Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
4872d1c9800d9726bf30056dd060341e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4872d1c9800d9726bf30056dd060341e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4872d1c9800d9726bf30056dd060341e_JaffaCakes118.html
-
Size
461KB
-
MD5
4872d1c9800d9726bf30056dd060341e
-
SHA1
b8a50733f9c457b0055b1c649cf18e889ee9cb0d
-
SHA256
e9e9a85167ef4943022a80e9d8ebba4d7246b191859cc48486d775aa00028888
-
SHA512
1d975b507369d21d2666e648f92d38baf35025ed52a7a4e24491d569230079a89ad0c513c40728ce933c69e1bbfcc15a4997008bb1e1935109bd0dc94d3e02ff
-
SSDEEP
6144:S8sMYod+X3oI+YcRTIsMYod+X3oI+YYsMYod+X3oI+YLsMYod+X3oI+YQ:Z5d+X3H5d+X3g5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421975915" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7FEFD81-130E-11EF-8547-E6D98B7EB028} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000051420a9e2be912dd3647af584f136cad20d3572698703262c801d5816ab3df0f000000000e80000000020000200000008107a70c49f2fbeb3b2583bbc3b1bd3d8cd70a98c8ad611bf819bdeaf827e41c200000006683bf7f965763def7c0173eab8e30ee682fd307cf98412eaf9641d7b3bbcd344000000074eea79c2aa2ba38dab0ce095e0c4174e11088d5bfbcdf1e82126fe7b6b727dbf20fd5975c69847689631f434491a8d5996998f1457a4c4cbb0bcdb39561fab9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b02588d01ba7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2852 2088 iexplore.exe 28 PID 2088 wrote to memory of 2852 2088 iexplore.exe 28 PID 2088 wrote to memory of 2852 2088 iexplore.exe 28 PID 2088 wrote to memory of 2852 2088 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4872d1c9800d9726bf30056dd060341e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f195f148f77d6775c32bd64fabdcaed
SHA10fa0e917a6d8eaad4601a4a7ab26e227616a81ab
SHA2567305b7d6065d8e20b5f001d52f98d230d1afca8ebc08f5b827b78275f0eb3dd2
SHA512443a5963cc3cb145a7a8f8e83340974ca3f5f5ea79412e5989d684107e3b7eb04c5154ebc0aa2d7e188c1e5a0fc8d795d266f8596f62b2e4f250558b0a0f7d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0e33c5e06780327747882451d5172c7
SHA1b68c55611c7ba91b979d52e5afa1ce3fe680345b
SHA256dd910e1c18736367dc83c836cd463c05634f5aab092879f64c080dbb9b2f312d
SHA512f131cef308d923247229c72e01786ea17fc3c041def3621471c73ead8d9869b42dd2246f846c201123b5645247ba9db4fa04423e9aac5ed9d5c04727ae23ec74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57956bfe2c0ead2532c0552cb7b3a1821
SHA1ff9d20d6b0e6b702494ef725335b6b922c93791b
SHA256be16eb206fa22268d943b48de8bc04e7da4e8614e5da865c64c30d3f995091ea
SHA512b2e76849fa8f3117efc250a4bb08b98a358a056c4fbe5362d30bb49f7509ad059c4f75d9bf836d33c26ed014d46d660b1fa3fcbcaaa15dee1593781ee459e2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c10a4899d53f5c383e524d5596ac8773
SHA1990a0792ed35446cfb57bd7041a9ccfe17bcd1ec
SHA2563589e844ddb4505ae5055e200cdc17e0fec1eb0b4eca4fbc124112d6da0bb6cc
SHA512ee4c78c681028897806b48d51b965e4452d041289d95e1f4296d5132487c26679e00b664d8769b3a7025e52fd87deabf3d545b068b4e09dd2486d992ad2694b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fda8ed5de2f6e2c21fe937a5440ce36d
SHA1acfb5b6a79f237f024003c3e7ff5885e2fe561a7
SHA25652fef687ed642e82f4b503ecefb835d7568d4a19f6947a80f77467ea70a6f3b5
SHA512a136acd93b361bc244c601ff51a8d8df56f8e573bce60d204cc8de395f7b548f311906eb04c508b07df9db8bd166ed95d9f43272b44a4c38fad7e50e7f3866b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d1c7b58bf537d166904c1a30e396b23
SHA127fa0a763a118d95f28d67260c5a3c988e9cde28
SHA256023fdac71ebc219fb4d0edb171a93b5fb8a2f86d59ecd7db7f312a5c7fb0fa5b
SHA5124c9f80c4a060ad070dc5d41ce59b7bec69a41a87d4336025469ab3177fa561885de757f9add822a9871e2944b82323015a8439352cf3edda9795e25d54cb6954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5946d2658c268d277222b8164f63406e9
SHA1128f279b9b6f32a73dc530d9b19bfb85000776f0
SHA256dba1c46a5001abb5b15df619f468274e452375e8acd39074448853f48b9fb92c
SHA512d817c6dd156f607e5d577217e9a24d03ea8093ca8b4ad89ce30f029528abd2a636ba5998454988338a6063737d01a69413af2a282f94708254ef0e62bd4b8ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9c63384c0129994e9142192162df853
SHA1d3d94e61a2f3561ea8f5fa2c7d0a96f9c306e65b
SHA2564a8861a8bb01ed56b810afe76d46f1d58fe8592585956fe797234b3df6aded89
SHA512120a1bbec5567d2b19a16c8a38ec4d84356bb4c21420317c0eb336610a5d866c0c7f781de73862137f29e6538955d0450b984734afabee6f3e570cbe445a0b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5103b1991cb316cc0e6495ed21a826d92
SHA131f26bcc02476203d619a10904d17e75c2b5e906
SHA2563d966141ef93d09f67badcad6755ecb856ba9da9e68350608f0cefffaa4ad68a
SHA5122bbd81ba1ab4e6897186ac487e4f5001d6ea825b28360ae3e69185f3d86a3c1967141a47e695106d94b2317585d4ede713db5b5fd0278515cc949fc49d09ca51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ecd96b82ec58ab02b88ab9cd18bbd09
SHA18dda8fe3fa24c03db614a6431c3b4c82ea842e0f
SHA256177783fe82f047debcfd281a6f76777fd42db8794c8614f620b2d2f1cc7f1176
SHA5120f9ca06ecdbb26ae558fa6c2b76c646020dc399c454d05e6b905a24c144521ae00650f8a3e074be411f1fdcf1c7736e6d03299e27ae226b9fc27a6d608c0a75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5937325265869dc82c1e76543b19dcf5e
SHA13670f876d7c4741774220ee139702978ffadeb03
SHA2562a1f6961cfe4efa224c3f93d037c53ef0900888ce5891a5a43115b38940b18b7
SHA512edd463a11af229aed7f71347fe7c2c1c94d33010f54a3a09d6fb41b1b489c1d02e47f5132190e15828fc014839921963c68a2fc9de84168ae7309a7ed4ee05d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af59bc8ddab953674ba6ff47cbb1b321
SHA1848e5575caec52679b9338d102f2e2db3b4c20e4
SHA25635ad7ca14c903467f48c825298a709d6a3bcf79766f3e3ccbc4815aa76967f48
SHA5120726939d5069341459bcaf86362fa9fc45a419286124abb11cdbd93dea1330747a83858d510a08b264e6f2b435508f124f8437b9ef99f6837a07d1bf1c9dfad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543a7ccdbfa61c3f539bd7192e13028c0
SHA1f8f34a6bb2cbdf7b878c5639ad095324245842b6
SHA2560baf62c4bb31f5037213a6d5308ba694c5752e7804576a6f833536cbd10fb6da
SHA512839ba76dc03e130034b4f7bf4ffe1860fe1b516017c15b61ff7d45bca752dbc4ce358b30e03237b0198103168cc4213904f0d440631edf4d83a947aacfb9fadc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584079e417d992c9d51988c136be9847c
SHA13de90fffc5acf45a216dfdd53a5b056b2e6cedb9
SHA256b2db427be2a165ccb43bb8d04c9936234d5d22e18f75416d50616f2b10b86168
SHA512c53c1e5e8ec01d319bbc5c7a243b00b8f1fa22ef8388fca89520f0bea9e5626c96b75b14b1268c54f1be4170eb39345a0ccb4a8283c1e79b57b6a831283f0f1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548235353d1c5c296fc31362798025b85
SHA1cde43becffed23aa0efff571d43eb49d8fff8f1b
SHA256448c340dfda34c9332f01d0c2607682785e9d3c9602d0706dfeea68deaa1b3ca
SHA512326e71359199152a07a163928eccf466d296f26b773d6952452fc147872ec097eeeeba8e22113fc72fee6e35ea5eed7aabb048055275831f7bb6e7bb3ecb4249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566c83b16e9dcd7cb82ae27a9f25f52fd
SHA15036b6237d7a86776558771b9e7ea2db2994aa79
SHA25684b34bd477afae29aa3dd71405feacfb3b1c2e86e36ca4c76212a568b206be09
SHA5125cfa417029305bee1b408e5f03c6e0382b1eb46554bb20a36e11bea61a748bb63c80dd18f270e6a10d9c444812cd796781c894dad9645566563c9251f4f543a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54250f599c7cefa4e7421b8a0f02c6ee0
SHA1009097e4692a980cc18c5b3012530e1488bb4351
SHA256ccb097979624eb800baafffbcd46d16abb17eebc4e511ffaea03117386c60b7c
SHA5124b460ce033273fcede065a9a43964bd6d690f664974708a42237dde7909514ff8cdce771ac32f1e3fed1c35df67eeddce1ce502f962fbb613a64eabb2af09203
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a