Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
48165f8008d1376c759abeed14420d2b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
48165f8008d1376c759abeed14420d2b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
48165f8008d1376c759abeed14420d2b_JaffaCakes118.html
-
Size
52KB
-
MD5
48165f8008d1376c759abeed14420d2b
-
SHA1
58f558c8cebcdf4afae8b8379f2afb0e7198ee73
-
SHA256
4808db370d95c2898a65ba8d05ce906fc2b19bef2e9c9881891941ec497e10ec
-
SHA512
143cb2a3865e309e50f756682085f452acb6ef19ca657ca5d9deda6772915a81781ae30a543ad4004f8f63f3a5764ad8541300ae1fa4b8fa98e561ce7fa29c6b
-
SSDEEP
768:Wdbih9VCS4pepE3tHq0cwcICwAYEi3NhlLPC+qK:Wdbih9VCVdbcwcFENhlLPC+l
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421969846" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508173d90da7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000f59f52aa30ce02c2bb6e27f49c54af80f91159ca2212b6c02cdaa07c09d2e1be000000000e8000000002000020000000443b7a2caa24f9ddca88defc92bd7b3f9a1f102f252ee6838dc55132a2a2bb0f200000007a7432f3ed724cfb9e7195eda150dcd5e601db31f16591e50bae249f75af475240000000103029f048aefc0ee347c3dd651fb0ca56965c7d18f8261746ce00c0177a179588d0c1762d07cbea831063813f24a71d1584a6064279f77ea983fefbd34d7f12 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000f372afd7c7f5c725cad761e7f606e5dfd1f5609c47bacb0708dbcf417357638c000000000e8000000002000020000000599191d0e3db7d2228f3c73276e804f506ae5e37ec7b48dbef4bc66eed454483900000009b004f419fe327b55e03aaec6c7f4d6647647049c0f578eab937e2887009ffa420187af2330487802991572c9d062f2d33f26a400bc819256f4d32e5c02884eb76ffa54c8fc2c7ad65b974bca20d60e1b6d553727957a8b1449e9ff129d979e13301855a6910352ed6616ea0ca0c8146faad6dd4958cee9477ecfd58f2f1fb77a57a88a4eb99e105bbbe2acda10117434000000066684633ef41445818cd4d803f2ac4efce80f87bbb2284129526556275aa15f5af6628e1f143299b384382a742a26f35b42fd966004f26b1eb0c27a6d7f8571d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0A97161-1300-11EF-8C47-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1300 iexplore.exe 1300 iexplore.exe 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1300 wrote to memory of 1760 1300 iexplore.exe 28 PID 1300 wrote to memory of 1760 1300 iexplore.exe 28 PID 1300 wrote to memory of 1760 1300 iexplore.exe 28 PID 1300 wrote to memory of 1760 1300 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\48165f8008d1376c759abeed14420d2b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD59dccb445cbf2e88e7d6238c388419a7d
SHA15db342774a6d71d3f032805861a587cf39fcf407
SHA25668e6b04e8367d3adf012bbaa71aff90b2a305c1378b8449b7499414fd5aaa0b0
SHA5126f69d51cabaeee8ea70f455f69b414577ae405dffac12c748d21dd77f7e804c5e9352222bad96b7e0c936ab459815a42d3f1e8a06a4c1c8a4b5b3f544deee5c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd2accd5bf84f359c6060e5919ea24e3
SHA17b73907e8b5a60e9cb6f0271121cb08eb1f01d90
SHA256728688f698b999c56ee630ece0033029ed1028ac94a52ab2c220d96a1743c5b5
SHA5129e53566f60ec88d349b5e12548f1f87abed0c73a78f80945f4108c3b3d35812bf684cbc4d320022c12dde0c6338bd70eb8e4a0be2dc0ec71b3241e379a653684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0fa6ef53b23af18c4bf8bf3110a9382
SHA192ca9f4665fff3643b8b2b1c0ba6778ce4631895
SHA256bba3d4fb1b185f76473b94c860bb516af27aa1a17575efb95259810ed5a14eca
SHA5122afb560815f32378f979d220e3639a1136bc5f6378e012b3c0d0dbc30e988f28d595f7fdbc2ddfc84e3dfe559127dbdbb1e21d77782b61f6283e9ef70b9aa7af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b400d1a53f6015735bdb86306db183af
SHA14d62f984c7b751103c9c7c478c7d3e579bbd292b
SHA256025fcf61c342de36c711a12fc4d47d3584091fbaeffbdc67f0000be34cea55e0
SHA512a3aa932387cdbaa07abbab1d8c5f670dd51421c4734bd0b8681820c97ea5edf1053a5bdbe871e0d22b630717b456738322f29b8054cc085310371cfaa61772ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d293c1e89fe7b9e53c6f60a1081aed8c
SHA18280a396fcd8ef5e5ac92d7c879a45ab1f62af91
SHA256f17cc3677d7932001a055d4a79436eb859dec66889c5ef2ff68a42dfe7b14257
SHA512c9171a9592ffb32a55014d2f663edd2200d60c78db9f8249655bcf1c7b447fc99620a8dca80b79dfa84c21789b55a5f7eb457b750234f0d6668c862b9d76dc71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5113b677907141bd664a53132583974fa
SHA14605451f982a26e316d856d2ce09b3dfc729c228
SHA256f55ddff5838f79d7ce22a66d265a72bba461fd983c288d36db59e1e45fcca174
SHA512829ad9cf228a64043104c1bd47c4f041c7454a1dd8c374afb6b464a0f8e54aa5eeca7c08ad3bdfd7ef192cad3bc1c5ebdab1cf18935add5ebf2b322ebcf829db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b1b75b592c86c5a0e841c8198748cef
SHA1a26756d467b20775e1bc154ff9329fe1254a4bc7
SHA2561995714c1401efdc30f215353f448facfdfdb8798f35db84aeba01d107182442
SHA51272d60bfff6a1494192ee37e710f5968426c61f7d925a1c9d614fc78ccb19edb1f5c7f902e732a09948a044d13704dd2597eca3f10bb817123e723aedd5c890c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de0d6f1ba680238fbabe88a15d25ee45
SHA1c9aae90e89c961245b4a8a11d52c79ac85e5af6a
SHA25681bf69454dec955c52f0fc7f4ae1f2e1a322e53a5ff240e3478c3d680e4a4a89
SHA51226bb6f65a2966b3260aa1239f11f7f8f3605cb84140e586f223e2e18bd525406558ef7ad9853db879e86463c97aa419ce3c5baa211c18045d811d025a44f2755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3cec21bd4dac9d46945cbcdd8f0ff7b
SHA198fc9673f9482ab1b33ad65697d5b0d5b18d52eb
SHA256ff21ee0b997fe786ca7e79c6515d5c50e328347616f7636531268d71f7629d44
SHA5125942a372f42d0bccdb3dd80384b0671e05c02d422aaeafde49f7ad34fd2b18fb4181ceba8e37cb9461d632217550918fcd5a4516d348b7f1ba5457ed59e96c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e71f9bcfb5f89f18428dd3e615e82dc
SHA1e2ac7032118be9ce00e6f3e07bdd8c52e3a86638
SHA25684fd2c6972fe73c2478cdc6d190d9515eb87fd07b041ce31f4d96130b4225013
SHA5125eacddcfbbb1c41bdf9735142cdd625a6d26dc872802beae9e4541a2c67cc4747bf5c48889782c24ef2817cb613073dee8553e0a192197ee9d969ca9426459ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb6c60ae5ba1aa711efcb647c704330b
SHA1b4f940226f5df2fa49ef78b9fcefdaecc5ae6ecc
SHA256c3c99706006a9d033bda71566e5e2581aa5ed6119a9dbd405c5cac19fced1a88
SHA5124406dc1ec7d8dff286beeba1381b60eff6891ac485edb3570b9edd1b7d3735dea2dd901297c1530a3be7546952cf432c02f0b0aafec53628c4e7ab6a5ffc3660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e236a7cba08507016e7528bac8da7460
SHA1916b6fcdc07bc6d5d684903a1c252583f1a6a3b6
SHA25655e247469ff947645c2db05aa4971810a9fb49b4b9d1d63d470b697cff091e62
SHA5125cb90540d5ae5c9f9ef71fb27abe36e7cbd9ccc1bce1f8cb0119bdee1ed97cd6447f96c26da16cc568762c9fa887ad17214dd46daf734c6c28c7ed1cad2e8778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b7081f15c6fb2a96b909c753b020f4a7
SHA1cc001e024759873cdc12854265744852d8894c60
SHA25697390c746ce87ef216773717c11e458a5ca371538f8415996348fb28abffc7d5
SHA5127cead7c897fa4488850c7b4d1ef285b70bfa2f9f9a8ad27a56d1781a292e666e52fae8150364cef12e022ab3de6a0358761d08e92afdbaf6a55776e14b4adf93
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a