Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 03:03
Static task
static1
Behavioral task
behavioral1
Sample
27fbe7895e222918b3399ceeaacda974_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
27fbe7895e222918b3399ceeaacda974_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
27fbe7895e222918b3399ceeaacda974_JaffaCakes118.html
-
Size
1KB
-
MD5
27fbe7895e222918b3399ceeaacda974
-
SHA1
e26411ed8de144dad4dd00efb457f55e2ae63dc7
-
SHA256
9b2e1176964615e355e1c842b5802447be7ae5e479c19dffa3de51b1fb49c04b
-
SHA512
0c71fc0aa6698720b4f3b368e5ff3710175f022de87d84f016d5100c1a3d850662e1b95791133c95bb51ac56352c054af1bfe2c767c5f672c75bd33aa6cddee4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000006da11890ffc43c91a3206a25ca217da642f613757a9a98728e86d2e2063fcc28000000000e8000000002000020000000d44588f65e022e51323166185f2c143f0ba19393eca429e0c222702beea9b3fe20000000295f50682f9b16d741452350eb5889a411410d481e3560625073fd1a1d8a48e1400000000350f147c886adbe30e354ae518c632a749204d5bc2040d78b80aac76aa7e1b7d8feb94491b1e505ca7ae3aa24404d3647605e8e63bf7853ce70fed95da52f0a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 702cb57cbda1da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A76DC1C1-0DB0-11EF-BF06-56D57A935C49} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421385653" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1972 1728 iexplore.exe 28 PID 1728 wrote to memory of 1972 1728 iexplore.exe 28 PID 1728 wrote to memory of 1972 1728 iexplore.exe 28 PID 1728 wrote to memory of 1972 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27fbe7895e222918b3399ceeaacda974_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50a010b9c744e75235bcc341833016832
SHA11969836a61649139c00bf058301f8c9210932cff
SHA25674f24d5c21c9609ffa6be6e386d2d02a759d3a1b8cc19f2b0131d4d44c15925c
SHA5127d6ef90e50e07043ca9decda32f8eab84b09150f42be008db41fd71b67bfd81d1e880c8b34486738eb708bdc0b6aee2c0c641952aeb79a69839d819de833f9cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cd395d45821293fa261d704810185a0b
SHA1dc4c9573fba330911a272bd36a8dc9a30f53b6ed
SHA256a51cc16dceb57cdd1cb46d29f4b5b75c5f190360263595f87f686c1aac2f481a
SHA512cca92803a32d26f984de1af634adecfda5f2fc083cad72c563509c70bb3a68b123d19786d3f3c96411d98a2ae4a3824d8e3e025b3a2b1c98f8857231cd91b776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5614cd75a6cb54c759d66018e0266a0a7
SHA170f96cdfbebcb1feff1d858caccae4961d3f2d93
SHA2564c5ff2182c066fa720323c9fac48a6c7fce9f211a17ea40ca4d7d774fc758fa0
SHA512706060df742b0c14768e13c1fe4eccdecf81c472f4462d50cd410ef57717552b31dba432c5e911d04829698bf386456abf1ffc65aae6be0d568a11db783f628a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bea6b043b0452e55b3680156064b0dd5
SHA10ee1540e2add7fcae2198e0df7763ad2901bd0c5
SHA256556c1a251c67bcdd90cbcbb562fa4571180fd5bd2249bd2f985311beeb4e06fc
SHA51258da2bf3866410d2578fc923600df8a00b20f2cfcdd917d7244f2bc02510792fd91289762e1a90e1367b19a96eabffd07bc511a747835e2bc1c73d6e110343c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52552de4f7475262e9a30140cc8d6bac0
SHA122893189d26d5852a4bbe632335d9b01f5a855b8
SHA2568880018e5381fd56e92b5e74cc2888272157444f5c0cb90b89daf6647ce581f1
SHA512515815d6ab6844326a61906c50718768c4b7b735b20089c6c911289fae19eb507728ee5c83d4f73d29dc56bc958711bac12774e61073cd4dc85ad6a10fb9ee6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5793cd0af18dcdc1b58be3ac39fd5f93e
SHA110f8f55c5e3619346dc78253954538e2c65c9dcc
SHA256c269b3c96e902187bc7975c5325552f4c9c4ed6576d7a302b65ac9e5b19a2d37
SHA5123835fb86d011aed06f8f78ea1145f7f2b31bf7c74c3e80437a2ebee53ca5487ea5450050e0830aed4b7fcc9513db19e5ba8680a5828d9e107d2520a7f2983361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b62092b1957d0acfcf2aa186f3364dd
SHA11240530b2653ea9e04f7785c75cd185628433a00
SHA2567ae61c9bded84a541b0d61b3859df8a2f4fa1fb92f05de09d3b10f3a6e6cf39d
SHA512eca2728741362a186fa5345b64d6d5d55c6b4d7d0c9fc2c2a6eb9c24a83313900122cb1ec201f7c2b388736fee2ebdad33df9df91ba5c48a14b5afb14de7dfa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56bb3343c3630d742d1368b039edd77d6
SHA1b130231edc924d8f69aa257da19b91c72c6c8c9f
SHA2565b8b8a329461cf6dbc2ee554817fef8e456480be7659e71bee0a521664a1e31f
SHA5129352bb86dc177b065e643ea13aac602371fa48f60f384263c9ea13a3f1dac52689dc48e826616522503f3da802e0b8959b23b54f582e43f8758a28add4d3e3e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5248da06aa05391466237e982b79908f5
SHA1ce087ad5bfbdc0d05b2d703153f9c1a5fb84d665
SHA256edca4cf3b6442d4f3f7b18f56a1881dc77f948474c59cda51ab4d7403725d4cc
SHA512d9d5406c2ef2212ba532a2841ea88f0e81f8000b9ca130688e20e43af37de4a62677bcd7f433620680794f8ae29f7226f90124362ab103c45ec2a61c51542b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5573d496dd6f303f4937d317d1de01089
SHA141f3199ec204bc5f97cad47b2fff6ad155943cfc
SHA2564b4c5cbaed751f1f0a3566be4509a3a2af20bbd3196ca754289d43e5a42f491d
SHA512000a2c46e6acfe7c7d3153a5d9df5c345f670bf77bbad0c2728236d4995e0f04aa93b23cadc94a8b2fa8db1e6572a448489a0b42b2468050f9b02a1da49599e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f905c8eaacfa08f043a9e47eedb1f632
SHA1f92d4df8f7745b43c96f869a51b81dfc95b62566
SHA256b821f990d13c2bbacf7fa806380dcb3899182433f4aecace5a64b1b231c09f49
SHA512254dcb1c6ba22488ec4c7abac74eb9014e01f74470ab7a8e599c01464d2a228c70e4642dd29a06ff7f58442ef67e92e39405452fe961cf044e39cefce7b4f9b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52cf4b3f41f8747ebb33a717ff18d9909
SHA18d23712c9f8ebcf55971f8a5436f51b1544ddfa0
SHA2568b7e3246d42a9c07690104ddd2cb8d6839c81480f836f3aaba5aadba97102931
SHA51207e284d6c439a5f49a10a838559ad1d45a9f6f11f99e6de2c768aa968da8b995a48b6126ad52653e769192c8ee0fad67d78fa86962f7fba02fe07ae4e90de0c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5329873f84a50a9c0a4eedeb595391fd0
SHA14f33ffdf0b641943b9024a9264225ebf3c2a9ea4
SHA256995546414e135deeade1e82d66d122270c551b9c25837c00e61a7d635590d359
SHA51258d763cee60d6f79514e7574c42136751f77664de7a3f58cc8707477c19d79c136dd6697a89c1dbab623c458f04925bf432c7954c54641aeb6a3145866821a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf3a2fdbd31eb0c2178a954c31ca2c28
SHA103c3a70dee9996272cfc6f6ffa105671eb455f62
SHA25677fc0cebd62388d9e64e86ef79129230169a069feee3ea80d659c1eabbdb17a1
SHA512549aba41b7d25a5f72d3eabed6b2a7dc72ecda0f844be64913884736714573c0cbb40e9f90fea1680ea5ac672814747c5fc1c3a72e15a5f3a690cbd6bbfc3ba2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a