Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
46706d5edfe760b101443040738651ab_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
46706d5edfe760b101443040738651ab_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
46706d5edfe760b101443040738651ab_JaffaCakes118.html
-
Size
70KB
-
MD5
46706d5edfe760b101443040738651ab
-
SHA1
47503359edfed337fbf2031d9931d0425d0117b9
-
SHA256
479ffdcc58213ae507e919d3f46284a4c6d8263ab2572ae60b287bfd4035bbbb
-
SHA512
d18d749c41dfb19a62ecfaaba99e5c01e2c337b9cf0da5f0c0b37cb1f98ac8c971304180f5d387718d2cf0b45e0744d1be4246c5f382cdafae03243e6429a6f4
-
SSDEEP
768:JiugcMWR3sI2PDDnd0g67Fee+4e+GgXBe+ooT2e1wCZkoTyMdtbBnfBgN8/lboiG:JuyaoXMcTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000056f16f2f0121950b0a272c0027d56722604dcfa412299063861f369eb11bbb77000000000e8000000002000020000000d069de9f4abf8a6746f74ba2f566469c267c839739b2fb4a47b71d066893464820000000fbe65ab8bddab4938635943a02e94259ff7cdda02d7b9302b9089d8c5bc346094000000013ff326fb84de4b3b3aafdaea42fbf636be9bd660be209722ff3bc098f7e0e544e6eab6724528aee85c971050787161ec075275426b300cddf55e4e223926bb7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A4F5FCE1-12C0-11EF-B991-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20999f79cda6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421942279" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2452 iexplore.exe 2452 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2892 2452 iexplore.exe 28 PID 2452 wrote to memory of 2892 2452 iexplore.exe 28 PID 2452 wrote to memory of 2892 2452 iexplore.exe 28 PID 2452 wrote to memory of 2892 2452 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46706d5edfe760b101443040738651ab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5997b4b104197dd751f57d0968fe08d3e
SHA12eed8d84f5d439faa1215323012470b3c5dc5e38
SHA256b0e4742e4f5f77153e94621cfde2e8af26c00a129fddd58434507b19ce85082b
SHA512d9f2d9a86afff4310d5e21427ba4042af17baf27fa63f00cca0886dadf01337e91de92ca18344df4f8809dc40067888e234a213e1fc61279ccb463fd43731aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59ffa6c4492818166150c76a693e74b48
SHA1f400925c7da86644cd1df48346474921a1d3bb18
SHA25619e6cf8dec80a99a9843f035b6e71d01c915cf6f7c8d42f539c1ffe4e05647c5
SHA5120af3e60f9519bd4530161ebc3d86a5860df651718cd2baccc2a1434b4be5bdbcc24f4618dceae3a0f913cac73bbde50fdb305109f9684b4f15b5696bfbc27f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD514023ba972b160be30d3b7b7c2010d58
SHA137bb5a8578119cfdb7030b33a3438083ca1180db
SHA25600e8665558489196c32e38c80cff8a57186b2de401db771a7c9be7b0b5c5499a
SHA512e697a93e18d0eb6388cf5fed81c188a90bd9b31599258e571c5073d3f55d518f803dc0bb5119108d728a2724bc7b27ac3eedcf421b760d3dbd6661f2422b1f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD577913f9ad0f43e453cae05d7fa12655f
SHA1e0743e808ae21fd1221f439d79e685c1f9e7d1b4
SHA256f0514006d5db45fabad762054418c3b8c61f13fd965335bf73b42ba2c52284bb
SHA512c8f35634036ff993d81bbd94d5dd1a94e2a8b9502414c0e49b7dbe94da47fe58ca8ccac2194d1e16415afc1f1f2081dd7ca0a972b4325f92f2d104f9592a5df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d4febba8f4d0e6f0c75dced9e62ff914
SHA10ddb9982dfbef49eca43a9040ddabb0be679efc0
SHA256f7d6b30b88d4faf6bff2cfa11f5eb70f58c583462ad5357c386c2b8c7359dcef
SHA5120316e2e3de89d8a3865b075518d53dab2551b171aeb9b790e076000aa6de8ec53345a3daa356c5955af415fa25e10b53a4df5c94c114274a4029fa016e5ea0b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59ffc1624ff637e9243306b686f929e10
SHA19119aa4429839ff817e6a479a0b7cd86ecdc98cc
SHA25687ee69c627910ff6f2d8b401f83a7b16130fca5c3799234fe6870facfdec7b71
SHA51277d4a5fdd11fbcd94a27ffc2ae17746febe37311952d2a2a1f611f2a55ccdd607ebe2285325b713874a0c6f77a44e0dd50a1d0cf40fe9e758010629a096b8117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bb1f4c147e1e69139a2894d757856b54
SHA1781e41919e153471ba1309290fb6f319249f6c96
SHA256adb7d67d17fe90701db7a1c9f747a6af05ccdb45c1a58ee41565f693156471b4
SHA5129dbc4e7ea142faf882854939434ac26f900450e93253b15b714f34ebdb87f8c6e55c34ec6ba5c68133400a9538a6a1abf7e116e7f7d43be2ff1cc8aec4355a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54bef320e81735930e648f2816de23563
SHA1998036c86695a28468aaa8f3b1a8a826da14fa93
SHA25643c5841adf87903a4c21565b2d86305912fbe5b286ac8cb9bb4698b1250b3f4d
SHA512303d8a56bf1ea5cace1f1fcc8875d2dc7c21873ff5ee0a315b3aac7d7a70024f3e88aeb35b4a4e9b34e9336be44f6b4e7f865bcab24f3c8ce9f40b98251b4bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e6685dc82e5711724ff54f4dd6261d39
SHA139a79f57e6f79e771b7be471b8d74d2fbaa13f4c
SHA2561e3d1dcbed226fc3b80f0abeac6cecde859f61e77c56ed605a40a572872761a3
SHA512631959274534161e8f63a547bef4cbba0729127cbb087c95c46899d716fe30d0904d407b4c5656ec3b2c6eeebf56899b5857bfd4e6957e4c3a08deafda7938fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD584c64112883d0fd866fa72bf63e06e9e
SHA1d18e794160510395a9a02faae5cc433c66fb7aba
SHA256572c833e3b1675280d9cfd090a6c1282b7cbb79733af7bbd0ef3a6d43e0271e0
SHA5125e1e0c070a36f34e112afb0280fd8c8a63447da029200600efdfdc54f679fa21961ede56be69cefdb262121ea0167fdd51814fe08a78dd07dcb5df08573ce09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58fc7f1a6c2b369cdbdedf42fe047d7c7
SHA1e6c4b2fbebc956a3ffc959ab2ce3a156caa776c6
SHA2562fc11ff51ebd6163504daa3f9251fbed74b77edc02fa83535fe4da1f10cc6c44
SHA5124d0c7e42f92647131e582aef63fb2d484a912c05bdaa25146609cfcb2c7b0081347e779db4da665c8e4f54f2c9605d4eb990cbbcf71b41d87c27552ba3a5efaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52865f1158d1d53bbb2f1928eabdea208
SHA10442ee64ee7d185477e0027115491d6f19b0d469
SHA25698d2670c4b3563d015a9a994ac6cc81ccffbcd10d50af0eb7b97c6cfcebe8099
SHA5124a1f96c83303b33c9a58db8b2e9682f292bf82b0ba48ec3ca5af8867707d17ddf6f2991210eb8c7de24ce2287e29daebf2c47826f27ff89dbecfb32def7c2770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53bba3ff7f738af578eeeb56fde3f218f
SHA11f4ae48d54df8483341164597fbc97b199ba43b6
SHA2563272e67533f6b34871bf91d57893cdcd3344ae0111923b4c3bfbe0ecec92f34b
SHA51202ecde4210fa5822368e955f654223b34a1f1a9aa1f7ebb97fd695e16698fccf76001e8d9d6055f1ee412dd2725d6031dad3396436346868f3040be581055283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f3f89d267207ab2f972e44843828c8f1
SHA1fb0c56b2854b5aba6b519e7a56f861393807e4a7
SHA256a2b2e54c5ac44eef57a84d63a161709bc506a3c17e599232174e6e381bc854f6
SHA512d37c2132464692d3546f7b06e5585694b8155bcb022be0e098d80167556b14a18a6f225bf7ae117d4095958bd6fb0945ef748e414c13f699882198a1d729f596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56bb12cd68bf2658298a83c10157f1914
SHA18661d4c3df420bc60bb9ccfece03b865231e13f1
SHA256e9daadecbdba96e6c2787f55721f372db95cf54875dc646e5a63f935c44220e8
SHA5124a97ea5e9c20a8e4bc3aa52aac619ef517b99705989adcddd60a0ff3eeeeb33f620a0b8d0b682e93470fa9f425a9e1b0fc5c1651efca86aa146d1976f5ec693e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54abb3e091228ec419e9c93d2ccf84bc4
SHA1f696e3370f0cbab9ca21bbf29605011e2a028f48
SHA25697ab503628095aad6fc071134aa889efced54effe5721f2d707bcd37bb897f73
SHA5125c4842ddd313bbeaa7c90505608f6ddff885613a3d5becd8aa904c841a093e25e359f426009406b415dbe908d3f6440f0c680fc5fec69eec41cb2291ab66682b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f9eea7a9dc4b8963d3929e3997f97233
SHA1759d4095b242ca7e37d2851cb4865fc61ed92303
SHA256934b5154f6837aec0fcd34f399c98471407347a0661b40c32d791ab6ad41cee4
SHA51290f421e97fd422e83d7d62b964abbbb31ae5a5bdff17023b42f074460cc779bf837099cd6c7ddbbea1492c4c826e02962d82a929077bca820f575a0fe37745ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ab5d1e71ddde8225c1ead14ff0c4a5f6
SHA1c8641579628c8267633a7efcd61a8c49ed3cb7e0
SHA256cfce7ec7859ec45a093a009df81e4fa09d94c2315657d535620f14707c0b897f
SHA512eb775948ebcb1003d160de6c5a1594f54ce40ed5b345ada373883f4238e95f7c2cb7e50294e3e4c208c113ca87cda17c57a1fdb6eeccbe264c9eb4a69d2a1fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57e6374cdb6562be7143cbb07db828adc
SHA1e1db07829e4da1d40aac00adebcaf019f0150786
SHA2569286330c5f9378c3d612c2360ad2618c04679eb09437be6bac5ab8d36c789172
SHA51234d3347e6353cf6c48245ec8c10f3b19ce04719b84291914fd3c8408cf768a6e671fd3a056b9f9d2eea2d8da0391f9e2e0d612283db10abf04a25e929c690f00
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a