Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 17:16
Static task
static1
Behavioral task
behavioral1
Sample
2b061c0b5c91cbc231229986f27dc542_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2b061c0b5c91cbc231229986f27dc542_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2b061c0b5c91cbc231229986f27dc542_JaffaCakes118.html
-
Size
34KB
-
MD5
2b061c0b5c91cbc231229986f27dc542
-
SHA1
000a4095752f20be4c2f75fa8c8a3ad9b791fd56
-
SHA256
0c94f9cb4ed77e82e547767d48f3b1b08baccb6e4dcccefec1b46d969f24d839
-
SHA512
af73ddd4a66e3edb45e6a9d948c20689ade44fcd2e80a07ad1aa2683fa3473c1842fdb13fe1007c40bba8c8c07c377b9526959ba6c94857fc78a6f8b4a45f79a
-
SSDEEP
768:zSFQW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34aci6781DdRA4vEOjq6h8aRlRV:GFQW81D4RA+vEOjz6raAhIarC81DdRAY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE093711-0E27-11EF-8C92-6A2211F10352} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421436853" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000326e75dc83f4b861c48d174e9f3c8445ae025657998d24385ea52fa9d98b1ba9000000000e80000000020000200000000b536f0575435d1f160625f73bbc07837dd4d2b5cdc98c43c3e686fafc19798320000000a165aff967252b440da977cfed9258bf423bd932ddaf48a1928ab9282c15da41400000008924981addc7ff41a22d3b9131057289a59bfab3d9cd0dd603830828a1560df93819d4b52404b1a1a1d667ea0429fbc95169df5f2bb6948f58d4e25e4d2a1dd4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a022e4b434a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1368 iexplore.exe 1368 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1368 wrote to memory of 3040 1368 iexplore.exe 28 PID 1368 wrote to memory of 3040 1368 iexplore.exe 28 PID 1368 wrote to memory of 3040 1368 iexplore.exe 28 PID 1368 wrote to memory of 3040 1368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b061c0b5c91cbc231229986f27dc542_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3bc685fce377abcd596f66c42903f37
SHA1f3189be5861bf232ded36adcc257c22b8cb43da1
SHA25612a8cd37906519c5502d10289566b5cf2adfb3f8b813aa6a464846d58efdd578
SHA512c3aa039342dd0de757fae9456e199481b707e3c66f3e331f0b834991da0535fed6052af99155230c84bab42ebe1f65af433451cb96fa4c526cfdbcfc777e12df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544f38da59ef8581be35dfa970624b8a3
SHA1684d1db1e26aaf48d565d27b2f69c6ec5a69b07b
SHA256aa370a35d837818cc537c98f8b96763b69dca50f78248f5456914b51a3a5df4d
SHA512678ee47a610e0e1d561f404d5c9ad7f36b477a9f766b726e6ea39b0253b7969267bc0c98f3d4c6e3e7dc0de36d8c410208500f846eaa8608dfba51f117d605cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c99ebfbc48aa7685d2f27fae394f87a
SHA1532cea8ee9fdde48abfc5b2b62c209da97011ccf
SHA2569ae72b6b7cba890f207fee9d753e87d8ade2a165cfe52cc9d59bf8cc333a290a
SHA51245fc3bb399dadf3c6d657b98bdf0f7317fdc8d61d35d188a26c86cd24945c835fc525c6dac754b89a7260acf45fc4fb500283a532f8fb7ffb7222fe963131c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510c9ad81d6cbb88ef47f131bf8a76efa
SHA1570ca67a539f5cdfbf402f988c668fdfe2249ff4
SHA2561d8bfa2f24de9983f9d927ff6d5b16a24f61e291afbff9742eb1f31daa2cbe42
SHA51272b52fd1bcf4bbe45f455600dae0a7502c66871060bff5517de6d922f6fac15586abb6dab7eda0b436f082c9a29061eb4d02d9fca226888eb12b299c940c29d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d8491a3cf2a2162aa93260dd3a7137e
SHA1ad90aa899b889e0b4be23c57167d253a2ed16f47
SHA256e2b42ba399324973dcb48f55916097af9b2c205d429956e26468438bd34e026a
SHA512a3a411fbd084995656db1c0843ea117bca81274cc156cbb2235e3221f48e2ee51f41cadb8a50f7c16665e3c4501fe66e1a1ad400b8fe6ff91a8fe60008807c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6f7172893561a5699886a50bc0b3ecc
SHA150a0dd67330d66e8bc6d759d1580f757835b384b
SHA256b57f898b668997001c5207eb36f29da137b6ec11cc43191e5475b8d9bd2d73d0
SHA51288be8c34e081c63da5329242cad55445f9f13a7a419bedc42424cf5b70e0650b7873fe9d4c37dbd547e29ff360d60776cdaa415e0a57e76e4ea3f23455c1d3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a2128329188d20d9b5eea999ff025a5
SHA15c19101ea2ba26381ca09b7e2b308e13dd9de8c6
SHA2569546002513854e66fbcd988522b42e1240fc8f90455bdd9b7f21773e615db99f
SHA512f53b8ce30dc841976c15c6dd915162bcdcc0f1afc75b072eff1b6db305cfc76a3fa99eb4e6b1e5d2edc8a8b36d7c0b2535d9e533dc26feab08a4ae968a5c3e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfc91403e6a8a110f7f9f07e58a4be77
SHA1d65e94e3d79c6fd3e31cdabf3d0eab53a796aa55
SHA256009652f8dcb547c290f500c256c2ffc4853370aa694142a49236e00fef0d9f82
SHA5123228bc4107090b06ae3c02cf2a20c5633110462b48497fa6ecbbb466c6cc98a4add8a05d4244edfb596c42a4fe252a7fd10a6b6ef5333b4c4c60f5521e293b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59616d100186f8ea8ba6d134cd6ca05fc
SHA167c40958efb5e6ebffb2375d06894052fdd721a7
SHA25695c92f2536d61a27f082419ad0695fa144b19a0495f2edd978040dec83c45d38
SHA5125e38820ce4521c7198349f64e1268319e452a51340ce19fe4fe5ecff8357017a873507a41eb43e158f1121c32a25b57c7a7aec627f2ef5e3d73f857a02033f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f7c5a194fbc5983609c943d819fbdfb
SHA17bf86c2a8caeb5515f58f8e065d4d2da36fdc66a
SHA2563478f60480557dcb6eb1100b7715f29a4805111a6317524d233e1006423fcf13
SHA5127ae9b280fe9a4c7cfbca12494f97ff30844db6afcbd7dc5093ffac7125dc236c7129554cc16acf1f09796a60e2d25deebc1e74951a5b594672b996740d07fcce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54140688c18e4d43e99b44a8a95f0e04a
SHA1e7560f8a60f7b4095f21eac70f0c4910a94a4ade
SHA256c7c659e7f5f8c83e530e60db199dfd8803fc6a9a6f989ec1ab04470d229401d8
SHA512047c401fc1a41b3b270fe41716d058a2135060608c5e17a14c1fce1a95f4a4d6b95b20cc58a2e15615ae313186cf082caa8cf607caf5fbba59ba1a8927d111af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552e2cd5ccb710738499f239011beccc8
SHA166db8c10d420ac55a95916b208a368b480a5fba3
SHA2562a1e5e0e58ab73f97309a442cf14820e8a8a194511859dc0d9056629fa971204
SHA5127389b1314922c30f9da1ad9074f1fda8fcf7a3aa79e9cbe9be1427a77fe8d992d46bd613f153c472270077d7d1da9a05db70304441c5f326ac44c9452447a7b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ad62fb5bbabe5f0f45c43962ace4fd2
SHA199980fa516bbacdf88828128fc3866826692174a
SHA256a33328186877d8c9bbdd914d557bf91c2ae7d077cb9cc2b0b90fca90065c7cea
SHA5120d0c4bdd0c20cdb861874d6e44c5b6406cbed7301a82ef1fb67925df4dcb42867d5bd2057e9a87b36d4ddd76fe01312eeec2a3794c55da2c7f1409a6ddeff4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9449d1ab559f55dff102ce30b81032a
SHA1ae6a42d2a636a7a9f1af2b5f269ad9b6e6db5e11
SHA25644a13f95c1e4810e5a822a97c1cb23bb8ebd873a730abfcbe5aa3ff9d9b5bd5b
SHA5124f5acaf6d359f04d0d2a07949442f7368ca14d2af2376450a8d7da56af3f7fa9872440ad4515a1ab88620f05d8dd1430f23845f391c5b6ef37d51b70d3fc708c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c5964bacf218bd84dc4f3fb40686e58
SHA1bfb768bc867c7963be987fac6b7d6d80700f9c11
SHA256dd36ce45cfb5b0ff48dcee7cbe44f6905b8cb96f9f7f9959fa15390eb1d09dd7
SHA51295180db7d9186a5240735704c51850f3fc7c0cf0bc8f2559e0b73066b02b226cc71a426c7448d4118fccf66157a5b98f7fd2c315158a61d8d93a5f6b6d5a108b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56acd6373bf1729373c9c55ffdd701288
SHA17ef2da0b99328a86a9cbe0822c68b146efa81199
SHA2566151e76539721b8a30f3ed7517d0162bee868d9ff77bb906c7f9e5ef30716230
SHA512fbf31df9befd716ac85639bdcdcf74ec06eed5fee3123e970a4cc89d8e777eaeeba2a1966a34786f1fcfa15edadc819747ada796194344042683bcb147581abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504623399c55f9ef1ec781737c9e910a8
SHA1d1a8462db2e90bb7ff6f09595e068f301c2cf86f
SHA256a24b8007aecfdf3a7fa2e3fc0437268ca6cfb4a0b37f8bfd68cfc9ddcd737cf7
SHA5122015982cfbca878c6716b6f50f3331fcf3edfc24210a7ea5839dc1f2df0b8631420758d696afd89f4a8fb589419192c0506762a64145a12d5df0acce55866fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50798780ca173232078d1b18f02784d39
SHA1b9fe6ef995db957ca3a05c77ff5f3587ca0f6f83
SHA256889c166f387d5c44290569887d0642991f948f258d8dca986ae0a400fff53204
SHA512f92e69ed4e24e6061e0484d522d77062cbe49a635bafe31c8e9239539c361aef4ab9877015ed8017b97335a0c96cd1064c3f27464caf01a562a524c82a21668f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea3365dbac7ce0591aee6d2c56408c0e
SHA185984b9132d011db0d4580d1387e78c6ea8814b8
SHA2566b4ab99a6a5401fe96da81caac2aa27f1f686503e57979312699e747a910bc3e
SHA512c4e4d256b227d844bb750e3ae36d5da9d3757cbe3df721b600f4102d343fd62248c095113f45588cd30c4203870ac1bf5893dcc2c301d47862a62194728864bd
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a