Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
40b864337543ecfae6458b0f62bc8c20_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
40b864337543ecfae6458b0f62bc8c20_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
40b864337543ecfae6458b0f62bc8c20_JaffaCakes118.html
-
Size
63KB
-
MD5
40b864337543ecfae6458b0f62bc8c20
-
SHA1
043459b44aa7026ea171802b74a0f0f538bd20c2
-
SHA256
356ec8d736d7d9daa32195e08743e8e4795d6e26fb05fc3a7c11a20dc8f2cc68
-
SHA512
23608322ae2a62a26a05b545024277b7236c10289b52153de2766b17e2953c63a879fd14518cf078da505065db341f2c48f078a4d0e456814f267bb06427787a
-
SSDEEP
768:Ji/gcMiz3sI2PDDZf0glJ/6EfoTykyCZkoTnMdtbBnfBgN8/oi2c8QFVGys//IjC:JdyTTFec0tbrgaMc7NndC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90cc1e71d2a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C7806E1-11C5-11EF-8745-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000021ee5d27841842d4d9ea02ef35a2f949e7ffdb5671f4eddbb2cff9345416d302000000000e80000000020000200000009fa033e650887bd842f8d0740600f0ee64b389debfbcf60aabbc99c40e6542a720000000dfab4d5d56447ff130189eb1ac95d252a841192e510b34a383c0181a9fadf8654000000012405243908cd46c880f7e5465776df2e7f30c6ef320389d1173e543ee8ecf69c3714d06bcdf7ec3989fe32b111cf51868073846f80f3c6289664f1df4c3b0b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421834458" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000ee2c14ae7c726f277ace005040a55e391c8b3d1e45986080f763290c82aa6c8d000000000e800000000200002000000041405dca4782499ae5c69ba0d9c5a442b8521c5f6f1ab98b613709fe0dbcc2e290000000c49b03492395fff4e42ffbed7adf7123f8a8318bc05a88d91f80d7c05273b4ce7e7c65502290f6b8564057e2d3125c32e36476fc7b0fd93aca1569ba64047bedf8f2564149b380e4e2032638f79a5ed2313c0182818df77e7a8a984aacea715e0cdf014f7fe06ce598d5143a0ed1c52fcd91900166ac18df8423072163a911c9f92cf874cb19ab0bbf7428b8359a24f9400000004ca8b76f5210018d9cf3800105bad32759b5636c968e4c286fb39e6c70a748098d81f293d41c8056609515bb0aad92c36705a0964e3ba12b69d934a223330252 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2036 2240 iexplore.exe 28 PID 2240 wrote to memory of 2036 2240 iexplore.exe 28 PID 2240 wrote to memory of 2036 2240 iexplore.exe 28 PID 2240 wrote to memory of 2036 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40b864337543ecfae6458b0f62bc8c20_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b84e73ffddb7ce9b50b04e5057708f78
SHA12716e33cc12e7d50663606a13ff1a30e494b87aa
SHA25689371480d40820394381ba5f1eb3b6206d39d8ac7ecad48f86085c28af4a475e
SHA512ffe37d78e9d9cb461d4930628d3d8b2554afb585791e516de63214a25dc3d90a96040f618f787a49f38c3332ca175ad459415a8e5f4e3c6bbee6187adb5b6267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585bb1f5c3ea117061881a5320fb844ca
SHA1860093c326a232ed578e652b8cafc12431eef114
SHA2567ca62e4763387c7b7cf2159b4f750ad63af251e33e6d41bfc1046fa641202b2f
SHA512066caebd7d8df17c016d4d79e1fdb6fb6febba2342faac777b242953057fee7e5ad7283309db89cb4a3f5cd66083a9b94b0a7638d61fb96d49d3e2d7ff2c9f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551ee21f5f887e63ead830991a5972792
SHA159f5a43ae6c7470bc80eab34add8ba8760f6dae3
SHA25664359dd76710a58d490a00386f4f00e223f9d3cff663e4748484925cb4f553c7
SHA512d37c79eee9e82df0266fda863c61b05638ce5d15e046733e83fbb2f04fc9e4f6a0db9a4a9942690264675b2d1500e46f3cc75d1f31caa4fdfbcb800dedfdff4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd548d01ba856bacb094041fa9ba03c2
SHA1e7ee890cf20791bb0ed857bbc66ea15d48482650
SHA256fab4d2d8b6e7728958b56fc2552f5f26d4095d0399667b5503baf08c57357067
SHA512a7d73cfec5bb516d37b51d527dd0fc026f0551de5950e30ee1224f986608e75818e08a86ae83e519ed9c88f13f353e590eaf2fb47daa955efa28f357a5f8161d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5338b11ba5f5dc7564a5cc69fb56ac5e5
SHA103c8def3ed53e420e7a6de4fb1a6900d73983fcb
SHA2561c4cc9be6289ed28730d4ef56fe4a92e86b6c4ed3ec7ffb6921d27705b122ebd
SHA5124d98f1f79b27cd2067ee4f21a546e5855d43abd052f115cfd3e51f8ecc784420eddcffc313f0b8ab97860f9fa043b1e65d5dcc0c24cc263a1ba1bb6e6a3ce770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcc24f31e4b6ccb501bfb0c4d6dd40eb
SHA171efd553318fc17f312e57408c3ce0ded7943efa
SHA256f0ea67f692f7f070fd1906e673017adc2472530b24cc5c1a7617ce2367a4dd6e
SHA512363236b5dbc235781aaa57d3818b72359e65de89504bcad63fe4b460caf4a04f76304ce930f450a9652655dd6e145618b4734359616de1726fa8978aa2ea32fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b27607d7fceb112b9914a7f5bd8ca1b7
SHA1b9cf8be9379e15a2ca6bb8b07fbb618d2757cf0b
SHA2565feb3267c0dda017989e095c3032e335309e694829f2d3f246f352108649b968
SHA512d15fd9a3866032e949acee4e14c17a95ae7f6e15611d83c367852493cc6dfe27a507fa4c3f946f932d96b50efb0a442f3df5d92f0f1b6727faf30b5bcde31c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c8f62351aecbd2f0bd21c13a92608ac
SHA194a677cf6f1d9460ab49b83a171b1114931cfc05
SHA2563189d471f897e2f8411594bae6a48f15ce95b0802eeef3b979f8c4d406c491aa
SHA512af86046122ae72ed6fe7a1d8f8590dcc5f91c20320870d627b88cac9c7f1876321c9e788fb15e3968c099a02a7264e4393c2b3a86047b9818163eac8e1d39cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5193e7c85182b79f8994bf75bdb087fd0
SHA1f00d1ad6b5f03f3b54807394c665c35e331be7f2
SHA2565a7c60ae581831b4188edc974b6684d1e62a4ce074ae0f72eb084dbf4ee3fc79
SHA512c391ed7d1a29cab57195a291fe6db934541305e8acfb99aca8d40887b9225b294009e57c7682fc8548afd17ab2dcf534d72e50338b743259434aeddc208f1674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee880f3232d0aea21e3c3aa72878e79d
SHA1b75050f36c9d83d026c78f587915583ef6be37d8
SHA256d908f9c9f8a8847ce5f272d6b96b8cd39afc3efe17190eb3949fb21ed1978ccc
SHA512cea0ca040cfd26ddccdb8cd0bdef8ce5ed674688a4babfe4983dc1898a80634bf39d0695ed91622ed2e70783d9315f2b82e5ab54e81010224c8930c3fd2058c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54494fc441738cda35303f8a8c8073efb
SHA1619bde7fbff9c53422fb8039872b0af2b7f1f2ec
SHA256141259239fcf41cf8e67dd08dd68930c355ae8e220e0499eb49b057a40cfb77b
SHA51228d18d553501de166c87ecf813c68b7033382947b4178f1812d77bfb8d3997d571139f3446426a020fc5ed812a5eb3327bddfbc0d908fa63604f0b807eb9c03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5393c997448394b23c5970b1796ae51e5
SHA10cf26dbab09464c28051f7643bdd240a8a17d3fe
SHA2560115a708c4ce482e55188d5f5052e4665758d78cc1fb2c972cb85ebaecd885bf
SHA51278bd587f61befe2c3a9ae2306e60ae4d3ddd2222f6f572b8d28e12182e2cd8d8c385e29c395c8ff6386ec30e105feb4e7f40c2032a7404cb903e2dcabb94ab60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5170b3dcef42449a3fcc66a363b434925
SHA112a3bb52d01d63e1f80e91a4e8fe734528f0d934
SHA25643f76d45dd86bacb29ab0f6d7f93282e9d5b0e4166adc300cfc526335ef3dbfe
SHA51252ed4268becac40ae093b7ef5837be0dfd8cb580e4f9e66347124b7a11aab214bf3fa7592a46e10adf53704a816af4c6e0e6acc857d2a3fc0baa5c8a9cf88c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd01c1cb687614577eab19335bac5c2e
SHA1e1cfbb4707a99b2839926292a82f1cffba218fca
SHA2564e5bfdd3ae7c89ca4e680180ae992eecb4287adaab6fc57bc3429097db2021eb
SHA51258b99f34b6f43473ae18efac372e6cd6eccde7132914702aff5d765127d0c77d5f7079d723749df6e36d6504ab7e097bd72db12d51ed35d5c3eb426af4afbb3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51108e39d7583645462f4f108873883a4
SHA15f3a1cb05c9e90aa90651bb143082bcea5cc8367
SHA256784b15848829c1f50c82a3dec069717bf80da6f102680c9cb1c7f7dbcf6867f9
SHA512864a80030e87c9057c709beb5315dbca4016219cc4b2e283c786add263a91ddcfb06f6ed24794e00e8b4e80667d6a1ef30c86dd1b035c08d5edc4282de13f7b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549a764ba80d5ec9d530e96c32f9b12eb
SHA199d276b134fe56854498db90285270485a0cb6f9
SHA256d311eb1bf1207afa437ef6c7ddb741eb0d3786822ee05f3fbf50b5b7ed84a6df
SHA512ba1325b25e0f462cbfab11af605b253df6886ee70ac3bd33d6577add0e0896406d5264e7f2a356f742f02476d83bb30dd9018afa9f1a23524e2b8a8c5ab00aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c666b6aaa7871aa639c802fb1e3a2a03
SHA1649e4241a3763cc6ce83aae9d71aaa66f673b2c4
SHA256ca7370500bdbb366fd4c992a0d6cd3779896394df38652955985e4373595a5be
SHA512d98983f482cef7a7b266849685b6d8bc273af437698b6ba45dc5af95aa1e6464c8108ee867d7908d651019201a4e66854f6a405db2b198c1fddd88f11d21ca39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515dc26a3e336cfd4e9916391f3c64756
SHA11532b154ef4f6ea1b1a17074b47468d652c594d9
SHA256ae6ffc90465ca85141e8ad2cc85850652310fb58a2545a170c0e94c7206adaf5
SHA512a68e5ae79ad7eabe57430188097fd9edcf6e71ac71ea14dea919edee77b3e8f1841a77666e6a8985b51b47444a86cb2b963afdbe58b4973d092899b1f5f5159c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a