Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 06:07
Static task
static1
Behavioral task
behavioral1
Sample
2389abf316c34edbba0e319e18e019b3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2389abf316c34edbba0e319e18e019b3_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2389abf316c34edbba0e319e18e019b3_JaffaCakes118.html
-
Size
67KB
-
MD5
2389abf316c34edbba0e319e18e019b3
-
SHA1
14c1d585b02dab07075828ee1f0b9dea87e541cc
-
SHA256
aecef19dc09bd875664b7f27bfd81a0a0aa40813b85b9890ffb094ffefb003d9
-
SHA512
f74bbb2a910437b1992008716c9c6aa8791fa9d60c2aefa3ff341ead7eca8ebf30e458d3e6e680da6381da213c7184aa0ce013ded35bdfaae8b03d8ed3c5c0a3
-
SSDEEP
768:Ji1gcMsSZ8tN99OIsF/zNoTySqQCZkoTnMdtbBnfBgN8/oygcR/QFVG8c//IjkKy:JJWcqTYPec0tbrga6cuNnzIjv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421310324" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44430CE1-0D01-11EF-8745-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2087c8180ea1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000058b46a05e95290f1487702786e989267668f56f322adaa0a45e4741e5018d4d5000000000e800000000200002000000087a6429537782ef2ccd3a424f4be457fb82011670e1013eeeed2d55798ef633e20000000daef3b4d28dbab6ae27b8b187cb9f131c86e99de3abbadae0a2c2d4ab4aa0ca14000000003ea81a41f7a0ba817141a0389059eff3a2a856a3c82f8b7e51117f9747c21c62b6e081cfcc4a0be40fceb514364cc9ba2f13909038f0b580d8a33c9949a1174 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2216 2156 iexplore.exe 28 PID 2156 wrote to memory of 2216 2156 iexplore.exe 28 PID 2156 wrote to memory of 2216 2156 iexplore.exe 28 PID 2156 wrote to memory of 2216 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2389abf316c34edbba0e319e18e019b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503c9ae936221c56d03f915d49fcc248d
SHA119daa587ec41873b19bf096b6e1fdbb0d9c35cf1
SHA256155d9b94ab4b95548d65b26655b52f20b7fde8b3627f3924521d4672eb061d59
SHA51289770c7e78b27a16fb1629fd42d92e82358813e57275b12a1b403f555b04f4cb41925d834fff5bd22b8fcb3fd459a810d2941b6adc4c1b211724c6f193fe8c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573637f6e2a9cee92d4de5e44661d0d30
SHA1bf60280b6a1682685b0993ed6fde09ccc8a3307e
SHA2560304dc718b3baf45181bb82abfc5818555de17295da1fb0d88546d217f187d54
SHA512dc2fca87d4ac5483e66abeee5febbb16990741dd101d851bdd8f61ecb445d43b9c57b5b9853f3e0e1bd7cfbe38934aeba43460f43ee966d26244ef528f0fc6ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5662e24ab0803d1896c7f7bed4b816c0d
SHA18a06cb702ce3469ccabc02e193763569acf87c32
SHA256579efac42fd6b2f0b7ad78855fca1845d5acd490c898bde97fad0e74a4eac864
SHA512d52e41c675c000ffa028c6c4c413c55c797b681b14d249652f10077939a80c6057e51e65d92053e8ce29d3a053a14d386150cbfdcb54bbe8a28c837109f2540d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8f8c476ab9a27d2f36b7f3d51d3286d
SHA1861d363d0940931cbf1420de86b48c272af382c1
SHA256d26179e9304dc90b3ab9bb21893f314168f137cedd6606dbb875867b194e19fc
SHA51256e3274bf51ca93ef244c45447844a9512385afa2f3cc12a3dde2f4c21a65fd68687bf0516508006f42c7115e4f81faedd332cc5a4da677fb522089bf4c00f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e7f43525bc79e6aed975c23521ae7a7
SHA16b1d4f6da46a48796be443a6c055c3e99345214e
SHA256b434e14ea2ec7ec5d60e22d81d4d46356cef539aeb1c6e3a7003a994ff5d0fdb
SHA512ca4042c790ac690f83a8a82a45f0ad8f7b32468a5042e823b122bd115fc84f74fe49246fac39a6d82211023d927a787306791c0b50d0e52884e95207e9760309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52262aebe71036933ffac7321cbada27a
SHA17490b54bfa1bf2471de5a3237a6a45bfd04e7662
SHA256944dc392cdc9f518d5a7318d4e9e048a690dc1fe56f8421ffa999502859f6b29
SHA5129c0e47513f76cb0b99a9e3a860fe103c49e3289027a3e5a3922f7e805158c860ef263a3fa5d13b92c0f021be7c4f2b3faacd40561c1c78598ae0a1f4af56cb63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c4ef9111a77f4b901a1a30fc3e077f1
SHA117cb644365bf5ff7aeb3929c5a0d4416ea2304fc
SHA2567f0d8058efc40dd16c24f75b92936fbe384c5df23c47d81f86bb9a132823754d
SHA5121d736e0e98765b52e7e9d753aa0fd3b176edf662c2777fb42c072baeaa4dbcd83d8e2953f1a6b2f66a6389e327e80320be6f441c0bc1f59e76746aec1e1758c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543cda6ebcb2a1c481ff1b303660d11e0
SHA108ee10cd217590f2da019e0908160b88e07279d3
SHA2566dfc920d1f2da69cec0b9d5630425a1a8c0e7b20f9db52f6084f31274ceb3477
SHA512755f8268898b1d2d84d058a23952e3c656552cd67cea606c00b4eef59be811d44b00376a80ae5b6fcbbf2ea851a1aa5408abdfd2e6ee4133fd000217607ff53e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58551ec013e91164613e8a4ce9f547f12
SHA18f3702407d125ba1e61df81640d6e08c23082e04
SHA256fe4d64aa627cf28136ed5c2273e6b1e595a9ac3ee19c5e90954bc9e85119807e
SHA5121acd3c533bbe45107c372a18d1709fe74684852615d5a4166d8ebb068a3dfbe47d9f9af6b06d0afe4c0990be32b2036859939afece91d9da22bdedfecc5ff115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c01a5270abbe6f17542f8e54a6aeb8c6
SHA1834a3dcfb2723474a60dee9d97b3d62a2d588397
SHA256526c71491b04badb30565ece3280085fcab45bb54e1333926a7569b9c36fde45
SHA512d1c4700d920ec08e3c015c76c00d20331cf2b6086effea0a2b10f3e3282568e7c2bfbbe4582f23b7a8ad8aa8efe8309b3bcd26f1b29ea88bbe1b72a32aa83831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa64d7804556d56a3e3f939b581ff9bc
SHA1d0038fb739e0b893a23f965fc5aa3a2a086374a6
SHA2565960b5ed701afc115b7e05ede7f51f25d06f47883f4d4e0dedd9004202f286a2
SHA5126411eb5674e39b90e98dd4b63b33da87a9c7362cd5b18acf80b8ff7058f97296a496d51d5b8c62215353a57cc2359e7ada43395f014aee14a2b0fa9903c13946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0958b516a3fead32ac25b906fa5f031
SHA140d57e01fa951ca1d173b3d814eb3b5b121523f3
SHA256bd28febed694a9dc32af1ffdd6fabd11fbaf4203b1adfca92863adc6bcd03d04
SHA512a1776628ca091a640259e4cd4bfc1c8f721e4dfcf712d30e934aa8b53ee7e8069aea5ff5d5c8bf3c64ed8df2b0e162cef3650996529d2a03a56eb9ada5119941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54abf8a93150e93137fb017b1c6cdafaa
SHA1009a2b1e62232f3f0188b950eb069cbc9e5218e3
SHA256793b060f6cd54cb96255338a4c382c6940bbb93bf77f036dfca0da2bd03aa900
SHA512dfb1c219cef68c0483b2b1777ffbe801eb29cd5a2806acce46eba4a19ebd11cff5800e10ed868e349a70bce451f67e9c4cac1af663b7168c212f90cd12615c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e27686ffc468c02c844185e93c02125f
SHA1217fbd7f94013202b391d7376024ac21a74c8055
SHA256ccd107703821539df448ab1c703972620d980d95c2e762f5687cbacbdfb6c8b1
SHA5128e486e43c957fbfc3cf35d2dcc0bc4d0dc677adabd1194f59859291b05dfe7e957230814ee5478aaabb41611857c622f21094035ea8383887a0a71b36db01ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519aec658a5a0d0db68c7d8f17c8f01a7
SHA11abf11d9fa70549ffdc70d2e85f23ed5160f7525
SHA256b6630a37bd45a9af71da81d879701e77752d039b9341766d6a4abfcbc68ecc33
SHA512ffe98e04ddd4d06ed126a5249c0bbeb3145ab7a4ea62d9faafa82754e6692ef5ed89c0118722cb84d69b5b91e76aacbe2a8d2c6225578da2107a0ac82e7e0ee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ff087300360e694442e163b39d002a9
SHA1709644aaac38de8b20f92fac227de245ed23d0f9
SHA256fc78e86aaa63e0eaf3b684d5149a2454a20dd26989d75ca90ef7e023883686c7
SHA512a9776d1e559a33d1bf5a3b0dfaf12e7971c45c386ebf56f607fd937f13d74f95da168976e0a60f9764cf6389128149bae89c9b901fea1f238e0b6a64638d1b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ef3d0f22fc2f206f27b7543249c6c3a
SHA1e1f05d6cc03306cb05e87db4905234265b497530
SHA256b51e16511fb846275118a094daf4bd4ac003954c6596294a5bedf8f71bddd295
SHA512e47931f36085f72010090137840d7abfe26c626af6b07ca71ab7b36b8e6c447e90c1a55c376bd86fcb3d1dea4086d2af2744b4e059e7efae48f9de1d97489ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5187a33a7ca484d429fd7a8c09c863467
SHA1148790e273e56958880dc6a4e31bbf82d4ad86af
SHA25686be8f5b53721cf7611ebd9442fab7a108b473beafd5a956160cc02eac34caec
SHA5124800629be59b1668b119f38e8eeb6fd6d25e06891ba502f61234f3885261594d6fb7cdf6463588b09b075b0078bfc3fae014a85721825d71a7ed0017bb618c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c2db5ad8c3eb3a18e77f71f39c26f63
SHA16060df7b54fad9bc172a55e2061470464cefaf54
SHA25600694b67b588fcde803638d3673706851206873b579fd761bd95a0d12a4ff08c
SHA5123bb33fbd0012235229b412b2058625017d7ba09d0ae98f859c0506ed414e3ad274a0cbc2f89e11ecc6374f12cdeadb763c27638c22b62b72710feff397c0061a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a