Analysis
-
max time kernel
136s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
289259650def4bdf11549eec55e42772_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
289259650def4bdf11549eec55e42772_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
289259650def4bdf11549eec55e42772_JaffaCakes118.html
-
Size
36KB
-
MD5
289259650def4bdf11549eec55e42772
-
SHA1
aa0014b3ee6a037480e695d76124e48aa468fd6f
-
SHA256
1ba936c270aff3384b2763d6878c387c59f3d64b16d1f6b43dad0f378ddede46
-
SHA512
17d700ffc698bc940ee528a14ab1f49b4ec2215a79d2f90ca9e6e1bc1f5f2f6c7a193693d947c2111f8caf62f0c564c2b490456ec8dec7248c5c2ed0757ad1e3
-
SSDEEP
768:zwx/MDTHYC88hARVZPXkE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TdwE6DJtxo6qLRT:Q/3bJxNVGuxS6/W8bK
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807332fad4a1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24C32DB1-0DC8-11EF-AB07-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000002e643ac3a6f4989ae47ae30817fa5da6b6af79fd4744b9beccc6f91684e21536000000000e800000000200002000000013f6dd211ec994f2adc42d417fcbaa801921f7e528c46a1994719826e64ee78d20000000f4d1857d0fd6152d110c29b0c7393f68343f9717d35f7b6e8a554312875889ce400000004a17321306b9a37b218f3002521df0bd99c040733e60f2ece781abb9269cd0abb5a7b07f5494a94fef9169bbf930cb2e0c666f5f7e65527ef55da2b4ea2c08be iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421395741" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2292 2528 iexplore.exe 28 PID 2528 wrote to memory of 2292 2528 iexplore.exe 28 PID 2528 wrote to memory of 2292 2528 iexplore.exe 28 PID 2528 wrote to memory of 2292 2528 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\289259650def4bdf11549eec55e42772_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5980db886f2cbf3110b71813f1c55cca9
SHA1a574aa7b6f0ae88191d135161b0329202957aba3
SHA256ca3b546e0b8ceb8c92416dc5081dbe1f5ea28c80fc867078c966c981138b7cf6
SHA51252a238e4ae4351b9a8074032a909fdf7b86da856f6fb430eec3fa58b6745a83a57d9a3e1c91f718ea102c131fb34230ebcb9ae8e32d86f84e75168975329abca
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD552adcfa5f257102bc3a168411c928c15
SHA1d86356ca44ed77829232b17bc2ee818be2e0d855
SHA2562ae287cf57dbc9dda643d133fbc68e6a701cbf308468e8095488c57dcc8d3d88
SHA51231cb08084b68b0480f0dc30935f04c9d21eefeafc63040bbc2b06045a67f6d45bc5fc92947dada0636594459a5685127338142f476d1e8c0cec01fa9042cda93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a9c51358d9ac4f73832de04174e5e7c
SHA1590da6f475728ec113784b8b4f91b531e83a86df
SHA256e24b287062a7e56cbc6bfb5a236c7325a53f02479ec34e3971d9afef9cfd8dd5
SHA51298daf776dc11677839688c5a5f8f7c2a57ffcf37fdd02165ec8fa16b60ace16be453995908560dd25eedaceb5a261a17d982e8d435e1786e472f8f0b8fb5aaa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0b98d3473c86412dcf11b6c8f81294c
SHA1f6c60072d4c0dc5d1642dfbb90c889dd93a92d73
SHA2560819e4b45f833b6fcfd502ee69fb94fdbe862bb860a007399323496a93f4a336
SHA512f5f0b28d49cd9a4caa4cc5ceb7017a2cd840ff987a84eec5fd21cddc9cd192ec6ee2ae578f8c0ce0ad20fcd2ece3df8a3fed11c4dcc6936bebd2afd08098d4c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501058dfc5b6c58b5152a34b162464572
SHA1d2f2158e687642e30b53f325edfa22d9e0faaf3a
SHA256937334cc84b627df39b0bc139801e8a132ebb6b58f4fce264550bc6c3789e1a1
SHA51260242200abd3207c61a5cd06f92637e58b752862dbe94c264cfec935db2954b79860eceef268fb959c1c4427f7c8407a294952345e279b10f9d5cf600ce4e63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff38ddbd64f59846284a623521d2ebed
SHA163d1b4316118e0dc235718a34eeac2a5c9d9ac20
SHA2563249ba4470e4555e77091ee793fb5de8c95756da48af5d5749833b1569337e60
SHA5120ec757e79e87c4b1debe0757d82dc9f253afbd0b080e1302857a48aef26e1c8899dfc3e5861ea29ea65951396e671403bd6367274a338bdfdc4ef0d0e7f7f7bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5023156b4b1ccbdffc6ac00b3350ac5be
SHA19596b6f0cfac171cfb163bfd8c03ab68c9166cc4
SHA256fc61cdfa2d670cfe6c847e1a502eb638c4063212c42744a9e8c280d4a5080942
SHA51264c4fe0d0380d1bdfab6f3c83a65c8562d854a8c5b6a5bcd7e882fa3c32c2c328487931ef04d13d72b8de9c8089fe928c032b2af74a95413585a55cc4b2f9b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508682da5efff866ab9f0077fee310549
SHA14cb8248d4035d6a14dcfeed102683525b9ea293c
SHA2564b93ccda198ea23fcd47270c5d812d67a207b4f04e91a38e1b371a3ac931bcdf
SHA512967cb31942835895afcd0940f633174d1d4b09767a86817a8031b73e32fa767fa187557701fbd10b4b33d6b28bd2e86928b9a77df1b253c2bd08bec3ba855821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b85e316f58a907f09c5e3eccd019713
SHA1d5e1abb71e826817ad672e4e44c7ef25deb39286
SHA256a3a6e5f9bcc720fd36419d4cda2a31e9b73eba22051fc914b19350d9c58e388f
SHA5121d55a6046d729578b00cfc66a41caecf98325a6d39a79e5cc79c5fb0ccc18d7a9feddfcc9a95f39485c5a8111ad3cb072b3eb3387d327816971ba1aa6d7b1e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562d56447efc946bfdf229f17b3469b29
SHA1bf730e33f93a9c07dba9fbcf8b6b0e6a5b9f3f53
SHA256e65d4770204b1209458d241ff1377df45e21988d4ab89fb711f3096dea410688
SHA5122b7299f456fc4ce8c333356e7db7fda237cd8a9d0c50b47d2ec0daff25d2dc4421104fbcba0714d4a78359c4111159833c98ca76312bf6a2244288cb2de72f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5822c7591b688771027f47095b7ae049e
SHA14414bef4d7fc54ce87348975018c757fd90c04d9
SHA256994d9132f47cc2df8eca4d06eb0d458d3cdb60c591af311192616c63fbc68d9a
SHA5121255cbd3ad9bfe7394c4fef300ec8023d6834e0e25352543d1ebf57db8b9a10e1fe7112f7868a7670aa0e07df7faf59ed87c5e59e1e84e13eb46a49814af25d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD540edaf307b3e39f26e11392e34cdf10c
SHA1bb791970db6d12de386f43bf487b1a94de7388b1
SHA256ae52e21faf87c94aeff83b7f50138303e5c901023ef0599252916cf49915f1ba
SHA512628f3c20c945ec333eea274363d9a4538807bb362622f18520fba633e6421eae6912542f5b48c66047f9048662bfff2e2afedc1e4cbe6eefe7ed398d70e692b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b4f5ea909eced0612fd1954196deb4fc
SHA15457a68291f481366b9ffddb656bab3bba46673e
SHA256c5850ba2a3c88c191ec5bafce01e6a74732a8e96bc3afc4e2c14d67718e0eee7
SHA51218e8f3b52f20663e86cb259552cee4dd18830a294007a7bd8006d8ca880f8d01573ee35561e09b520b24edc27c82f0f86722e8302f0e68ac1644105643d63829
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a