Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
4f5e76c34b6ca4378c4c054388389d79_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4f5e76c34b6ca4378c4c054388389d79_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4f5e76c34b6ca4378c4c054388389d79_JaffaCakes118.html
-
Size
26KB
-
MD5
4f5e76c34b6ca4378c4c054388389d79
-
SHA1
a7151a2c08c0ab18c3563470760605afff14dcc0
-
SHA256
31f922c3600622725a73d117ac2ccc933f7159c5b92fe48dcf0189d70db9c736
-
SHA512
e1008693254c2a7a0485201ec7ae2843140e113c508f02f0750500f9e1c11d495657c0d09f309c540c89c5a2b202438f114e4138fd2581c3127cc8fd46401a81
-
SSDEEP
768:Nc5LSLyLTfL/ZtbczL5RHhHL3HLfkbqALNmg02FEI+nTGHkvPBTJh24ZLeFkXlTm:Nc5LSLyLTfL/bbczL5RHhHL3HLfkbqAr
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04cad8c3da8da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B78D1931-1430-11EF-9FA2-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422100363" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000025965927f8ecb0e7d8a5219a76a3045af5ba762538a6b588a2fb1c37051e8490000000000e8000000002000020000000e52474fdf0e70da6c81b32691062f6a93599c1431e14ca18e11fb41065c87cd32000000074bcc948eb7218988540b83af77a3b07da10e3a2a844e9934fb2db170037c9e4400000005a6d4f258859fa10feee1ebf5c24e78494b5428918065443111737d19ac392b5128621ff2b57eb7ffd55a69bbb015dc0351d2b14d7f11dff85e74dd8d1519eb2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1612 iexplore.exe 1612 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 3012 1612 iexplore.exe 28 PID 1612 wrote to memory of 3012 1612 iexplore.exe 28 PID 1612 wrote to memory of 3012 1612 iexplore.exe 28 PID 1612 wrote to memory of 3012 1612 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f5e76c34b6ca4378c4c054388389d79_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5573a3fb1d487240426df992066bb60e6
SHA1af236aa81d3dad8de9d0db37f4676fcf4352c29b
SHA256d06e449628a8c679290cedbd01e2667b71a6a4dcce5ecb1a16f24a74a1239717
SHA51256dce4fd4758567165ab2ce714266cc1e017d76523b69dab453ed0a056f2e7160ef2dfc3ae065bb449b12c30d2d7ffcdc559bd611cde0644c3ca94587e7cbcfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeea54d824736769e811d40bf8ede42f
SHA197eb1faa95717f1460ab89ee369fd2db7ae786d2
SHA256c2c6772e9495498ddecbf30346e5cc279a83d05356e5e920464535bb95ea9cad
SHA51257f85b07b3d82913b024d5141bef922dfdd694ed0d39d64b90633cdf9bf12c0a05827527bb626afb47e5ea007b55c01ab8b9c81d3f1f41b1add142f851dcfcce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567e379526d21fc0a20c66ed66c163e13
SHA17d3847f8da3d5765e07a18c8d102c67e340faed6
SHA256d0ae361b99f832b99a73a10bce82a058e05587d866438cf852ce2bfaf9e46be7
SHA512e5752dbccbce558dc0468c89c1e98396bc6b9d0fa85dc191e55d266b1c3a8af38f68b2be9fa09486360b5d86f7633e37cf13e9a18b60ebba6193ad0396d8114a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51597c16ad7a685bb09dda646dead4298
SHA1d6ff686515152c685a48799bc73cd56d92042a83
SHA256c09da01839c60b200d0758d01c3ce3417ebbb45270add8ef75592e132a9024f5
SHA512d8a63578f1af8fe906c3dd7d67e85888e6e57546848dc4ca8101de8575be496260d27445df2ece0e325244cd25837825a3e4c9efe427648b1710e31c8a6f34bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5663fe06d0aff5b083643dbc620ecae57
SHA1977fd63c11a0bd8e0c423a193c2a26146868e79e
SHA256e35aecf1b7553a480a9f55d6abe3624927093fdffa4e7045f55aed4263b9525d
SHA5124e3be9e1b6c9a509f2c8586fb728230dd3196516cc5d881a8bb1987bc60e4a115108255964d3ba369eb59281e703cddc5b6c16c0181b120283e14ba8c98dca98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553ca4ae8e625257b3bc913529b700c64
SHA112880a28b30607ad5986122efa0c9d7bb64d227a
SHA256c4e93ebd958bd9b0ee7abe469eda60ee13330981d2b91e988daa5a05e4348502
SHA5123ae044ab2095b19576a24936544fd0d0686edb776656fd79226484c1e01e12359df5af94afeeeda4e6989f173619ad5f3cccc2e9e760d18750e23f230a3d71f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5becfb8fd9431e884bf5b173640977d2a
SHA15fa57615aae7426296150d661bb2cdc17e6cb33e
SHA2565858b1055c5f2c9a8e79c935f491d2da7da872e505221e21cfdea2e8070b1d34
SHA5121a26bc291861d967685d5300702633efb9b6268f7eeac37bc252372cd14a7ab11cd72ed88cecc5532c713783f4f20a23ac84a3508dd0e3bb875ce8704039a70d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5565a66f58d5ea8449eb39e49387c75d6
SHA1eea3eb6ebbb56401bd7318a909927ea494895fc3
SHA256128fca8ea36db21363d501ab67b3991075e567c5e7af3cb6c7a66cbc9c0d7b4b
SHA51227eb42c80dd159593d872a208ef5ee3fce2fbf6cb3d0957cdd83d0d6d6d5053d707031a758eccfaf5cdd70061af83419ce52a7b6eec0d420fe1793a7eea5f6aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595f801def1ce5e7e3a0606d28a151fa1
SHA11dff495e680c14088d937afbcd6995a15454abbf
SHA256abe9f573880810ca8d344e38a51e30f736e93bc573e25220f4cdacbe63122161
SHA51255ea59946a4f00a7c68f61adb0f760dd80747c6fa30beeeb71938a5940f2bbd574dcca99c7e7f151930ab5e26ac4ab8e127e0e8cbca96ab265db4c028e74af0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568c31970819991163e721a218f2f1003
SHA18217bc8d42ab2b2ee804feeabd8b18eaf2781f8f
SHA256fe3b687fb56273c184310ba36a53a4f9df55f701af6f33776b0411c5ba773058
SHA512bd9edbac738f390aa8b3a86cea101daee81bc813614fd32d6f6d7749db0adfa4471da2adee895a6c49de842f1c5a4ddcdbc08dd3fe7bc9f0167a2fbc7fa3aa60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2cc5f7ce3a5d56606389e5fc2b43f48
SHA1611712f9e10a7c2ab8ca0b18b4eded0a5b5bb94d
SHA2564e90f800e45c07b803ad5a3c9d57c0f3f943d2bf7bdd0efdb13d70d0d63f7aeb
SHA512500cc395f57fc0598df4bb223deefc1e820474c6e88a7541c36f371a46089428eb81e5feac5c510ba5e3bc517792a098609c5c90abf95788347b61c692d0242a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583465533b38dff6b7e36682fa88eb91a
SHA1df0f77c73b942228793d2e050eb210671b8c3c14
SHA2565a947a1290f8a9b8812a0e94ada55c7f4c91432faecf8eb0144f101e993f44fa
SHA51250a2d95b293fcd9cceb8ad05342d05742a147c90934c41404c6c56a6803e2a04232c0a7f50f79eca9886116aaa32d872d27d4d0f48f8eef0f1c408910fb4fddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596e4eb0db7e5659c1ecf08fce2b143dd
SHA130f3752843aa88ee340820445e64fdbd50e4b436
SHA256c87fd42dd9561ee6cdfddc2ada31e6c4b1da22244447456fa1aa3229f45f670d
SHA512b1a21c80e66de8f26ecdeb9241a5018a20f7e24aa58805a6af927f371198c0945a6277a11885bfc83c47bb8aa333d47be4e86c3e92937be8e5df646656026781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3053759c7a5e7d4bf9eda1fa5a4cac3
SHA182de5dff02e25f1a3eef3a405e328c5fe0c636b1
SHA25685c7dca2185183cc2fd7f24fc173bab2454500e0d55d82b01a2eb137e99366ed
SHA512736ba6d1491ad3bdf2e3df00d9f3fdd20a207228c61dd2d35b8cae8fd2ab14710374e3b8042313305727bc12c249303bfcc679ebbfe2f97e478162c9942e734b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50483491298e93cac1a2578a77c50d826
SHA152525f29edd0b322d7eacff062decd6e4e732f77
SHA256396de5a71e680902b0cdae954c38fa3401746f9f104e76303ec8b2a1b8bb79b7
SHA512793b0cb8bc8db882fc2b44708c7283cad29402caee160815cd6c52a16984f55bc23dd552ea424a832751c47d88faffd184a517b0f74b1f7f114ff4943c3c216a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570de31bea563788f776d91b336566237
SHA1fdf8d1f58e4eb41b00861db4b4209331e8c7d5bc
SHA256dd647a33a599ea3b8179c2a7eb16e3fc37bbffd3f31a30acc61da5b25a571f65
SHA5128fba34ca5c4b1345df0974b8833f977e5dbbe9740951340ad4b11b581377d4837b50b651548807cd5af1cd6d665feb8641f331f0fa7181ff516cd9a3e9c1108a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55026d1a37f8cb4432a81df4107515d21
SHA1a6c44d6a6e2d3d37019f25461a288e00e562c0e2
SHA256b84e280f88abb5d2bc52713271a54e428a8522e5b6f3079c5fb79a237c59f764
SHA512216faa278d0fb3a0c6b1efd8aa38e74a12198026046d7cf777d4b2feac0abba808b0a6f50858ee0c3d5cd940791a5ae81fa7c974deefded8a6eb0001228cd533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5821b39bc9780b99d5c60502d92c0f238
SHA128032c42c656d39badee5987f807560661e26bd9
SHA256e222ac51c66d744c9460dc20e8704ad3ff4dace82f6fcc32542ffb8e2f7974c6
SHA5129e5cbdb79eaf330f07df98e6061506beba58fe76ed1f6ee7ba9ccd188ac9ec670d72b030fb1d3355152d86b1933e16b51b90a1b4db7d9397647b2a232d5603e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce16631f382d67cfdd05e8fbd3f6a1b7
SHA1c6622b1375bb9df098367dfc4dfeba5386a2a961
SHA25624a2f45ea388b823d5b7990478d23cae4f054e0177bed37d7db5a7b9f36264e3
SHA512cbf7074cd8ac539765cb4a506a1f75405dea2075dfc1d95b86a8de07d247850aad6074b0fb3afaa28a6f14c649e0a3ef3bd760488cbb8f13ee19771ea30a6e7a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a