Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 09:19 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2028595de1664134416f84d00170ff3f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2028595de1664134416f84d00170ff3f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2028595de1664134416f84d00170ff3f_JaffaCakes118.html
-
Size
14KB
-
MD5
2028595de1664134416f84d00170ff3f
-
SHA1
8f6ddb8dd01b12a2e56ab22445f1d37bc5aa0373
-
SHA256
ee786662819b9ea419c370cd1fdcdf171f4b74e559ff72e432bbcc8eb7fc4e19
-
SHA512
17f91f467abff1a68621b607d3674019f1879d6ad6f87f6c4c4e6506cd7e6e2e6be2493a55fabb8877b60018a8feae51df98ca3c97d5927289b0e0259b93108c
-
SSDEEP
384:kzBqtZRsVuEc+6fkuOENbopul0LgIssbQbDwiTkBFV1aG/a1B7rl9H:kItZRsV2+6fkPENbQJZYDN4n+Gy1JlV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000089fc5e77d3bb80757922fb80c3a51b3dd4a3fed38f63b968479adee53e2d5769000000000e80000000020000200000002ab5c1ed7e06d9a43b10ef313931bc7d3c1f238fe6e4c7099c840bac8b77526520000000ce9eb4c377077336678e8adde7ac619bcfc0291a0aa6f90fde38561c7f86e406400000007fb296ac0a871a4cba9a7b40265600198237bfdbe0b6a7f4678b78bf474fd2632ec5b560859c20ab6a5d484a38834d75024f0d3e99c98340d13b92c41fcd22a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB985D71-0C52-11EF-AB41-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0bf21b05fa0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421235415" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1664 2240 iexplore.exe 28 PID 2240 wrote to memory of 1664 2240 iexplore.exe 28 PID 2240 wrote to memory of 1664 2240 iexplore.exe 28 PID 2240 wrote to memory of 1664 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2028595de1664134416f84d00170ff3f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a856438ecb11de00e4936d79b2ac6888
SHA19f0f1128685b6785575ff9fb2d31d31faf632f2a
SHA256928ddcd38a04cf9aef3e5e4d9f841d5beba4d7c9f866bb8c0f197959c34a23a7
SHA512fe43055526b5f020fe612c063369164b980f4a41cdfc89cc6bb5738e4a1de5bb491fae7fb3c62df0bcf6fb47db3bd02f997b433a671f3ce04c69a8e553930dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e2185e8a57494cd45c8c182accdcd41d
SHA1b5de6c304c352aa5a72f1959d1c0d6c11c2409d8
SHA2560e6b66ea652aabb99f17a3a8c167de8a6d6c854bbaaaa2990213c3d7db0a80ca
SHA5123863e126534a8c107a322f34effca82d1dc695e781baa237c8b9b715deb5e9f287b64bf6b5907882af016f1f3824d8651403c003dd86f75e05c995af7d56540a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f8c69110b87be752ac2885ec505c48ca
SHA13c778d9dcb897ed4ed5b5e646589cf03489f33ef
SHA256005cb65b1ed4079b01d24b10b4a203ca5807ce937651116da7e811392dae0f45
SHA5122b5ea812e1330799566f559649e10d4a10fa535ce4b3ebcde03d327fad3dc7fa7e5ac9c4bd6caaee58d40daec8548b992cacc10bdd64357a40810809ceaaf59a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55dec868c1edd4fcd1a33281974209c83
SHA1817b79c07f66ca7604933f79afc0543d8cd95b11
SHA2562b4182d607513c0fc0b4a3b3502dc273db7639e85b8db69ed4e21bf80364fafb
SHA512512bdbd5c5beb75dc7de0cb56d6822c02bceb9bfebec3f658c79095cf836d4e85bdcd09661b1e05c45e18eee8fbdc834e1839a5363d454e1c7dd4ca0a1e878ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54fde0e3d47f6292624d9377cfd831f2a
SHA1bfa6f79a1d4abbf60170a25e0d9daf08f890da22
SHA25670454f0083b7c9a1f8e4e2f0c5066348009fe726e40794f4845623a7e975b78c
SHA51208b5c5c96204ad608e15208066231ec7638310e49155a3cdea20d604378680f6bea154788529cb90d7cf173b1a1e4a6dae7328a1a78d4eb110005db639d366d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD530ae81f947f331e26a6a5b9c0d90d3ac
SHA1df8d8c5cb13e60d7965e6f07836aaefc62ac5480
SHA256d0f612dc2a49b786946f10e1beb6c0f30fb59e6713c57df5d8228d96912bfb16
SHA5121c20d1c56b2d9282a2716e98af1a4163e7d4454eb08c7676004933adeb5dca516f11a248073721108e3b150484235fe2a5c1c364e6fffbd92be95a7572c1355e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b2f7f7729965ea3b978ba431abd4604
SHA153cd9620ee1495e9ec30356a0792afe0d7187fd2
SHA25681f52b6b03688e5a91bbd81adbb9261cf2de5aa614b9b6008daf9df4f25efa31
SHA5123dca0efdf4957114bd97d6950e3f79b645545c6e41d6cb2f52aeb85b329a51f3c54e1fbcc89134fee3e998661e6a60a2507cc7bffd470df07a79dc9a32dbd2b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58a5365a44f524300824d8242916272f6
SHA1655268d3a129ee37ca9e349badf796f1e718b815
SHA256306736f03ad27fd4c8b9538aadc2f374e83ebc0f588c1e54e6dee3a5e0480e1b
SHA51265cd41e17c441cf4e4c0c3275ba31dbf4f5b083de04b44c188e167f59e44149e4eff9e99b7ee34e6db8fda06175855fb7026b21f3c1b50007c9a32b18b8860d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5152561be596a25c3e2a394b3cb0cffe3
SHA10d79b747ac535ce00644db1de5da57897f7f4bd5
SHA25605e3d158c80f4519a988ad06da6d94ac04b976e9ee95f634dc384a6689f4dbe8
SHA512bc7fea9ef3e5b26b3b09dc38c1f6d4af0dfea67ebfdff5cbd32bb35ea8d8db4ad404cfd50e67af0cdbfb2988678db4e1b1725df49af13f13b17ab2189cd236a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD566dace6a3296710838804e95ee190833
SHA11e722756f7a2e9f87fc0383ccabc4b550e1e82e0
SHA2560da19191ef91637910e5aa7579762569dac668227ce26c0d70707b9fcac26227
SHA51223f1cca3c89c91552e6727f0bf7c0b155b8c2f294b14a2289cf1d26aecd88b67677be2d49896480e9ae4c0f39e2cf183790366f572a7eea11b5a7d461168f2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56f88ee8dcf969fc9a565b611541fff99
SHA1913dd3513b53981f8077ce73c0481c226a281ac9
SHA256cf2de22187e1c74a178e5613f0653622bc0e4f16a88b93750cba96b0ee4fbf71
SHA512cea4e2862696d08bb8e0ea3db8a548487e78554038e5ad5ad97bf05a189cb4a1d5f4697e8af58725d45b2b4fe335a2621b13ebb50e2809f3ed83ced19edea211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52ad39a069967fef6f1e20fa788b82364
SHA192801c59ca77145a8bbbeda0ed25fa67624d247e
SHA2566bf2d7698fb9032fe803908137e775afb1a3736bc158ed071992ae778b836db4
SHA512f2ce55a2652c2dc0fb19a6d2d5df75284456a031b5cd82d9ee264f4721614074d6815422487eccb70b8023ecf91de4fe5a014207d31f990a66ada3229b6660bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a1be0a5c415d48cdf390ece5117d7aff
SHA1387b0ee5312a1dfdcc817cde2d5184ee62da7658
SHA256d1f0c8b5683b126ab95580a52b1cac7f5770f2476e7e1db662f3463bb8db21b3
SHA5121e6084532e07fca2bd1a51fb2bcb62562740326dd5580a30a2dcb777c07b12648a4b4207d68cf462f0d4c82fb998fac663703350d51a15f56fbf0ff8a4c79506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ac69a7934a3f5260562b9d4ef9138bc4
SHA1870390e0f2305e712b42af9921d17118af7be7b4
SHA25664df9463952708df07acbc199e599cea10b68dc8bc163d41319e7da3b6304ba0
SHA512518ac417bd50ee9bc41a954bb0505cd3a84669b7fdfd43df59f6f335f198db3b136f70ef72fcd6f6f79801fcd81bf3e8676db511cae2969120e5d78e6902b587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD510ddf62782f26153e03652a97aa93e7b
SHA1c2891a3406b63a6f062280167eda7fc277652cc7
SHA256b95ac748064f615b94084f9ec6d719e44b5cb7a5a42d069514c458463565e559
SHA5127ef16ddbca7b3d4f729ce924d5537b6999ceeb9ec3e98be3c15b5255fa1a50ce70889d6900c8b877597ee77daa3e2ecf60f6b19509291b022f14b916f80cfe54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cbfa68f77ac74821cb876011fc44c632
SHA104998de63f2b6c4b3d67cefa1f72f8806b014683
SHA256e21f5c79c8422fd05d873ff26b805a06a0b0ee6efb481226f8f7a8eae2b1c43e
SHA512619c45aa3b84e24b42eb25e2aee20fff9368ef75bf9f99c91d512dd6b0f436cb0dbf621df2b9807c20670d647f48272509ab0503c255531bdfb1520b13042ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a5bebf49eec5e6185c83d1dc1ccd29df
SHA15ba50a9e37ced225b37dba304796fad3e3f7f354
SHA256c2747f32291b51f960dd88f8f97d46a2ee6c296225ee59e884133dff74e940e3
SHA512b0f096bd486ed60bc81c45e8d9efa6349fd400a8cd9a60af8cdf023206dc241cf82ac2727961b2e05f06d57c31e9cc3591c4f73904c714b4dfbb60ef3c3342fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50dc01960d9b5e7985ac28ff93dbc810a
SHA1c226f1c1a000283932dc625273ba057f924b4a52
SHA2560bd068ef2438ea9e2513da8553aa94b12395cafa92b129ee579a5b0036f1dbdf
SHA512cfa4bd480d7ece3e74951fbb350e9beb2980b9a4168ef618de4c57b859ece1aeeeb5d685b3e377093ebbdd3734808d579b2443f931e0b943daa6ca3a09882864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD568380a5188f45ca02ac5a85902dd34ed
SHA1df49fda109e3f0d4cb212ef3a48b3f840b1b5c70
SHA256e85acd30d4ce5c753e9be7ee259762fcbc938c70c054d46bce9de7a30a9db28a
SHA5124065863af18768eb31dac498a4bb0f214116ea14b0077e8103f58a7c9f7690cbf844a7264652c0d6f80d97cd66b79322a507bcea36a5895a4766ce69571a02ae
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a