Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
4272c40bfd9077ea9d2e1981993d84bf_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4272c40bfd9077ea9d2e1981993d84bf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4272c40bfd9077ea9d2e1981993d84bf_JaffaCakes118.html
-
Size
28KB
-
MD5
4272c40bfd9077ea9d2e1981993d84bf
-
SHA1
5b7050395a3df0d8baec02e45db7e7e18773fd40
-
SHA256
36a219774dbdcc666887fc6d84a29580dc312755580ff7b5307f670b41e18159
-
SHA512
0b5f81c3353186b869f883c2448a53d6141b4e9b1c8408ec70a61cccbb75d1eec0cd5d467d58e29de9001347199c0c6a83c4cf51d0828e878f61a8b004b7ca2e
-
SSDEEP
768:JmVgIBSEq5upweeeXOI2u/25awdE/RM6A:J2gIBpqDeeed2u+5oMv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06dc0e22aa6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421872439" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B82C8B1-121E-11EF-A759-F637117826CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000543df0affefd67acd31c69c926f1f0dc62aed58d5b1e87931bc66bc253b6aeea000000000e80000000020000200000007104086794941af858049a31c6cb865ee6caab9b3eec5e9122a7a25c1f9f0f9c200000000ef69b66a81b9c159e72a10417e8ae8b2a1613218da6f3e60dd7a6f3aaa7195c400000006964b006bd265b55edf0f1fd65bdfb85237f202f81d19ebe011fe20446f74f4d27b5986969077955e6994395028d2aa5a9572dad01bb7f966256d1a9906bf33e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2664 2012 iexplore.exe 28 PID 2012 wrote to memory of 2664 2012 iexplore.exe 28 PID 2012 wrote to memory of 2664 2012 iexplore.exe 28 PID 2012 wrote to memory of 2664 2012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4272c40bfd9077ea9d2e1981993d84bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c499ce023b63fa5c792d28f9b82eed5
SHA1515e210ca0246b69b6462b99bb6eec890fc4f0c2
SHA25669102f81a68e6a3338f750d0fba0a84ea74f9275921179461f9c89b9e7f11771
SHA5127006f848be1f0e0a4d3dec27baa655a339bf38a4dce4690ac22d7b9a992893f21e0a0de003325e1180233359537895513648a384aa63b13ff87fbfbb9a1776d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5557b3eab5e159c5226a33326473d4fa5
SHA1e9a3ea9da26dd1fc0cc68e0b54e27df0b9219eef
SHA25650add0982d36427ab58783ef86dfd2feb96d840da159aec100140d37f1d04ac3
SHA512cd1fac528071bdd491ffd19090c0ae21a7d39f37bce4bdc68eb5780a979a1f75aefbaea9b72086f047e3d42b33de6025ec8c52749b1da213e0ff3ea9d97a67a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb967e4c121b7318bc43f8dac4fb8d17
SHA1d5a72c292a3cd4698afda85357777e9709b29e39
SHA256092e06956af5b042a30a68a939d19be8d68d35968321c86a4fca9de95763bd8d
SHA512cea76b03034314cd9a6d2c474438178e0afde5ee2f3313643236f225261ad90f22c1ae285a51ae2e6f75306d50cf7df43b26fbdf97285d2845b531e683456d91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5875737c863d4c88eb1de77a458ca87fc
SHA1b63a8b1517ab0772027ea7d688ab3e64666cd366
SHA256b4b1dbcc15f83b9adb0874973a5589827b2f1e3e240adf8bf2ca624c554c7201
SHA5121d31c32943d621ce18f4a89d44a38127ec86929208f4c12a1a314a2dbcb12c1a0f309900f9483e24ecd2ca696effbb2f40439922b407bccaf8ff2b1342b541cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598837f838da2d8940a2568fc90c1d38d
SHA1e0f2f85c822a0eeadf9ce8bb77c4c923188d2e51
SHA25699dc0fe7b9fef38a75ecfeb9dde4292d7bb337ebb7fc47f1fa36e4dbdd197d70
SHA51201ac66a769c2389642f0d9c23425d18c612959454a1588a43dd923fbebf2a1bb97f161c7127d575b6bd30cbc35e1b1d1f992ac90d404b99c15e8cc31f533dcb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55311eb4ca02876c32c1a48cef94da0f2
SHA13c69a42c6d1a2c11afb8919f19ff60d3a28914a7
SHA25694a468dd0f6c145b58a159b9e571420b30c4dba48664e02c018dd9b84d0a44bb
SHA5126ed4a2468018b02b6332a09d99a6d4281722b5d3eb940694b850a945fffb6e97b92c06da91f6a0e19f52270cd70780a9e4db2fdacb89efc8bb250e0a2a46b650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5879c4bb9567e9d24851c204bd6c7df75
SHA13ad2f76a3c10d906a518ea911eabaf2874bda34d
SHA25677a017183e8cab861556abbf336f11da3660b2e90d146b3c7fe58d4a5bdb4fa3
SHA5121bdd75e10a9cec38ca56220c47d2a5fa11ca6260ee81a1cf49123143988c676419d5b9e0594b98b68107dc0308c53653c5b537a54de8e534d6e9d6cb5800111e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50083cebca4c35cfbb2d50f32fd98ff51
SHA143ffe323ff1ea8beac39f6aa06d87dcfe55ce764
SHA256a8896e0dbc5546303b82576939a105cbb2987ab828a99739c9fc094cd0d1312a
SHA512aeab4aaa7188314209eeab72c9fe9badea03e362ca386ca48a29080b5db3399320b2153deda383fdd4cfbd68755840f9776ce2c9d691aaed5122aef5d0dd287c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57df1910e624eee718914c9be308992ad
SHA1389a1b3f5e4bde1589987685f8711e87f8a0737f
SHA2566e5020d4ca0d075af3fe3f91ab10d9199e3c97b8919f821450a040ed185b7f4d
SHA5125fc7ffff5748fd19c5acf12ec4a63c3551b159beec1ebc1968d04b9be28f1c826a7e97c63690ebae85ca529f8832fa0826aabd85a8ce5d35164491ea93bde10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1d5846f8b3eac30a236bcae486bc056
SHA1f69fc6dfb031fac743fe7b917bde48bf6a55fe4a
SHA25641b01c7682f6a539e6256554628c9e4277e7f5d33ca180a97043147fa24929c7
SHA512a28a7eef7ea446f1f3452073a2da7a7143d2c5962bc4332c5b8db572430d1175a0e4a8cdb551984e06ee569c61da73364b5500bf48e002e741498d32126f2ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5386e2867dc074587076ada5eb9f2c9e3
SHA15f983ddfee8dc0b1eb6045c050ef8f382089a070
SHA256bdae9ed92639d11dd1edae28435b497eddba3b8f9dd59083f80ae3cc38eb33ba
SHA512aad43121d8a18cd445b0fb3b96f4ea903348e775667d9493c7a32e3e5ce92992fe013e576eab748e95149f09c4d4f871dcf0bc1f86d2d5533d93f5d70f9198fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d416efd0a8fb680a9d6447e0a2e8058
SHA1baf920e51119c4298de7f829ba4a88518100fd2e
SHA256d15c9bf3d5fb11efdf17a910426baf14d26c8bc8f48064382800c7da0ccb2389
SHA5129e8717a65eee90f912e418741f2415074505d736587023206031321cf13f55c8a3b93136ee7c3c78c41d51142a12398dfbf30f6b62f7a238428c904be529071d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8e650b7452feb46c05d0d32f4bf414f
SHA1bef5ea945619171216945c709e570d5cfc223657
SHA25671efe3eff2a7a04595c741c184ae93ba2a8594f9ce8e742702a1c3fe0eab2693
SHA512aeb6e0fe3ccca4e621f7db2a1061460fde14dfd84976b106df8aea6c6d7a172ac173907927bc42c0b43f1b2244dca596da431ec388ede17045b9ef69ebf21de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54da1fe07d1430b6e83830fc3303ad01b
SHA15daa93d70ea597cde1199998194293a5842f374b
SHA2567170150221cf2d86e36d45be92f9835d4d57ee2fb1b8413eef455dc5895cb80a
SHA5129c5422de8da2ddbc16ea0113dc877cb95b3853ee6c9dfa6c498d417e8643b7abc60832273b9bc07d5052c06d73f55c619e6bc814c00702aeecaf8a04d54041b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0121a77366b68a7c35600f6905e887e
SHA1f6169fb80ec6de6e05bb867960837f221a6c89bf
SHA2562f846f3ecb87d1d97e9f4e15934bff745554c78c62bc333c0aee25e513eabc56
SHA512f173fb7322a3243e0c8059f7fe494e189061105ea192314c842e8014cca7c744cc6b3372f7090bbf85d9fd8424fe233d57ac4fa03f0caf5c16b245e943ae5497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59aba7c99da004cadb8ae0977b58e9c7e
SHA1ad17bb09692390daafdaa7a7aceadba767b012d1
SHA256827299fa8ea429f9dede821d25af4a7f223a491c91e7de979b3a5f6adc15e000
SHA51254ab296d8f686dececc20f87e442a48bad5745aa6e28aa82d7a4fa88d609784e8ec9d8a94c6f3c370086e7f32e89f36c634f3705a59d85268c0b0383b7fbf204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0c358c987a732c7ea4d797a444179b7
SHA172829169f34333a47026f7407e39d1faea525a9b
SHA256ce15f9e4f199e7b24cbd9832f1afec39a60d5251dc2828d2d38854a002274d37
SHA5120421cd88ccb2420f5e95ecd19590014e1c29d2daaf0efc1cd8a10db400a366be482c7ecd6ddd1e79c7055e4aae8dca9eb7f98c2e0836fe397ff0763a106dca37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585380702e2c1a62522c571db7413d178
SHA14f47805e3051f3743c2441425c80c6355463d35c
SHA256dd9a847479ec49d758937f7360670077a712aa453445e55b840044c60266a1aa
SHA51291ee81623f8d5a32a47da7ac69bf646a7260a306dfb5e16f1ab3abe684fc7b8a91fb590befd7e8f6cb1dc98eef43d8696b6af04609fddc719b509d2fac07c9e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e115e48e3e81fdfa19fee8dcd282e4b7
SHA16a8f7aea680f3ed451dd9edcef9a5bf187ff39c7
SHA256a7cfd64e49d6a25020f4b8bc8045eda50a89a4333c2c847f729f90d47e263868
SHA51273097c7d1344a070b5b0f246c02d7bcc03d62ae083929466940ebc8977c1f6b0176ec259745cebdb1a96f9cecbd60a51c65111fc8afd327b98726e1848beb070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552838d2b919654a45aa0fcda405f87d5
SHA16f610121cbe9bca7667bedf71f61222380c288b2
SHA256effb4f4bfa4b56e6ec3b93b167084cccafd72504580c24cda71d034e5ec39f63
SHA5127c574d0dfb1610b26cad5cc8edecf8c8e7bc56447847e3144e9f8ddd8fb1eac13743e395c3b859601d7b1fbe7014370a64c7a2d207c2ba135095c56f7a17295f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a