Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
20288cef80b931bd88277d7f117a43d5_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
20288cef80b931bd88277d7f117a43d5_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
20288cef80b931bd88277d7f117a43d5_JaffaCakes118.html
-
Size
461KB
-
MD5
20288cef80b931bd88277d7f117a43d5
-
SHA1
5b51e356cfdacdc9bbd932f579b89f9d96b1fb77
-
SHA256
e64b57e4cb2bbb29a55c88ae53e0fa3af4e7f585ba6219b2b4f1639b0f207230
-
SHA512
f8363eb733e63e744a57f2a00e6c87ba387da6b18d84ece45f4ddf8f6f075323952fcfcb3eba256caa6ec35f3c9ebccd64470a617cf3de31521bd28ae2713eef
-
SSDEEP
6144:SpsMYod+X3oI+YJsMYod+X3oI+YHsMYod+X3oI+YLsMYod+X3oI+YQ:O5d+X335d+X3x5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421235426" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50cbb6ba5fa0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000ad5456532cc4b78ec1f69f5013706b3b0fd4b2574fe831031cb69d5fdde4e0f3000000000e8000000002000020000000dbe14a76f497e7e978e1e9e96b4e17032327b9925390dd30c95b4a849424577b20000000cc1eb7f84f33642c3da75cae19e9e3bdcf289aee6f1d1038174f5218566287d340000000a6171c17474c85eada089f4df216dd6169e92a0622442c2725ce0afb6eb089edc560c6233d08416bb05b97e1cc5b28c9edd584ffe3e2f7798e30f2be472fbca8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E22A5761-0C52-11EF-B944-E2C1BAF7F8C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1960 iexplore.exe 1960 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2192 1960 iexplore.exe 28 PID 1960 wrote to memory of 2192 1960 iexplore.exe 28 PID 1960 wrote to memory of 2192 1960 iexplore.exe 28 PID 1960 wrote to memory of 2192 1960 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\20288cef80b931bd88277d7f117a43d5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fe8df08b75fa137cc3aef3c15fce027
SHA1b73c9549ea231f4a7c9910c4431e35dcaa3e212a
SHA2563dae20f46ba05e8d94783a6411a9feb606d8cfbf68ff9945d94e06847f3a05b2
SHA51255a0c7f0862c73e2f75308eba5711ff82447b786533da223e15c24171eb8f6a4dbf6065828f64b9cc9d66ef135ab8aacdfa837a5a6fde642e31caf4ebea569c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593a417a8904be8653bfa3fece5761a49
SHA19478670c6cdede2d53707b8e41829f8e5cb418ce
SHA2561cfbdea2c2fa09c387bd2dedf2135d224bdad901e197bf2f05bee28eb6eaa622
SHA512db3fe1341cbef5f659a38802a6811126859289e96f86bd025b63aa0c85fa7f19f0e9dcae138af8c77f4ca90fbd5508d2dd33247c0d8b0682c987651340d9f1fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d3672ed4055a7667ec6a712f1ea1020
SHA1b2dc64c14969d3f0455a4931e81e7390cbda8dba
SHA256921a9eb66cacd4337fa371d142ea89c77c6c3749526a88020aaa25d78769daa9
SHA512e348682e53d1d63b403cfc1baadcdf3a34dedea846c6b804d99434760c68ffa40a1ff80d65b530a6c598440de5ec4c26e14f40c547da3c24130a662712e01467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564dfa0d04f2842e29095777453185f2a
SHA1fdbeb39a777ebb7539a448983db55d0e83f2dc5b
SHA25698c5b0206884ea06a55d10ea9b0a108ef62142c50cd42b5a45a2d9748167ff97
SHA512e378a2979661fef496b1df781fce9c739803b764b00e2329415c92bb248e482d7a83d1acd211f73297d14e0b3730e66026b2769dfbcdb5274b86bae089cbd534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5651a01b0463080347befffbde7c01984
SHA1396344922cabd6efc3d692e96166e0c6eeb7d64a
SHA2565d1b79fceb925350c60c2672612f96f3cbe144d86746b3bb30215249fbaeacd9
SHA51218f47d8176df77cae3fac6610f346150d8bd7ec2ec8edd47252881529e4dd53b46e304c682911fdaf93651b607a2a224c99c0ea1eb343cb86e9a12fcd6fac987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dc67fab6009bc7922c6de2c3aa1839f
SHA12e5dfb83b4c3674da68fddb4c36ff7156d26d141
SHA2568123e254a5b8134258d48874d5eb8932de6d4acbd41c21fc4b5da3a215f525ee
SHA5126436f3bc6077b2f9e0b5706c45eacaef1c2b56ef53abdb12c96311e2bb59ab357bc065f325c66e53b465297c5c96e97bde537402eb866f9159c4ae51d9f5ea24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5088cc4ce13a1591fcf2f471526e535a5
SHA144ef116ed71e0d5b047b198c526baa004b72afca
SHA256b9389d6b50df3503153f6698d0bfbd05029781f2a523000db6fb570ea01b2132
SHA5122c96600a964290f5fcc196eb09763c3abfd2ceb0f43674520c3d19ee886a612d3ba487537d605477d6a78aaced406efb550ad8d951aa2a0360a18899a8c39742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc88f96f31b0fd3f6ffcdcf6231a806a
SHA1100c96aad3edf65e3689dc89b3207d410b4809a2
SHA25617b30079b6d084dadae641955c4fdf1188a2ae972a9cc796d1e5aa3dfbb8922a
SHA512761b9e157dc2fa8a64fc5806e4724da7fef683f33318e5eb1b43435bfcebca5b89391cf539fc2969f6e5110a41d1ceca3eeefa594a8a03eb2d5ec0d24202f629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fcd9a4610829352732801f64c58b449
SHA1475af6ec4dee32094e3053904563b534d3303a1c
SHA256593bca122a35e834125db14f93e3e9954b8faba09c171d5172bcc3ba93f8bae4
SHA512a2a8bc4368f2ed41b34efdde9c9b64a3a499a03b159852a3b563e12d86fc9c41ec9c8b1a539126c560fec0d39cf7f697ede2f34aafd91434954599da70717e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58347f4c674ce98f4391dd81e4cdb951e
SHA1a04a01f3f8bf07d772d47db6117da09d5eb01218
SHA2564f66e1709ffc492cd347f7874edf12cdbdf7d00157139a0dbdce3aade8d45447
SHA5129972f2e824f1f3b10504cadd0fc684a2b144a1e1186ad83631ea2afeeb1c224ee6459053e089337e83194da28a2b59206c93e75d716d21902ed74f7c74303bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dabf6487ff619c731ff90b7712e93553
SHA1444c9bed59b76026527d227c552e114655e4ac8b
SHA25698d732e34172b81fc43a2d770afa570db55816bd030fcd50089795f87cc2d980
SHA51299f39b80bfc10a2ad217b8684e7c225c545bd844d22e84d5f3cc07f18f1bc0a2130d51f58559ef6dda90cec0c6274ec67fd5a283247fb2e2472d2d2d7b34af4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3cedb950b06e938774866e47f291896
SHA1b9346a80000239fdc361a897fb69b0120dee2e75
SHA25631281c4653565bb62a1d99dad3f453bbccab8bfc30f6da0717d55bc6fc71ce9b
SHA51208b066725ae63670dfc9600ac5f34a40beada1c8d68eed14d1d8f2b829a16c02eb2fd0b230f2c248ce08e76aa03c092583961c0407c3d7ee0549552f5cc40491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59694efec6ec6f5f3c8d009de772f2406
SHA1398747a47bc33e42c746e2d599129e5538124f8c
SHA256ad3b041553f751eab0362c5cb881e0663ee1082e5d0cbe3e3e9c0891be4b33aa
SHA5127200cb073011d5205e08eee9246cbe21010e14c822a7f3d8b2ddbe6206aec26da826c9e2b4b47bd20fc9c05a8605d1143bead235684f70b90baa8361ce7aad03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7e561e7c063f27102db5d505af60787
SHA1f191595671f1034b934890089797eacf739368f7
SHA256571a137743a4ba9a2022bd05e1740a042336d077c93f8c56022a34a761beea4a
SHA51268d7613c176b730e22622fcb17d7edc4f4a3bfbfaedfaad1f598023dcd6b210b81d49473fa31668dead4019468b6840474f208d0125af58e29854fc0d9fc074c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d0edd4b8067cd5b0c9cb4b05c16cf2a
SHA19d7a05d3536214606d4d6acb06b4872038f0c94d
SHA256525a2a5d6492003832bcdcba600616a27ea6d34f512b4ebedccf44b9adaf44d0
SHA5123636b72c434022e34e6fa4a2660ce10a338c2516f6ce4e8ac8f7ad777521b2c7a804773b7939b350847d7412a0289d68eba7e5b271a94bd7568e676ef196ec2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51aaa83dd982f325c90424ea133d961cf
SHA1cbab012f7d90624670f4788a06f875df6316f3d2
SHA25676a107faef71324437c2a39e1502afc10e98c43f14fc24755cdc4e77f23c613a
SHA512125be35991cdd76f374a990b0e767576cc4559afafb3175aab2052e04ab1e6525d9988b296888f138867192bb5d1858b24dc59e3cd7cd3e95c1103af75d4ed89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f4f46d76057f966a83738e05931e832
SHA10454ef925305731426f9509c89a3eb428140b265
SHA256b889952792dd8ce2a84728cf12d96506de07f8536f256b077018499d26c429b9
SHA5122916edc0d8a643c4d27231aa68d084fa372522ca9a14a7a9b46bbeb3c45d8e732446e9c6f4754ae944fd5d48b115f44ef3818e162185f035c978aa5440363d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564798ca8164b9ecd018c0e7733c1a8b0
SHA1f2e0b3d24ef1dce6fe71bb262b5cd3ef10b296b0
SHA25614b8069b6b693ac8a7dc26515713b9e46ada13ccf56eb83316a56c35a0ee9cb6
SHA512ceb595a1d8ab4063d6a1f66e628d1fff1ec57c61f5c38bce1b34aa19cce5d634bca4a5962d3c3f885596ff6b2ff933ca3ef521fcd34ebb63de376dc426061998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ce90bbc426b00731fd327c219f74c3f
SHA13396a80e0d02505079b1474a0991de42725f3098
SHA256c1823809b6a55b64b6cf2ca004b111d9c86b6b43579ba6f260e9a265f5852106
SHA5122415408f4e6787c5acad0fd9e95171e97b72ca21b57753968848f96900580bd7af4bc4ca0bb3105cc7ed70104db7af8cfdac50999e8816124b3e2857994c32fd
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a