Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
440d11ca02390e25daef4af821b7a85a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
440d11ca02390e25daef4af821b7a85a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
440d11ca02390e25daef4af821b7a85a_JaffaCakes118.html
-
Size
7KB
-
MD5
440d11ca02390e25daef4af821b7a85a
-
SHA1
3fb6db188702fabbed51f34b68521d9bb93746dd
-
SHA256
0f53e6763d340ae15360fefd7b59eaf73a79db5e3656b7ce5f7e127ba3c84ee3
-
SHA512
aed38cc20ecca6d504df4bf0410082b82a82fcc1de8a7750441b3f109dc3e808ecb52cdd0115abcb68c913b521b10cc47056eb882de0337bd728b752ebf2f203
-
SSDEEP
96:jhA3sHfsN9d2QKI+YOjiao1XPgGgyWh8qmvZlYu:jhA32wn7uaaOYGgyW2JRd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{799DD4E1-125D-11EF-BAE0-E64BF8A7A69F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000fbc5419b8aeb4607e05e106c38c2ce9bff0d18b0e856c3b084f2fc4fd7543eed000000000e8000000002000020000000c979427f53c6201c8d87a37499f002694e198f3e91c3222f92e3429f41d3ec9f20000000c48159fc78b82030b6d97385c11900e827792d574b4b7c72ff762fac373b0e534000000091196091eaed7be229f92ac7d5234bc9c0f4d020cf011ca74edd616b21ac7f5f418dfe6312eb2218c6ee33b97b6d56be4d168731276a78472ceb091f422fae66 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f052f44e6aa6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421899683" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2284 iexplore.exe 2284 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2304 2284 iexplore.exe 28 PID 2284 wrote to memory of 2304 2284 iexplore.exe 28 PID 2284 wrote to memory of 2304 2284 iexplore.exe 28 PID 2284 wrote to memory of 2304 2284 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\440d11ca02390e25daef4af821b7a85a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a280672587fbf5b35b7f51b91aef80a1
SHA1a069e27ace45d7bf5ec4a88f1e2ff365fb14213b
SHA2569e152d55d278160f54e734481e72006ab9c6e3be562ede7c3e1e1b9957b1beae
SHA51248f13daac56defbf599849a3198ff02e2df896f9cacd5adfd5aab54555f150a19443b63004612ef268b4ade5e752b290c0d52a80c0b34e0b442c4a73f03ac953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521c80a6a51aac5643ac051d680a94400
SHA1029b4c2a78c40a64607e4dccd309701a3bd53be4
SHA256ce8846b49a44703d6cde6699c2048349904a9ecefeb6c201852c6b785360c053
SHA512e57e1b00c33c6767afbe9e1c5d88b34acd0d94f4c0535cefad07e386930b364752d8a11585421c9a22a342578b8a11a10e962f2a747c4bf61832addca6f81dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7f9ad0158415ca266db2d20176090b7
SHA16c38cb64b285980eb696e5339de4d0bf0dbeffae
SHA25617c8f3bb745e5b1d326c1f21f7279632d7f208d105ef9dc0106587881e01e37b
SHA5128371dd566d429b61d7cbb4607fe711e647517cb74fd0ac8c91615a0fa8127834060bc68ec4623ecfa275f07eaf705919b9bffad9ad294f5a49d7ede4cb1b8e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3fc02f201fa5ede28b99f3f90ad862c
SHA14c60b034673ba505403eb6b77a5a9950e84871e5
SHA256b4859e49fb623e357a891b9049aa7e598c0541dc850e6dd9e313168657046e33
SHA51254d8e5a46e4cfc07eae4e9023e3096509a362fb456db076f4eab60c498544fcf20b50553551593767e242758bad8a4227564d564060f55c731928606cdf24ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eb165c8352ced94f7e2249937c4318f
SHA149e115fe610a4fd39b449d58c614d3042270b7ec
SHA256a44f7367269a61f6d8124252e819396905beb7a5e2648634592ceb0ce3989a62
SHA512c89b3f4e76a3d2bebd9468489de804b5f786abde7b977114100104a32abbfb8794c010d907d8459526b37de30846a4a606ae23e4a78c32065c33408fed79ed16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5966570ac19caea507c8268126b4635a4
SHA1d292f24ada40a0b953adaba549c94232b1813828
SHA256cd9f7238fbd22ab83b77610b9b22c8ad5ccd238806e19df9cec1281a99a73505
SHA51295a20554490099cdeb8a5468b9e30f97d7edea6cb92ccfac52c141ddb8a81a9d2f0027d44e9290dd7c41e3f5bbe160bcf3504fe9e74ff16a542b6e91b934b2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecd9e8145f83837c517df47917ce58ee
SHA121a59b33509776faf641691a7a1fd9a042aa6538
SHA25631d1004433c4352d792da21e4623413c09b56643a842101ad4c4b96ee1bb5fce
SHA512c7cd476e70560ecbc5d92e99a4d2806518fcbe3e2f743458db93d0888611a6a275d26520980911d4d89012b43ce76f4335eecdeb1f5d526e4b10b33dd9459e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc61c5dcab775df5fe3095441f5ea679
SHA13812e5570161fcdef17cd02d6747ed03503c4cf1
SHA2566d5a9a9092486956e60c288a8f6129b07cdf4c15128b4191cf036ca36d212e0a
SHA51282d074f96c6c1b6be89ad739f3586a616b729b75d54c245f3153f78207407d6f406d48cd7d77b6fa2f74d4c80d3123b3e4ddfcb8a2a3a7c08782806bd72600e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56462fd42cbcb7e9b428569b409500365
SHA1a718678864fd2827bd8c7b7f8c6ffaa1f92bfbdd
SHA256df460721d67b166ba3a703e4cdc5648348bc8bfcef4d737b8c67e3999760f261
SHA5128b668273ef7710456dfba7e0ecd29ee68a879ecaa2a272f5a59d23c3d3bb06ee82438e613819916ec57683da2b3821359ebdbae9387f295665ccaec0320b979c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d2bab6f44900380f67c348cdc336749
SHA11478b43032a47778954572ec75cd6d26a1ff7394
SHA256a0c361c1824b86acf714a332c1639d9acdf1e8d3d455ae65848bd12b9f558e4f
SHA51231b255c58e83f863920f12a85dfd46ccf76fa197b5580ac5acb14616473e6fff28ca2764788d4706dd0f32cb5d61f43f990b6ddfacab9887106b3a366de3697c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7502029386b483c4b1d4b759bd9ea60
SHA1679f9fd0d51d28f36d01f98e898e98146d177e71
SHA256c2a10c3c503986a36b7bee50a7e76aa48665600e501e94066a6da111d18e81a6
SHA512417312c2987d97d12ad630498b33ffd27e2dfb2ce06449f44b0ab4bb9ff5e8fda634fd19d64cfa7839e5d5a1e209ac31997098893ba3653bca54620e99d3ef69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51900fa358e2d6bf7eb55dfe60148c5a3
SHA15fb82b4200c2ab9cffd57abe0e4b33783c27ec95
SHA256e2fa0ca1ede9f86053eb20c86d62458288a484a2717e1e52052ba0952fa999a9
SHA5129de66e6e9c758b7229b014567110b7641bba7a1f6e94dbded551b2e14e3b608b622b5c462f1bd3dbc38d43bf29ae783e2a61b95b1a38fa24b424c36eac16cc75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c56bf8b9acd19dafdb8eaf62920f905e
SHA100dc052dc2765938d34114d21ac5981da34bf0bf
SHA256e561ad1a1db362f1d976e4d0c95c903220ffbc438fef570eb7ceaca44194c43d
SHA512f1c3ccfc788f5fb611b4150b20e5e92a041c6886d83a83ece95222f97e913855b0a306583e2032176d8e4318cf36cfda2a492f70e28864a98b7c4949a6cca4b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec778839be6ebbffbeb9e3678e5bf2d0
SHA1d4d49cea1b0a8a6c67a81e1ad4ca00ec3057e9d4
SHA2561e7cf7871b788e163d6cd1c57f62a3b48c995b74708f69dab8a93d1582c8b780
SHA5128f6cfeaa93fafc893a09ff039e0601e4e4d01a8af20c011a504ddaea3c254dc88eaf7e68b0eadb09762d08b264380ba680f53101548584621e48247eb647aab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5817745c5295a1d37b4371b5a0ffecb5f
SHA1a80c51ec5228d6ce931b793719de292c4df2bc19
SHA256930c911ef2c48520b44c2604055895d30377be06a40983acc7c0c6eb01ee8ac4
SHA512707bb450163f79e2aeba7c0370e31552245e40a972905504a0d05c2ca28d4fdfce4dafa48d4fca0ca17d8c208ea197bbc4030af73aaba9db562acde0b7268613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef9be9d59b4a43c460126dba83878eec
SHA1339acd389f6d32d6225807aba4713a7327ac4cd9
SHA2563f4c8241d8f25de0b9400e829f65090c000f386a7a491788e6fd0a161b760709
SHA512d8bcfa1ddef51fadedd2cd0f0c5e7cd53b000bbb737867b93f8918bfcd4bb78ff3a8dbf5dfb4f9ba2afcdd5c26895400678e84db4c2d220ecaf0c71d99cc82ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567a648b34b68044001a8889195e33d92
SHA1d6150383f88cfbd6f15e2635d52a9caebecceb68
SHA256b90e84771df5656a26bdfb9d472fce07ade646882b02cc834b366b122d5b48c1
SHA5120b223ecbdb02a812bcd48561e21e11e2c6a33768b066c9a7a3950993463a565e775016c726aed20dfa7aeb696368a6b62a9dc6a52f697a6bda0fa9cb412e3370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db928b08349a8f675f9fe7ee5089fee7
SHA16557657912e0537eb1205ba13deb5b836d0846b7
SHA256cf9a699721784602938a7916ee9708e7616e36b5caf49bb8f760875dc32045bd
SHA512104c06a7375d2eec483e45acabacd433d7cfac7e67c5440d6b2ffa053e0c9bb1e0d05dc0b5aa36cf2de760ede117264db593251a3a7846d9b74bbb04f6262c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daab6df7c15a0fcd7236f178bffeb8dc
SHA1cce340619c710adc35f606bd9b4aeafa3d69fff9
SHA2565e1624ac9ff18f4ecf25b615cbac9096f63645f4d73f11d802edb1e731d50a44
SHA51287732f976c327493e053d7761c1c40a4ab24a24302e1b3a226dfdca703ff55af1b89d32c3c40731eab76e6784d19ebfa934bc3bff45cfaa1e2f6fb0bbc8548eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598857df6ca37d8af8c95e400d30caed8
SHA17746aff427e2f9d8a6e1727d43851b283d014412
SHA25614f2672cdef2bfa097c6d40c38fd327fe20defcb3b9d14889bc4073180dcdb74
SHA512950b7e12f2976c34b7884654d4d79b4cd4417d5ff417972ed91f8b91b71fb8d311aef47fefcb51ba40e47dfc31ce0de96ba46de556f0b498fd59698dd35207c3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a