Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
4d87518d95620b37017cbfdd297313aa_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4d87518d95620b37017cbfdd297313aa_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
4d87518d95620b37017cbfdd297313aa_JaffaCakes118.html
-
Size
24KB
-
MD5
4d87518d95620b37017cbfdd297313aa
-
SHA1
384357f41fb0864b6d26d9ae675820ef7b121623
-
SHA256
d50cea4752f9ab395e6a10d31e7670b27da8321744309e7931a244df7eca5482
-
SHA512
276039097d44870ecd8e6aef4c09f0aea224d7864a165ccd3fd2f4368e38c0b32269f3d29118753e6bc82d33ebbf2d543cd57fc1a4e09195f84dc3286770c371
-
SSDEEP
192:WLZLwKQcUO74w/h1UUdQ/uQe/gV4rBllCgV7B+W1ThpyPi6bW1ThC5WafW8Oh0Ii:fF3U2/IoEdV1T/yE1TvlZE1TA1T/YD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19C97771-13DB-11EF-A38F-E61A8C993A67} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08f43eee7a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000465761ff6a38f9f53e51a58541651ca1987de6a309bf2d682ade507a518d4ec7000000000e8000000002000020000000d3bc55578486fe0101fb658b4c64b716ff0ff04c765c89723cb0effb2236fc6b20000000f6c3d567d31615e5277197c959353a46b556e559ff588b3234a2d4fcd895bafb40000000fedae7773e08e4ee5a9b7733808d940f4841a0f7def2e612f2436d1ed188b60678c5698db2f294b3261a6521ba6a0ee1f1cde02d12a47092a817a3bb62c308cb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422063590" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2184 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2184 1704 iexplore.exe 28 PID 1704 wrote to memory of 2184 1704 iexplore.exe 28 PID 1704 wrote to memory of 2184 1704 iexplore.exe 28 PID 1704 wrote to memory of 2184 1704 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d87518d95620b37017cbfdd297313aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afd767924e5282740efdcbfeddba8f08
SHA1a1079b1e8a67871961364a0cd0592e9257f7d89b
SHA256839155ff20f6f022d656be7995c744e7b0509953f29f99fc8560e636ef8b67ac
SHA51258b1c6379ea980aef79a508b3013e20154f48fb16089091fe71d098d314671222118e4f7f34d1b91ee7ac291003154b57609e37e4891b1f9d46357e7f3b08200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501370cbf531a10335ff0754873534653
SHA1cc5d749b94cbb7981af2475ccd92518088fd3e1c
SHA25658806ba2428695faa52b82a8a17994cbe32ce8bc1a61a5afd80d70eb48e9bffc
SHA5129d7c7fac27813db6d21bf501219bd3cc4b0b98628e24d69c1430e08d30dad0380f4d6d26a0eb4df402ace3124d537cbfbcbd76707af8ed7ab45389c74af6fad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cab6e7ee5af3828a1b631e445002756
SHA191e20eb7240a740d93e54ef76f8d0420dccdb41d
SHA2561fddfc304d83c78f39c67c82e7d90f80ee8fda1435fea31e40fe207f5b3b65a4
SHA5129d7b9ea1852814e5eb8a6ac93d8a639b9418ebf9b79d2e3e224f3a7bdaac0f77d4d16b6fa5eb695a3e71a1abca62727390d4f8b51fc261796bf8063fbc2ebd9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5dad58bc4edb007011de959531e2c22
SHA135f96b739f7d56d2a473ff89d53b90b68e4b2d28
SHA256f5421ce4d9377fb1c72f9112072116daaad9a312f3bc352d7b155f5e7dac3844
SHA51282b40cd40caa8441ae92e03f245e8ac8435ed40cf8e01cada65673ff76c6fb5f2480048331ced432e70152ddc995b634820c009aada640da97b869e7e34b06ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efe7c22000543972a7b5a9b0c5f44864
SHA14192302218c1108b2fb9af1ce79fd360ddea46eb
SHA25668b74fd4a5dcd1eae8f99a1fe580b7f32c1f2ca9d344e072065491930f77777d
SHA51226728650960169bc7957f73e2a1d96c650c203d143ff081288d46c4368d53e7e04bd35d1d5d74257b9d8ad502e13203f4b44f76f1dcef84228cd66bf78d4e5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e83ac73ccb0cb435139c76a58a3af4a6
SHA1538898fa67981eab2b3f70dbb4462bb1b3c1e861
SHA2560e3830b751eb41af3044a04f467bf50167d8951ad23b7550cefd7a11c6d754e8
SHA5129465ff5775ac59ed71d762690702f2ae36e6edada104725672150da5dd698ec35cc4fab84aadd88c3c73984d58d0b8751f1f221232b60bc5fc51ef934831bafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574cc546d2deffe3b45516c9569da9c59
SHA18256cc843d6d3d316f622d6fe21ce2c96f87efb1
SHA25624942c0837cc7d407ce5ce123f1cb2789113e9ec73a545188c1dae12e5d98e24
SHA512f0202953ceccbfe3d9294eb4323860ba0224e04b576b00cedac3f5f01fa20021fa0f75b4b42a397ed348b1b378d7dbede18d5916a5e1cb756fbc6534aebfa8ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ddfe2880eed652b74f2207a32e0bf4c
SHA1a601c315b0f6d42cb302a62a1c8530f820f87dc8
SHA2560738a5bbf15996069aae050fe88d0ddcc5ade8b59977f1456665f23a898c3222
SHA51217dc1f6dfae6bc4cc59d6c86fb69386b76407e0e44cef366c547044b4a10e55fcbe87ea68ecbb790fd7a0c2d8aab233ece29737c2b9cdbbc70a5a197e94821f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddc99a120263b58a7e4181267be9cd24
SHA185e6b9dc4af271cabfaf60175fe0d6a399a009b5
SHA2562c2fe14014cd929688b2222c49cc89a801f48b551ee6bf15e7e9443799036cd6
SHA512753bf0b605aed31a433fd1b1821287716ea6a28b33687f5e3386d6ae941f27488d67b923446b29ad79b58bdf35c6b33cf0d9c155a03dc19dbf5e2abea1dbf158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5076758b6219b519b8dfc3a15504218c9
SHA1f3dfa3a1bf3263b1b69d4361a2518280731eef63
SHA25664ee7ee7b27b8626ef982d51b09306436a4c93f17eb9a4355a780733bb84dbde
SHA5121e103a1413eab5e3bdd2eb9d1016903303f71dfa67affa5ca4df005b6e65c5367c5bb0112c6e9bde01fc103e387aa98195cffe6a1268b2d3ccb6f7b91a1a19dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59abc6ecbe2b7b8d20d042b30d765cf57
SHA10b348652cca7914c7a855f16205858ab5f18cc04
SHA2569de065381396fa7d6ce7a5eb3249485ed230834f6383664c7c5fac60b0f88c42
SHA512c4794e060f199d1377b424b1880eef33254570b2096ef084b8dbeb30829a32ba69da49df9e86e07558856079e3513ed4ec0190910f9dd4198f378c3ffd504eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558f12b8223c7844ac83b76611f66d72b
SHA14ddbe11c97f46425dc2bcf7db51d38fece7f6655
SHA256efb2bb9ca5f0171da9ab0d1b3893e1428ab0265d1890dac8cc846996e585a54b
SHA5125476b90b63045bb95d8a3ca8dc8873821d702a0fde452d1b317c9d0229269b3e1f772a8026318b76c280db5c5e12953cf79be2d7e74ab30b976936684b6e612d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e2e074cc033c336c1340f1f85fcdd18
SHA1944e26f7987692881cc1f4927f2ff3c1e6417e15
SHA256eaa191796272190a648b5eee2ef0a08da2d731784986254e3641a2a5b71cca0d
SHA5123e26714faf6d6e8cd2105c5af502f684c37fa50b4dd2d715cc1ce76832de5ceb109205f2cca6731f1f30b9ace71d94b1a59b742f9c142451bb578c4f30f2606c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584b10e7771a72feee06112c1d8fcd13e
SHA1b4a2ee81f315f8e07ab140570b44cf18e2abddca
SHA2566a1508988c45226af7adaaa564ea145d21653bb4dd5dbf9f6a532a4406cc883a
SHA512d115c5ab3cba9756c25474e09c5d0adbf6d50e1d35adc37a955650347b05a438dd239247905b3f16112fb4346d1222768b90e93acbae5b77dd7d618a173a47f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2534b7455965d8b2d0cdae1d5707ddb
SHA13b13d0a111c236adbb989ba3347ffa4df1618883
SHA256d7fed5c92239745174474c5e833891aadefc0163e5e2bc4d9cf162da6eac4223
SHA51220e23e3a25ea56ca8badb89d8ce9a1a1aa15b03b9cb0f30c17d27e94c5524ea072d5d5691a83b0523503f42c395573fc4b966340e77d6d4ce4796d4189517860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bbc0611ebcf507023cd60e45b8d886d
SHA1065e38381fa06a34fc4ccc565c052bba2e2d438e
SHA25695a712cb92e6e6ae20bf6a853f68c6954d67a9bed2e31e89fd66ac30c1068435
SHA51219079c36ecf670e20b7b1ecf34b1255d502c326222d4b8c87c29e989eb1f45884018667c7891550b32d95780684b6bc28b48c523a304cd30ac384605c40a1f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5120cdf854a421a7d89e9568b9c006596
SHA13d885e5bbd8cb8cb7ba01463cd5ac786c8cc1945
SHA25617e6f4b9940368aa5939b3be317d8f9a05d59d658773fa3d968accf6b19e9542
SHA5121fd2c86a154afd5ff2dee11aae6d7fd2910a67ef1d6a80a50477588295f9f57737ccca62176107ec967154078507cb5d6611167c7f84d8336eff25d299bcd7e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e59ff3b20b81c6ac68160685349303a
SHA1c1e87d84d929c63965f1ccc64957af8576f9fafe
SHA256c5b566adacf3a14c3cd019b0916539e52588b6a5e2beae12672b1d94404423c5
SHA512d08d310caf51bea8722c79f8f40ff4a2627fac0b766af4845cc36758057244c058a9feef323d144029092e738a44a89e5340f63c0eca55fa9f914702c614a63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5389734dbcc3890e0bc8c1a91bad60aad
SHA16e51e5aec162369b1ac9f58e6125fb35726e2e2a
SHA256cd833be853dc3e19a5ad8a23af98bf894c3b3d164fe579cde10f77cee5435c47
SHA51293d52559b158ffa7b439fd619f7ef3ba4bc834f29a445d7d209b5957682cab9c302f73e7c9be2923a51a33625dda5a5bdf03f88d8e7efe29b75d9193e986b9e4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a