Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
419c65e02a319b2b953a5064efabd314_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
419c65e02a319b2b953a5064efabd314_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
419c65e02a319b2b953a5064efabd314_JaffaCakes118.html
-
Size
461KB
-
MD5
419c65e02a319b2b953a5064efabd314
-
SHA1
0bb9d2ac2b17e09d4736d75d2d42ca504ca2213b
-
SHA256
250d078709dc4cf260e160bcb4bcd0cc6a987bf2bb09716a61c3580781d011c8
-
SHA512
47a94e6a2c17a1b6790360a7380c4494a1b720426f123a521d830f7b6ed1d73942fe230085329027cba48ad3fc6071a2c71640f56d63278d74a76fc3bcf109a7
-
SSDEEP
6144:SSsMYod+X3oI+YLsMYod+X3oI+YEsMYod+X3oI+YLsMYod+X3oI+YQ:H5d+X3R5d+X3U5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1087542800a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FCA4D71-11F3-11EF-9988-CEEE273A2359} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000068b4a050a8b76c156242eca59cb11e48fdc1fbf0d0996aad058077179e676a0b000000000e80000000020000200000009c112697f191369d9f799f0c2c734733350127cc90ad105f251ee8617bf642bc2000000043fef550d9d8d260bad1309fc9e0d0ffeea64753d0baf7f8bb5a3f714dc3cfb440000000aed677a02801fab80c03b0967c96f558b3829157227965e78c22689db18ceb0964dbb72ecac4f52223279712af5b0d3a47d2e55adb1ad97c98dcafc1cf3f9f0c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421854086" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2584 iexplore.exe 2584 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2592 2584 iexplore.exe 28 PID 2584 wrote to memory of 2592 2584 iexplore.exe 28 PID 2584 wrote to memory of 2592 2584 iexplore.exe 28 PID 2584 wrote to memory of 2592 2584 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\419c65e02a319b2b953a5064efabd314_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519f719de18a557b9ca4a6bb5b6ec27f5
SHA11181135bcdf5fba14bd20c47afc05a5065295770
SHA256f0775d97438a35f4498c46ef6dacbbd69821498b6296a5eaa7f1f414571a6742
SHA512689ddeb10d781a927a0438154f6b37635a811f0e10ff11a4b333e4777aa5379f9f913bc1b273c1e379f9c52c4a0186f762de49dee0bdc87baf05bde7032fbd7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b69c0f4f410e3ecc32770eaf987bad1
SHA1a917e2cd64e7ba97ae7ae0626f74a4e0256d0201
SHA25692754866a3ba6b0b18033062b0913e411190de93b9aea320e1799f34125903e2
SHA512b191e80d99728772c687e0f3b7aa89276eb18f09ea0222557d64edb8158dc4457c62e251e4a749c46dbf38add25b0900ca46a0bfa816a72e0ae776de7d3710f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55514e67a9c97677768bb8d7e5e15c3ed
SHA1424c379014ed90ab7d032ab9cbfc44c003f66ca1
SHA2567a899c907f079ff695a2e08ad77b6897a423493bdfda50ff6bb8bba9faf39f15
SHA512cd11eab8fa376b57deef08cce1aef2205b09817d8cae14f61ce5b8a63a76ac194c63deb600bdf6546fab6b40d32a28143a49085820db6ac5fb7af453ec246636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dea454cbc8fef627f120e7f143b6a7ae
SHA1a9a8e59b2c8fe223e69b2a942e4d1b861c566443
SHA2562de78c59c0d47647a71578a9639362b4d82c9795d60fdf053dd4de4db8009128
SHA5121578eaccba73e5a129a5ec79024a87e9fa1cf343f1616cc3e8844900be4d3f2e4d63163def80ec61bad34e9d1c1c19ea4a878a89e9759d5a8d14fc2841608337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56317d7b94b4d2e17036eea0917e921fa
SHA177e1c1ec9a6e267ebb6250133eb64d5b3075ded2
SHA2564122bbe34228d83d74f5ac3073c1446bb06f717cef01b967f196a2433faaab80
SHA5127ac816a19ab76ce1a0b6c425a97e98153ca6afecd03e57469fbdc9bf505083818462a3291791f84099c8a99b48080eb389df3f672ba1b963383c956926ff4e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535e7941b64daf1eeb337ac21008be799
SHA1c2e367b5ea786ee7a82ccd795a54b3bf4322d06c
SHA256f5bec7bc03edfa5e6ca32bc51f348dbbd852df1b41190d2d549b0000683828f6
SHA512046023dfb118cbe6d7ccf0ea2077cc97bd845a6987b3b49b30713617cd6a5c15f70ce5b5f57ada4391cbdf775f6e7aed1840a7dfc02389e0192933043405d7f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539a5fb902f0a05835f3c4ce968fc9f5c
SHA1b2d2ff577f45eb6a49dd9fb7014fb0f043d9ea8d
SHA256abbe8f9784825efabb1f5f08777e8997959f25714f7f8da34b58701e1b08b2f3
SHA5121ba54b6184f6c50c035150541b95f94315aaafd5647b83967bfc24b67843a11ca6efaa8d0c4f38e44de66bcdcd1b35e59b87bdf0073028580daf3a0e08f23d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac1ca13f18363762c65c22de1dc8a036
SHA18daf350d8a4d076ca667d656362cd90d2c178f65
SHA256fa7d243dc258119c85e22bab924caf58beeef641da0b86875359b4e74cc5c779
SHA512ec8382cc0421cf5e5a66e6a96459d3b779be3b2f24aa42926c4f131baf03c1915c3f352cfa64d96bb52714815623985d135fd0edf76c05a559f40c6232b1a353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581242a40c976bb0d02267fb22b5500fb
SHA160096addf432856e1cff42e42a842f1d2bac3347
SHA25654be95eb74f38a24814e60a62bbe4fb92953e3abf08315a387f5a3f6e85539dc
SHA5126a3eaba597879bd71e7a568592114f9f312abd3ee34c5b2f1c0a3207befff6a279a44df27a67bc784f3a4f8151e88368ef0f5d223d71145f030ee512558165ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5218682fbc0a8b94fc16391b1ad43b3e0
SHA19a18a77eddd49b91053a07f6880affe9af04854b
SHA256fbaf009d3daea9087d5a5a2a2691903224560c3b719026a42fcd85e99598d847
SHA512a6ef7f9d1763e20b15941d9c7b1909b27953d785029c20d8dd1e5f37fad51cc0fb8593318f33dbc130b4ae6fa5e0a0dd4685d3977e6997445a076502e9ffb11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548f3ef53e8fdb066249a36d19966789d
SHA187a880e2815785991f0b347f75c40502085ca613
SHA256edd969698e8ada4e73310b32ec8c37782d6c5eb5f0e1c0ef21c317159c4bd1a8
SHA512f6eb538e771597e2d1fb5de316ebb07c541a0315d46373b9f675bea3980c48d5cc663037674f8b9e29addad38a6a7a0b78c49055ae9ece76ccbc7ab68391ccd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553c52f327bc3f7a9296bb657d012b48c
SHA12f0417f3109fa5a17bf8d5a16e4c2002edd0f7de
SHA25675e65d22ea8ca118bd9e3e76228f299e44a6949402a76ef8598636f2cf76b348
SHA512b8aa7c0f4ba024941ce233a6e3828ec72087d0caa05af03f26a25e66fc69f3207e8ac176fa09521027426db493162315807b411fea17b74d374b849962432ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c45ad40befd8de70971905a5ab766e7
SHA12c97e52539c492ce201ee63a7eb5317bdf3879d9
SHA2563131bfca31d3d6234dcdd0c44ea5fb8095ba6d6202ab0f776482ecffe7f749fa
SHA5122a40e325aaa0f546ad08aa10f4c8397618e2fa68bcbd963b79d1f7bde98a06dc62c5c6bd734e28bd30f3d003204ad68f1169c3d07fa3e8f178bbcafe0df5b812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501fd7e0af65d2c9d3b1ec9a9dfb54ae7
SHA15cc5bad60249af6815d7ab7ceeb403ea1f648b27
SHA256a72499bf42b7e5bc9607020df4eea2394c4e3e9b9204500d93118fcec7c6af6e
SHA512dc2a68dc24717065abeee7fb770191d3c80a7da3cc3311a35cd0def4565ca7f22dedfd85e7dec819a9d09a1e16593dc77b9ca59d9c01f64d4f4fd1100efcb613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53754b6edb6e52c7faf28ce1159c7973b
SHA1480245251bc66b7984c20089df8bb4d731bd7f41
SHA256ae1c1f048635f32176a928185440414bfeaba7e1083e675437c4e0faf12fac1b
SHA51228f3d32fd8d4f7c27652c5ec9bed8d464f297e0de49685a6b0c8571d138884905dacf56adefa3504d146a6724ab3b6e2cb0569fdb1483cce2e072d600f61b70d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7cdd3ed69ecabb7917bcd901daa1da8
SHA1d526ddaa2dd734457b98d9d5b0f8714baf0d27d6
SHA2569006ba9dc1527cec30650936f3a4e6e9b2e7baf1f2811e589eda04974f7dc781
SHA512ff24f5b33de0e00f3eaf90a7e514598edeab2bffe41d351abad05ee4c97320626758ab21380c9b74f57fe7e2946cbfd7004a1eb1d58beb71fefe5e764b16326f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff9008191a213adb86bb87d6a6182dc3
SHA1164d3b6d41439df4710fc50e055b1c7584b377de
SHA25602324b4ae2263d0cf475f8280431611d53e4596c075169df50d9e5beba7d2174
SHA51295bb59704e4fad197804b3382f348117a9a4c75525200f482da613e7a22eccd6b327abdc5fd87ae08681cdbfde70eef7ff25d2bfb35e1d16e2b9b4fb5f590ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527dc06b5879364c23a9e66daa99708f1
SHA1563acb4f9329d2be390ffda44616b4401db7784f
SHA256d7f8e6da2a8fac134fd05445cfd9e44daf20db71b58e751e29fddf65736ef6c3
SHA512eb985ee78caeac69e4bbd39c5d819b41c4f29391da781ba010eb352b3f136c4e97d01aedad23bc7b59fcef5a0bfc2dd502c20cb6b4d0935cde4650712bef5ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff4136d53e09059241e3caf46669360c
SHA1cd0c18bd613cecf9a866a1bf5318c7f2a9ae65be
SHA25654b525d9a9db047add04f0f5538e6fb788a46ed4f43c26bacc2a6e3d508a7c4d
SHA512744735b37c8c1283327a862db68ffdf1409955abffdba9d0c728d87527fe69bf37b12b537b36ba7af6ffeafcf30671ac01ea686898990dcfcb5f8361de68e575
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a