Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
2093191e6db42611dc6d6a2532d9d9bb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2093191e6db42611dc6d6a2532d9d9bb_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2093191e6db42611dc6d6a2532d9d9bb_JaffaCakes118.html
-
Size
68KB
-
MD5
2093191e6db42611dc6d6a2532d9d9bb
-
SHA1
eb77c57245c8809c2b2b1b7fdcf1b4cd2a453f59
-
SHA256
920da1c97710f979f3b204f3801387e2afc9eadb20d4d6ff710130918ee13f7d
-
SHA512
461a265d620e573b6eeafc13c82519801ba394789fdb2510a6be823d560a448f09628360d24e4addccb710b03847505175ea0798e804de53da39f4ddab78fe8d
-
SSDEEP
768:JingcMiR3sI2PDDnX0g6bc6YH3OHHAoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:JTJC9TcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D514DC1-0C6E-11EF-822E-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000e44769498b37a7c77ba23245dda37017b8f82e28a33e28c10454b4e011e4392c000000000e8000000002000020000000b5432be8567133fbb0a47b1b6de7788eae55f02da882dd323bd8895916f9a6e3200000002984c9e85bc822f811afc2b0fa52225246790fbcc5c97c93b73df49be58d26e240000000f732f718ddade466712e36f8f14e4a2a4379124f787e1ea55fa67b83094ca325459d046b89c73ed8975d9e5c679472cffab2bee96a85df6b1fe53d07e74fcd4b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103149327ba0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421247231" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2324 3024 iexplore.exe 28 PID 3024 wrote to memory of 2324 3024 iexplore.exe 28 PID 3024 wrote to memory of 2324 3024 iexplore.exe 28 PID 3024 wrote to memory of 2324 3024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2093191e6db42611dc6d6a2532d9d9bb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec040adca937691d1cc3c47ad3c9e22c
SHA1357600697b9e3204921639ce0f5e77808a78661c
SHA2568da0b8e055e006036a3db738b53ff5a23bfebe08aa6674fbc28793c4c5ba1ce9
SHA5125a2f0ed0125c904ab3bdd4416a1923ec197bfb5e6729d083e020230d8d028209a1db38d2821429f84ade0a215453507e9508bd5d40147b6503a12768ffe7658b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54103f338f8cd0efcb9dff8b090ce2df5
SHA1d7772563e35e65f96b42400edf68a7e89724b2aa
SHA2569c7c22410582a18c8ea8d1ef59adbe25bfdde9eed0bb3f7ae458a29f15a1e0fd
SHA512a90d09bdc715c19b82cca2a14c593eeda23af8ffd0eb734138ef96290de7b5a8e3c34722641679689a1acef8c2e8955744075081bc0f82fa5dd16ad9b35d3fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8f33206bdfd8f9c96d489d000175369
SHA135c33312dfbe0c6bdd34a9868a6f3c173e8ae6d3
SHA256d66a94f8754db54ef3418eb7abcf70094b9f48bdbf2fa6d190a63f6bad613199
SHA512e0dbc05a1494e6147a15733f5801bada53575e299bc33c6e343bdaf1f8147d612235dc888db5d820f7ff2c2f3a963c57775854331d4c0731c8491624d1fa1806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eb64b2cbad7e5ec461ed1da208ed613
SHA1ea2b7451be0dc0eb498abf5a15623e0bb1fb29c4
SHA2562b850502e41d3ca592bf20bdb68d0d9d78d3eadcba3ae35190adf748c63b4813
SHA512f5f8e2a5cafa424f77ffe7c3cd994834c7f7476cffa2723238e0e51af2526bbacb05d4b5394c72cbf4c269959a1dbda9cb4f3190662d0582afb47f97ea2f58d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554b353e6e56da16e83495a9f4090cb83
SHA11e3f70586dea05881bfd1454d7c8644d946e8f48
SHA256c47a4fd114c6844d9122c910e99f5e3f12a734105759630ead27e708d5c96bf0
SHA512b3e468330616bf6c3d031791d9d269fa3b3920983e4ff0f504c3af9b2e8cfbdc612c9e357e8c2ce79d847c5e0a20be0716d8b33473bee1748395ae7ac47f3101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecab5e9356ad3d8ae4671e9f1777458c
SHA1fe356262f2519f6626a8de749ec9c4abb11fff40
SHA256dc363d712c55689c0207260e658c094278779c7f93f46fa941c071844ba6fc12
SHA512ab87057d24b911a879e8f8716e6623ca94897fca7a14bea334e34878beee866df0f7940708ae9d8552d13dc874b9d9d9b06a1afe6b0a05220301d9eb8504a791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551f78d48880fc3b8ead562eef5316d61
SHA1c8382b00be7e463bc6d18096bc56116cade03ff6
SHA2560547a4b63a14fb4b83eba37eddd5d1f7a9016ae25e406dfa04e8a2a58784a1eb
SHA512695f850d96ef23a5889c79f1bf3127d92ea6a103f04b7b06dc05ea986d8f054efcc148490443f951a571a055be0770d3ee44f3cd496ef8f8c1ce97eb72ad6c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595dab7c8b7b4145ebb6ff373ca051a24
SHA122277c04e14d7e761b54f926c09c635f497874ca
SHA256a2e5c95a3bf1f5a20d2ffbe906f6713ae7e2b9e678ab2983ba7178f446e4ff99
SHA512ce956d6e95895972d079e63939652164bd21310e594e25c9771f7157b503dc80c300858eba881218d9749a3fbf47a810dedb64d0dbe971fb58f1576b2d1c4629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b9a85dcffc7bd3517b8c375c1bab6e
SHA1465e016326bf399342d539bb0180af5c06346430
SHA256e33481aa3d4f47fe32adfc2a63ac8cfd966545253d0f20e577089ae80e10198a
SHA512271420dc0bd7ffc5a9575867f92eff21e8e3ce93adc620f73f205224dae8c0219416dcef816f0cf653659e4ea7b1be329ceaeaaa755e6c919f4854b658c464c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4dad68ecc5e5eb60b51a71dbb91d186
SHA1167b21decc4d19a2c2e807a5aa2826aacd64f60e
SHA2564a0caddbb850cf6add6dd38c48f96ea2ab7ffc0488ea3635c328e415867b634e
SHA5121c80937ac5bf197be9bf8ad076f94e6d897fd6b86ff4d0f85002e4806f592c057999b3b73eec443e509f52c5a1639e6a76ed12880e63999abdbef9052d556d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524063e663cca970a3f8d97939e984128
SHA185e8fae3a7d55fa0ff01ee5f2b39a087c4fa98a7
SHA256b321f5b95662d87553751afa7f8f6a19efcdde012ed604b5aca36442e8e32cd3
SHA5126cf534d275eecf8dbeeb9591c93a6847736ba06718e16f34c043d2c06e1b3a6196647b83b67e9b0b9896e06cf71d29a3a9af49c655d1a3bdf61c10b6361872fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f9bd6029da58058a4137d2b43e165b8
SHA1b0f9025e3d3e7ce808164942c95684583f9684d0
SHA256cbc4ec400d053395b71f0a4751f5dc1fbd5a88a84624ac500e11d0eb6fb6cac5
SHA512301b6f13388f76fc458fcad47ccf52f7695ed96f2d65f927b8ff8ce6e0cf82543ae6a15a7fc555567ee56265aee5791a66ebae860514b86215b5542c09f9f9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1a960e3d02a856b99cab274ea6ecfa8
SHA1b2bf1d60153e0eaf9a809ea35b3b546c904d0b3a
SHA25668099b738f2552c30d0daca88e819cbf63909c86228958bae660e8d33e353081
SHA5128215604cd85561af152c294f31c1079edb5024f598f83bea702d0affc4987680528257b51eb4e6d7dc78d90781c9142a104aa76aebb0d6476b8226fdc5d5dfbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54462f5a681dce4dca620e4679267c3d3
SHA1a48a8e7e13743a0656cde26d751284da54600358
SHA25688e0ff1db91f17fdd50dbadcf924b9d3839fa4b40dfe1743e856f931cd7100db
SHA51248c9aeb4018dfc789a93e73f82acc814a4bc0268de243256e2d2fb3d89be427048cf89c2199346feb8a3d21159ab2ad28a03e0f77d95d9cb4f637c7ddb742911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ffe6b241b0bc201f9c7771c29b81d48
SHA191419cb7de31fa3130e9e6569f3c08a3021588c2
SHA256957440ebb76ff5f63cc02a65751fba97e625c9f5548fc341807d9588c0c6f2f5
SHA512c2ece3e9ca3c72ce5ecbc77fa7fd40383d6e199aef23d89bfff23c66a9c3057c89d1813ef1d1e80229268f7aa3ab06c50f922a9dde908d83e417f89b920db9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5407b3ae97c5d3df8655426cf6ee8fab8
SHA1372012968fd115163438f71f4a728788e9413118
SHA25646768a033dcfc760eafef2a95c8f49bd46dea2ebe522c1fe0d3e11f5b485e78f
SHA512f21c4ff9ba138ba42088081bba073d07845b64581ce5c7cd7794735f1bd72db864f5b09ae7052a3e6d99cefa85f38ddfdc3a65811e90527331116a3f20789bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e50b0cf8907cebdf313d56bf02188f5d
SHA169e0affa6ffbe7fe65de2d23dfbe6e6b3098fb04
SHA2561c4355907ca1dd1042c26d5408d30a06ca218db2acfbabd5466c36832b9fa987
SHA512c787fa8c0af5e3dd30c5b5d90aae013413b7d507064771fe98d9b3a8c3ee124731d89631217499ddf32d20d711ba7fe5f29a1868586a5c6ba521194912a88b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5021c1ffe4073292389856c7e24020fc9
SHA173636d2d30c601625b47297c1c897402bb5171c8
SHA256132c660712613c60e202aee379a142970a7f8a196209c5370adf75e5a532cc53
SHA51289b8ed4ec6cbf65c9b72a4b8bc9d3f4a89c1963a2002a11b797a3e920e1e645d62fad5cb61a4a3242bc8ec4f144cd4907fd088162704d6ca62650d876109334a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5830c4af6d123be99d16b1ceb47628ad8
SHA11ee3009b19e418546c64ec62486c49d99d91b922
SHA25660848711112ab93665f101e7a46b8e30432b7adc579487be823b430d440f92e7
SHA5127da01728c79898d80d8426398360f80eeacfb09434ec5638580ef1af40c9360eea7451a73a0d0841457e492cec851fdcdda191247c440824123036ad0e28e997
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a