Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
4167835a52c3c13a42d199edecc5c575_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4167835a52c3c13a42d199edecc5c575_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4167835a52c3c13a42d199edecc5c575_JaffaCakes118.html
-
Size
19KB
-
MD5
4167835a52c3c13a42d199edecc5c575
-
SHA1
f650eadad3b7175bd5469f92448e7e412cf67815
-
SHA256
f2e3ceb6445133b1351566f3612e20cffaa609c7eb47d2e38dba67ef5d42346e
-
SHA512
f6e18d1da6b50d2ac616050e3dd20df0d886f50a5ef2bce15c84ca12d66600e26507bb784b0f07c0bc1cd41ba1ce1b43ff5bea6450e09a5acb512a3f60241923
-
SSDEEP
384:lJdxlV5bdZSinnJC4JmVs3Wux+JIV8Ex+Q7Tx+3+JIx+AECx+bgZwAr:dbSinJC4JALsJWKz90++gAcgl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 401ffc21f6a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421849787" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000505df7e7a19fee4825ce2524124eca30fb754e5981be386d796b12cf038a6f18000000000e8000000002000020000000afa9cafd54e5235a3269353b514c5e50913a077b2578253f7d470aabfd05be15200000002dc419eeaaf0ae0107f683bff01b735a36fcdfc01acfaf8c9be83efb42252fc1400000007aa160048a53782984c358e3a6ed62b9899a38a303b403ba7dca2007e95a472d0c6e16f66ebde03ac5c9571047309e5eb6616a95a66b7f5521ea027d5cf4c16a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D537D01-11E9-11EF-B2C4-6A55B5C6A64E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 3052 2208 iexplore.exe 28 PID 2208 wrote to memory of 3052 2208 iexplore.exe 28 PID 2208 wrote to memory of 3052 2208 iexplore.exe 28 PID 2208 wrote to memory of 3052 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4167835a52c3c13a42d199edecc5c575_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53370ee4e90c541e326d9db76ff6fa521
SHA12f83a3a732f347313356555cc3ddae89386d34a4
SHA2562885ec6084cb2ea25c83203e75716aa84b61acb5ecb9b6e75a2598193928b29d
SHA51215e317aa6d5c5af43990fdadced721d90231b70325d351ef0b2aac00c31e7313fa7dc830aa846a8df20c0c9cc9f99ee29b132c925d93aa3c7f5e45676103c305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab9c128eb2837549ee9d2d078977772e
SHA19692d27d8f871e34aee574840d8864a4f6831ee4
SHA25650bbd67fd2fc364c81d02812bab58190beaf67fd90a36c3353b3b89c0705f7b0
SHA512eb70ddf07b35fcd30c893f3c6b973d669eee1380b7d0bb38f9be0f90c649d045516f3d8c8564ec1ea4ab535db7accebdbcab26d50099d2c401327bc22bbf1e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9dfab8a70888416b4d38227c12e92f8
SHA12441bfa89249fc7102905ad3037b6151b004c699
SHA256ef516547d1e3a12416b1fa2ffbacf18e5825a4cd3095dff07e3775208ac2b103
SHA512dcbb0e6e7572ac9448fee84cfdce3daa6e0c2f30bc842fe2c67a8b444fd9ed13925b37f04599b5a94e2ff027190ee475deb6c3b353efce2680e7369b643d303c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5542bd770a7b5968ddb4a4ec884dc71f5
SHA1934365c458197757d983ee07fcdb034bcbc8a3d1
SHA256f942b78d5d75694e94ea6523b3b115f97b2e35ce6ca6d89e70e2e3fea76b421c
SHA5123b04064ac34f5b90976bf1eef4ae0b76c3afa3171aed243c583c2940ed1c4c71e17b691ef6f68b3262c245831213f785ab524c7a7e2e4f6bbcaaf8d7cc574bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d25c0e860e95160c90e3bd4820ad3ae0
SHA15d3cc2834ceea30f311ad019cc9d36b6a809da92
SHA25691fdd12149e50551c615b722e28fc3764706342a650a35d41febfe870079d68e
SHA5126670ddc0d1bf09941f5f47e7323ac62502017f67351f4ac9b84fb817dfaa5060deff9ef31b387a0276ddd81fb11d18f51e22a81742f6613fe92c59008e2afd56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d4615a8a22418170b1fca5b4abeadbd
SHA19fe361f9ee929d925dfc1fa68a01b1892d491b16
SHA2560fb099183b38832231fabe89a8cd41dc9f264fd5330e46eb93c661af94cda618
SHA512b8fb5cfe27837037f65da0fdb2a325ab67a2fe95d10ca70de8734b8a0976861db1642e3c05e661cfd5cfcb87ccb043c1f148ddc79f740145aff8f31b219c6c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569239eb93b132b72efe0087b38a4ecf9
SHA134319b77b39c8f1c34dd247e397b8b139cd1a134
SHA256a40bc8a1855c60b8d02a67301064237e81cd5094ba43311d34fa79b5f132ccda
SHA51280545c8e2ebd8755ae045f5fc6c537486e13e3cb16dc58088ab26b983a0d9408d55fe897b5bfcd666f2152b2add550f6c8cacd0bd3dd914bbfb456cc54ef792c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58acb2466555a7bb785ef5c20023b5e0b
SHA1e2949bdea67914d236ae934afb1dabf5849284e2
SHA2569db33044991d7900819076a8c5090a92c72e9e506ed407f9e9a4a515d98c50da
SHA51251e66f0416610f8576dc053fb055ad076b488c41579f76475ceed59a2414b1e3a8be34d6c09124beb57a23733f44682e7796d7d806fa62c9c245aaaf917e0f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53adeec701ab3e4e7cb043e765885b5f6
SHA176ea4007eb90d7338dd66421c1d605e863c2fe83
SHA2565a2ae6c1c24a5767cb3b357f7eace318e7b8b48225a70b191f0f6a26981c46b6
SHA512256c60a418bd17557a5d2df951bad78c21e229a934ce6a094e3e0aa2234d6aab87af25c4473fd9cbe3c7d267786200438ea95e9a7f8058b3334432d1db35a430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5130a84cba8da0f39cbeb580d4683b893
SHA167d41df105799e862a8a8396c9f862f7a96e2805
SHA256035e3268ed98b18466d3f039ce4db0329ba779318af332b6bb49dc6af8841170
SHA5128620b2000597a8252d72dba70cefb42714773d96c0fe8d3781890c93c578cd09ddcfa1d5a4e413a9f201441290690572ab06478b759196dfa30b8af5e70c02f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ae703d9ab092399472d4344bacaefe9
SHA1aa092c179bc4cca4e074966a72aa92d1657462b3
SHA25614eaf03f2bd4761b1b7f71f6804fc548a7d050ea52c1bd8ba70ea7d03179a9a6
SHA512bca41f5cb323736570a37cfdc47594cd08f46e34cc36e3bb251d1e8d91015af0a28ef7c8ba20483bd9217c1bdcf7bdfea55cc39267736acad8454c1bb0802d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c1196b99321322a06a68f356ffe2d01
SHA17374e26fb30d5673262f64ef0c28c53369bf16ae
SHA2566d90a7a321a88ff27a21ca4394d907710b1356cb5d08be87c229dfd1868723a8
SHA512b0b06b9354cea3f851c939a9d88c8869a2b640819892768f71062393a74aeaf1517202527d6e27e51d3b7fb7de63b96764d5adaa0d122c60304c06fcf3686345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d50d19883196b978ccbdf6fb8dd9daf
SHA1b13c2782ae115a6c1317a26cffa8f5fe96345485
SHA2568ad3e307072007e9885929d42bcb4a095d405b408f76e16b52676edebcdb1e82
SHA512f1365e276032ee56f7700cb06b5c3bf640159ce1cff6f44d123536921a831396c38620fdf3d48b0e6df9aeb5e5f83883c5fb9650880e91239d9413dd849ef7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588e7288dbd1b4cc6cc8a9cdf04b04e7d
SHA1cdcb08212fc2598a2d36453fcc092cfce99b8057
SHA25652adff4707408dd5845998bbd125ab7c974066e502d5eedefea6f21e6ff8bfab
SHA512a7318fc6ebea6e7cb026901ed189c99997a4ded34fabd988ad4b4678c20138c09c71d1898d6b1cd558316c840d16a00eb3be9cd67ee8ff02831d41be1cb2858d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b03a10ffda9e88c02dbf8ad5f41298bd
SHA1b6d1c922dd12af95b53e52786cae9bc88e9f6897
SHA25654536ab2de5a09854f333a3ef0a61e5b8b3ab390729341a669f2fa748d552a40
SHA5124380f19142e15ec1de8fc84eea3ac5944964bf6f9e36e3664a5cbaafac73183b3bf7e44350c66bbe9843945d290d862f90972dfd251c267084d5d6f59fdb106c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525f1109673fb5db9107aa283d4e35f28
SHA1e47bf46758a224e0d4c241a98e20093986b78deb
SHA2567e66097999c9c8d137fb8b5f600b4abac9d1ea8aca7825dcfcab0c3c0f951260
SHA512f75aeab3c5ce35692e6aef5899f9b7a9547d5f37021158b04f9e6d0d47b57773dc1f87bfc5174da0bab74ebef81a807c44cb78eecd44242357eb445a72d38075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589a76ff2dfe63c0f4f386aefb115c9a9
SHA1c58a21bc044d6c89aea5c77abc322df01d1bb098
SHA25652ae36be4f54489714a730aa757569ca98d3823e1d42c50b41de9e3f6e870456
SHA512f2ac942f037f78313ec855bd42169e954fadd359ffb41131b67532d6ed92a6c379ad6e85714cad90575ffda96f251214b6e7b17f0e494974fcbb3891a460f1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5987bc6d702baa7d8642a48c62a7cce82
SHA1d1e8f6e2e36a87fc6c846863955ddaf286785093
SHA2565146663c07c39e77ddeb4146cb675f6e972624a5c68404ba30d1a9adee3a55ac
SHA51240c12d5d0df3683cef4efff007e2f22f87ea38a3bfae1e39d2a97ab2326979862da17423a3f64c29511ce3d79cc28e58b5699df0412f21b60cd939f15ab72f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516124a460a04c73e6a36dbb992983cba
SHA187d1c864e66e9a398fb877cc96bd922949b7a29a
SHA256b75416d6ff66029b3b1986bf5717e66136c109e3e12e196e13e94aa819ee8d5c
SHA512f71aa498234d6adee4086ba6ef82498f8475e0bbac3b5c583df532e1a352b10d8bc1dfeca9abe00f7be1c6d1e1ffa1826d4d98f23bac639d67e84a83259c57f7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a