Analysis
-
max time kernel
137s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 17:14
Static task
static1
Behavioral task
behavioral1
Sample
4731955419b0158887336180f40b9fe0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4731955419b0158887336180f40b9fe0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4731955419b0158887336180f40b9fe0_JaffaCakes118.html
-
Size
4KB
-
MD5
4731955419b0158887336180f40b9fe0
-
SHA1
0a0fac116f12bb63a97c93407b7418274931b083
-
SHA256
c7eb294274bacd8b65d64792347a0c64fe80afd616863941743ef090e112f890
-
SHA512
b38e5dde323103af745d94919d30ffa90919e6cc25e584abb04ca94222714a72be515abc1943d545fd5c3ad72bb4dfcb524fa99f0990369f745b8487823a0296
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oAohsbd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c00b6768eba6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421955135" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93D53571-12DE-11EF-BAE0-E64BF8A7A69F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000014bc194df9fede1f730e7fb93311762028ff929e3fe0d488be4b2289f04b216d000000000e8000000002000020000000538902eed091e358017ae31999767778654031ee49988bcf5234adcc44800708200000009b0e3a384d071ac2d4e2ee5588b0af01b55ef6b252973a2eed48e8f55f469364400000003084efe46d1ee1eea10da88fd359e462157d0be32f71ab4908be6f64d78c6fb4dc3e77a06b53c0ee56b9dce3ea170808758287d801f5ef6ddeedcf71d0b681fa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1616 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1616 iexplore.exe 1616 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1616 wrote to memory of 3068 1616 iexplore.exe 28 PID 1616 wrote to memory of 3068 1616 iexplore.exe 28 PID 1616 wrote to memory of 3068 1616 iexplore.exe 28 PID 1616 wrote to memory of 3068 1616 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4731955419b0158887336180f40b9fe0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1616 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517537f3bf6fd0b2a1677da81cdfc179b
SHA183f36547b9729e11aacde324d117fd36709d14ea
SHA256b0bb5f25abf1665238027cf4b4ee0252367da82415dcb015207b7847138de1ef
SHA5121077565a629c98944751876e1b56fc6fe136788117a13833aeff8f62f83e47a0cba74720269d147a2b317775ee79510ae7df55e71c50e695f9c02ad4033521ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3370dc9d350a36a2cadeb3b9e789625
SHA18b3ff41603cff0f33c24d9f96845d9a500538ba3
SHA25634b784da32d87b89df8a5a66521ce3ec5fdb54b2e13c55a183687f7cd75f2464
SHA5124d2ebe8f5b96edd1d9005b40e81567c2a4215ebf4cc02e465f87da4dfb2f652c1a68f129a35e1caca175dcc8cda4986c11d85fc398557bb78ddee35b0fe471a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cac0b0bcb7d503eecba94e0393e2f50
SHA1ae7d0712ed426e40c91767679cd51fef3add7b00
SHA256e999f6bee85139a7b92d4fee5ac4e7dee1e2f17f0681821a6d9d37c07b84841f
SHA51233904d4a2c45e7235ea05f8b6edaa70a4479fef4c2418e0e013762122896a914da50ff9248328c5ef42483bf753fd815b63b65e50c71c21ea2c8846ded1345dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505cc3d9d53f1fb476d4e58bfe9b6b478
SHA12c83126b7b053ea62cb0807f278a5bd0fb13ed6a
SHA25652d75bf8f85ae0b5a694e59af18a5d58c938a41f3b01052aa05e2080edb4dcc6
SHA5126c6c8cae371ad29902dcc7bd5c614dabc57be057aeb04b131d95b68a75f569163eed7c055a404c6900be586e13283f298d46a5e4bc56a701170a3c56bb7f3987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5558748cefb4b5caf569a6e7f113bfce4
SHA1606436e7c05dff1efd993329aad03c85aeb7ee34
SHA256c9880490b4d3ddaff9eeaf9bcbbd19abedc89b0681e3a38a4bd84178e14228c2
SHA51299ec1d9fbab20af8bfc3db330d3823f60f0c3c68c7136abf4213f0e02fe8c86e332c821653c962ed5c2e2de4bbb549571808f59167611eae247a97249ca02ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc62de2dfe8885259bcdcead70e93975
SHA10d6545e84823d6f160e378be984d88a2885ff83d
SHA2566b7625de6c84ede073a1872b71b9448f8c612a606f231cf7a4288d9c7e5fb321
SHA5123f0ee37174f8d89fe0da83803f0b10e780c45b050f4f4ece139def6c195ddc42d66dc300ce53a59c20aeda9982d5dfd0b1a4c6d21f7bccd1a8f5b38ab8bfdc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec2d364ea45e303b9099c4b884f88d75
SHA155b6420358b45ef16ef73920dde6c2f5077b0b1a
SHA256560b858b20a9c22db9e6f632145f30520a18db098bdadff3ed40829cafe95cf7
SHA512e7494e8123404360f4081e731390a22f4277293450b26201f4ef97c42cc79a66353c43f44e1b0740910335c475ac4368646d065fe14c478a7d217261dae4848b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cbccc506cab24a1969d6b361c284203
SHA1265f4b52ac3aacc010672e75525a50f0a7b9d312
SHA25633777a4ecb7a4b53d80e019c0880f191a27717cd42ca1bccb5ddef3badaa2d1c
SHA5127744fa3bcc302cb545bbc499ac63cf359b82617c3ea5844c40e8424482bd5d02e0d32a4506b2391693ae08f1294c30bb7904b64c93f103bf9db594d22eb8c249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1452c745ae3611502c54dfae770a148
SHA11b6ee856423b4d5e807fc2607f7943aa568dd620
SHA25686a6e8346c142573a76a5b44eec52b6697e7ebecf87de18d16929a1d98d0845a
SHA512b3bb2098e2b56f1874a26e16351dd18e45ca381e664decbe20750a0b3b637715a806878678a912fbc192c1f86c57fee7b57ee29ec5d774092decb2b2d21c0c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e8cbc29688e4972da7d8445478e1b72
SHA1d228cd9a851c2e06bf3378dc4f703a828df927d9
SHA256809db7cb0f2a73ba4b7a6ebdb4a9a20a147fac01219defa10aa714dd054f5137
SHA512e9f4c750bdecdbf9e03b1f0f69112be3d1c95eeb3b387e0c8275e230246a247f04b69c45d1eee2094ca6edaf51874d5afeba88936883b9d1f303380a87f7ba81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505652c251329ef90168c1485d02df20c
SHA1c9a459dba0da4cad00eabff03ba3aeaa5e32b0b0
SHA2564c40431de583b4bed11af3fa7fe5f9b63b9aa09deb16ff2355fc3ad044b9c152
SHA5128c76a1e13ee6c9e18dd84d1b27817c31885781ad2cd6272e950b383981db44d826ab10fa68f23b22c1e9640474cf28f31f393375cfa3bb4dee00954031edc706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573ed37c5f086682978283040f9e889b6
SHA16d71a18fa8a8f36c6237c7b7fbc26b12f3207261
SHA25602b65cd88f034012ece0cf6240a2213917370a2e06396f5f807f825fc75b7820
SHA512e668826296504c6ecbc8eb9a1fec1c3673f78d95a0133d5849dac708c3cc72819fd86c2c688fbf2b901428239d7430f1550e42b37a0603c3ed555e928e1f373e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5188d3b2e536e474ea51a89f82f5787fa
SHA1a3755991a270ac03fae92071e51a44ac51154577
SHA25627db8e1c467039f4b80113d8ca3d492196891202495d9963e0239507908f09af
SHA512c27cdbbfee92162af069d85691c966b01c330ceb34b7c275ae4ce37e2ffedd24a61de43588ceaccbc06a0239e0e701a0a63657fc2a951c23bd817652df6a45ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579b45d55b3112e34730bafe90cb8b119
SHA163e5658f1bee685a079f609dafdffe46db7fccd7
SHA25613f83ee297039f578c029b76021bdf9e29367882a8be0576aac23afa19c6ed90
SHA512712b02ec0bad32f4d410b6eb714f09f71188203c1fcbe42ef49fb5e36912644e1ecf555d3ab8ff8e5627be9205010c8b6d233cd2fadb49d5019ca6d52d7d24c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a5d482f67c725615f21f93918923863
SHA11eaf9d5c2b2dfda6df108a5ac653b41bced084a2
SHA2567c760689aa9deee3aad42984547ee786e4ff436ed7f14ad7af1f27f1ec670823
SHA5125bbf679bdc7534c8fed40cdf8fd248f89fc6b718bc99d74afa50c71c1f10a8e6a9e4088158e5b085e50c7b2672e64ca489a4686c2270d702dd3a32133b70eb90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c023632ae5f3524c7e7cdbc151f365ed
SHA17c2da45d0eeec517e4884805b513a2c95c2dab88
SHA25619d48cc2460c6eea654ef44546dd158b952e3bee0f76655c356b2d3ea1a09556
SHA512fa33b21cf629aecd35e4d60d18b4a2455f8bf6a613cfe71d4676c8a686736ffb8d1a27e2ab54e930fbea1fe3a7768215c5f3a322e94bc22c15eae0497439eff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5859c77fbf682fefde64e77160e5678f6
SHA151f7688c02ecd0b471cbba1bc71edeee766d31a5
SHA2568409934ab57f1e50ad9f29e8abb6e35ddea21a3f99ef52ff73e024ebd93c4791
SHA512a3ea70ef817fb6f501768c01399d77862228c89cc7699746729fc6da2b7e5adf790fe478adbf9eb92879e4ea843af46970e26c079073c73a79e958b9b705fd47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e3dcb6805ddfa6f698103b89bffdfc4
SHA1347ca58f6fa8dc9c3aff457e5d501e5751d47999
SHA256ba9e804a2bfc2c60266d067c59478ea311016b81d74d84751d260414cd6879ce
SHA51234b586515175521b08f402cca011d5806184077f31d5a0955f9c6fa66a68d3dc061ee5025706e602bc41c714900b769499c356374b2e6a669f5f89517ee9f6ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53be6914157fa8a4ca0c531c8db6014cf
SHA12dbc3ab4c57d69354b57ffcf88d2291bdeb14f8c
SHA25619a194be2e4c220fcca24066d73f47b1d98178db836b7c1fde9bee9bad96b6a9
SHA512a6c3442d367c129ff4b9eb2c791b34bf05465571e05c376bf3b2b7bea8205b7c9ae4e64aa0173d7a53fa3b07f8a78c2805f111bef65097b8acbc436b561ca948
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a