Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
4633e06423de3b06180bc2299aafdcc4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4633e06423de3b06180bc2299aafdcc4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4633e06423de3b06180bc2299aafdcc4_JaffaCakes118.html
-
Size
29KB
-
MD5
4633e06423de3b06180bc2299aafdcc4
-
SHA1
d9851c458208c6308ed626194d4093ea79c5357f
-
SHA256
0376b3f8e2306eada30fcca4648f1e2b9eb035725bfbbb92287d3666a0394be4
-
SHA512
82839fe0f4fc3a032a95c6d75214e66d3577d27f063592382dd56aec343219aa89d9ed8ad4addfc37d4a505bde7666ccb0e7310fb88c8d7f680d4e97cccdcabd
-
SSDEEP
384:CRgNhvXIxTN+4RjVaQCIPDlxqx6T7zj14z1n:CRgjXIxTN+4x2g61n
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C513EA1-12B7-11EF-B238-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000f4586c3eddd902fcd78bc7f762c680b5dce56d39cf6ab15cf2defaec4d86fc2c000000000e80000000020000200000002ce40b32cb4fd5bc8df90365aabe01c9893a3a6850f0a6714d745845c637db4220000000f50d42d25b2fa47358957260a317f2c32bbdf04f08b913611f20333149fde452400000005eb5560d0926cf69c2ebc8b3822859cc33612ed5a8078edbc2a97769ccf2a32a11e5901ed7c69326b710d8aa40aeeed4d02f15b882f6b4fb3923c3166e1dca49 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421938396" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203d3a76c4a6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2944 1640 iexplore.exe 28 PID 1640 wrote to memory of 2944 1640 iexplore.exe 28 PID 1640 wrote to memory of 2944 1640 iexplore.exe 28 PID 1640 wrote to memory of 2944 1640 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4633e06423de3b06180bc2299aafdcc4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56858c93727de196e710650e15cf42f85
SHA125df923a62a9096b7921d527fd3a0ab3755b1c0c
SHA256dd41b19e9fe80f75b4bfd08c7226aa61369c4e70ac2a6e13689f899589c4f961
SHA512d0cb5d0c2a5467089552529a446b82e2c1d92e34b440b6b404cf647da4b0129e72c6e9b52bfaf13a357fb0a7538ab4325a4218f48c454df8131aa6105379c639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bca20591e8a4fe6f8d98227d7d9a327e
SHA1076992cc4c43cc18425939847bfc341ca2aff7cc
SHA256dca15e8d7ceb17b2ecc68820616039be7a5adb0cfa00a6c9dc1b9e4af3160fca
SHA5124ef0357bc0c4010936d027cb546e09d790719e2e2fe7afe1295d1f1a5817faeb2750097921bfab82e49fb60ade4743ce50642210755bb3a7cfd6137ca28dd21d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea4d5012f55a528a1914b457a9c25606
SHA1a6ec9ed72d9d2bad6257ae1e361ab7c4f4bafdcd
SHA256f9566739ab47f9b88f976fd0f0f9b862aa80dca16adacb9d16f32e925e676678
SHA512289c90e500772df00b3d3c223fb3d4a3692a64f38290d9d131ca0170abdbcd14790b2beeddea6928dec83ccee13c509a93c9a05e1e4d8ffd025e3aceefad7537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b373ab28c94ca603b96dc5465f7d5cd
SHA191cd9db305db9392c818edc6a93bbbdc6e3e6d07
SHA256360793739d7c9d8a72a8a2e01c27eabddae7bf89f68d98aef2fb65c806623a63
SHA512286204d5829cfe626bdf6cb9bb73be1e4b32e693410db8e544f9eb3db5ee5a8c728d2c92f2c4ccd260fe58b61f24bb54abdcd3460724f83e5456a7e5e61a64e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5358a7da2424e74f72f4a10f0a17e6264
SHA1f5d0321dadf46991c15833c9da84a5d6a88a4fc1
SHA25622c611d41574da0a8668844eaec276e1d488ed2a2c26189a72a02da466179d3e
SHA512b836e9b15f9169b84d1e2e45051a11614e074d08a7d7b29721b601d85cbbb78639a886249982ff55072ee3ab9f1aedd0ee9c37ca2c565e0621dfc1ccddd1a0d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530dfc50d867900e7c1217d4150b197cb
SHA1cb057aad783632ae5b029c1ed60526adfa66c826
SHA256238804a8c6085bce36690e836c101fbe931407ff9411e5ed9525e65312814fcd
SHA512f5df3870ea02b13f3383ac68eaa9cf5e12a447927cc44e70049e17d313fcc96b925a718767d05d6ef8295785437e7bb0604d3d686a6e06bb63629dc6d91c110a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0cf172314a214ff74bc00feac74191b
SHA1575426188c42a8a37b20fdc2a9d80af7ee815cf1
SHA256004b7ad1e2791dcd6403f97e54c97222c8166d41edb63b493d5bc0eff04db29b
SHA51204a7a6d8e6473cf9ad1a4fd1b1395ae668aa21821d0409cf30f61239d7fb97771755025b877dab782e5d383c96f88b97a5ae0d93b683cbf0349bb5d1fca1c078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e872a7849e927d5e85c7d1e6a8ce8eab
SHA1c47e6e98ded17be512e72668157329d55ab9d574
SHA25617d458c85ba83cf8a4c2e3868e0ab6bf4df728222f600e3ff88fdbc8002f2279
SHA512dafd49dcf4cdcba79cde2bcb97893850d7bddc4c8ec0f570a33ad638682ed0c3d6a7aeff2d62956601e2b5a4471737f068fe15165d478773c70742dd38ff4491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541b7c1f648d64db835d8e0dcc00beb40
SHA1d28a528976e5dd4fbb446b0d8b4967d7f39225b4
SHA256c4b9c50a2f3d3adcd928d7f01bf6eb56b8cecbfc234df4e41046b382e2d8de35
SHA51235bbc0e749ce7986d2dea4737c3bca60b915f58bb0ac21ada66e4c30689d7ba8b76ee46a5405da2cc6c3bd8e462b9cc622956dcd700c20268d150efc46838444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52609d34acb224415ba429801a2aa7e67
SHA1c91c6ab70efc9a8cf781c16ef8f42d97f2807efd
SHA2563a7217618d4dd80afc8026f950dfcd091db48ef5d6100b934675776ab116e8b7
SHA512b3fce185cbc7ef5596f70516d018cba5843bd5ce1c53a12c7fbbfa15b04bbf757aff587b9bc1873d93f74f4fb2918171494dac44cc149b2a2284af5befa3709f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537985c3a02bd3bb06a7433f449b4a07c
SHA10b2f64b7e86eb394b669141783423ae415fb9836
SHA256bc10d09fbc6048b23f0f0484d57b6608ede680fb059f4edf8a10c6c21fd3af51
SHA5121aa30a31945cb2783ad3484156815e29e042ef57ff0e28c8b4bc28fb9c3f03b0d8f02bd70072cf5787cae859550e49adee9776c45713c194bd6474be52c1d05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec066133b2ae96b6cd28192362c602cc
SHA12af96d41c7551c5a8ffd3c75c077619d81ba111e
SHA2567a50b16d6adeb96b25d3cd432f578b0d902ab351136aaa21e5f92ddc666ab16a
SHA51227223dc64882bf87043fafe8b8a15a5a679ffd71008f9641992e9e665632940e13da4cf85792cc799ec0762431b823c733a873fb8b7079b6b950595e0f2766fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3babfc3bd7df667db150e7df8c98850
SHA1d2fcedbd2da473e8b5eccaa8415966bb6cea30a5
SHA256519a08a57edcd9cc743f17b78bf49366cb470c4e75f117624c5f6b2ea3face67
SHA5129cbe53f6dcc42e6b5982aa20056758d3bc30e2b709915ec30b3ff16ed43c8bca90c65ce2eeeb2e4c0d480c29245da8142360c83b57009f70eb02b96418cfc608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585ac150653cbd7318884744bba29abc4
SHA175359f1bdf2c29841f5f890640617132f1637c1a
SHA2560e482ba134ef7441461d79a64e6b44cf11c20296e3a51d44132a99f573de8f64
SHA5125711ef1c97a24742593b321919f6262dd7861753cc4645a7d031e99f3019dd0b34d7f4922740256ace3dd88da6f60e726bcccd7febdf51d08bcf3d5fb234eed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8677ca3ecfa3c64f1576b3bcc877bae
SHA10bc36872b7268ab76a45ef57332756328a61b57e
SHA256089ba1bd58d1b6333f2c850d9bb9978bf161bc2e296f0546d8ca52b688e8e2fd
SHA51214e791c0490929c7b95d7c17115f8ae6788b62be4e8fcfe1a8fa6eec85467f820e531e76685df18b0dd21a2d14d5664fe71ec48f788fdc4157363c341a8fe318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5312f8714829a9a3f4f63820832309082
SHA177899580859f56c5ac064e1c47a83a5d6e8a6c16
SHA2564e61e3504a15a7ed07e7c227e5fa8bdce038bc353a1b2ec83bf2249481963281
SHA512fb02b88e318eae5a1cced74ca9a9bff2bcf1e61ffbfb9006500493af70dc858a064a265bc9f3ea5a1f04ab2a046b95510cee9573a4eb2e15442e0129341c1f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc9a3c3eff74bbbb7dddee0e3158c90e
SHA1f4b9997971d54b39ad9afa90731a3e22c37f2839
SHA2568e518570ebb098c068da2f830cbc68d5fb25b1291bcc6b41af29593391c47642
SHA512cc03f5c5aa52d65961d78f28114f1885822127012d44b3be22068bab4dcfae5e1e46675d2c1dd5436c00de7c7f6d8923ffe5baa87fd8568f1cdc9a1bcd16aec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53467daaaeae42df53857c05c364e47a7
SHA19d4d043b7b0a891eae77274a9c536c4e51ac72b6
SHA2562301f05466f28c4ea697d09dee03ca15932e2bc0db69702911d4b8a971f1c48e
SHA51208c1f192c4f8d9b3947ec4ef7f5ba45a86beff6086e03416024ca0f61277df6fd2e58213cb26703af66089b85af9e730c5b5637d29fefd71bd6e2d43b049e6df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55affbbe6413fbe3035a85e03399df2fc
SHA11e6e530556ff3e188b76efc45bd4539deff763f2
SHA2567e6e3227451d9116e62dfc93cffbd09746654b1875a6e2959ee789d8760cabd1
SHA51275b37890a509c9ce5de192ce47ae3ce28dde400bc1927b899e189a4edcf0754978de1dcb0a1f0891bed121532a5b8f9c9ec760fbd166600048a05a32a4dea059
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a