Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
4b5970a407880c7a0c40e42445f05506_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4b5970a407880c7a0c40e42445f05506_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4b5970a407880c7a0c40e42445f05506_JaffaCakes118.html
-
Size
94KB
-
MD5
4b5970a407880c7a0c40e42445f05506
-
SHA1
5771b14d0c89d5ca2bb5d32df64eac17d4950ee8
-
SHA256
edc7af5f98c1fe1296b9f1c777d11494d0cc272ac0eaad92c995908e0dbe3a23
-
SHA512
dd9f210024cfbd53f0c248ed29361b86f8232dc1b7de2b7bedb28577a5fcd282f53abf77b9c211e224774c2d10c726508257d241c38b4b265e109c3876566d57
-
SSDEEP
1536:AV6YyhEjTvkHpukYe9jleTwnlglpKcp85fJYo:a6UTsHpukYe9heTwnlglpK68NJYo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000bfc5e262ecdf168ac066eb966fb2ceb20ce515fa13f5cfe98dd9141a8dcfef61000000000e8000000002000020000000d87b7b50d06287311b372334335f8097e716b464d4530fce408210177eda54862000000063923282efd9a983b0cebdd0bbe49e07492783db42788bfe69d913e2634edca740000000ef6b0fbb0a0b6628d12c1d4ed9b2e58a015d5e535543ed5bb47f65ded665de1fee9761ef448e671528f00d88e707fe6b867cb4ac3706e493755ea94c18f7af0d iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b046719696a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422028654" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C11D2A01-1389-11EF-815A-6A55B5C6A64E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1384 2244 iexplore.exe 28 PID 2244 wrote to memory of 1384 2244 iexplore.exe 28 PID 2244 wrote to memory of 1384 2244 iexplore.exe 28 PID 2244 wrote to memory of 1384 2244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b5970a407880c7a0c40e42445f05506_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e67cc8d612d9e574d9c733f460c74b7f
SHA1df1dd97481527de58188bab81dbf292db262658b
SHA25608619d65e34933be187d317cbb5499c7739ae8bc49bd1178a66f22d9a99e3428
SHA512621e93f08ccac0b8b633a48fd65c44c78e1785b88d8591232c5619764a7328fb068a03fb2c0bac6c7afbbcbdf38cfdb42cdc51c88fd16b09c5f59d5bc075b24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54806d1bc23eecc47afc988104ac6eca0
SHA161846382a19939bc5affbfcc439033091f195e20
SHA2569bd456d397019b5eba410d20bdf5771fe3028be854d5651c2db938d03f23fafc
SHA512130b72f6bdbeb729b82e178cc3363681c570efbbe7d6a9fe3841710be1caa76eb307aad4bc0bdceaaf8231c179005e0fc240253e7977eb3654a5d95607d04e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d1603b77caebf374810b5b595646e4e
SHA1b898f515ff712817dcec0272bc35b2076c1ec705
SHA25648b1022d5057d0125f855c9fbb9e945509ee34f29fa0155f1ab3f25ed144f5c5
SHA5124f7fa89a3792ffb9c3acea971454f05131f654f80c0f6c29110a007ef7c4421ad7bc9c289bc4f88de4fd335d378cfcc9305882273947e380999bd5cc3abad281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577546d4c81208add566a0306cc24de9c
SHA16769f22b97fd2fcd6e037aa5e468153171c571de
SHA2567c42ff071f3ba57f222aefd64546f48acc0d38e16191b40726fb4999f13f6c2d
SHA51248965dfb60eac46fb0222313e7a88274b7f5ebc3e0c47236ff74f013442d2bc2a34d6f290c053b331ee819e7833969d85a5e26842ab2d9d5435d69aa05e16df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cfb28def876c8d04b32be4446fe434c
SHA1917ee1c244c24f458dbfc2582f55c778522ac30b
SHA256db377e8201cc67cd27d370418b4976bb4db3c185d1e2d6a0b1bb33e81089a8c6
SHA512baf9c9c409ca820a4e982cb79adecd202cceb97b536070a9a17d784821c29cb02933ef28a0eafcbaa6fa1d7d5b40923ef0204d35e96165a3afba9303ca4e87c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586be76c37e8d3edcecaaca65b18d0b2d
SHA18116786ed2717bf2499031f100d068eac217ec9a
SHA256d3656974a355a47ea7efe10a38bcdbbfccc143ac6168914e44d9e012ebbfd973
SHA512d4a2d70abe686c93dcb5782211831611bba695556399a17bfe6a45dcf87589322bdf043ce388c118bd9d34599dbb0eace8d5f7236cc825b0fd7fc8d04ed6c497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fc4e0297db2ad723b572cc580a0044c
SHA107d0ee42c7e11aa36c3ec6c7250fcfa734d79638
SHA256c8830ff8734593ab4b46b7c9700c42efbef98f3602d552ab69289238e784e51a
SHA512e808914dd12f497c70e15a776ad27114bc919b3fd503845775b34684f0610ded61b4396f1d47663cf617047b6a890ded4904bc7a1cd51122d7ae849d0b6f86a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c1f58ce6a5269e54ecabcc6347c2f14
SHA1382ce7205cf4038df20004ec9f5afb3a2954b046
SHA2564a3815284f1b2949b75dd273d80dc8a25342de1a7890fa0dd201262cb055938d
SHA5125a28cd794d0df57fba355f7f4929581f79954c3c6f2fd78181adf1d0e7e027a643c5754ec519f601e6a750e57f304c44635a03e222f6f1f2b212ab82fa05450e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cb85d507aaf3ad71781af01c2f3be4a
SHA1484b556edd6f3743421fcbc7edf46243223fb51c
SHA25619616c8dd5adcf883880e0d692e6791578bf777abb685aa1b752f226f61d005a
SHA5121e976d68326fbdbf4ef5912b950618255c37cd5b8156d0dd7710240d07a367f533fb6f5780c57e7afe3a1a48dbd5cc179df99dc0d00b57e57da15676d9868ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7aa0c42ae4255fc88279b2967a31e51
SHA1a0c73e7c1baceadb2bc499cf0eb0e16dc867a23e
SHA2565ba1bd6a77fcb1044b19e5c333360705342ecc022843f670360b9638d7bf5f1c
SHA512f1ebced6212fd0b52ca7422d3a42a31f3e06f00fdea59e1b0227d84f061b41d5426dfe07200c4730e752629b0ea6f9a26b9b74abe7fac16ef981202a04e22848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51052fd992eefd15ab34230cc5c9cf92c
SHA1e98ced5f67620de996f5b1b035afbefcc2501143
SHA256e56ae1240f5a32cf7981312b7feb007ee031855b0dfff7c18b1804a2c0fef48f
SHA512b5f1edf98b2af563d04f1e065600eaaf35cfd42481b0c8619b5b919b06216bf7d4e6c498839d474af52ffe8ce55230a8ec854d257aee50e8c6994e62610d7441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c128cafc32d29433cb3099a4b743e479
SHA1c8ceae39b9d3604d5a80c7156a9d0da972016b65
SHA256d202ca1c158efa571f9424bcf3ceb1dc7f1b9173859b878e4d8adccff1d2b7d1
SHA5123bc924267018e254c357c81d730af5c069a37af817c2746a414b1abf815aa9b01b2709117b0128495db23a9e610df6e0395031e8478be9008a1637949923d69c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6198e64982182a0527a5f75bba204be
SHA1e611c99643888215f673e06b065bd91fdd91a78f
SHA256205bc101d59ed2988999afa4ff4c3fb0d3a35604ddc4684acbb21ea7a57a9a2d
SHA51210e9c54e5ec429624ba7822e37af5f27ac866e465feaf38866f7c91825c6371f6fc7314672a617deff31152772508bb6403dcb60661f0ad317f8c6d2a31ab3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59477180ca539fb6695b364f7f4807e76
SHA1b06345e7f31d6172c56e75e5c9bb7cf30c888b3e
SHA25619364bf04628d4581c6f0d842bed31e920ed154231111a99e4e685863083d885
SHA512a762a2090f84d1723c4bfbd69279ebcf352d96e7e9526c60470a17119659da17d3254e115e1cba46da6115bf07726148bbc0688c02c3bae52a6b37a1f52447f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD50cec872b052062b55f6f99b15e4a8d05
SHA189247164396fe1378963a14b9042984930e45da1
SHA256b43df1c6aaf080a3c0f32e35d86a685c9b6ddf1ccd0413ac4c886efc9aed436a
SHA512ada057a14438b59a790e132e185861591fa2656494fc2ea7912268e8152e71554cf5c9428f039a52ccb0f60640acc3bce800086c9ca79cb3aac169dee47cb266
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a