05d1663eaf16e0b5169c1
SHA2565c5f2eda14eca334c6be789f9e4c610d3242f017aaf97c35dba6b60445e597e3
SHA5126434691d3d294da530e7982f48d39da39a9b0f277eaab6766f606bcb1e3d52c95520373f0869e31aad0b8129874cfaad1069681b61cd99561f21f24feb78b2b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53c8187f21c59678f546df05cf5f0d06f
SHA1de67ef3b56b2615a24aa803de6cc0db02cc8943c
SHA256820d5f56425812df166b7d29a3e9d34fc1e46c5a30e103813d115e7523930b73
SHA512c2f44151d2a4c0cbbdf058f1bfc0c136b0cd5be9f14056d209c241a957c8223ac4402aab589c5274b8e425a99853d09375db6a22c6ea2434c965cecab8bc0620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e7e61cc440034b2d8fcbc3f6d55a78c0
SHA1120a834a1d7a91fb9a24c7417e3edeebf5504963
SHA25605d44ab77ac0ee651711d878e743edce8d9c50cf04fdf0c1b2019b13f1c27698
SHA512ba3fa4f5f4d926732930348a17e30567e9ac25588808fc3f16b4e9fa3d8053c3480043e261ffb64354136b11d978ac9d010cf972b00be80989d0ee522ef64f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59eee8dc24c022aafd03ae413d2c70978
SHA1bdaf90df05a2f02f9604b1a5d14618921ce3baa9
SHA2564b41aa8d25ee8cecbd20a8f88347188d2b4cee8d672f24665a87a5f827168421
SHA51221454ee60b7f13ea4c662c55c607a6023aa291a240665fdd94c9144bdf8e8a6787f031ea46f69cf695388acb2e105503fc61a8f9a99c2989576799c61577eb1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b480e3b14d6476c2d4bac714f99f86f8
SHA1befc8a7761a13b984417e861805a6438a50d7b89
SHA256556b3fbb9eaa43575d92617bb69ccdd2591dbb33360ff81d83d164d747e1ec8e
SHA512e90e3b63d73465cd1bcbf3d47b63f154f9c138568926b63c5029618ab4db3d3742e0df13c3b779bde9959f2a9c0606311520327b23833bd93e5c713a84c3844b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD516b74d3b025565e50b33c85d49efca6b
SHA149014b52fc0be1e4a69d699875a42748714bd611
SHA256c7e4a1807fbe67036c7526a2fbff9b24779f16e7a4657804cdd54ba5f3af7562
SHA512d5cc4abac9bd6146a9c53f70dc1737c46e65759a513ec47b2764df2e2922b56669f5b46215d5565a91d9261d529d9d07241d582cd2b5dd28720befc2f25ba059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cbc95fa1ea317320cf87e3cdf4e81933
SHA14d1ba5a0cc92f59f60de5a83f2a9f693252f7aeb
SHA25664cd644c051b78b9df6c73df281a0c2dd2e7ffcf0b221c2b3ae6864a22b38c46
SHA5122b9b112ca2a2536d03223dc45e1ffff0f26e8f3b09a3a89b0e7c3e1701058c3bd76fd1aa4ff12d271f20cfc696cf8a62af02a6277b2b0f35f19a967aa176ac81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b59ee0d98fc423b44f3ad97d5c3e153
SHA165b8250e389bce0595240a9addb7211c04d92c29
SHA25619ab87397879571baea02fb0122ace100f027c6ddc6bfb32649d726743d9a421
SHA5125dea9873f38b7620cc818f4994394768a2000dc09db2b26819e31c6313f7972dbe9008811dee895ddfd4b1ae41b392409b1f977cf48219db267094c40bb8ee0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fb978cbcf77391ca61a60d41c8d4988a
SHA18f2f7cc89ae250248c81823de571558a805312c4
SHA25688eabdbaed5f5462bc1389a2769803cf828baaebb7a0a15453710491b86167f9
SHA51241132cddb147a7cac1cb1f9ff37e4af29500d7b14651f78aedd62cd10a265774eaf88af39a7104a40e1473a87743a8b1a9d1f79afee48d6b2b691ee1ec6c56b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD591c7dd37426c87f6caba6e45e9d1593e
SHA1dcf90a314f99a1f6bba6308ae7f3ac9fca18526a
SHA256ce6e2fe6247a35ef247077e6b58e476d91996d0475678c5a6accba7e8105fad5
SHA512fe539d7c1a10eddd422c23fb696bb6999a1521972ff8d76b9370dccbdea29890bb0ad705cd34a69a6865f9ff562ea56559e552c5c6df7b1055bc54e8bedd20af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dde89cef2b4c409f10e5194db55f7f24
SHA10ce92ae2c950edbfa9f5f77cc498d6775fceee5a
SHA256ec573f91e0cdb6f9a328a304ba30e2af46b966d021c1fd66d6ee89a3aaf6ced0
SHA5129458e8f467acb3f67111d4b51a0525c95dc699edc4ab571f74b7121268c9144dc39494529b13a4ea9b77510f1fc269bd2b97e3da7052c542a69ea8b48e9d4fad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59963414f91b55beeb0c1d6d02285bc89
SHA150ee48378986e7237880ebdd58aa786a71abb088
SHA256c624c3b94a0bfb556c2fd8fc70b6fee5d4c66779dbc0635e9fd9905bf38a6d66
SHA512d750c2df2a234a393b0fc451b9f6648aff50f4e6f8fcbfe219bd69177710c7d6861ae2540a4635d9eae92e9578b88b849424381d440d2094fb645ad4434167ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5559e66cbee07719fb9f198ffe6f767e6
SHA11572d832022c13201fd1d8480f8149af91784597
SHA256cd3cf40337770b54b04e10f99ca1f2ff843bc4b61ba9bbc3036a9f940f13e1e3
SHA512c2718b1adcaf80913d8ae81689e534892ff4eb38f971be5db76e34ef09e6db6dedc97b726fcc96506e52b12b5b7ecf4b655112f4b1384fa9afe6a2a59654aeba
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a