Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 02:22
Static task
static1
Behavioral task
behavioral1
Sample
323bba468c8db587e1018c7535bc6236_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
323bba468c8db587e1018c7535bc6236_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
323bba468c8db587e1018c7535bc6236_JaffaCakes118.html
-
Size
14KB
-
MD5
323bba468c8db587e1018c7535bc6236
-
SHA1
d0279bd410c26fd1a03fee39e4a47735f0832731
-
SHA256
95281481b6459aa381d5987e3efad447b6df9943a8d9c83036380aa0b0c6cbd3
-
SHA512
12ee60c71cf454d224daeddd4731e9ad8bb63299e47bcdea09d0edb567bdeb64f34eb4c0ce4d0b58aa7f7f8653d1fa564daf8f8edf09e60cb36fdaef15ef2dec
-
SSDEEP
384:CyiqA4Nt/KhQFAi79y1wMMMw2gX2a6XQYQAQ:Cyi4v2QFAi79I/MMu2aeQYQN
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421556033" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000afbdd79c0a3b77abdcf12aacf119d58342e712ab7afd6018ff5a0fad9e2100a6000000000e8000000002000020000000a7448ad5057180f29146e96ad0e797c7e3bd896a2e944276017a02584788670d20000000a27bc40ca5759ef8603470b6726b4c70489ea2303c48921e4b8749129dc9952a400000008e3c8b712ec0bae2854a85f70e069b0f6d29df98f82476d428487ba9a6c4c97c4547ce9a29b9f8d45027ba22a14584846d90942b047c358665c2dd55351fcbd4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0630a324aa3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5ACCFD21-0F3D-11EF-AD30-660F20EB2E2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2036 iexplore.exe 2036 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2080 2036 iexplore.exe 28 PID 2036 wrote to memory of 2080 2036 iexplore.exe 28 PID 2036 wrote to memory of 2080 2036 iexplore.exe 28 PID 2036 wrote to memory of 2080 2036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\323bba468c8db587e1018c7535bc6236_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bc51ca524b3527315db8381f8f504be
SHA14e0ea030325a15ba721a3c964ffc847cad87ebeb
SHA25640cc36bdec79e24c3544326078ff7e261e8129ed7dc41ee930c33e89c14dabd0
SHA5124adb11ff78cad275a5d82d96d8e0e2c513ed91fed0212b40aa1acaa5e5d3e6fceb73c08269e46ed6370932d5b99f2dd55366f0e9517f5348963cc1372553839e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581bb1fd5fe047dc915e3aa2a07ec95cf
SHA131e71cbbeaa6128f4afd4acd1e6f47ff928b47ba
SHA256a3d9b74fc58e69cea6473205c5e4ab2a80b746739a7f4ae08b72550341bc7805
SHA512d6c18027aa6113ac8ae2196c3dfd88502297b8d79b9f9a2363448d6b2ddd01b138721887c644aec7acae9038889544d5d06237c1d4529ab6a6389a265505464e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5893f80d5085a11eae5a55a9221d158cc
SHA1feaa3c3ce9e8ff0187fadde4da7989c3fe9ea672
SHA2567670b07f280285d4bee48678291b831205addcf9901db08e06fb0a7e4bbb7f8b
SHA512f1c596265981ddba2d3210eb3ff4eb830a9743b83fc92e289ed9bf527baf90564da7303615c6e07a7fa19866d5df5ce664107af615f45d2a47364dd2cf39e474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1f313ca07491b5e57f5d9972d69b4e1
SHA116c358b087ecc672577fafa2eb7b974371d42be6
SHA256b1bc74f778e11a945ea8fe3b6e0e7246d2c1f166906c97461770660f0794efb8
SHA5121f6c1d1fa541e3d8487410d43e814cc1b9f02d9da717ac13fa0e25e48befe0aeeac8b3b371d7d810e7c6fb64cbe15774f675518f466a11a1cc6d67ad4bfe8efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5616fa48265b81be096404669ddc521d4
SHA13fee0029f48b6b7ef92c2da87b8120e847f7c2e5
SHA256eb3c7fc3709ec18b0166d443fbb97d568081108e0c65b6495832a376674712f3
SHA512330d126119dcb9849e6d7f38de9cf225b055924cc25a74602548faeaa567e630b06086af07394264703b469721a0518b1812f29d2e2087fe30f34812bd2adee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546ca5c1add6fe3f761d32d9fe809fd47
SHA1679dcce48c9433c08d86a56bcb53f6115cc0b7bd
SHA256d925856c4ca19b9f8f0d12b96f8d210441c7a972cfe011375c1eea88b7e68f10
SHA512bb778c860a7a8aceb7f4711b4cc8c8a229d52ef78f707c5e5d0e50d163ccfcbe8e3bfc04d23b1e9fc1abeb5f7060217fd21db2cfe0f0f54415e55e815220665d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5145c7d629fbe558cbe35eec84f179775
SHA1a75be5cf287eca577b033ed983151520ef82d84c
SHA25633c58bfc68ace147724ba9a9f9b226d410f50c3786637b61931e9be78c67ef98
SHA5122ec37fe84a62632ab687be2791dd1d21662a47fbc4e0dca182778c1f2bde938392d0564fd3d498ba507b75554782f0f77a35299bfa9cf7eefbb0ada08405b799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53abaa835485d78b6437df03de8732ea2
SHA14562df37ec5772eba7e100eeae5f4da11336278b
SHA256d511f3f8d3c6e92bce40dd06d86cc369cc31027b992bdbe02ded26440fb96384
SHA5121479b349342146188b0efd94a45876e230819e72a19f35976ad3ecd31850105fcbfff5414190d731db2113e8f8fa4c56249d2ea18b4e0423f7dbf6105acaca31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ecba599e77098ef08d4c84a4e8bb714
SHA15943e2ef60b377e41db515738228b3a79be1d998
SHA25641c954ce8776844389e02465f10776d3f176cb5fd089924767d2d4b1667df2ce
SHA5127fd267a6b152349bb3cd1b3cd5ef328d87d32c4d3b4fdbef010bb51f46d811609a572b9135efcde7cdb707bc59f1d81661ae56b0f8c92290c0572eff292e4f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b97066a1f4d435e5cc4ad4ad25396297
SHA1e36ce5b0a345f468330a6764bec5084c5470aa21
SHA256077961b7dadaac4b03456fd9f519a8860dfe690fd60bc82e947cb0635a671113
SHA51267685fbd729f3d88fe550a93efef7d70bb90c92e6bb99d40d38d5ae521d23e30621996d6dc190d25aba5d7b4cfb9b97b67ba7a995224131d2f88587087565305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b9ffe9419368bacd9047467975dabdc
SHA13237998a378cf2451137f851dc7fe0f4c61743ab
SHA256d00d634563275a6fe0a6c47c932dbd40033ec9a500f2b5f62b23b2b22b2502cb
SHA512c8a401f585430504d8f7ce3e67cd6bfac4e61e2253ab064361ba01cbfa2ce82255d4694140bea294b058a08ac8d10500e48c19ce92f69b2efddad05542d9a12c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5890c815d0ad7078a0bcb7deea9ce0cb5
SHA114254cdc584a5c3a2e20f9b659b456b189c30ef3
SHA2561d78435e2a05e8e243eea1ec14456de573d90af6e9f4abd2016e22c0e21d8b74
SHA5126ac6eab49447fa7855983683bff6b5600a5efa120ea7cb136eb357358dfc2907205f1fc7aab1abc4a7986e043bd45824b05bacb930d0f72e95bcaddcbadf52fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b5a364a3ff627912b883cb68ced624b
SHA149a03d81d1b26f03487ddbc6c03ef0c3c02f524c
SHA256c0e6af43b0ef53179ebe8e71c556a39d4c5ef79fd9117378c81e7394e42a8f88
SHA51295a38ce5cec49141af1330b52313884d3e5683983076b467a8d0eefd9257444bf2355e3980bbb5e25796993f77c2bdf41f2918883be4ba26a53f6c04069b9c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2437bbf1db2f1af57b0bc575e500613
SHA1d2a0552a1a78be7247670883600ba81e27789fb6
SHA25657fa4f6bcec368311b571910005093ac27d3b5abd620bc9763371c1a966c03b4
SHA512b36ce6f46a76cd83dbc2e5beed96d6354d2324fd4634387484b96df658e2cc48c4fded399f23ef790e0de3f6ef4677d73acdf503aab989b1afe27b27e04ae143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a21478de06f1929516f340f3cfd12ac6
SHA13d35aa876f61827840835c916df3ac4d2bef8758
SHA2569bf7d523fde93978c2bfb5739722c91590b2b61a9514d9cac44d19cbcda4c2d4
SHA51248d77c460ec41e66abe57c30d0cc079e01b08ca2e08f92e52815f61a7a0f7d4efbd38c8ddcdf9c4d13b03c73a878fe30e185080897ff20e01768b29257718d95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5060e202d765a7ee5650e4cacaeaca20f
SHA1feb214e8a85333a4e119dd13c5d274af040c1f50
SHA25629a24319d708ab5afe2ae1e26768f1b6461889d4f0acb9f2e85c9002a22f56fb
SHA5128fd50e1ba0b254f51d271e07f7aaf1fbf1e8be257fe5af0f64b8b72548c40a3a7daae6a1b5360c2bbf1d9eb3bd8c8a28ac6bc084d7adb3979d2a8e81c8846304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7c64bdb228c687cf0061c933c44673c
SHA1cee53923ee15cdf23ad3814c5e2fc33022b904fd
SHA2569b67064e3935206b74444cf1a738488bf2edd8b230f03a231a9ca287d438907a
SHA5120de51bc688c2b3e2fa9b831aae90051fcbe7c58d5e450faad564dd7edf19d5487cdef496960d9c744d51e685d709a9fa67d5e9e1377b1cc20641816f6cf68f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a15088ebf782ae87f1a61cea095338f
SHA19f9568861f31f52952881a9dd1efe4f824ed05f5
SHA256d915000887cfb66ebb0c1e5442fd4594f8e435cea49daff316c031f97f40fc87
SHA5123e709cf2bbf8046c0592d698ecfe156864f966245fb550ed89fc00c5c8b5ac8f16fcfc003fcc73ce3b392b60f47f4df98d178426f04ef0769999b28e10fda461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59224e46af1617f12cc84230538dd2859
SHA11c1bc3d0666208805ea4be5272d5891bd9924121
SHA2566e60cb76429a8f256e6371833da4f7a4449bf79b41a99f0647c3deaa65f15473
SHA5121395a87eefd13fe87266963ade55e00a0f2ab693805da407c464718ceb6370efb19be1436b082ce36c45f56a7c29eac4f474bfd24b4ef2c70faecea360e7c6b2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a