Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
2322826f16851235ed3832591fa0226d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2322826f16851235ed3832591fa0226d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2322826f16851235ed3832591fa0226d_JaffaCakes118.html
-
Size
69KB
-
MD5
2322826f16851235ed3832591fa0226d
-
SHA1
0efb062f76872f60559e10d6a3877bd715a5fac2
-
SHA256
56533ea6262209a98ee906c729ec845110293920c1dd1cc342bfa8ee140e78c2
-
SHA512
307768c840aa173bc8643190faecacf681292af82bffec863d73a28450d75d58b6f20f922788b128d5971fa104c50215bddcbd1e923ee770bfa87ca01b847d04
-
SSDEEP
768:JiPgcMWR3sI2PDDnd0g6RBDVWDDoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVu:J/YpWDcTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000009aea5a2b5bd649ef3be40ee9fc98653cb9e6a08d1fdaefba440c6fe8e0940f19000000000e8000000002000020000000a41f22956e835881b9d48a7af820f1e63ed43bb12886de5b05d7ec2496e6748020000000f85778e613a72119461b4d70c5abedc523bcc1b0c0a2ccc208d650b566273a25400000007d86b0a0b89dc0e04d05316e8e67d968e959cf800e136377db36455c230dac853566d1919a23c92a305f652c91cf07009351e1db35c0e1ce6285ac4938b29789 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c615defda0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421303353" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{093BF271-0CF1-11EF-A7F1-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 1256 IEXPLORE.EXE 1256 IEXPLORE.EXE 1256 IEXPLORE.EXE 1256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1256 2364 iexplore.exe 28 PID 2364 wrote to memory of 1256 2364 iexplore.exe 28 PID 2364 wrote to memory of 1256 2364 iexplore.exe 28 PID 2364 wrote to memory of 1256 2364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2322826f16851235ed3832591fa0226d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50443d654dff4469ace6d996c0c742483
SHA1275dfa592c418d7cec74e1352dedb6f5ea6e6ced
SHA2562f70d35f57402e28ebb83c815bec34a489c2bec5b0beed067fe477f4fa93e566
SHA5125d7aff7d1772b211b89002758c74c4f45a813aa103d49a295f292e29d8274d2f6b161c56dae5621606786d8c380934f0cedcc2b2d21f0aafc0be448ee56732c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5950a7e97d2ec39318dd028a63e1e58fe
SHA1cd1d6538f2260b90b456c70d4037b6601fbc89fa
SHA25606a929abc2eb69227c1adda9ff5ad5895e1ec3159d40ed8a718f635eb68558af
SHA512282d0ed8fd72858a09eb41ba527c79e30f164765d432ec75072e5a18f224dae71f97c581a1cced92e9901bc9fff4b9f7714edac54ceb2b27d3d8eabac8ebafb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae795ca666d6335864a4838e91620fba
SHA165f2db5c6731b013b9e99a7791337b01aa9ad5a4
SHA2567cff0186bf3d816d2e083a473e6ef34237b526ab0e5567c8f8a40301e1c51e71
SHA512e639b67ab96b64bfc398afe7797d1320dba4fa7a6e3699e7d3eaea1ef11d0616f037dae595c9fba61e2f2ee99561968fe49b33d514d06077501559376a79bb9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5661f65a69e2097bbfc2aeb97a97e8db0
SHA126d69fa9d97021d015ad8d187428d24b80b6123b
SHA2564722e77416bc67ebbcf20afd21cc36eef8bfa12a4e115a26e3f8e8dcbf40680e
SHA51245286d11c0cf21a0912c309bd0b343b8c99e559b79832506f2d94f8cc6d953ce29b652b17ca1ffedf2ee8d9ed620c23d13913a76361fdd6b205c54a624df32db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d6ad909ed5e6c948ed0ffd3f6762d9a
SHA166c6f83804afd7d4a4a9a6056d8d32fa88d01b0e
SHA256f7cdcb1ed6a0be288f801e2a6ef5c97513cc63c4d7ac75c8065734ef2a0ee31d
SHA51233c6e3dcf1f3dc0f0c1b4b7b103e972d4d09336fa502d0f1f13f3b9ba8e95351e4533212219c822574fbe0bcb32028aa4df780a09d97054923daf99a3e7b3705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548e9a78c404ab1f590bc19740f6ad927
SHA18fc9ef1f38f377d8f994163652d157950176629c
SHA256d7f76d7c38c1fc6c18176d178dd7f2917c4e01eb9e5298117ab752e81da39192
SHA512f6dd2dec006b6e2a2b95c904a21c31427b2bff4577cdba9c8c12b5915e0a1fc6aef85b15a6460ea07cb767204bb97c4188ef4c82fb5fb5c3db659daa9c6e8ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546bad206bd0bfb7f65482ac5c1cd3515
SHA17080161ab98e57ec1857d97ccdc87a5aacbd4114
SHA2561790323a2cda663176f2991be5aaf3636dc7ea7d41219c414fdac96d1b0436f1
SHA5124d915d6b74437968f6f67e9c2ec8ab287ef17450d39c57f652660771cd4e8a86c107f5e813681085c30db5ec8f720733986b9f6f5c16a2dbea09ed4dc1249d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559a29ba68a05aa09161e0bfc27c578cf
SHA13cc7e4b3dee4f5837d9680e43db39af6daf11f31
SHA25654adb6867ce788b1c820bb4a20909ec0dc9f86490241f87bf0caac6ddd324181
SHA51238e437143f58be61be2e2b5d1e555bf28d58308bc96308be249a895cf83ec45086249cff4b73de970e81b350ed91c7703a7877a7dd9f48ee3cbb7f3375c13f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dd9fcb16c79fd3d1d3e33520abdd82a
SHA1a659f53ca35f74f87edc4852f77439aa7d39dd96
SHA256684bacf5a306eed44445ea2af58fc1d9648f28348b5bc396010ab5ea6b3ff0bb
SHA5129dae09f1dd39ae906a48db50858e59dfb1340e049d1a8fcb9a3c17a569370181f3985d3c487a75a27f6a1c818998a32c8fc2909321cb14503f5486f216b4c353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52871caf7ce4b968bd5f9de289164ee24
SHA15f842577562245ede726cd00b8c3d25682d658b9
SHA25650867f71e3660dc6ee14cca7335e854b80a424d43801fb7c31e723abe2417fcb
SHA512f432e9bf5f4b32b0d27cc2f80c2b72d6997cb7a50f07092e2c71ed4bc165b64aa7bf049efa47b65d49383a7ab2edb335da8675d4c5cbc3ae5c04fa6fa5a8a1c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5754eb2e7d5292619744437882c8082ac
SHA1f9391f20062546dffaf92fc9f9d3cb85eb210aa9
SHA256c41aba06ede75afeda79c70a5fb59780f82c7232ff1955f41cf66d9daeb88192
SHA5122906d30ce5a46ce31ed805b894a0fb83d351bc4ca368a25f30d788792026d48d33799d36b63fe4c3b22c5668fe7015d7e3d0993b032dde14236677070cdcac2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d477faf2790b556252eaa600acda7f7a
SHA1fcce31fc6415d7bb207138eace5d57a0679d3223
SHA256fe9e216715e533b4fdf8031946cc2f345be51ecdd694898a1536d1cdcdb4bb2c
SHA5120a4a294f1d89301b48b373d614614c1810e7ebf94908060c017d2e97a8494474f12eb8f00b4709e056781347622fcd75439bb3973749194861aec9c3fd764ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4ceb2a5b9cb6753bc302b86b75fc233
SHA11ae4275630eae425bb6ad0548ef80eb0aa481744
SHA256c2130715e90325f6896c26136860e514508cf55ccec72cea1c9dfe3cfc7710cf
SHA512bc290d747d6f5b38e3b44987013c9958440bf3b029bf93c1bbdf8bc45833773de0d890fe25f927af8a0d1dd50fdc63adb02590b94089f4c07225ac0115abc266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c58ea02cb08004a5c889018c79a6c1b
SHA1f5722b9c85406a8099695fdb6081083244805b45
SHA256857814395b13c9d48823ac2dc409a3f29a9b7d2fec2f45a56b8973467c688619
SHA512521576d0d6459eeafb6b554bad3c0bdb5af499c56cac1d789cb491a4c34b2911da7de387ee138b565bad40218fa3dbb6c09334c7a0c9119ae55a33ac3f15ee9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dad8f1a7b4814671fa33dc4918692778
SHA1f7aeb12e763e7af270de375f5ced356e135942a6
SHA2562f2168a2e1b47421f4a300e35ca50313f04f0d4ce652e901072367ed65ff1a45
SHA5124809bf6e849ccc1838b12a5aeec684c062b67fd1c91958499ef1070235b22b26320e4418b84108a9231d9e3d1f8fc04c749c040b9d85df07eb3bcd7be38365b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b444700b91fd02ea158f82b5bd4225d2
SHA1a4b679ac37045187d56c4a83d27694363f1e0954
SHA2566889fbd114437cfb52cb5bc627aadd6215be7dab816f89af31119b154d246fb9
SHA5121fbd075e115aabbae9a0860b5ba517171748f43e92714df29675e2af11d95f41fe6f2a1a470433503f3bc17aad5b3641fa1114f1172f4f0b55e247c14232f1f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d42af0d6d967e323efa2e0bd702e0713
SHA1bdd14631ff4c0881440d33144ca1df30581bb9dd
SHA256ce4e4c87c1645a5be3b1aeae729fca55f6f3024247bd3f90cafe5bb42c90b1f2
SHA512726503129f2059cbc3c596d5cc5c2e131bf82b8e7922a35ac28d8414d132189b5c86113f31ef5681c4a6f127ebcc21e80a90d91a7f896561a9dbfd7969a58b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dacb54351aad54388f8df4ff3cddda4b
SHA1699387527cd524f873f86db8e1f2beefc6683056
SHA25629402a4b23ba503cb774adb40e2fcc9acc8052d0c992dc93a4bd21cb230c6c44
SHA5121f47768f3d50fb8b72d76fffb788f5a1e841be908f2500a16867024cb868571693f95a33c858e3b3c6ed1c0606fdccdff66577adcaa5f21888b33f7e291a117a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abbcff48beee51e9a975eb89def0c630
SHA1dc6b8966078c0b3815bd7c9a79c1337e428ca263
SHA2567eafe29b27f781554d790c0a8ec7fcdcd04570f30b458b93e5beb366bbe92a5f
SHA512f49d0f74f945debb24d6f1ba08ec43d3c967669783a36b02af1bd50052298bc0291b36e81c00a1b241c19f96b483bdf8df5a8452e4e048e7a1c8958c7f699311
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a