Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
409e7b10bc194656de6b5cae0d295f2f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
409e7b10bc194656de6b5cae0d295f2f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
409e7b10bc194656de6b5cae0d295f2f_JaffaCakes118.html
-
Size
47KB
-
MD5
409e7b10bc194656de6b5cae0d295f2f
-
SHA1
cdb155fe2b341bf521105bca1d2519d79c0325f2
-
SHA256
9b0a12022d4c700142250e7b40f5a408d0b42035c25781925ba9336f993a0b2a
-
SHA512
0d4fe5b82d84816674e23bd95e02ad7562dfdd2fb8b2dd9cdbb9576e8ffa51a4fe043d27b2358a1471d85310b90273523b7acf704712f8987466923a223cb167
-
SSDEEP
768:VbCvjIPCkCVCvCvCPCPCCCCCyCyCpCpC1C1C1C1C1C1M6sAXA0z59AoqJAnhpzqu:VbCvjIPBEwwaaFFPPwwmmmmmUM6s8P9n
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421832158" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000633317c08c1801f70f7ed600f05b0fc3f5d423ec230e46e9aeb3d7773a6325c9000000000e8000000002000020000000ca83feee7f0cd9e5d0a79c84b011a60ca67999e1d575fcf2264aeb6b9f46c20120000000f794674c7bff2fe1182a676e7be1fc89afe90aa657dfc9a27ec5002a3dff5237400000000f5c5249c348a31866e92a9545c0049999fba9baaa98c86a50d9ba59386324532bbfaf3081739c80a339297b5c10ec9598524cbfe586137ac8275ded16a559a6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41981E41-11C0-11EF-A9A6-4658C477BD5D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20bb7c17cda5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2604 1728 iexplore.exe 28 PID 1728 wrote to memory of 2604 1728 iexplore.exe 28 PID 1728 wrote to memory of 2604 1728 iexplore.exe 28 PID 1728 wrote to memory of 2604 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\409e7b10bc194656de6b5cae0d295f2f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521d071b14977dfb177854bb4f537b7fb
SHA158cb027328bae984537250011db814049803f1fd
SHA256586df1ec07ebec31a392294f566346500c45760a72ef5e63ed60070a279fa89a
SHA51290a36ef4f583bd4c369ee7d203120fb32ed7a4a563841a776bef9caf7203769a4847551f042a461f847a1fbf6069fe36e29288855f342fd20abfa873da0e7242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dde28668e000d28b072b28b1645b09c5
SHA1f795274f92d62f5072d033aef7fdc348ef517ad4
SHA2562ee57b1f3cd788036db1b8fd37849bb00890a5cc0d3f34818705c1a6f2ba134c
SHA5126e7a519c1e5974df2a8bcecec339cd2e48f318fb8faa5a517a6292c0aeccd2252c9a94581d3bf54daf982b758ea45741d8eb34e07d037b48c9059bcde2bdad0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506b4a9feaaef2f356d5d1ed2267b2026
SHA172edd0e52fff6d0a80b70a5857ac28fe91a7936e
SHA256d822354d4498dda3a8ee3de0546c93c68ab1bd650195c05dbb12b687010948c6
SHA51239933d64515dd2f657dd44ffebd3c59ad03f28a2a5be803936d60b3f3e803c3e31f850ca320d7d48c30f59254f3c36a0a7627e150cf9bd15dd97531ada465ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dca57aa25ce2c970084f38f5d134c5c2
SHA16eda66c213ddd4514c799d5819236977a99fa526
SHA256db069586e9ab0da296c70dcd674a78fb4737746422fe3a6635f32d6dcce0d6be
SHA512c9db24095f4ca43a1ba113fa1405931d6523c2d43ce532af336b0ef5b4a0f94fc0078db14affa17de396ee07c7e89cf56dc8a4cb6b2c1ec50509ce86cd9cf817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564c5fa3f530a32cbb606d2ec070b14e1
SHA18aa5d44fedc110698e0d663d97f443468b5db5b2
SHA256dd183d46ebd7c7f2e344c0e7b309ae6d7e2dab9ab02395cb819a77a32b785b3f
SHA512bf88a68bed6abb7577b767d9334ede91e59f759726ca0d6362accef2ed5fa5b9b1919c76d8957089dfbdc8ddddd45289b4c7764cf46789653399a7fd852b520b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d28f271788395d09b1a7b828875f65b
SHA1b70e1ae71067c60851e688f644eb834d90f774f0
SHA256c508027e235a69c30eee811f79d8d9ef01229d4cd20905829b3ec28062121f96
SHA512f35f4b87db7204269a5604d0eb78b55d5ff02bdc6147a14fce3b9e8a4fcf377e080310c08acb0dd86e5ac870646df1081dd26c6dee1cb7df097cf969a2760252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4e2285f1cf7f117b89295226b4325ef
SHA173090958db64a8955471c6c94f727a8f20c920ae
SHA256887fde3e62f5cd813257af11eb7d9f431006f0ec6ac0796f333fa8ca243d7dcb
SHA512d2076b1ae4ba95e56929e2a60defc11052fcdd186fcb2c1688bae8949603e25eaa93d335e91b5f3dd67ebb093103a7bd6bb525aa5c7466e3ccecb8c6d6f4c045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544c9e4b882ffdec2aff9289c5da357a1
SHA1395c05a9fac2587269e80b367cd40024d9125b87
SHA2564d82d59c0bbfa99a5aff3d69c3f6bb1d064808cd32bd1d0edfcfb6ea8a4a15cc
SHA5128974a4b3d8208d874d9d64b794955c57f309aee68a2625b20c7892bb6de703a5be6feeae7f1ff18b318c8b2af7903fca0f51d5f3a1d119871ab348d3e009493e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a671d8bec8ecf4b9fe50679da9f02cff
SHA1e15629d6888bb3a181590a166d4f01da3fc6a988
SHA256fb72f740d9f2889ce34ff3606831a9bb57543d29d35fb137b8c5af52553a0f3d
SHA5122557d4194908f8f6222e957e66e51f27cd06d555d34e1c17c9ee3cb146e19f8e6c546143369182335f2c1a4fcca8fac5e38a1a30da31eb3e178b78373d62d4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50724d17b8f490fe089059378da58e7f4
SHA14e24497ccde49ff1f42a41b74171d2b89d78ec5b
SHA256bbb8b777a334132fa986c43e0dc21a020f21676ce13f8260399f5f78070a48fc
SHA5121b697724045a34e32d551a0b01bf2283fc9608f0631be69ce991b4449eae01c1b4729f2219d61b2e53f8fad8ce9795d363a1d0e83129e2eb16778da2783a7e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dc2a8f7d9ddc5d5206727c706d1dd5a
SHA1c30916d3a49eb8b1230dd3ed9286540973851b47
SHA2564e3619916f1622ad8eec095fce144203b7cb4ef79a4598b5ac3ee627a0896ffb
SHA512f3baaaaf4dc56f1bc0595fd932a44030189a86e86973b19439cd91ae54d0e9b4c1889a5cefdefd3ea12e2a1fa54c1170dc614ba913ac36214b0e776a2b3493a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d203782f24e687f83c9ddd96150ee02
SHA167a4c67ad58fa1032bbd6c534df603c34986ece4
SHA256114a56b7f898ee056853a70fbc2621faec09942e68daf8d0576af68df471c3bf
SHA51210c811d3d06a37c6b403c40dd7c113c7151adb459bd2ebd5956e214a643f0e2db93d90dee1438bd6610e3790632a8b2be50a376d6a2acf957bd3a1aa7a31c312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558412045146852eb69f3f5912414c61a
SHA17cc951215243d840528432524e96cb5e81fdc0fe
SHA2560370b094b19e1efc2c0a049388a984cff22ffe0ef88191a49a30cbd8b3bc76c4
SHA51231e6ff8a21068fd665132997150090f2cd4612a24680b1d7f26ea5011fcbc27c69ce76e0e0c7c11ffaf86bc989d74e6f5af7097c2805b96c3e130c0774ad4c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ab6f2704dd294fcedd98aaef9d7565c
SHA1cbc10bfe35c882392402f1d3d8f5d0e5da0b74b6
SHA2562faa327eb195b68c3e58f4f9e97b4a00b56692333fff817583cd118cb3b9d331
SHA51299ade0e4b252f332cc7904e54e9fe3bc43c310502f1e789ef1170a0e42bcedfcf92dac5e74e54a8cca2af7034df9bec58b42102e66b261573bdd120e5f82270d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd0976081409bb25b4957c02bd1ee54f
SHA1d1fe8b936d0413432d9885fee8185c3d4d7746a4
SHA2566c324b262bb26a32a2d259deb605c050c70277e365bf3dedfa71404ffbf5c67b
SHA512178299fe2c5bcee035d493b4d52920264991210f82015151b1e5a93d6dfecf0f0b225551a70bf53485b45358417fcd76532daf560eb8b0b21d7ee9da7be704bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7db923f5f58548e03301b4b03268e23
SHA11847d4cd40c86e8b6e8fab589db6c2a133812b8a
SHA2563284c7b8366fbe79194350dd8e937b204ff7442006204e52533c22dec43d7d5e
SHA51271dfa5b5466dcd9ac9325038bf3e06be53c46f9cbda7529755b80f733fbfe0e42475d2f68823729b02b4e053b57a4a7fa5342ae3ad8baf12e9139f23c7479b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5928d8d5d2274149157018fe7fc776218
SHA1f2fb37b509c39e2539bad60410720e9d18649dfc
SHA25609ac4d9bdc55a6794d96f886243f9815377eee302b12f2dd2eeaa5af91773735
SHA5123db6829d4e14126b89dab679a551b9ab8ff77b4a469705a2af2ce04bf73bc00f19607b35fc26d0d3a4438d76f00c2cd394ebda6bd53fd978a1f4a87d31a52e36
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2XHJXO3H\f[1].txt
Filesize35KB
MD5fc401c32d59141143cba12859a177034
SHA1140dfd296fc1a360768de1557827bb94f2a5602d
SHA25658b90f5aec01233f5f26810339a2a6e4fa9b98d8353d111a03fdddfec630f76e
SHA5123af9dbe01e3c3f71f6c9cd969ab6d6d1d1abdd36127ecd27d0c5f44a919e29c3ca4178a48250460688fc2f33fda850bd8c82d2935e2f0a49cf97eb22c71757c1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a