Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
351f89d3d734c3e607ad53dacef081c2_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
351f89d3d734c3e607ad53dacef081c2_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
351f89d3d734c3e607ad53dacef081c2_JaffaCakes118.html
-
Size
57KB
-
MD5
351f89d3d734c3e607ad53dacef081c2
-
SHA1
253853ffd1d590f71815a4c7e44eafc131e4332d
-
SHA256
371e22f048d8b033c6d3180cd4c93b37b4d50e8c4de3c5347246c0efcd135fa7
-
SHA512
5ef2b9611760885e361c000eb52fec78a228c4ce118df710d9eced6ec9439f1181332d573bfb6e0a818663a5ad5aa8be9f70c23cc31fa9931431a5cf7e8cd299
-
SSDEEP
1536:SqQycOvU0+yHjc2HfeaiDktVzlUflNcdXmoHxnRVRpuR5xF3Ogf:SzROjXP/dWKxnRVRpuR5xF3Ogf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e72c9eb2a3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000037e7f50234f98c163cae31db30ddba8463a75c18cf1ced023e5b528728301ceb000000000e800000000200002000000056a3cc95d49951e218f2214c1e49a60d1227eba838b99c69328b252277e39c64200000004e58ada1c6321f024b8132c2eb81558bd140b111f9ce3cb721aa2becbe68bbd940000000430f3e4b9b044a82266e25f627aaef2c1d52c92f56f6400e768af346af0bc5084989c1b125e5d1a4ada3e316927a1c894d8b57141a296a2215b3a05ed2c6b61a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6597291-0FA5-11EF-BC03-E626464F593A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421600882" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1600 iexplore.exe 1600 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2556 1600 iexplore.exe 28 PID 1600 wrote to memory of 2556 1600 iexplore.exe 28 PID 1600 wrote to memory of 2556 1600 iexplore.exe 28 PID 1600 wrote to memory of 2556 1600 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\351f89d3d734c3e607ad53dacef081c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5603b716b8c3d9fedc344194536c957ad
SHA1367e81d6e14bd33809f1e520e1fcaba4b49fd254
SHA256e90b12c3d8e9737bdef02cc0b12fb70c3837bb4d96cd28c6074dcce540914dc9
SHA512d3584383d950e823165132dedddfda8d3c8276fca18ba51f2420b2a2f84fdc41c1d0bb8dd86922a15b0d38dabe38e6ce888e897681327754ed57d4edf59af6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5731ee5f85b2ff7600fc7a6c3d32588e7
SHA1d84eb98e7d4ffce9dec22ebc7c19abff3ba892e2
SHA2563d06d8afa9a9b04515738c97359aa79efd4502d8e50550ee5acb68b13b1452a9
SHA512c9af8a45a938fb095a5f7c99a11630baf86db1e2dfedc7418c1395148c214336c6d5426a81e7b40d43a1253b0cb9c7ad0abf26374b85874d8b8d614fa5949718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5682570ffe2167920fbc1341792f6472d
SHA1471d4fe8497590c520319f69faa34635535bf9f5
SHA2562e196db4ee5df691ce9429294416b24184d50274ca1ab7c9256f19f213d4d150
SHA512cc11e8ead97ce1613ad5f1aade38af341c1a1a582c171142eed33e3ccfe1a5f7a86776c136c8618ccc32668b2b8f612d786325ab26f15bab595af517ad63946d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e05f38437115035f924ddc54c6dd63f
SHA1da8189f1a9663f9ae4b2711b57680db66d25a50a
SHA256b81324602b0f4a5a89506edc19bc8105ee6ceea331995236bf15cf0926e5a59c
SHA512a45895ec7c50de4d802c151745a0b3c48445a8ff7ced10f56cf40dd986f24867eedbb244febfe547d805aba6a9fe3c7edeecabc495dd0e7a49dfbed956006d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566e2ccc56bd57e4bc7767688d612ec31
SHA1296f78008ded97572c10477cab1e7e8918fea1be
SHA2564e78b66d66ac8ab32ee1c80ea59b3d94c6812d58f25b52eedb2272e5ccfc4233
SHA51200ae7b961f5e4e30d9f664b51e43eaf8d27d1ce9c617e617f3da3a2ab8bcd82e48bbf019cf0d90471c95e8ab1f08b9165b406f694845afb068c61315754d5a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c659ad95bc3d0710b10d293a0d6d7124
SHA1b975c9f71b59e0a947187701244c2725e114ac85
SHA2568e2770c796032b683de110c41110c483143676a54e97b514b985c4c27a6a2968
SHA512c959b349b5aafc82b530da9c17d63ce4b1c6cab681697e889bf3c28e5fe719fa0fee03cdc7807de0eaf7d95e1465e7d18838b7257b3f0ef96955487e23bde0ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b97ba4912fea5db02f51dd435585fbbb
SHA1ba2f1320e29448f786a36c37f711dbd022445f6a
SHA25611074f2ed24d1bd23c98a5d4a2ad8f258bfdf6d9896b999eb26b15f294675bd3
SHA51237a936e19870025ff9fb5c9bce07dc1573ae9416106008b15f8f6a673244c00165c012501ca6ceb856670561515841046b5b0394f5377f09780e4111d2e47a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5049da234113eb1dba00e90e88cca7681
SHA19f56803041700456fce7fe69d7f460e5d985dd6c
SHA25666d462a3a173417f843d49149a950acf5ee4f8510840b6a7e4040ea3931f20ce
SHA51215bbc84697e959b75a6ba899b85abcd30f7912c9c35d0c2efc077dea2c396b21df062df4d454b6850379087bfc230ef6bd2b6d34b6b11ca1e7be6651281dc6d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5482cebe7825065375cff52f85d15736c
SHA142e3bc162fcd7798674441dbb78e799a51088a2b
SHA2565b5bc7f2cbf77c4da3d93c9826c9585b68e50350932f196557cb2d95b27c82a8
SHA512468c63030c26be61ec0968b5a158f05f549da9e48cf137a5752bd3431b500029c28b147c331f6d582c3f2623e2d1262f66f03439c2260bd75d053a5a402daffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575eb2e68d410a4b2fa393eb3f0838eea
SHA1c4a43edb9d01f39e50e8124f2a3e68f17794c798
SHA2566aaa44ddcfcae2bdc6b5d2ebd3907cbbc624e70fe615901e518f83451cc412f5
SHA512dbda863471b784d63b69818a501c481796bcf81f78e604cde95691f3c700487712588c310998ba7d30151483265ec6c14a82ad10a8e912ae7cb9e953382a14c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59da6ffc74b97ab3ceadd724e5b04fe08
SHA199c9f707ffd97f0aa7657c17ce58c1589e380fc7
SHA256c9728b6bcb4de828dea8d47d8fbf36105ce31c3e5afee0e530536b395de8521a
SHA512636729e2ca0d69af948bab58cb555e60645904f4deeaa22c575c5ec3fd6ed84b71bc1ad9e7527a0be16eddc03514f7243ef865a1c60d4aaa8c5d3bff744a2f0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cadac5bebfc801fccd4a2f4c542d1d82
SHA1cc98bf1c2a6d7ee4a3120efee2ea271e9c92b042
SHA256d6f28d9fccf4ffdc48cf0329f820ba65052ee28684fe8352c3ec65731cbe5986
SHA5127346c9f8cfd3d55f23008e0b70cfd787933fdb0cd0577b2a528359eee34e9730db662cb31f3005687d88fb5f6ad9df060d6f312a2f45405996f0f48ea22cdb9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531f0fc410bf61c5a0a89e7a100ae50ff
SHA1625144f36b3ca6186972bcaf1bc340d0746c8eb2
SHA256132d31137fc049731fd22d318425a1dc1c786312a48a2f45a12db361b042546b
SHA51205eb2b102434a4ca5d35475455254a014108db640feaf6451c4898e194039cf9ed06e8db4bebc2dd655b308888fa4acbc2e77a05c11f324dd7aeb0b7a3ab74f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58db49a5c19f2b5646a888c96455a9a27
SHA1e9366fa20009a328bece3713ce2d6cfbe182d9a3
SHA256bc81ac51b23ba844124be9bbe6f73756fe20764cab0ba5574621e7082bba7b73
SHA512b7b771447f1bffe065cd6f0ea85c732f30f5888610a316757d5c82621306282a2df827a8af02a923774ab890b980143e142b7eacf2bf69b11878ef1c69a6d00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3545bd64d6149d6ca724d67475059e9
SHA172abe0e18f8c35c6952da2129a9ee96b6d244b87
SHA256d110ec3403db30d57c521f87e8ed7a101afb3467291208452268c9a9715e3239
SHA512047568821954ac0e2298cf7be8e731da0cf1e19617e8fe3c24d2af6ed9e3192682a30d374dad9415c24cfa816d0ade50533a9b9417a78cdadef11d29bc9ced20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536a3f890b994b7d514af17262b69b5f3
SHA1dfaa8aa56048c12d9a315eb8fba0baa2deca1f83
SHA256c718f3dd2460ccb3cb7e2ba01dec58f1afeb3e25a7669be6e4578d287ae5a94b
SHA51296ef04589468c5f36555861a5fa3a557a1525ffafa26d0d43299c0f274a9977c3a491750328b4a871808507dd217bc9d0f75b69fb1c0b47601bec2dc1ee3e45f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e0f33d3a95ef61fa7f4149b9d3b0b98
SHA1171a8832cc13f1f8d7b50d39f8be89922de300b8
SHA25684c75e278731c3c99020d3e88bc173dc616869731b82de0818cfc20ecc9111b9
SHA51255ab27bbaece12730a8e32b358e578fae8730fa255c97ae9526f4ebe1d11a3da77f936a07334e3adaa52f693a4dafc6f7bed693a558a8c6cfcf9f3f9969d597c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba754e8808613278854c4e3d10feb0f5
SHA15a1ece1a68724a04f8d5dff37b6361df69103799
SHA2563c70c084e01e405bebd0015f9e6bcb0c91804e517a22bdb44289855c37dd0222
SHA512638f8ebb4b084cf2f14708f485464521f224bc83cfcb9b24e08dd1f78b8a7de1e5ea34b8566c36aa243f70be504fdbfe1492ed69abbbca60f3332e46900a40c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac4b19b220b3caeee850e40029925251
SHA1377ba50c232a0d658a7b89ade16c037cfa5a2f20
SHA25648156b848c6288f5084c16b22a37dea579e76dbaef78d0c4ed96e17c9f6af652
SHA5128ee930409a98221d30e7d9e827b4f819ab9adc8d88e77ebf55bd972015174f783ae778269653e063659e120104a84efc5e77f68ae675833dfa6d96a6b70dea88
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a