Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
422d916afa096b4d9946ca842a37dfe4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
422d916afa096b4d9946ca842a37dfe4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
422d916afa096b4d9946ca842a37dfe4_JaffaCakes118.html
-
Size
68KB
-
MD5
422d916afa096b4d9946ca842a37dfe4
-
SHA1
7a4d972f04689cdc46429eb1a3a9332e23491555
-
SHA256
f4efa84a0b6698118025273dbfbaaed7de63762b07ee07a16ae5ef3032945619
-
SHA512
7826607f878c264bf02d76a675058dc2902bfb053523410a23d113cbb17a9413d1910e2510cba1c94ae4fb2daa0e1f4e530f486a38ca850154866610214722c6
-
SSDEEP
768:JifgcMiR3sI2PDDnX0g6IxQjR50MV5Rq8oTyv1wCZkoTyMdtbBnfBgN8/lboi2hX:JhGj3ExTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0CBE0A1-120F-11EF-8E44-4635F953E0C8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000036eae1a397b87300100279f9e4e6734ee665244a13dd328f24bf448c2ab5aa05000000000e800000000200002000000095d347c1c8e0b505311d0fd3ac174499aa9575472d37f71828f33d9c3341026c20000000b984bbbaa409e1e2c47e011051726f638156791e74d98f33875fe06a26dd530840000000259ebbf516f54890786e59f56947a05fd4003865783e0bb018964561ae4e8bee6df6ffedc297edefb3a79ed09fa37e0d16e023f84bdc7fbe00f535f93e3c5ff2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0db6d751ca6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421866247" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2468 1700 iexplore.exe 28 PID 1700 wrote to memory of 2468 1700 iexplore.exe 28 PID 1700 wrote to memory of 2468 1700 iexplore.exe 28 PID 1700 wrote to memory of 2468 1700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\422d916afa096b4d9946ca842a37dfe4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa1f3f40b75b81b3c0c5a42d25d13ad5
SHA1efd626c03b5d93cbe11ba1d5d20e000ba7d98806
SHA25601a2b918432dbcdd4d18ca0c6d9ab714f0c61511b57f1aaa5ddb037707b082ec
SHA512572fdaa4cf3a38f6817148d1f45fa5f5cfbe8697a7c555c5a3e1884d664c2152b18bf110bce57cbd2772bf389a5b9836ae0943b8a8b92f992dff8eb5aacb585c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f7a8977088e77cb0ddfcbf470597a13
SHA192e677e6a33a358b42e5870bcf0095d4873ca3e2
SHA25680252043edf04a4892792018e2325064e8f7677362dd28de30d6e4b54e181f45
SHA5121765fc6ea6cb84accd7c5c3e6c1619d2af051cab15254af6fb63ca57664c3ddd4238535b2ee8d250ade9f54f821a5871a849b317aedaac54038e5cd2836f87e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518d5fbe4cf13d5ff73c3ff67b9b66131
SHA1c1487aaf43479d58db612103fb50f01e95eac17a
SHA25660721926c74c53eb51d819d51cd4796f9f9ccbe584fe03e676bb29c88294861c
SHA512535619b9d874b4e204246f0e365c87699bdb78b68433e926839b81ddae0a23be6ba9e9b5c373dd13dc8ad480aba9d2848365b689fd9c823afa17fb9767bb774d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6c7d1b3bd27667fb0d5140b6dc6ccf4
SHA15c4200617f86fb8d55baff81fadbefee70a4e1d5
SHA256de91a38208749f4c9c74ec887b6693de14c01d30016a73a141b20fc7b0465743
SHA5126ebdb4d6fcb7ede8358801f529f09361906b11b0034c74f7994d0ca2449db5ae432bedee00ed265fd78cd42ca779094776faf382fa2f931428cd189b70eb22e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b234b8296e1d3c9ff884d56b0d159e0
SHA1de54509c39f61dbc5fbf7c17104e09c49169aa93
SHA25640aab77e8225fc75b6b3e12904485eaaf64b70dfa2af939b2ca8f1830793e242
SHA5120f407debe199e9cc55bfbe979350490da8871213990c6f7bb515a49440c30fc3805ec420d24152125cd958d99dae527fc0d1a5ace636721e578ceac91ceda48f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed6002364b8d231d7b08828ff50adddc
SHA13a93b6a7c3d9f385a5467b6c565ccda038a6c858
SHA2564bce285ac28726ef7208879a6d91c2ed4a060b5af6565e0f6980a98af914abb3
SHA512cb9fd5312cab82f35f206455deacdb94c359031097e043bc2d3e6b41f8b84de54ed337459521f0c32fd098c369a5460ec4fcdf9b12b2dc98a7cf25a850a50bd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c542f4bf5e79b37c5c45a534f905d48
SHA11dcd5a270dcf3c529f6a51692f1692c0a44853ed
SHA2569d72af29125958165e0f9ddcec09691320f0269cfa7901bbee6f5cfaf2dca1f6
SHA51279c7d851821ad5cb4e6b8e1276e48c192ddc3da688991c1ad0d041928dd76def0574c5f9d330e67011349c18d93d559d39ba100003bdeaf851966e0a69771c31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5481b57cec8b7c7a91ce38075a2492357
SHA134ada8abb7db4f64276d222d29eb010d72b47016
SHA2561d08f93fbbee44015d89c3b317d19fbdba94c3d4d8f4e452692962efba3f77ab
SHA5123935bf737cbee4815ac27672a766270220602fb2f558d800eb04603329385fbb3815cf13ada7c99f07acd75c811835f083a093e0b3d35947c6ce4d8b5dac0524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fce14347f16f78eee22427763ff923e2
SHA12d9a6879a28f93fbac9b824d4630346beabea785
SHA2560aeafe080ea305950258a40330f4a4204823e732625b5cab5534c8f7fdd121d9
SHA512cefbbaab0e66210566d51614ec6982cd51c74d836ef754eac401118c3d3b0ec4cb7c3d698f755bf87862afa4be6b51149a3ca0ee5dd241dfc5fccede9d9cb951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526a6a7a30c7afac62f6ce2b6b5dcec59
SHA19cc4b38283f7b8696bd845bad8d2e49ecc961645
SHA2561e0e0bdcf6649000f5f1dea87f805038c461edc92df2da517e50a8e158038511
SHA5122ac393856bab7707846fff0787a30da2723d3ce474b7c4319afcf206428a97fca344f16e7ffc80f3f253c6bb3ee0bd987ec6fa704af8a2ff72e58508ed0294ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553755ca5d6e5963d84f2436e82f48c00
SHA12ecf842c647e187a3f4dfdcd39538eb204df9e2a
SHA25645f2ec34a3f0e45b8d09056bf3effa0b276604e487fde4c25c53ba4d5f77cc2f
SHA51295b3258505c90524843dc3b34138d13949791c676f06b9f931a395648437f2bd78f25eb74ece09700b7a8db13c5c7b97cc31adf502059166c777024fd7c135b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ebac503cdde9f1f132560c187138751
SHA1942ecb92e340ca100902849bebd00b8d6d281e44
SHA256e03d64ff95d4d0d00f0af7e42076146808c98b3fa8e08f4ca9f587b9dafb813b
SHA51298e15f4f4ed00aa5e4e18e7c08562506cdfb0e63b6c74b315f714ae854d29cb4777c885beec11ead6cf8ce430cb1d8f0560ffbff2143014ca76d0da10777854d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f5f109520003ecc06841397fd1a9c81
SHA1345380e0a50dcf7bee667c28e3a4e66ad553ba92
SHA256b7744f3bd4ea00f28f2735273d0e7268e818f9006ad2ad8346ee20cb8e63898e
SHA512b800b283b96ab49e66a6a79ea1cb63f3bf492aae984b82d4db846757d2ab73fa7951bb69186da78511d7a598ecdd099254f0ca4ad33b62af315c8ebb5a6c6245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a48aaffe4223bf79bb71d9e3cc09443
SHA1a8de56cbf7231b8d9487e842f4ec0b2bcb518eeb
SHA2566a59efeb9e3b7f1c71002a74a892483b59aed659dc271c3d1b8c89927355afbe
SHA51252c8541eb96ba8c73cf806d8ff0ca959f0daba157df22d42f9e3c46bd52e61f193e1eb281ab326e396cd809a2b4274fe8ba5cb0240a3d1ec1e0d25a9c7bfdcd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58756cbf576ec9bfe89225c0a84058357
SHA1f6703778d5050a94dbcf96d1dd003e39885e8ed9
SHA2563acee8da787b9ebfa9629cc937a607823beee3fd824117931bf0722a3dae9065
SHA512de4d95c3eb03e6619130ff8515b83efa14f8121ba7e6e1968ec556c49b6e9c0c8c6b48ae9d61fb379d5e50a4aa339f80c9f7187ba11e8e85dda2f1e8a6288051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501fab0f75e5c1a9e2c16fcbb5b4fbd1e
SHA121ae7537def773ca793acd79590de61c2af3ae9f
SHA256dae67ec10c12e7ddd0e0986616b4ee5e2d7e09659c3358dc736bd034209cb81d
SHA51226e0bce1f28d0e500864efd32599e80d43ec702aed98e716092edd15dff787fa14e046ee4709ae866e5ae8e1a599ba3e17380d584fe7d0e7647df3f217c5a56c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575687c6169c512cc36332db94e26934e
SHA1213b9390a9176cfac0a1effcd9635d6a2db53f22
SHA2567e6bdde5853729c1ec30746822a67f89c97ce8f4d19cadbc1406ae77c9eed58c
SHA51291357b0ac29182ca4c4313fd49c53291a93415d035f7fff40282416bced93ace70ca9c321cfa0d16e1a78aacc101447fec2ce79d8ed04bcd6a94f1711701751b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d72ef0fac8bbf99c9a6a7bd4c75442b3
SHA1404287ec869d0e7ded9adbdc31ed6cb7db5ed5ac
SHA256f6b21967e2243f07b860dd42d28a675671fce378590c8e1e4b81589610c08058
SHA51265d23903805f5ad37d7db08a72874ea03643b1786cd73e747e717df48eb69a68923f4607a8e266841b491d63070467554d34a4709dfc83ee34f4321389df14de
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a