Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
4380d154fd6a38442d08edc0c8c61ef8_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4380d154fd6a38442d08edc0c8c61ef8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4380d154fd6a38442d08edc0c8c61ef8_JaffaCakes118.html
-
Size
5KB
-
MD5
4380d154fd6a38442d08edc0c8c61ef8
-
SHA1
44b302d61f1d24cc56682d6f297c438b2df2722a
-
SHA256
0a17fdd4431ecc421d785dce3b78fecf546cc710deeb4a57a4bd06b597fab077
-
SHA512
b6cb3b4badb8cefdfe606de71b6b998286d927e558effce40eab01f3a8f9ee7981b7f6f300dcd25d96eb57bddcb8243898809b391ad542e1fefdae5f1f04428f
-
SSDEEP
96:1TM18nU6lFnhO2+Okjy298PVHNsVKrwtnnLHoDEPv:I8UOFFGjy2OPNNsVKrwtn7oDY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421890312" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000038685d17d09ee9978a7df7f6ac56aad34de18baf41560a1506fed76454193554000000000e800000000200002000000008851bb150c5c58f428ec71a2501003965d61592810ba20b05f106d33ed94f1f20000000ae4f41974c815168cc043f875e3408e7e0a509aa49e80c0b4119c10bc1a08bad4000000003023b0b9b9063d84eea95d85000ce0402fe0c5344cdf11dc04d6ed01d0277747f18982d9bba317c9fccd6b80c0f1aea396b88e045f3093ebaf17d0d51f05135 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A80785D1-1247-11EF-B411-768C8F534424} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f3927c54a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3004 iexplore.exe 3004 iexplore.exe 768 IEXPLORE.EXE 768 IEXPLORE.EXE 768 IEXPLORE.EXE 768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 768 3004 iexplore.exe 28 PID 3004 wrote to memory of 768 3004 iexplore.exe 28 PID 3004 wrote to memory of 768 3004 iexplore.exe 28 PID 3004 wrote to memory of 768 3004 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4380d154fd6a38442d08edc0c8c61ef8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5637c2bd68ce3d3e58d9ffd2fdcb8cac0
SHA18da7bba688ece3c46f43f8ebc1b39d80a9a9f422
SHA256ef7f460776855fa9cb700dabd9458811c8a7814738383731f344b7989b0be003
SHA512cc627f0d6e81b7df3c8b9bccbb5ef4ce6a374a1cad2c9beaabc3cc9abc25f7d7c7824a556c79a0d4343ff6eac4075db0c24da45f728bb143ba71c9e86384bc7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b6cfdd73b840209cf72128ecb05d370
SHA182177b7998d16d46889a8d19dfc519cfd2c85a61
SHA2561738ff25d8bf70f27154905c7f0ac7fd325b580978bfe9a407f4277153f81be0
SHA512c1b7a260d0e6a559f4ac26fc2e539d6a0678323095ab5a3dc8d046fd72d99565d383e3f3951433701125dbad33b3e12b0d2ceba61810a515d3c1ec7100d4cf4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504d293410a25f182a12a4a7605a597dc
SHA158640556a467756de1528b23ad21e5a2906e4369
SHA256c5bc8311f808c60d23affd3a7343da3f24f339a5534f5f1dc66e1dbc48df6dd3
SHA5120d1535c17057321f60abc0193617971831d7a4d278417eedff391711ec060ccea550c0768e49886aafe05ab4b0423ab498f5d20e5d0f70f3e5e58236dcd0dda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec53e0501a4c1f0be80915f17dd071b3
SHA11ff77ea99028d900a30e11c4672df00c62f86c31
SHA25610ad88608ef1da7c664cab1d5199a72fc6591a5dbda1038111a6193a45281420
SHA512aa64aedebaec6d4175485a1bba5bf6dbaf3bffb69e6e3aad21abfeea911c80b64653f3c0a42f49889d31f78d50b7a797a60fe8e7ad679b58275605436600db8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b8a36c0f32c04fea4dd3347ac12f64d
SHA1ed9a82ad37cf58bf9d4ade9d491638fe1a5a26bf
SHA25696109e5b3a9785a9457e4744674e4ec24d09619ffba797ab8f2f727ec7c97149
SHA5120aa7c69c387b479b61431f8908ed584ba769a3a641bed1bc8c95af44c79957f7c09eed4d1c912a122a13b28f3ac1861aa9dcdd80cb5d68ce92c7db30484232c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9ba82df7a4330271b602e27aa8cb009
SHA163c58621be7617ca53b0c1e69d8b431d11fcd11b
SHA2565b24242f72d9c216cfb0a5543bffe8993a394193a669b95ce1ac9fe2c1587c54
SHA512e0a1ec6cd2a8807f01e4dc6ea6370600f7d0160f7b988bdc94103f37f86453c738968513fe6fcaaac1fd601b86ffade639dd80fd1633d454881395ff01aebaea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517c5628216abe92a25076e437beda624
SHA16c483904eabdac80552717c8fec125ec64c8131f
SHA2568679799ff35eae70af737c2c385da2974d1f7f0f091f8695a8b6bdafba79da54
SHA5127a241f777a479c474afb38364fc1525d9fb58d7bac9aa38df5b2621c1da6327c98fbbb323912dde4127a1a3622d8d1b128cfca703f959c6b32f9dcc48fb921c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58020d5afd05edbd1b2634119c9078883
SHA1e80d9921fe56dc96f59233a6cd32a7cb0638f71b
SHA25604421772a92ee893fc92ad02e3ad3ebd612a670a424a158731be56150d1a2a2b
SHA512e509dffb40e50e9a4a33abc9a260ba54fe44d2eaef4d5b4570095a1fa5940cc8506bd88c97e7e15df464d648c48488086ae226e03dbce95360ca603655daa09e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599cbc7f850367334a829632c5d0ca0c3
SHA120ce9c8f17f8792beecb554a37d8bbbcf93b7416
SHA2566140b461118a03b4f939dec5bde52d0e403bc0f9ac357f9a8be6abb45b1308a7
SHA51262fae9b9f668a65333c8445e041d3dee3f71f5b82304fa7f6076c156a60fa402f4cf016bb56c51a5e8afb3a8752ebed5d9e305dd70b366a80c5a83456ee85487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8caec0b4b886f2a4de4de0b9400055b
SHA15d89f654033f797d56a413757d215fc2f9f5fe65
SHA256176ee8fb451c43b87aeb1520c0e3f04d38f7efe6bc50c5ee413a8098ecedb164
SHA512eca3d01ae6f3c59c0eadc9ff3ce272ea7a665dd617d33a991f85c27c74778c2336c0fea4f15fe4d0b945f07cda39990133836bdb29af4090e0a719f1c368a9a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b3ea11df213af3207ad181cb13c94ee
SHA1f716a7f88413425caac30c2048246869c5a8bcee
SHA25672d63088b10bb4cc75ab0ccd534756c251b552c639b67cdd7167c00bd3f1ac40
SHA5129ee8b36582ffcb5a85dcdcaa4c89f79bd72fa085f174d82b71ead6ba71b8e04dd33c3fd440ae771afcc20c5ae2e6e6a0269bdc7589ac657eb377aec8ba180a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea1ededf0c3abf8e90b622ce1a32bf25
SHA1f37904e3b41ba9ef67ef224a953c8c60fe553843
SHA256aa9e71c52ec0651b61b91f2f35fe256037c8711aea1e4a8d9ef01b15e0ffaec1
SHA5129898002c2a82a279e9267e38c39bc4a56c4baf8641a40bc21f605f799abd7465eb10c6044c261e4210a9798b87aa4bf5c99e18e901ae3e8ad678473886a713ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59570d88d22a917e87dec083a32147b54
SHA1b152858f432442c9000d136b976d692bdd37cb8c
SHA256badf10aaa03e99e21c985452a332bcb8e3803b7461339b06ea83057207bd1b42
SHA512893b7d862e4f19d451e9cd004545f917d744b1ee4b70556af4b1987ab73553263bcc3022a297eb904ba8d7e992417643b18782a25a85924f41cdba3012d6b7b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b80e3239ec736df962d2dab9c36e529a
SHA17642564404588a9915242ab5768d649cbd27f52f
SHA256943f0fe800b882d8c40f32bb30bdc32e6853a36a5ccf244684e5123af345f5bd
SHA5121877fa8a2c7cb9af1a405d5444b90e32ec386853d237572dfbfc2b8f4984f56e2e085132a562093b33e50820578c84163aafe8b84fed12aeb9c94d27a8a18380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58808542a3778dd6bdb584b8e96aba4bc
SHA1875fbb258a091448f032e07f8923ad10a6162d38
SHA2564d0c61562843c58d0218d4a4c17bcc4be733498bcc4ce8e2a203aa4fba3c0f98
SHA5122e5f70733c3a273d4b10e1c659d82c842a02c94c7e8b3a07f558aa537f5e9c4c8960b236c678a43820264b57365d85585066cc47ac9e52603aed48515115eb9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c6afb08adbce3bec0b1cd7be0988c29
SHA14699388e106e7e41ef1f8b6675a2683ba0cdb5e9
SHA2564ea1990d5abeb9fa26102d222ce723316e36e465da83aed11ad5db2af9bea8b4
SHA51225413852d5f3c8890ff9634d5b6ce99399a5c4a11e6f88657c5348606266f57cd0c6da1745c0b1c10b8cb771090dab82a2d5eeb2e79ee948e8a2cfb6f2817f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e331ab23ea0f399b8efbdd06d4d1007
SHA1a5d5f28037152c998190aa9eff8179b4838eaddb
SHA256c4e7563422570f676b56ceee41c922a606f7aa764f8f48e2d96e5d4d5cc0b9ca
SHA512738f2b96e36c7bc1d72fc03fd7117a8eb064dcb1669c557180fc4daa3ba12fbccd59b382b13a6fd541dd1db4e9dfb99312f48bf884821aac05222ee7e7382d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e5f254df9b5036e96ce88105c2484d9
SHA17d8ad7b31a0abf497f0f6f5741366875d8de02c5
SHA256bdc2db6d46448827b906a990dbc3794ac86aa8556c0c0e96000e36c0b567c641
SHA512abb0a5c96e9d78708f0ef0a8e220279f1ab5d9789ca60d25a6cd99b7a05f248571fb867a8deb4f3981f252e465d9a071045b26af8f9c60649ae4af4f88398f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f947c09c6b88445c882d6aeb6840c83
SHA1fd9f6515c55d344596075bb2b2185b49651fcba6
SHA2562880bb2e98c4a363f331067ef8ca888906fe6bca3ea643cfbca320c03223ddbf
SHA5123bdc06de7e44fbaca58df451a6b9e0ee7173484f2ebcfa7ee65979038c7208ade4d270a6d62d703c292ea2ee6a70c02e85248a548dca5239371d6e2a5dc42858
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a