Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
4360bbe8e3afb425ac7ace28dd745897_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4360bbe8e3afb425ac7ace28dd745897_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4360bbe8e3afb425ac7ace28dd745897_JaffaCakes118.html
-
Size
461KB
-
MD5
4360bbe8e3afb425ac7ace28dd745897
-
SHA1
e788539598372aa0d06df92df4480f5ed9355793
-
SHA256
c48317e86fe0174aab508cfd1fd1cec6886107746e421422013464f3335c6e3e
-
SHA512
4721fe4eda5528f566b293d9c4bf85fff65802bfa8a42f79fdbaedc265eb669e24b9e9cc9471faee25d355e15c912eea73727a0338738080af51ed149416fe1b
-
SSDEEP
6144:Spy0sMYod+X3oI+YGo9yQAsMYod+X3oI+YESsMYod+X3oI+YLsMYod+X3oI+YQ:I5d+X3k5d+X3r5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A561CBB1-1242-11EF-9966-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421888160" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000b98638813afb2b402f6d46c2061a3572aa4753532aa2a251076ed2c0a104fba7000000000e80000000020000200000005d103f36bcbffd6e2b351a3e9788711339af3851124c02dc088c537dea8b90d720000000c897519b36fb58a80e95c28982680d15f7f1675425123ee9e576d0c5741da252400000005121de1d67909d47aa2abe1ed31f53eb8155cfc186691527de56aaf0559cd14acc355465b5852f7ff67bcd0187fb5542fbbfe0e23c7b161b87399b15ab453dcb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0bff47d4fa6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2528 2156 iexplore.exe 28 PID 2156 wrote to memory of 2528 2156 iexplore.exe 28 PID 2156 wrote to memory of 2528 2156 iexplore.exe 28 PID 2156 wrote to memory of 2528 2156 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4360bbe8e3afb425ac7ace28dd745897_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524ff823959ba8647b472d373be60d284
SHA115bb35604bac160072746e4abaf506b089a5006d
SHA256d69dfe5112a049395a84af2bd852af644b41a82afa3d92fbfc348934c3c7c12b
SHA5123ee0a18b6f0fe8469e9ce6de37182cdc51c1393aab60f6a2b4fa87766d2d3d364b0cf10c6362efb0c4d2a3e68b7175d6a262808624a27c508ecf597e94c1786d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6317d81af72cfd193be69d6b9815be6
SHA1f760c49fc329abb7ab39bfe666418bc8e9245c0c
SHA256c921c769c2e964d347de1b5d7700f50ce4f7feb3909df70fafd892bf4a891763
SHA512ea0c3fc66b0914fecc33ee19f11312f31ac3c9c9f015445e6055560539ecdab754f0189f6574dea041ac49d4a2baa168dc67d57381cf3a3041799dad648fecf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592402a52e43520fee2d72f29ada88711
SHA1877162116a67d296203371c311902fbd5981c888
SHA256f388e47a456b57f8ae477cfb4995ae129ca49f61f09bb017a812c1a7f981b15d
SHA512f335bf1366141f165120a853b3f8704cb28f3bffb100d0fc57015707c5c7fc7c13d648d27e05d21fa2d9bd14f645606b6fbf468633af95684db56ee7b600ab20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cd37dcdffce2ee55f26770416fbffbe
SHA19748ecea5347fe617d0a97789b590323d649071a
SHA256d1c7a9c540720629c8c51d00cc1f1a114fc8a875c90aeb5cd9b4db429866820c
SHA5124203a19679062143ce74382d10e6b297b61a6a299b1e3eadd0ef09951ce8b195f6afee472963ee421f944b576e242a40bbee2976c0455c45d590ccc66acb1325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3d83d4745ce2500eb639d97e2d1f46f
SHA14c30014451f3ae67204691fcad25345cf6b8f6f5
SHA2563baea36b1b98ef593fb36c1026e08421576b2fc2f77460c49c1df55d035efe42
SHA512dc143c955ef3c6ce0b89e9719637b2d8a086a695ea1880f0981a07762df67ca9a914605cb9cc9af147c24a9515e7c2ebe9e8c7f80dadfcf0d34e5492d0b37072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5566e9fe8d8499cf151d48510959d7bfc
SHA1a6d279dcfc730ffb9f5934c8d507cad077a59565
SHA25660d27c032c4deb58541664aefcd6185adf8427658bd66f993a305a3907cef157
SHA5127f3a8f2dd942cea5c3f62e0de67db309403cf3b1aa262380d016993320540c4b69159f6606c4c75fd32e7aee229a58fa429f83b674f654b5f7477d80aaeed6fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f73c37b11800d4aa4098b42f92c4c13
SHA1a9c53769624687df38bd33a4bdd9d43bb2d8e1c7
SHA2568f0c96c56e75693b4f0cac7048311ce3fe8320673d88298f94d8e7e63db308f2
SHA512c5898550c3f4c6ace8cf1bfe7d08b1b7c1312d32088ee787df70c13d566ffbfcf5a9e2d99c757c7c44a3cd02f4c26ae4ece47c537ab886cd27b7390e97684fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d68a9c6452f0da8d91a916be602da639
SHA15b954bb6c9f90adde47318a7fd34707e3376177a
SHA2567bf94c1fe7e36fb3b6ff033186754c16f2d94ea2132f3fb011515a31f95d9fa7
SHA5126e96d70afb1a8a2bc8c2027a167afd91476c48f2f5954f1b8f3f0e051d362e206e017d8aa2857031393b83cd7016002ed5a7706a7de298ce201575f18846fea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9460a7c0bf20412112c895b582ea9b9
SHA1dd8e978c971244505d8bc36e80e12a2c75d00df1
SHA256bbd12c22b3b0b2811455f17e4c3a08dd477c1f6fb911d10f607e7eb5a6b01e4c
SHA51258de0543be639edf92cc7c6715d971812c04c4a7306eff6dba0949ac6dde616240b303e24a772b3ee12bdaf269abc160e42437efc37d8c01caa95684ef3455a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e675f2de46c92460ea18fc9391c9d139
SHA163018955a0c7e4c2e08546d36e5819b9afac81a0
SHA256ccdcee9d36afce03c12e68103e7f6b76f5e1d3a65e18375dcb14c83378763029
SHA512d45b7d83ddde463f7c04ef693fafc3a8c5a1d68d9bd476195cff16b527884996b7942f59ae0ee6fc7bf8babedcc12ae5eb41e5a4f451bd473ba56fa90644d655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564cdfb79c4686dc994ff2dcc39a9642f
SHA133e860941fbe1e2c79bfb8aab071249110350c03
SHA2563809b769715104b6dbe4492e0ef7fc5a4b1fc829e2ec70d8395e15040a83ca77
SHA51231e80d0659ad3b11080b91e494cc03f6f35096273eae10ec9be92da959f5075e609c4347d6f96adbbb9dce5253c6bbaff5cdd7ffb0751a8707060f03490c9b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c3d382da7eaa633c559a6d7d0b1f373
SHA1b186eade439dc5d257e476932109247e19c74467
SHA256515ecf2bd85e08b7941f1b91890505f1c829f7ebb8f41aa3f1011333b09368c5
SHA512eca7582a96a00b59863507f673fde65baf0cd19458eab8b1ec1bb026db397334c66c485787fef32c06b3231b6eebaa3a908a68a4082c68540f0da0ca0dc65c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5510f782df2bbfd95fb96abe964bc1ca7
SHA1c2419118db2b0c2841e975f91579e382bfb060b0
SHA256030e81bd422006d9c00c8ff409ebe3c2630fd4d74f10c5189789cd0a73d277a2
SHA512055be602c232915f035bade04aad628e80feeea5c6ca27f694394d44a0d57f471756f8d41e7cef5c7744f1270645247b2803e02b30fdf7b86f0a711f71ba2a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51517e69c02848fdc5b27837299199e11
SHA1b26f11ee18a8179d17623dbfebb5e51f768abe94
SHA25610ecc79004b41858eb30c88ecbfc25bcbc617beaef3e832b2f35c6310cb06144
SHA512bac582b0258997563204d52af6b250141095c8e753ab37ca2f1a11ad725a30aadce6ccfaa3a0e548c6d6a473e3b4d9a427e27714af32f52df1c51176a1e1f158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546ea46bd7fa049ec5aa328f8b40b67d3
SHA156de6befcdf0dedc4aac3c6cd2678907447b0522
SHA256e6fa62eccfd247941fce00c429471b9d35f061c9a85bd0f487d25330134ab273
SHA51265b77424b4df09e39188679ef13f51a66dc3967a134f0da62269acff38e36c266e1d1d744d2683c8db1d1bce4184ee098d1a171797591b8d8b8c2e0e360783eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cf5c1799ad9a5c87e4b0e68c9bf408e
SHA14c130310fbf73c7b5b9ef422692135bb75432b68
SHA256ffaee72ee974902501aedf6042252d59b39a26dae11bf8fbbed132b3d56ab8dc
SHA512e11bbd81b9b4b96be9a3febbd066916a55a93760190b003bf791161302fca1d475a79b6c8a214c9f896dacc4fae3846770ec0b539a0cf8354c7fe561a09f7e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb5055a67b877268f6a9218e53ae60d8
SHA11d541b449e464a9580f0043606e319af9be18bf6
SHA25611b45890038eebf56c3fe09d93c5dd9c212951fcc413d1d9e9bd9fcd9ee2464f
SHA512bbd949b5b5e85a44b3cc7518204dd8d9b572b8f0c7e011d5f4622c716d387e87473ca7d56ae942d7ea6664e78ae72500526226ecdaf0258b458f971999a80779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526aa54d418e843dfc2ed4c4f7c4236e2
SHA17120006f98d7de21d673463b60a6d35643538a31
SHA256e17e2373a5aeadb6704d158befc90d083c0f89bd403f09b50dc8440943cecabf
SHA512608fa8ee49729216be3bab952bfb444160c3080f55fec0df9f821eb362afdb984a3bda246f54a0e1c30a5baa6e9f1989c9dbf048c08915f3b7b90242a78a0ffb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a