Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 23:04
Static task
static1
Behavioral task
behavioral1
Sample
4876129d6e538ccbc08f464f91a0575b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4876129d6e538ccbc08f464f91a0575b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4876129d6e538ccbc08f464f91a0575b_JaffaCakes118.html
-
Size
51KB
-
MD5
4876129d6e538ccbc08f464f91a0575b
-
SHA1
f61151f6839fd0f6c01ef1b79653523cccf620cf
-
SHA256
ab46b13d65785cab95f0ec5a7e33f52f516503d8a6ccb4e059cae6ae006474b7
-
SHA512
e11390e62ddde197c0701e73ecd55982ed56334d52eb7f795d1ff6bf2d0414df2486e023ea8c529ff79629dc55ecb7de461183a868bc3aa68b12b6a5b4410e80
-
SSDEEP
768:S1YR49z3ZNh7YsxuaFvG/Es7nmu4eyTP9BzTJwLY6uwjg:S1l9bfisxu8kmu4eSPfiM6uwjg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80ABA341-130F-11EF-AFF6-E61A8C993A67} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60837e581ca7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421976146" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000f9c8c3ef84dcd36e489671a42446ad4f87402c4cab7f7c0613fbcb3f1e6cbd91000000000e800000000200002000000093163bb2fc8351fd74707ff8ee3b35105c804071b7007139a064650e01d75aaa20000000c926becd8f8182ce9a6b8db60ca3ef006c0ce1cf16fea34e1af1875ebcfe7d2640000000af14d030aaaa522b39d9eb6df0cbc109fc6d020c68c4f2be5ea2259e3a1bd601d7d33d4eef02cbf80d304485f6864b7f65cbef4797364d352c9b89c68f9bd2c1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000002f0cea1855b6a538bebe433920eb94310fd00f6f012c4537b2554732e2981416000000000e8000000002000020000000c07f8084386361783cee4953068ce98507576be773c72560bcf975d5fbfcb55d90000000764f40ee17f0f1154b67de920ff76b01045849ebcfdf3b9b516d45e4ad02753a6cea615b64808c9f3c8f71a51bb2741d75ba9a90c0490b2180ea5c1d6c9ae1856a883a193c08462374122439881c990eae2c44b4f7e9e8a9b09e14d42987d54af74622dde4fc4c2d8c167bfef0856499c0fce902aea6cbbb3939c248b874d15eed11bba083a3af334662d82570dd269a400000004412f8261d312808a258b5a9cb238586fdd857481bcf5a84eb8f50ab5e8ad92bd9634d8faff6d2ec31519ec2fad6ae052d0fc8167da42606a347dad12848eaa6 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2252 2696 iexplore.exe 28 PID 2696 wrote to memory of 2252 2696 iexplore.exe 28 PID 2696 wrote to memory of 2252 2696 iexplore.exe 28 PID 2696 wrote to memory of 2252 2696 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4876129d6e538ccbc08f464f91a0575b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5131c00b612328200f13ae897d9b7b7bc
SHA15806f51395e4f57774b5837a08d089c673d3665d
SHA256c47bbf77cce44ecd10387e1024b375caaf856bac32c60dc3074713ddc4952da6
SHA512dc12a56e306ffa6d4653a109cfabd80d5470af4f087d728d851cd2ec5dd176e12b3c1068306adec73f143d32b77a928b7ed0814c23e19c95df4541d41d4f5193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ec6c9e254ce1e8e79c3b842736d50fc2
SHA18541032e520e30ec738b2fb801c294b4d0470b7a
SHA256dcc602dadcab4c16d967fbad8c30dc7bb3f401f1532b2078572f74290f8c4d0e
SHA5126099395e313f90728df76fb7eab0a1ccb0acbf30fff671e9f1f978c3a4f9eca62f91aaf3273c789890850766f30348c249f57fbf3f793df20c59ace172007e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56458ac09ec960bd0d6f1b0a6d17f73c0
SHA13ee24e3acb30abe009b508c9e01c9d31a23ef3c3
SHA256bb3bf97f2e2f0a6ff0e4bd5643c5ff6a622fd80afe6ac80f88706faba847591e
SHA5125a5d347e0df0b2489b52b19a1847df8a71828d3472c92f27028a9eeafbe66ec5b65cd68f95eee6d6bd2b5280ff3f334f15ead867cf168b766f9d69912adf87aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5676d9f720efc401e7bef2cb02dd128cb
SHA19c452bef46c854e4a5697cd46776e2b8657f29a3
SHA256ebe2c6a87ae27f8da228d256d8b9889f5496b1a2ca569b4de7f7cb87c5f5ad6c
SHA512fc2d1e17477d368b18e55b9c53f483e6e9fbb144f558c8a1102b4e23fdd3f2b81ab0edc3447a02428561441d12156cefdc18015416f2c302ed2402bc0a3ba9c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c40575dfaf711253b418a83dc6fa13a5
SHA10a5ab85879117418739d6fa7740c65229f68c348
SHA2568a789a5f3e4b779aa715a0d393b90d67971244594bbfdd3375685b61ac4400c5
SHA512910a10872f5adbb715496c9a993d0877bc2ba262b0ddf1ac73dc3ea442f4162367e779ce5dc3b973180c2faff2cae2e3c9c58421bdb4a4e2340a1eedbaf0b9fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b04b5eea58de26ebc6be17fd6c236b16
SHA1192774f578441df4b1c253b275e9f120cdddad8d
SHA2565fb3e797806c8128299336bb9d683c4c6640039ef1930ef5b4e9ab7a8cbec3dd
SHA512cd33dbd9a2dbc0f22b0a24b0c153d57cbeeee590e09e36f7e47134409b0655b9708f74689e4bb577f87b7e5228fbb7cfa1b6d011f214eff059f5437c24e82cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD579e7485698961ae9d04b6dc5d1db6dfa
SHA1380dc2ac0db7e85cb26613bc59df626059156c4f
SHA2562f4008f554d13c35afac8d9bf85d713e4a9879266d2df13fe8a24b06495f9c51
SHA512aa92b1ab5dbabff20175bcec9912cf96eb89526f3d649f66e01ba11c175de22bc3dda71f981e385bb92e5d511907b2cae0756d9f7978e8916d264eb484f654de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52a38c21979260f689e7e892dadb1bff1
SHA11b835664bf75c1e4487b1e658d23cf197daf0e95
SHA256dc87debaa745a501b9187c1c67f87cb54c2423220683aa4a84f2969b26366d6b
SHA51246323503d78c0b1d08b2601c13b55ab6e47b5f83def3c69d6994cd86741614a6d376f95bcc4bb195169c58e8e614c96f6f2945e6cd22b09ee85c4297768912fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5196d6ccd7f89f31523b34a3643016395
SHA119de963ef87b2c1187f16f9e0e289842a79edc91
SHA256edc8be8345517a4b081607e8e6e67fd107fe86fa98c4c5fa71fc06bc3709784f
SHA512d9af021eb05061d2de858fa63148336f826a1809a6d8c6280a0bf0f573f8e91a87a6f0f61a3f7d5f1f2166b5602507a167d4d0b35bd048efc2f2153a44f25386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56bf205bff86e0b3dbf2da686449ebcf9
SHA1b8d5992a24f1b2272801809c36102f5c229f1d1c
SHA2567b2689b77f7e9ad73d5c4033e19f7740f9ad559787b5a3cdedb8a21e4c4ef96b
SHA512c4a84da7c37f95d0a82a517c7350ac7b036b09a30397eafa9aa008c02602dbe85f8369408e18b8c73d856701de07c958f6a311736167fb63cb0eb931cdaa9fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e61fe068e304f050acf64cb615c1ab87
SHA173f5457037a3439765f054cfe3c346c83d9430ec
SHA256fcd5be9b9d40ef7733ee1a3bbd61668ad70afb9bca6a5f8bb2851669afcfd4f2
SHA512bea6e8147f1b4459869493d6c050d4859eac7f9702a456f6e9fb637c669b0ea67ac8dc4d5627f129aee3993d41bde84763cfa716b93d52bf8c3d9934150908b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD589b33d106cb7c57d395fa6fd1855e126
SHA1e7a36db3949e81be2d15e3841617198f26ea5326
SHA256e9c0bd7b429cf08f8213e0a80e911da561d644696487f01938f4479989fcafad
SHA5120275aaebc510c617db7f7f46d676987981f4fab78ca469aca5eed83e022af740f0c051e658025208de81f3a7fdbc90cc0285c47da4a1d4c70779e8ef83e9bb20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55fe4816ba0bdad44e090b056ac16ccea
SHA19566f6dfd88425512507cd5f422c61df01864c8c
SHA256366d9b4b0383be04ee42fbda7f46fe7c62d764aaa624d32b99f293b91e6524b6
SHA512b8c3521e39d871a92b11b90f7ea2bd33cbb6efa8b297ee8381bc2418631cca078e68914540e045af7eca4a601fdb7eabb432590f4ca526d969be4cd99c185187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD583a45766c2bdbcd551d43387bee0fa8d
SHA123f4d7f53a324b983c20240958b0e9af1f95d822
SHA256cc443d6524219eba0851c94c246c77bbe74c4db897025819da4f420f8a9d3c1c
SHA5123c58784afe3d583a4a3dddb8402c8616f7dec009a4ff7d8a3aa03d48ebcdd2810f3baa6db7fd4aa18164e3ae0edfc298d85b7dcdb280e578b856d1b206abb1db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50a2d7b6564cb6bce56bad4654f77d7ef
SHA1975c6126d5e05e5aadd2935d197245edf17242f6
SHA256ab8001741ff12d23500db61879486f41704b3c5ec6e59ad980d9e48bceee1630
SHA512c71c720c281a419de2276248117c16a2ee5cdd479e2bf9fed8618276a036fcf8386848847bf52433c90a7eb75f0d4f6aa7e29133c7eea1584613b69c57e5e72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD558f4aeb0d1b8949d8645f9b94f836d3e
SHA18c7a358d86e661123171301baf937bd43ebee6d8
SHA2565c468948f93a10726773cdb9acbb143b460338124534b0ac318afb22a2114e73
SHA51241e28396216267f6df7b75abe126fffda550439c48ba2773062c0a1abaff260321193c94816408e9f1f790a00ce07bc286ab15fc23542d346d5e9cc510af3aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD512279cc838b802a03faa74db1c1aa547
SHA19cc0463c09e43a003b75a4fe03f6faa332f280d7
SHA256771b6c585c4bdb1b592a3b0f34cd7b4c6a2c9787f0d5db1d58e9cc1bcdf8f8b0
SHA512ed070971a610cf2157efea6441c860b200a722560a7ee4d45be62d40513172278656c2bded4ab07822a51910be90ae4d47f3359f0d09a547fd13093eb29ab5d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD560a40fa77b707ecdfce051e03d1400c8
SHA193f9722c1dcac427273b3ff32f2f27f9695685e9
SHA256f7bb5126fbb26cd9f593db858eb740a20e7e09343c6206f282f44bb309739100
SHA512064c2ba591b80271c1f2edc9c7faa2885b07c6307a511ec84620ab0394c3badd1f9c63ccb9b98152cb792c74da1b6553bf301e4b02138129e0f41a5597fab99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f253130d677cde8f43b8dcd8aa741d86
SHA147ba2517f7c9eb7e4abd96bf45c5bc7d1857a2ae
SHA2563874ad24ea1de5acb0e6c4d9c66890d6569437646509ba5ddcdd0c80c0f5cdd0
SHA5123d274c4178bea4b85c935a176ad8f94b7a9061efd6078aea567fb21659d7bc48e8e9222a4bf9b99e5eb97e3598b97897efa604db3ac6da1bf6692fe23f9755ce
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a