Analysis
-
max time kernel
118s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 08:41
Static task
static1
Behavioral task
behavioral1
Sample
240e0d01de5357f4e03b207909be2534_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
240e0d01de5357f4e03b207909be2534_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
240e0d01de5357f4e03b207909be2534_JaffaCakes118.html
-
Size
138KB
-
MD5
240e0d01de5357f4e03b207909be2534
-
SHA1
1dedc60f2b9e3ce304c2383ab3c31056b8f3f7a6
-
SHA256
7ae86257cda32704c68f059d297e2d7f698f71865f7a47335841fa04ea74fe9c
-
SHA512
ecd74f23eb0362adb9c2f6ff1d18bfe791ba50357179ac2ddfcb3fe968fe8bfecb0336e2f161b6c111bb848eba19b995c42d9900b8c083b3f58c4fdaf534bc1f
-
SSDEEP
3072:SO+BOBOwn6nIGuyfkMY+BES09JXAnyrZalI+YQ:SO+ABOwn6BsMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00204bad23a1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF629021-0D16-11EF-B937-729E5AF85804} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421319550" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000073b4c884b5a9776e9f2ac11482585c40cd271306b44c765f9e54e54df032be5e000000000e80000000020000200000007b7de0536e286d10503285d02443b642b718d9cfff0b665bd30f4ca2e60f3be32000000041ebf84910002ddace63ecd056d5b1d047a374e19b1d12f831884e2eea1f7eb040000000e6b4fe18a629f8d50c884e94712cf6d68f7e715514f14bb3acbba20aa53f4b4645016d111ccbe45d20b7c394f363c964a82ecad120e6cb3aba4ee82423ea63f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1832 1720 iexplore.exe 28 PID 1720 wrote to memory of 1832 1720 iexplore.exe 28 PID 1720 wrote to memory of 1832 1720 iexplore.exe 28 PID 1720 wrote to memory of 1832 1720 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\240e0d01de5357f4e03b207909be2534_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fd0ef7dedc0d907727fb35396aa96bae
SHA148e71160b3e2a268bcc6eb728a082933b5a4c2d5
SHA25699839dc26f62d8e39c61ad624b1f0c112f183cec6cb207a2f903d8873ba08662
SHA51263c1f4ee8f274d443474a606a6d13bbee4ad355fc94fd69ae5eb5ec98f4cf121ded0b3d975b0a7f6fcfb1b0b71776aa09e5371822ca88905f8fced2ef000e516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5113b3c2ac2cdd82c4b80e70b84d38b77
SHA1dec1e449cbaf9c413d845748414daf7daf5382dd
SHA2562a03e85c343668e0c2acfd0fe7aef5b5824c32d8e39bd24c6d5cd51bcb3ff0a7
SHA51237393e9da944ee67708be646c9cee83ea7c66241b343d064369b3f09a47833804865b252b45355da7918799d51ae352d5ee1cec167230e21cf0a61727772956c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD554212aea6019fbfd966b706a1e678d0a
SHA1e65f0e0d483e4521916d01b19a8f9d5fabb2226e
SHA256d8f0177bb13cc49b6ec76cc922c332007433ec361b8ce8ba31543f749ebd05c9
SHA512df2e33bec5620e6cd95cc3344ee1519988f65e19711c7bc3cf0dbafcee6fcb5d18da64ba0ebb6bc3a7930deb4d30673cd6794e20a185029c244d1227a014c835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51f16959eee0cd1a3aa20556e858ecefb
SHA1b6f9b2d2bcfd83529533549c4ad231699d5aff69
SHA256fa0dd3320e7771c2cb9c3aa99cd87412f70073f0c1a7d923453f7a38554aeecb
SHA512c5302568b6786f271c5276b3873e98649255131dfa8bc1ee07b9382eaca5981ed861e82702eb3951441f4395a096f2c327d1a2013c3888cab7f04c176b6e7592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51806fdf593d75bf7ce57e98aa6981d2a
SHA1d03016ed78ac81875efcc3f6efa22e16eae71952
SHA256ef07e7f602fff37dd4305f3a90e10a3dea0e9d6b0afd35082c3e40daf2017969
SHA51286eeb6606045520c52c6315efb7b64499050d04a9b6a8cebc7a4f6b585f1b3fb9beceb62d2dad64c064c1c5cf21b4b017d10304ba31c54675a666495e5c43bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5747f6c27a6720e16c72f7616dcd7c716
SHA16c7899635a4a225812a126b9d444318e09eb53c1
SHA2562cde23238735eafbaccce17577c3002335180e517134d925319e331ace3c114f
SHA5128c2b9e1752ced763b654bc787171243d1a0c221225f938b715efe255127155464ed212b335643173221ee17d9a13b7f814536778ec321797c73e72c7b074fa0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD599b64f9f26f742ae925462b9c9a95629
SHA17cb34a50d73afb475a2c82f66f38dbeee9411e41
SHA25603ef456f5ed57230454d6d8ac687d5a833b6fac505f283d2c5d880789a2b5e0e
SHA5127c317ecc046ca9c9ad63eada7a53a1f5a6b883dc2a113b482eb287a9b27523438408e616d7e2b31cf22844d6752daa2c6bbc269e599ac47c0f4e2e539743ee10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53a12987785f3644a017e94c23e7d88c3
SHA14c036c2984f2efb2b6fb3b77599f6f32a8fbca72
SHA256d583051b999827c3692c6126806bccdf0b8bfc9d836b18992bfd1fa767ecf4cf
SHA51271157facecb82c6f51f77cc626ae0833d90c091eefa33e76909e0d6268b1fd92921917ac2f6e6de82fe6a1dc6d5cfddaf2ae190778aee7c59f56d31db9c7b34a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5382ffa5c58805c347241881f5bef3c1f
SHA1422a762a754b3e96d92878c189875a89af9366dc
SHA25695bdaaedaf20655a5701ce2ed59d47f9a9d8ec65778544132740429544084059
SHA51283b3a4b9ffd06dedd72e7c3c406e88945ff20e1affae68892269cc2780643ed3b4927a7a1c5c959c8c271195a321193b94de23beba09e99ccf55b514351bdcbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD531bda755075f60ad17f723b16c24e4b7
SHA161a18bb2b0153c8176777504d3a0ea894825f166
SHA256328c8f36aee861024ef9234e1509651d2c6912d6176d6664ebcd17bc83a4dce3
SHA512715344912d742f6e07e6d18ab289b64832312854c6dd735b2cf804a0ac292df4917dbaf20ca9b0a7ce61adb8c8cd71ab56fe56396d7e3e3da708970ab7942902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f1860e396da9a372cca814feadf8147c
SHA199d5aa1a1aee4663c35a619bfd4eafe70150144d
SHA25644623be3919ce40c48200a05c3a5b9eb7a594744e310a1b2061b2778c60243e1
SHA512f53961baebfa1aa74a0b1d24067c249c27b0f73298400e0ab3f318dc16a337a65b9c916c930c6ffc1952114be5c64b74167ae65247c38742dbe76f163eafd53c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dc7ff221de76346ea376c325a13c70c1
SHA1d8796aafecad8976d533d6b696a0b5ab9ef4e4cc
SHA256c2e65d456141b98a9ba5246bb682973aa12eb27c4e8a02ca4f0cbdc600a41478
SHA512c8787912148049f3bd47bd0b981d2ef47e210b978e3ca320a8637f3b7e56aef546f0b9d891ad26e94fa99042c487aab455d6ecc4fc1ce1b8d54ca640ec33784f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bf02465243bc5154855104657f6532ce
SHA162f4e8fcb20b674b8273164c937b4477049b6f6a
SHA2566df1cd38dcf0c5ed4c57fa8a91d4bcf7af09fbf24aac29a52f6ec4d86141b2b4
SHA512f3694b50c7337147e32babe607e8ff9a859ebd30a5328db8df1c58ce06025ecd8897cd5f4f623672f0a9cb0078a743a86c3ae788c67f952b39e0ff7407573454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55ae4cf315de433466dea619973e81193
SHA158ba0845b0777a100def4ab8755a614765d42475
SHA256767e7c8b380e35f9eddc497ec133d426d36c27ad771b5ea95da9323e9833b617
SHA512e71d68c8d81fbc4f63e2680c2518e994ececf5e0faaa9f8874ba59c03e8e0892f4ad6a3ea3693f57aae4da42c46789e175008dbd455a3097d968344982720251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ef1a0a966826fdc34f6b231f58cdf4ef
SHA1c04fe250f577419f8d68908dfd62aea24aeb7c13
SHA256c6f50826985631005986b59730eb03390665b7f7155fc5d32f3fad1e506145f2
SHA5122ddded1faf79c02347f3496a19bf9cde5c41126d5da4909820ec6cb13b150394b109ca076f46c938b6737c468971ac8489974cf54f905865a15bdfe8667fea66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56772c4476d68566c660cfdc2943a955c
SHA1e13e3da9f03c21ddfa5e3b307985f87a489bf8f0
SHA256e991e585234c70d7b05272b32e897b61cc663e1cd04284dda93fe321eeefe7bb
SHA512c2b21e72bb4114cb92ab29f78eb52ffdb5d817960e190cbf6e23ab0e9922c15cbcd43901822baa78212376ae7d1798828c4f845894765eae6af3cbd92e95338d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52411fc28b35ae0e7afba34eeeb15f2d0
SHA1a5a650b9dd6c89ba8e04f7eb593672ea15510a8d
SHA2565b66ff72b3d485abcfbf228846cec754cb205cb148bdabb314546158265630e8
SHA512cf7aaae5f8f5b59bb2c0f6fb6646d314dd2942ac99a7619ec6ab15cdd6aad11983f17b9704a0690eab086e5ec6dda4bfc3921faf6492e0dcaffea7858904d1b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c43a93c94646b59dfb409293bd30d415
SHA19c545fc87bb1e19e8b747be726f372aae7de0855
SHA25649c0eb0d95e7683314c3f06c17122b24043defdfe7ae17b40c09ff85c14f66c1
SHA51289f13939c8d69d6ad41f9faf08cb585071fb93c24a3d0dcef8eab29cf8cabf7873d9410f53c3e0716ea1bb49e7739f17516cf6627b65acab46a4199fe645520a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57df2e94560bbd6ab351bcf2b332af3e1
SHA1eb3f6471196142ad24bb80348c6ca5fe468b2bfa
SHA256cb580dc858a6567a5dd090aed10702ff60464e1a3a7ef7fd002796c6b8781dc1
SHA5121a88e2c57029b6224fca59737a475590662dac1b2e584567799170779c87b3cad0aabf5d7807628ed442f8dbb95c96663546ed2426d9373813681db05cbdb4cb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a