Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
404d7fc3fd2123de40402e859def9291_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
404d7fc3fd2123de40402e859def9291_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
404d7fc3fd2123de40402e859def9291_JaffaCakes118.html
-
Size
461KB
-
MD5
404d7fc3fd2123de40402e859def9291
-
SHA1
e8cd92f617240dba77e5809d26cc7f120ee7461f
-
SHA256
670211f4dd78c9c255fd9aaffbde7b98619ad9c2c547f6173c4e435565f4891d
-
SHA512
2cf29b1ff15540fec8870bc4e1162d523bf80a5d22fa8d1ebd12ec368e334b47ebf7f605597067faee23da26d9f892c31999deddf782286c79ac28e9ec2aa542
-
SSDEEP
6144:SCsMYod+X3oI+Y2LpsMYod+X3oI+YgsMYod+X3oI+YLsMYod+X3oI+YQ:n5d+X3q5d+X3w5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000003b5aa6fb5e15099b33a82f47e5f888101b5476b1ff3e2b01a375097b6a8079fe000000000e80000000020000200000009c85e895a856f5a4b180afebff75049449a970872e89c08d7b041eb1d8ebcef8200000000bb2960f2dd9e335bbb25b63dec3da816d4bb96e7636a5746abc96aa23fd5e6540000000a3a5eda41d5b7b67495f5b757688c9af361ddc45bcf6664472bca9ea2dfc515e66d5afc0ad5dd669a7c2e21bff70b0180fcb9e548f95dbcb19b273cc9e55b598 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE1182D1-1142-11EF-A293-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d58fb64fa5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421778303" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28 PID 2172 wrote to memory of 3008 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\404d7fc3fd2123de40402e859def9291_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fe140d0bcbdb54383aeb72b71c14bde1
SHA1e7436dafc2f484b90c4d851a28662bce54cd4236
SHA2564b5466282f359ad29d0dc3b42dc2c6447fefdf8bdbd921ff841c1e08a07cc574
SHA512fd6442bec65c121e2a23e1462cd66e16faef0920713cdc5957bafeca090d73ade0ea3166ffebf511932974385a1997ac14582e581c7f1cf06cc20f7288bee2d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52bca0f973ea0541a431bac1c41b92f6f
SHA15066da6b17d7282bd1fd418f8b9b2557682972a6
SHA256df823be72e9ee28a0545dc56647d92b5dde31f5f93e98c2d1280ed3257787cb3
SHA5120465fcadf0f1910bde354a72fda922adc8dc38fe1f626949ef241deb2f30c4a4726f3a5fe151274c52b3f2f411b981e53061680d937a55e406f066b00c80527f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD575028532ef0120405580e56e38549fc7
SHA1edc97cc261fcb5591a1ac341467e1ad1f73f18d2
SHA256e539534baf907f660895daa1887e48c905f0e6efc191336e3647f4e5a8aeaa75
SHA512a4cc6fe699bebb81bf2df169d088d4d431b69ccd4edef1949a13d936590ddc1a3cf69592b898e5d62c4e2acb6b4c30d44ccd7e110bf8fd93b9a789544f937eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55e7359124518bd0f46dc3de4c2a89e63
SHA1a1480da503f704dacecb06af05d99d71dc5552f1
SHA25626f19449362d1f8dc12e03e3629ddd17a785de29d48220b8aafa017d191c9473
SHA512cb8b8b1e14ea2b1532cecab4d8aa8edc7926ee756a4072b0c682b3ef72c3440ecdcc7a2281b5a042e5a30b249c286ad1a9734a5fed79c102ec73730d6d8d272f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57a5824e56f941ad9ba97e339373d020d
SHA1d7b9e2e04412c82f65f393211ffc7cb33776f8ea
SHA256b16cb882695298e8bd3935a8b06432ca11fca99c6f23115d66dd87d5b3e1e067
SHA512408cc6f1bc53925f0050679fe90bf98d40caec7c283193d33727affa9b514fa9037720d0f09094fee2450c1dbaefedc4846c57766eab03cb8c3523be568f3869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d5d0172ee1aff07054519cae433e7e99
SHA1fd747a2d37bd2bd17a51e268800593877a9981b3
SHA2563654f852b7d4d05e1ab000fecb8c0015abd0329323d9ee4882a4ea82ea2cfd23
SHA5127bf647743b447fdca552515bf02c91034c0addeb21f231cd4eee8a77c8130542ebfb5c51c4cc5994309b608c1f5b070a255d0566985ba972a16fb5a95c2f822f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5866e5cb822596ef4f7477921d8236df7
SHA1688302ca435eb3957cfd67f648c96590ec024e6a
SHA256e90c5d9af424275f30f8f2ce28ea5f7b142b05ba6c8298ec52c5e4a4e9ddc83c
SHA512ed55b44cade836309d45c0b7dc52b42c4fe6817475cf6a568bcfea6049e6b522d4e18448fbc399545e5311473df65a5bd36fe08ac880e265e4880f286542878c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d9136a9fdbfdd8f5ca4b0425a05bf67a
SHA18b0c2ad03feccd60f01a2e17984265694392d621
SHA256b7554bd6d354293dae0d67e42086397dff29c44f5d7f011272ff7caa793849c7
SHA5120e760abf268aa5ad793c6903930603e7dbb45330fa64829d9c02f86950fe388585f48e43b17d74feae8e22f7c11ec37f019e989ed3d42d3f02c4df4416ad2a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58daa46c7b5475d786d46b5376974b43e
SHA12d99afa4c489a83bc2ab683fe657446101c2c07c
SHA256c9ab0428d719bb48742169aa83decc90628536d8111bd795b31cf734d79a401b
SHA5123e82ebd36df85f18d95df7ed797304a3f0e37f3659a24f0fcadd4e8ed96505b2f92f3fd4bfc935f29da59d4f57b08f38bd481b66925bbc51d2ff4f00bf933500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b6151d93865069392a2e24cf2a1b9401
SHA10f1a2738683038dc8419d8a30b9252941e4fa26d
SHA256f13e7b1e350ec83fe5c70a1c71ebe83134250253f906a5d90399661aa0ad73b0
SHA5122ed2c8b86442eb1a9fb6cb4b426a69a58dbf599b0bea5b5f704153c4cbdabea3dcbf3072ecc0c12f8a05b732b1af1b0c5b419b0b8d9312274998f9ac2b43866f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD509b4522a8bf3794869287c3ed9fb39d4
SHA168bfa1ae6536f3042167b6d0dbd9a9ad329d964d
SHA256ef6fab012ac0127bf461bc2603ec3e059b6a0c67a3a94f5cf14fbaf1234bd0bc
SHA512fa97374c003d4e552bb151e01f94fd02a2647c7b49352ad6f691c01275dd40de4bfda163b2aee01167a851194638e4613331827eb6c16cb9c00a43e267e48a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cad97dfbc51b0d26a1d01ab060da6e14
SHA195322b2db62c0a1cc160c380680f6c8e70a8d5bc
SHA256210c62b1786aa19e970077fa6547ff1b86334e82646213df7a8372b0f9113761
SHA5124d0aebf7b8a0f95b556e7a145e5efe7a71cb5bd58263922dfda9bab2842d70adce6ed7e236ae978d346b49f567a33ef68266a40ed92dc40b66192fd2a8d24ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55791743cc57060a17930b22d7605a3d3
SHA14b55379b5d0e2bfb57175ca459c61eb106c03815
SHA2564faaa03f9580b1489aa5e7ad2303c47622520c636a210ea9b54ba67fc8861369
SHA512d697fcfded381d1141d3b259633b2969556d56a6e7ed3273a0aa00083b184e1a49b0fcf258c9ab1932dba32991919965c9f4e16bc1ab08a5aea23f2f24db247f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c56a56647b869df2ecbe18e394da75cd
SHA15835728d197812b2fefeb8086001c36d73512755
SHA2564be72a9bab75ae9046147fe271b12d09423dda51fc7b9268f83724e031160ab1
SHA512227ca442e696a56d658f6324dac0bd29968da54cf1d103720e34bf8c66ce53dd55500ef71c970c66ccd73175e102d938d0ebcfe2f16203aed3738faea568f4a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b19146f618430aba47d3f792a6d3479c
SHA169ad65adcf181df66c49702e4a30936014ccb1ff
SHA256c808233707c9830c35ccf24207ead5144858d46ed04fae125ca90bb0d4c76932
SHA512d667bb78f6ded3ec3a7385b854f01865bf5e745d83d1daaa7d98922d7592f32363bada1aedf494c20d8a333d5ad3a322efeb29e5aabff5cf2005cc3c50aa7456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5705769c5f3b4198f56d3057f2f49518d
SHA1bdf739e06639186de69a5f00ee2689e984908c17
SHA25665f8ccfab4cc846f4d0b602798bd0e72e8b8d334201483ea4c09b9b619615106
SHA5121ee3dcb25b2e0856b05d480e6bbcb2a0dbf48b8092f967311631a4253aa94a9108846c400d7f6e2e102ab9b98110733f3a273762a80dfd65298b495a6895a7ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d2cf50b53661d4b1e80fe4210bbc6221
SHA10aabb6924ca9f322eda249b2f3027ce1c29dadbd
SHA25646049ca025b85e97826de71f66ba956c2b5454668d59ed02a4be728f4e7ff89f
SHA512915dc94710c5d6180bde939d3c83f397ac24101e64a19a9272ba5aed2b91098c7dcc3d664b63691e295d40fad48481cf01a8fbb61a188c92c52cbf9775121985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56ad03e3eb61b9495770afcc62f14f175
SHA12e80f40fcfb8efdef82cbae3c5425476af49de4f
SHA256e26bd8d7b1c579d9b1546ac388ddb65530d149667321bebd13466a7da8e896c4
SHA5122737b30f19d98fee6a11a1602eb41cfa94f14890373db83c6967be8cc2ec6f94d26da40270c1f2d25310174228c057892b3e857f09fdde2f6c1e33eeeaf89960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD558f2535259680637261f9524ef3536da
SHA134201e86ab7c60d92d2adfcc2c81eb2a943d8437
SHA2566c64d091e68fb612d7c4079c57718eb069db6746613adc5dc8632d20a74ffab8
SHA512c6efb8b8fc8307ab80f392e4e2b1692d3a6903f3665f2be290f8de59a21e09cd427a15972948eec8a46383da664b512b370bf9468773d298d6d7b933b1796148
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a