Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
216db6291395559961cf88e6c2728731_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
216db6291395559961cf88e6c2728731_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
216db6291395559961cf88e6c2728731_JaffaCakes118.html
-
Size
4KB
-
MD5
216db6291395559961cf88e6c2728731
-
SHA1
3ed9ca4e721f67efa05cd8ca6e724ad9327d99a0
-
SHA256
be470a6b21ee5f0f36d4910e0ecc22002b49a5c6ad5f62b49861c8c6e7d97859
-
SHA512
95b4dd00ce99a2fa09ddec708e44d54aa4fffa8b44a4c090521073a99234783c63754cb16fb8e369764a71a9ae2c41d42e01332a96d68cdd5e00a7af6c71786b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oddOkUd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD5
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421272579" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{627EE381-0CA9-11EF-9A67-52FD63057C4C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000001af6d77b7278b7ad33d0d04d179286113fd978435578cc205a184da469362122000000000e80000000020000200000000c5a4b55f9fdfd909d486a1b205db324059d3fb9e07e6e484d6e475279171c0620000000a5af50ecdfa6e02c4641164cbb8af8b398ff02594be67ccb9ee161e1533ff8fb40000000ebfef4e89020560f87f058dc646657b7a4139acfaa1f83d90e71cdfae54dd3ff423446c0020806770f071089645da1eeb587b756ded2554ba1695420ec3d189f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701c1837b6a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 iexplore.exe 2484 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 3044 2484 iexplore.exe 28 PID 2484 wrote to memory of 3044 2484 iexplore.exe 28 PID 2484 wrote to memory of 3044 2484 iexplore.exe 28 PID 2484 wrote to memory of 3044 2484 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\216db6291395559961cf88e6c2728731_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5325bffc84a399c6d18ecc359ea7b76bb
SHA1fee94f11de8ed1a45705ee67810d93567129fa53
SHA25652db32aa87e9f289e769b36abd3046feb562ebd9c06ac300e6375d0bd2bfc1aa
SHA512f7860a89f81aff53afd4b72b576a99c50b543e9044b86a099d4576430d6cbab831e76c3c2d7b311499e7b88a816c5cf9b61dfb605184a91bb604f63a12bf1a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa383a7d30bec9ca5bef428ed9683d2d
SHA136d228c64a1cf60560a72be62ecd2e2dc235dbe9
SHA2569aa8756c6a1d501af51846aaa5a28337532c50e08eb1ad227d219f6fd08d1dfd
SHA512a233a67c3841f5204e59088a3441c35111c56a10f12d0635bf8c79507cb48a01bba9ec611d2e5ccbd6e765a7251ab7deabc549e033435b4499b40c9e306303d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fbf4eb36c8deda04f10fb6c8230e22a
SHA12ed2a09b5e24dd2a37477f0696c7edf02c324447
SHA256cfcb5c5300d82251bf7d89d172d6e7a3453ed5b1dc8a2cd8dbd06aeab13830b5
SHA512cbab23417a4427c857a46b64800f8d1b74de94442e47ed99fb7d40fa74b2b0202b09cb2fc648fd1c07de24bfe5796f9f07b0feb2752db85f607f5d27d4e616a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520cbc0af4992dbf6c45f72effd91c944
SHA1e0b2b26710f0449fee98e2f77d23ced2ee8e83d5
SHA256be91b06f043917265d0c009ffc38e1467dfede4baf33940a619812f5e5f62117
SHA512ab103a28e4797e3b3040479149b91f26f06c1248b179429738bafdcb86a2c13697b66981ad1548c428f3b6857129687aca53435090cabd9f33074b87d260cc12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8184e7c54ef90f49a861202aa0db0a4
SHA1d4b88e2d6bf1af6f80ac5cc123b747217bed4c5e
SHA256348c4b86fe7bb4226d540f7d65baaa2f221b495e7b1cfa3dca111d4304dae8b9
SHA512c6165687e4df34aed85135d6fbafc0e5dc2d0c3d8c27ad57b0f34eb49efc856c9f08fd2d84a29f837bc4969b1edf8910d688db312601e14b8c12c4f5edcc851c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cae9c0ea2e0c412772370cafee609b4
SHA1f908c28616039a553f2500f8cbf83f847f59b43d
SHA2566e0a3905ac0f2e5e0c4f73ca8fd7ea908eb9fb71e144452d281809aa462195ef
SHA512dfb6ea8bd937d90684abb72b660230cb51129831c04d2385a6ccc46ad958305af7570d5c9f48fe276ec6d12728208522ae630fdbb7b32bdf1e3f728ec2a7d18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce74119e97333937a631a279ee6847a6
SHA1f889f5b383ebda0d9b86956a026c73cc6147fba2
SHA256033128687c2d625dda10da4fb82a573923bf6152d16b3f8784d62323a8aa6d70
SHA5129d67c179c43eb8fea2df75b66f13d842e3260a1b9c90d251cdd7aae4185f5bb422e6a2f6b10c0566ccdb09adcfcc8e1db649b49a21394e0f9fa8025a83b11b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548a372665f0f7f92edb67c11a9248734
SHA1785c3470050d052f0839fa06c093f6832351c87a
SHA2565f466dc17440df1c1a015723e1d33e6305dec689336cad356f2fe8caeb00a596
SHA512914fe81c7542732c0003e2fa05f2b98490a43f8ab9de429f003fcb0781e574da10edbde3f16b02efec2158a63e4ab6ac0d89b3a5ac2a0480feb4ecd1159286b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57727e47e678bbcc27e52054a36ba1fd0
SHA11e95c33616b168c785e8b35721bd01d7b0d7964f
SHA2566e632cb969c02b08e38275a79b028f1e4dd4d76a5afd52729a55bf03072e090e
SHA512ecfb58ed73b49921f70fa1a8e3a15d17eb6c06863beb5b279602965c765eb35b598dc758e128ed1d05aa22d12b8c48f229c2af939b84e9e017a5f9b4c46621ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5166729b2ef3cc387decdf88be43e9330
SHA167699b1f8dfa4433404e0913242b1ee99dba103c
SHA256689b97cf329557f2be416a9d88d0f089d818a3e77259ec9ccf9054bb261a679f
SHA512eccbd1e1acacd6bb85b7841aee2f7baf66dc55c3c147c99a4259086d83452447bf63e1ad744851214e0414434c4ca763b4db912d90a02e26ab74ddf6593aad31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c03c40849989afb9c5dee57ba5edbca
SHA1f3b9b0e0c4ac35c7869bb475b810eeb3382a564a
SHA25606336b778a83a96316de2e725850c397280eba134798233e22ad7b215169f5fa
SHA51262a3308201315537a3de3cd56f642bd6444ad19a6aadf012a3b35f4c1088935acfd07723cda9f1bdd5275420e0bacbc4bf8a2b2f9286aa2a0d372b1cea1b5630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b17e5670a3dca39ab50d5d401f6c302f
SHA14e105f8a1ff96a1403e34cc03c0613af8105b76f
SHA2560bf17d69b441659ef4f5f27e22cc48bd4c3b2592035852bdd3e623a3c58036d1
SHA51210ea2c8426eca207b05dbcc5db1a3fbfdf307283f072f5df7641f4642e9b5d921b8c314cfd036f96d9d692d43a764c1e14435eb98ddc86af43c2fcdb7f36e92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53724b8302e2a1a754cd83b6e65c3b638
SHA12d5bc84ebb1dbc263a52264d6f318e82d196e5c6
SHA25624091da529937ca8675ba92256838ff828213e13a9354203f31700d3abeacd71
SHA512d22f7e540090bb24b378159e0b8978b4a868ef72a0f7086f0d6c7aeda49cb09359ea9c9964ea78e85af5134a22794c3efbdf8732589046cf7f630e10545de95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c5987ca9779804978e7d7d8de1a7ce9
SHA14208122f9b10cf877df176c1749f15184f4203f2
SHA256c5f3f8156d64bd3641614d633e4f0631480145367e4e5c1e53a938dad42ffa75
SHA51252d8a608ed64361122896c777dcc7229f2e0a876f7a6a58fe91d46745e819d3c2b8cc0c5b228bd6737ef47459c5a940059a011e0e4c60a97c7d4f31fd0f395ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec45cd0ab394177f52612eb4f4c377dc
SHA1bf97125cf99009040f41c951d09b18362f276f39
SHA256f6163ad0bac22039dd63676c8a1ec2e9148e4f84a8b811e5208837f3b14ee16c
SHA51256e373e4d6bfd68023065a7f3bdf7f45ffce019a6768af98b757f83a78a5e69effe98987663cc5d56a5cc702bd4df5027a6802e7d51e9d4a70a6d60455d667af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb32b9ce7ece8613ca348d4f74dac362
SHA17acd57d5a100f7a8cf5e3fe059d20a26ed86f11a
SHA2563d2888d7ba209715dd82341687e248259270da1ac6769b1b9aec7e574404c38c
SHA5124dcda894082bf6c1818b66ba4bb8feaa8ace92eb7d9ab9b00346aacdd088a2e94d943d401c01feb4b8aed4e7e4b7bfa45ab21e7c3116a06a4bc6120760f2136f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba1be2ef6c8b732f8dcaa06ed9fe5bb2
SHA1db8cab25fa619905b8628c3d481bf32d55400c6b
SHA256f4f9d2406c763677b80b5524ddd848a12272e49daecf47b2dd08e24c60fda23a
SHA5121c286bbfdf24094f12b707ff751753af2923bef65ce25c41065fe656af7fbecc3d80a9dbbb05154ecb22caf7257a3a1cf348ee5e61bb5218a8d8beed43d4903b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcc3f97251e3531e4a1e08c6dfdd61c9
SHA1a68c1530c286c2092a05da1f629b7828a90cc01a
SHA25662ff35f52bfb6695a89ef51e23ba813a5803185b4593cfbec0f2bd8ad0470bd5
SHA512d4b043f945b43385672173c9304d4304b4516ae9f305a813b2ae1b2d8c4335e8c132c1d5b5f99e65138955d4841c46346f78d0719f59a28cf57c306cb69138bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50676cb2a49687045c7700839e59822ab
SHA1db3266819953e36fe16f66953a52802cac2e240c
SHA256bb7aed3a3b0e8ef317eb91258329f957ced5196e4563dd82143c869a56ec2d1d
SHA51244a75b7364a28f6c049753b6eb7233a801bec731d95a5eb757a1f928bb46debf9fb4aafa3105c4602adf69bfe2ec862dd55c5adc5105134de757f64b77c9d566
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a