Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
40511f4b80a3299ad67598a02b361f20_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
40511f4b80a3299ad67598a02b361f20_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
40511f4b80a3299ad67598a02b361f20_JaffaCakes118.html
-
Size
69KB
-
MD5
40511f4b80a3299ad67598a02b361f20
-
SHA1
23bc47180cd063aeb62709f6c82c12b92df868e3
-
SHA256
665ea28ba8d7dd5d1dfb062bb4bb8f8c548ce9dff282c85671b3ef2376b55406
-
SHA512
19b10ab3153e0939a14eac115993863bc81b4b2a51b4c82e6453e36d572943b2df758594f8f437e3679a9a7b5671d1570c9d842c036c0a2df6532b7ce17c85b2
-
SSDEEP
768:Ji6gcMWR3sI2PDDnd0g6rfG/oSh3oTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFA:JykTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421778573" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303b925350a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F01EB81-1143-11EF-A3F8-62949D229D16} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000e2171861d6c4fea08d8a5c39316ffb5b3371352d21173e9eee2e70e70a903ea4000000000e80000000020000200000005284b80b6cb6eebb5b0f3ffc57d2e639b6f8f28da3846b6ee9d222613358c4cd2000000096c97598bb0f681be2792f1df5cea3c8c21fb8ff590bcb77aa068f518bfefba940000000eecf8d312ed418a32ab9ae1a314ff769e72aebc10b8a75621db81ab6b5d2417180ea7bd4e3546ed2be77826da0f0c5044dc968db88a2a7a9fe459e2394e086f0 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2116 1992 iexplore.exe 28 PID 1992 wrote to memory of 2116 1992 iexplore.exe 28 PID 1992 wrote to memory of 2116 1992 iexplore.exe 28 PID 1992 wrote to memory of 2116 1992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40511f4b80a3299ad67598a02b361f20_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a3be746aa7a0cf1bccde5bc6d81bc90
SHA13d42e9553cd164ed35873ee774735cb400f302a5
SHA25684f41d4cb70e0296eb4b45504b4631ff174948e3f1ca34b2d37ffdf5ee28cb0a
SHA512291d75ccf9f4c9d5d9ad37166f1437531226a768355b47a7ed03f36df6c9e5f67006fa00d314cdf054d6d8487e25879e8a389423bcc323e180752c7c8db48797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d735e5475f2e37355130c99d806db4f
SHA1498047515da8f0482cc69bf9732df930d458016d
SHA256e525a7cbc5580626d226323dc28b9935a7ac5b497e542c2e5330e0a5dce6c1a6
SHA51294ee5cefffb07dea3acf06a14147e6fa3cf210958d405816484b07373b3e78d7414a7680b8d30623d1e11808089983377f6e78f0db0014d4c721d6fff5a00fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5399c693d585f6925f80745ab01eaf921
SHA1335d9cfbb556dad71752d7d4f7b3ec7c2116eb6f
SHA25600e9268e7527433dceb9c120cdfde2b4d9220335570679cf81afd276aa7c1c1c
SHA5125f9ba65e0b5c82c9c66166960545e8157cdb9831d756dd002534e693512e1cd26389de48cf908f049a64c2e63cd46aad6a29664f5b3c120ba62907622e32845f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c504abcf8be03d81bdc7abbfa4d8283f
SHA1ff34868b72d5b437c5fa6cd9e23ff7785801589d
SHA2563559303c45c3ce2bd91b856c6e2a327b018141f3e356dabbc451ea9022d7869a
SHA5128ea2fadc73cac63f1cd60893b4c997dc02a18461abda0ef0d0f367673e6c0d86652f807ffaafb934489ef19fe9cb59e06bf63c4e0537791b578b7271bcbe511d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2d272189def31b633be9d359290b629
SHA1bd2e5f3b131584f923449cc97b10e4b8805d104d
SHA256d1d26651abd7ddddbab5c074b9a4614e91a27e330a0a0331abe75b9f159c3e0f
SHA5120dbf295bbeb2a44a21be615340291e7c4bf196f37f6064e08f9c31558184df9fb12f60fe2ede4f98c077aded336d4c219b4c1658ec9be84b11901bde2653bff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50485d4ae46956cf8465d4f96e2eae9ff
SHA16df23507067b7bf56d9af5383194c379b1d4a547
SHA256c76f64ccb18545af3d22e8b77e1a4036301db254c4916820aecaf469b6ee9100
SHA5126fc71f1ef43d8c9cc1bd22b346f5e3f7d1a7bb7c9da203a91adbd0bf6e10a984645ab043597b54d5cb958c96be16176953940d247944d746a830b784f550bd3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5080746f6e409e0c282725f20c522caa5
SHA1167750b36d396b674d45efc1561c2e5f3cc782d5
SHA25622f0a739cd8955a7a25219703339ebcad56de2ae27f52c7d78c89bf956cac23d
SHA51200c5729ed4818e40655e13a66be4bf2596ccd32ccb9960d07f35cb4fd656b4d3f11fbc302341a7bbf4417c42ea3a2306d2176cb8b906e57e88c701ddc2b2a339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be23fb37289d874387f36e4a61987e52
SHA142a41d4db3406c0183cc9c33cadb4a1d63d7440e
SHA2561612ae7f6a4daa257ed4b58f253b2b1a6d6000b16e960118fe843648db6c7a22
SHA5122acd0cf0395991d422099f60ed83b1c510c8df102ad94a2ab10dfb90a761a93d5be0dd3c73f8486a7c7966158dbdd3ab8e72867c0a4239ebc51c0f962e38d473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555fc1a46b9e6db6e3800b5e8ba663560
SHA10a69eb20de30b6432b47335c757a0750b7996ace
SHA2561754bccd7288e468ac03a6f03e73475d40250a516d07c03531fec813ba7d94ae
SHA51278023fbd13315dfbbadb1d1b0695b4ed3ac444a472892f7bf3941cecf4600ee4c2773f8e1c175b7f61f05e6d5f100e315630d71cbedaf1ae6bcad67fbf4d82f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d142355c12f0abe6168a5b9670818c1a
SHA12e41665a91baff93342f8298b0fa420cc52d25db
SHA25673327dbe8d27c312e4a4bfb15e84247fcda5cba281a702023f64936482027cc0
SHA512dc828832144a0de663bc2af2819aa7ed7b3c0bb9436db45ffce1fb84cd45cf72616c64841d42021e98735c1a6effd5e01ca69a6b645932967b322e2016a8c9b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55078271f9236be47280ac6a6f5307c77
SHA16e85d15ece33765f9d57a57982d11565b5a1aff0
SHA25636670b03c34587ccf236ad1ed7c9fcef5f885de96dafcefd8f86ff1137e0757c
SHA51231205fb083d6b983072620a7696fa0f3794dd49ade0aac1173579e4efe64d7578a9e050d96cbbaf725ff10a608070d2d0ff383f482a854fb1a4299524a221cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdd3e562bd211139f35fc25832edba6c
SHA1e634c5a06b10ea27d84c29881be915caf570e126
SHA25696b0ea393ac3413f5eee22e459fda143a000c3522a0a54b23e9a1e9953ed7368
SHA51270d262434b2a05be3a5cb60d6a22a00fe8389c23ddf3f3cec7e8ba3014c0b487087977465d44be0dd475004ba20e9688389ee30460db26f14aaf42aa12cbec38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57939ea060d7954ec766e5c351dcaeb8f
SHA1362b1aec136e21f1dc57ef85ed4c99e2da74a7b3
SHA25621c0b36f4056f2d0b63abeb6be86346111606d3c7c77423f20347b032158f68a
SHA51289a635abf61279c1a0c9b11cee192a9ab48e4ae048efae0677fb36400fc276c033ec5861e6bbb89f85bb78f6c7c62af36b678fbff072f5edfc571b78ae7b2c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5766d6e9dcfe95fb74ec52b55b588ae0e
SHA19bdca1019d7bc36388341063e0de4732fac8bd86
SHA256bf1057a2489e2b23df8c9ab9ca740541aeac69653133c224def01dc09cc22109
SHA51225925e232240e36dc9bde604343db4c1c179dbe55297d3a36a3d84773e5de0154e5ca4ab1a1f79cd048002b740172c6626dfba47d84900b4e56a5071bcd38630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eaf96bd6f23d52181d858b2e2c05346
SHA141ecebb2398f99a33ba62ce004775461c2c98491
SHA25675a15f0f39c042d543244d21482c18c2ed2078c8f896bf80c6349d040023fbb2
SHA51235bcde16403a09b0a06dfb03911d051c9786012bc43eb8708af11c8eb88db3ba7000a095c18748cf1273c7342e830f9f5ad852485a05facc9fba39238b0adf34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd9ece2a5ccc796d2dc069bb02c2ed83
SHA17ee8643529791a78123705ce7e20dcee38e3ac1e
SHA256f881d0625ea1b748e52dd69382733cbe7a61f1c4db29be327e93bdeb682436d1
SHA512af36b0c9667193363711cb628f2fd747857095ed00fba3542d07520d4d884c255b41ac81d42ec4a08a9b7e7df3be4eecfad58df26c39d9698cb9097f20e0b69a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d3009d9baadcde020c0955e6e7d492c
SHA1a5409db85bc1ec25d5d2f81914a0a622274f6bc1
SHA2565e2dba3c4277331d2ee0773090e4ba92e2ef070a8e3c6ac6085f27358771f9a7
SHA5128ee1e0657396c7848537e75260b366e87c1c42ffb5da8beca07bc191d9323d4daf05599ae120518f2a61f3e23f6ea69dfbc01503207e431c23c0629005e0cd54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df69fcb37827bcc0d6b77f946d9976a0
SHA196be56434bcef8914ec901c935a2d5e5f5692c39
SHA2566d4f35184be28781f91ef65af830203f81cc952cd77b9e2f485dbee85a45e987
SHA512dcd51a156c52aa9b1c5b276f0c54159ce025b5c7f500d738dfa659304755868c025952e10a523148862108276a89dcb81126d000347bad7e7a56fcb91af53b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a8b6c5fb5b1b6f2d74f90d88658a08e
SHA14d0ed6b4a77c49cf51b0bac325e3a81f1ccda6cc
SHA25655f011e76a4fbff40283ebd6063840f1f4743d380b35ccc289b1efb158f4db59
SHA512eb53e9d3ecc2acb0e501fcef57066d8ef9cd62d6d564b6f34002ce9e51a79b99c058bf42823728ce30745bb46e516f1a06248345e5cb41aeb3046f572f2316f5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a