Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 14:53
Static task
static1
Behavioral task
behavioral1
Sample
40075f052e4106b20d8a841140dd81b2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
40075f052e4106b20d8a841140dd81b2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
40075f052e4106b20d8a841140dd81b2_JaffaCakes118.html
-
Size
4KB
-
MD5
40075f052e4106b20d8a841140dd81b2
-
SHA1
fa2f00724a4bb5c91a4b2b8f2ac3c9e94f1acedf
-
SHA256
c9b5953ad64ecd37b32c36abb3c846120dc75aefd14c72fb99c6971fdf7d725c
-
SHA512
bf930ebebaddd4c358df54a039e21c9b1dda861dc9fe2233badfc3e79f1ea56bb071355b0b90b178d0e209730a99ef731e141247629f2471dc97009d9670e92f
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oAUbd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDc
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000e7b5fb6e84f87a32a8701f655fab6ea2c3bcc489c5151a8ec20073574435e037000000000e800000000200002000000061fbb1bef4e9ef13d2ed72621fd42956120d8b5f29966be2193b803eb57cfe342000000048e281029569e8b5a258265d494847e30b5d211c997d87cd34ce190ef63081aa400000009cc4a086f374cfa64c4d6afab736f52b36559182d386cc5d8dfdac7862ec8a4f9b39cfbaa94e17c9a3ef343aa76ceca2f55a92ffb69dddc9cbb6199d1bb89cd7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BD639C1-1138-11EF-BAF4-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421773870" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000e4d6045a5da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2964 2860 iexplore.exe 28 PID 2860 wrote to memory of 2964 2860 iexplore.exe 28 PID 2860 wrote to memory of 2964 2860 iexplore.exe 28 PID 2860 wrote to memory of 2964 2860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40075f052e4106b20d8a841140dd81b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fe2bc8f8b435abf7c79b2bf138dac4e
SHA1ffeeb677f0734c07a349b9ba4cde43fb7a5b5c5f
SHA256a63fb8fe053ea0f813d17be6c6d6f222d18fa2e5923129d237b1853a857e411b
SHA5125e0d3d48d4eb2a54fad77f60516c17f470fbcbbb36e73abf50d8ef854f5e4d32e02e37494ead2b1b64f4fdbb016a8971f559cf17527a47b07f4bb6423f1dc9d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a85a22a5b3d902107e99880f792a65b
SHA152fb65d854070da1b2ed72fb8cef94b9ade9b0ec
SHA256e34abb8032caf391fd506fd8cd82c00fd090381ed5a02021a5807f7686c49c35
SHA512b2544d6551ce6eb2d343d168598aed88d693d10215d1d50bfa7d117ca957f43c4e69542c81578155d8daa23e0ded242b600412e73fe440928a37cbcd789a3e1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5866350a4d669eac2ffeacb2b983f36c2
SHA15858438d479993cc3d295219e525db9eb1cc585d
SHA256de7f3add33ec2ede11c171e8cd0ee56ed1d409cf3e0b83dfb06e7d683607ff67
SHA51282841bb62afa83b620a94f78a3765905b0984e8a4de888f14af9b97a569a76428636d683d4ac7456d6cdbe1452e481f45449a75ce7fe5ae714cdb873299aec12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59941556c8ffe870917a4a81962d97f45
SHA1e2e080b6c07f1952b86c9958ad0aae34a3676a27
SHA256390a38ca2510ae7898dd181571ca0cef5f934a8599a1b30bf3e17ae39bd1796f
SHA512dd8e9a57155c4b9f8533a1731ddc3db070657781ac502708909a9b05ffbb20e7f9cf6bfa760a51dce4c83c51d6c5ff7a8b67f3d8d4e537d288af486857c9cccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527a9ce0faa84f9c66eb109bf3640beba
SHA17fa1f9ba8c64c9bdfb29921bd99e737825d0a9be
SHA256496df2fe3ba70530a16e8b4f8a90d30c66f8082f1aba3ad933f50073c65da26e
SHA512ceae89f676d75919b47dbb9a19fd8bf2e8698cbd3aa136400e6d5c458d00a3c4f115afef161e9bd0ba41b33d2c0c022fb56e25cf21b5f9ad434b81fd37b8eda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c5f9d843930d2a35eb5f2530a0832e6
SHA1fa7d228dcfb3ef3474e53089066d66bd1815dcfe
SHA25607b3286a2b1c261e04c19cc4af30ea968057a5dfd5d5900d936dae2a7247a894
SHA5127484689ea70f897c63b91f994e655439c9f615be5da1f058310f6d1f8c7731657fbdc41d7d7f617227b7b93a773511a93657afa481815b74bf166045fc66deff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5949d17167b84c78aaa077ef7ccf904f1
SHA1d2e13784e276f85f5982378d883b74dcc078b857
SHA25615cfa0e96b17fc9274f985e5938f1f23225e00e587ecc105abe9a47fe42b9cac
SHA512779110c23b0b92bf3dc98f4a7c14c7623cae2bea37783f6b6b8ade04e30f3165ab9216270ef962e6e8b280fb9000445e9e07a70cdf7e7b5bf6bea5a2417fa657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba514cd5db0dc479c961851a8fba7380
SHA1a06cabd86aa0c9106b99a02e81f674904149899c
SHA256e30974583ff5e151c67dcccdbcb4aeefa32401271de402f2105c390051380971
SHA5127626c586b277a038db8d0c9538b82053f8053c4ed69df7fe2a72deb5323b191d9d6f343b8970caa9da00ad4d29cc617a827b51f572355a39d0cff344008bc82b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5175c2bc6ad8460cf8e4590b617834d13
SHA1e9994e6a9f242e3b489beb30f3d9104126f89986
SHA2566d24e4395147f0d8c10f2567426a2392de77e6a477975fd8f49bf39dde70999f
SHA512345fbcf9cd6ac207234bbdc3f33e02252e7ad45a03f2108e1f9718f6fc3617524f54148299c02a05502b2b97a5ccd1bc4f8e9dec92b32a22772a26a4fb4fc2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5026344ad7c39db4f9fd9f0e608999861
SHA1f6d8578db86f30a4626baf7d9408826d8456b80f
SHA256425352b9e802a9ff0e50f76abad32d078587152772ebeb37016a6571892c949e
SHA51249171e545e2c2c1df8a10591f4e9f016914db2efacb5da5c7cf1b99e618acf53273a5d10ad2194aba6896c38e356bda2d0e6fa3b5c565b2c46a95303f66f931f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585595d88999c71a6ac32075e36ccbd81
SHA13984e96de4dc686d6b578c8916bd8afdbfcc8d84
SHA25666b10c83e4c1c646a01ea36fc48744259624ee01f237b8e60de0ae89bd379b1a
SHA5121955faeaa5d2802774324d325e911f8f8da03298b0c65426d9143315df2acc5f008698aa9f725bb7ee428d31fa2583c78125a89c2e343318276c04f8f5ca6a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56442ca49f91e5aafbe0859993cbcb02d
SHA1b8d19f6037fb65d838a06c9603d0d8572e9c2050
SHA2560a54be6f43c6fcb494300f8b77a0f39ed2e6fb6256a684dc8c78c3fd5dcd4527
SHA5122a9a31a8e9e366b5079a2bac69cc137f1f520ed5942beee27a2be742683287601181a970355cf09603929a2a9b7e2b498bdff521739b1312fe40a9b39c8332d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a2fcd4875c603e382c5d791a1bae1c2
SHA1070969fc5613f12b5ff68cd12c04a371f54bfadf
SHA2563aedc7b0200f4669cfa99fc0254afcbbe7b70855b54da7da399823b796b29e5f
SHA512e7e8a96a7ca3204ef43034a048a97f189892cd3e8cc40b5ed2b2a87869f3d65a69507d88ef7ee6d90f55caa841bf3e4705cb03398cce1bc9a350f54daa473fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5980e8e894e3f7accdf5d45db2f80cd46
SHA1b9e3a3f68934288edd32027e67d631ac52b2bcaf
SHA256b0ee93860901d58780eca89bb35ef4f95cefeb5d4556bcac4c4b13861184d74f
SHA51258217193454265139b847fb821653a424afe2270f390dde8e0d8c2a3f7734e074a9557da3c62a298213ca8cde679f08e27fc310c650c238e33d3dac090a11757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc5cc17007a5de28c56cd0036b972b9c
SHA1ee3e6fdadc25599e9307672fc46b3def120c8136
SHA256f6497f628b79fbeca30f1bf3282e8ef8d66d4727b88dac750f09a5246795f748
SHA51298fb8c4e69944c28d9432697828fe0ccc0e6946a793874a164b26e50c5c1c2308e036d9ae6fd950c3c8f14e7f231779694ae77be9f1eaf877c99007b098d4477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9bd8dc079fa22e5e86fbc040085b8ac
SHA1624457500779635d02f38057e42f53695efec97e
SHA2562f2a1fe2a189f8d6f0a3c5a6da7d0d4e30e14a9c6532ea74778c401355c89dc0
SHA512de35ddd3931a4e0e0ac1be98b0dc4e266d0be836f33fb0a925cf7bb2e990680cf1c34456b5edebe4b4577e6a6c8137a4bdae4abe7fa17b184018622524997612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0cf08082e5f6b8a630dab32e22e84c3
SHA152d74ccd2d6e8a4a1bb98590fc1e6deaca3a8e48
SHA256f4e93c4dcd86584708396c6d03fa6d98e09ca3766e4d905575bba287512c3ea0
SHA512819dc0b586fe9da4b7f6415b9f3c20c1aa92e6e6bf8fc263bc0cf2516f2b1dd83cb70391719e5510ff885bfe6d2bea89b5bd33cc3785603f7ba138c30369efa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57255820e93f95319dc5a92639fe72eb9
SHA1531019a6bac444db22ef2096af6ac47203df0c55
SHA256b5d4debc14990a7651194df87350ef644a2aa84afba4ff05129d43a06bccf99c
SHA512112d2e17250cf4f0a9c291bd7ae52b64cde9c2114e3b32d8b6f218e72239d60ca0092fbfbe38afb10d2c6fe4543c9c83903d584327cdcb29c8363264937f0b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b724a98553eeac861bfade1770c93e1a
SHA1795b302e785d97faa191a1959f7f4f155e170f19
SHA2568718251af8f1fd7f366063248bce3840cac87cbbf88e9d66932ac5a9a2a7d297
SHA51234ded50adddf6bbe804ac90ea85108093305a29598bb3d90b534019f1458369c40f4cbc266fcee8ced4b25ec4156a5ec13d7d07baf78ffd500636c1e3db7eb23
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a