Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
452064f41b4d4a2a76ef74dd38e426ab_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
452064f41b4d4a2a76ef74dd38e426ab_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
452064f41b4d4a2a76ef74dd38e426ab_JaffaCakes118.html
-
Size
461KB
-
MD5
452064f41b4d4a2a76ef74dd38e426ab
-
SHA1
1d0726e0a431130333ddec034174e64b1fbc41a4
-
SHA256
4c4f1251c2e2c9d96199f26a2378b3174345a8fcb2388afb8995e3abbff60629
-
SHA512
68f39cd68e941a2e3a09260a4c6e8aa74f01bfe2240ab562e66a4ad829698663a8cd5c3bf2fa4cedc0a6edec2843c0c2c73a170d187c45217260a60e385b3edd
-
SSDEEP
6144:SCsMYod+X3oI+YpsMYod+X3oI+Y+sMYod+X3oI+YLsMYod+X3oI+YQ:P5d+X3f5d+X3m5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421920281" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000668c5a36b2422541bfac15d5fca77d9400000000020000000000106600000001000020000000797fdd9145271ca8fa56ff18be63f3a22d7a4cadd1caf64f626070a267aa48c3000000000e8000000002000020000000d56ea3f3d6b6934235ec9159c5808d8f02999063c49995996d292776abf6a88220000000abd4ebb01e9b967256fa2c0d80a4c3e48a9e58f45833b2026e82bf043f0d567940000000bbb81ab25025b6d53ec8f7437234b27eaf97b5f605ca363ac657776a1a7bab9f655d32aad85a54cec4ca95e61ee9341bc45754eea27df9314c7705190aaba002 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F8E6391-128D-11EF-B6F2-56A5B28DE56C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0fa0b489aa6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2624 2040 iexplore.exe 28 PID 2040 wrote to memory of 2624 2040 iexplore.exe 28 PID 2040 wrote to memory of 2624 2040 iexplore.exe 28 PID 2040 wrote to memory of 2624 2040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\452064f41b4d4a2a76ef74dd38e426ab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d163cfc9c4c01a877b910b8292324d13
SHA1351def3b80c66b97cc091bb38d699216153cd07f
SHA256abe750f4218268bcf4d181108e2aeba24505f659ea77f58f6ef4fef33e71697f
SHA51266207f9181d47610a4337ad76d92355fbe31f2ba270505905ca926337da0702d297892629f8229bd44c1366fc2af6ff0c9fddb53d6aa044dff6930c1c6fd7e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5737c5691f311ae7f148c270014f55924
SHA158570e773cb30718f1c84017216e4e3369700585
SHA256491d7ec2f775bee9e13de5486523c1dfe08c10b54b407ba29e3fb281095a777a
SHA5128c4a64ca2818ff2ea2d39bbe3d18e4339f2b363e82d32e091111a2d498d9cc8b5edc9d2885976d9983bc9eec46a16ceb24bd3cabd02aad11ad6a295ad93d232b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bff0b3c5231cb28fcde654eddcadbc6
SHA1f92a00bd7d77900f23e5b39ed4f16fcd38296e59
SHA25693ef7632f313ae2884e983f74c60862690fb4e2edc6a058fa30d4062ab043932
SHA512d2e0bc515091d455cc4d56f3210a07f248feeadeab5be72b46b49e2529e6cf38304659f8c38ef86e7cad93e949bdda1f4ad7242d3ea1a81a186d3aa46a15fe24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545b91ea056fcbd97bb1c1d52cdbf21d7
SHA16b6cc4fb7eb9df99808408ce3f480036408ca107
SHA25667de2e4c50642004c761bea633f2e8b46fdbd74943d454b171c390e14ac99915
SHA512aa38c8e957b00014ce1ff1b2c3a4eb3115acaa452655a76650c53042afc039cc7e8dac893adfe1964947f7590bfdd837dfba0cc8a3fa3f0d13d9630a9cddd5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570654a75060675b0702789cd6289e5c7
SHA1445d1bbb0c5e5319ea2428f63aee9a4700669e82
SHA256636bc7ba53b3bae08fe317fe16bf270b6df6984c88e6f66b0ed9c4ca6e865733
SHA5122ad07303b699f07b38ed54926abf20df6f821dac64a5f8edc0407ab0232c439a6b96f3b06cdc31bc0ddef23e5326b8b9bf4b25cf316271ea316adbe0aa2385e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b804ce8a4abee9f063f2fcfe53aade0
SHA1b346a4638e4343a2077af49d57874fcfc325ad3d
SHA2569fd0a7125a99f2be1c3587541b300afbd6ef9b2d594f45ffa6575abe5a467dbf
SHA5120d9d12db479bab973f5abfb75abad444e851085e034e37d44c506fbc3d807725695864044ab4e6b77d5d30067f40f232ee26a821e8370ab6d0119c77f94648b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9f1493f73c6aada215eac1bab9c1ccf
SHA10c824c4fb0851ac6e0fbf29e83836b10cba3ec07
SHA2561c56dfc310d20645f4d7a7df619a1bb24d0a7d7fac3809e06a9899b5a0d84e49
SHA5121f1afcf55e21d09c28c630b695c416966691f736549d6c20b2fe8718216cc4103f29759ad82c45efc0c55bfa0b4aaac78a5f614a5a6f1a40c880b9d84f257331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a247470f4021fbe76dbdc0676fe857bc
SHA190e5f00142055308c6ceef7bffcc6047a8e1f870
SHA2569fd7cf23e5836071b9ab14f0af3b1d7860b4bdc6caf971d94c5162b7975872ea
SHA5121a2844cf971683a7ae0288323eca28985f39432d459634ade41643c2c798caa1e27bbc8bd0052bc40e961b793e617e6f1a4cddc0f6d745e02ad1fa2583846e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508448dc142f8470f25e013f15f2a0b99
SHA14125206a8f39b279f79efc982bbd906764ac8249
SHA25698a87ea81359a6a8364b0abb4e72ea1601c76523e9132f0e1d0dce55836e8d2a
SHA51294de977cc2f13f44cec1f67edbca1e1d60039af97657262c8e9f293558b49f9f940913a23c95779a242c78f1d95fc7693c89e4dd1d32910dc5d18232a989a0b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c5d525ed2d06f7251d36af05494ccd2
SHA1087a6292c6d58d8e9dd8c6aa4d797285a0e5b44f
SHA25653d560438b9fc7097d55ffe8bca9aab161f477ba2f6272da16ebec3a911c6a73
SHA51273125c0f61544d08ee64ada3949c45f6c92e0440844a41abe2e6b3d5d5069101fdec51222c9fd14fd8d7d425d8f9e6d8c0a85249380afab01355fd10303f7cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5beef5dc31bc44301b512cd620d6045e0
SHA18c2400e57452c6075320696ef419a2b20b9ac22c
SHA256dde749eecd7d604c7942c4d044adea99f17cfdcb284cc621a97fd2009cfcdc97
SHA5128f6ee8784871cb301e74e6c0d9f39d4a1bfa18d68dc0ad04c4fc7e76e3861fac9bdefa1902429c4961742c05916b49ad17571c3897a011892504a741a3c2d64d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5752008807fe2af50d7df9d60e454e085
SHA187e52ffe8ec9a7295031efae33f4f6d05218e44f
SHA256e5d9f1d6a32c575da8a7cc0d74753356db993ed9de53370093034a28f20164bb
SHA512b6f8eac5822b3536afe7f8d782b5ee8e6d261860ec5ca24a244463130ca7e78980817b2be01cc19da299cb86c27798d493ca853024ff1d0dcac879ae776d3da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb003523ea025c2b63b649620fb4b437
SHA19787576899f1f618589c9da7500c2be5d4a22014
SHA256167c25204a497c320e6e1cc19005a2682bbcadc0e0a5379d29170ba2370c291c
SHA5122be3a77c7b0ada72d599fdf5c733b7282c84d4232ad274854b5e1236fa88c72bd303a2c1b3364ac8c5c64d186ac58e3ada4e73ed29ef99182f8a8101761b9af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5848ee075786e662a657381af43e0b833
SHA14c3fa10bee45e81912ca206c7869442809bdab5f
SHA256c18aa511cd1931b50e557d7bea7dac223ecbd1542ad094d3ce66cb90f8f6d379
SHA51296bb25455b94c63b1cb12bf37bd97cfb46c9e114b85f5eccd122f16db155828e89449ab988bc3ca5862b7d7c5f55116a84e33f0520712b79511ad5a049373074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570b9f092025e758f39994658b3f312bb
SHA134bddb71e78c55d3d900f1c54da1024bea8a2649
SHA256793b0f795bb2000ecdcf4ba2c86843c1186975bfe79b254598baf2f76f3f42f2
SHA512672ce3f456ccf18462af769fd1fae00b0022e28429e80ec44f46b177f53346ade4a19639aed63e84736ed948537ec9dcd7d4037a317883e8b1048050caea1375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f089795bf4966e2bfc511be21453abdc
SHA192b4b242e6045e11732ed3d4d368f40e89680af1
SHA25688ca737a1ef9eac22baca0025145bbdcb528322b0354cc99f2de2a2e18ea4d07
SHA5124fdcb348b070837c195d3cd83220e2c694462bbefeb69863b5a93b38e5c96c4fa9e381fd4fe8aa3467b73d174a3aba6227781371e7436efe24f03e09e7987bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a16f8868a854055511948b516a036c2
SHA1c727ffffe26b1d43b03ab97677da2ebdbc8bf505
SHA2565af3d8c305064acea217e6220dd3a7e6ea3b101dbf69f60e520e8fa4c870a446
SHA512bbb49d33b0d87c755f77d6c9f8b4075ce139c294c192b73d71cd58566b383a861a3b06aea2e15562ce2741627e80c9127f4d1b3a84af1bc49c98a1b9f8b262a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56de2bc7d94881bb804f06145b927aa05
SHA1029089c8529e93cfd2487dd5c5237091ad0ef8ab
SHA2569391961f3b1c1157b178f322dbae2920648818e84c52e3d3d99f41bd4ffb5a44
SHA512e43df546dca69848afc9c93a8c1f7b1b901ab050ab260e7672751c9e64bace5cb63e0c0d2859f1c6b7616324054daa70276398a5f59d351d6464e8d0453491fc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a