Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
501faf135d06531fc331fd8d2d464dae_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
501faf135d06531fc331fd8d2d464dae_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
501faf135d06531fc331fd8d2d464dae_JaffaCakes118.html
-
Size
148KB
-
MD5
501faf135d06531fc331fd8d2d464dae
-
SHA1
0f27c4605ce769666d57f619a46d68e3361fed89
-
SHA256
3e31a516db67fb1fb1255a838c4cf8dfa4d2f0265d33e0de9cd753e53980afd1
-
SHA512
ed202020478ff0b6b4c9c060f3e8074523311271ca6091c3c53b92ec303eb87cedcca2cebe0f08ae10c4eac85f4be17f6409b5ffb3585ee48380baf402ea6cf4
-
SSDEEP
3072:yIbKs/i2KTmPhcvC90C8r/ii2p1TrlSo68bQN:zKs/BFhaqO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1EF1A21-145E-11EF-B587-FED6C5E8D4AB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000786221fdfd6e03fbc88256f96cf16837e57e5905b030acc7fd9d37ec4c86cfa8000000000e8000000002000020000000e38ddb789bfcec6752af7aa2df2a816f9fc4135239215a40b8da6a5413c53245200000008c2200e5b972964afa23803f5ddcaba55f98c4b517b99df27b71eccc87e046294000000019e8c3b778a7cd39f289158f45f7b3a5beb647204416f0bb9e402375c30ba1f6e60d127f68432342cf1e0864b52bf7dfcc500b9f4d11129bf8116217526ddc0c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422120164" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f07930a76ba8da01 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2168 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1240 iexplore.exe 1240 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2168 1240 iexplore.exe 28 PID 1240 wrote to memory of 2168 1240 iexplore.exe 28 PID 1240 wrote to memory of 2168 1240 iexplore.exe 28 PID 1240 wrote to memory of 2168 1240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\501faf135d06531fc331fd8d2d464dae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5a93121ae32cd488369d25acff1c165d3
SHA1215bc2d389f9738d938d045a24381f42fc72ce31
SHA2567d381e836d548532725e2c04e7c98077ca91a29ff936b175c1d692bdbf64c78d
SHA512b31a7d150fb2a185fe3e4d537e04f8835e19907d2d258aaf6b77a5aa03469804ad7d9cf66784bfd2b68dc00880345b68b93df12d744bd1df6c42a4fb20a698f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_91E41FAE8B0B67645773C1C9A8DB10E4
Filesize471B
MD5d665d525841cb38ec628aa2f1f0afd7f
SHA1b1d3b46f89642f4072f181f837a4e27e4c57964f
SHA2568ff4c455fc4ad0d6e0afd8e421247cd224f7938eaf026ef13120e44c37da62e9
SHA5125511955949f56f830936a262b63710b37f8a7727ce66071073d4a09cf03c5cba1337ec58e643958b759594262417e3358d1df1d6c83edcbf0d37d8c2ed3ff114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5e49f9bbfbebcfc027e51d6575c693dd0
SHA1b9d06eff115a35686a8e2a2c00c3a3e1f4752fc3
SHA2561770b83a393ae8a20354b8066ce4a89d8cb2c463a5d80f5ed69de3060ede3257
SHA5123c9ea1b014dbfda3713c38b2622235151b5219bca48b4f8e62212dae10ec931fb75b56ddcd6eb2cd5057f630d2ef7e35e67097bbb43bd5ef1075ee4215fd736b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD512af3c6bdd1ebc88bd57659112f8860e
SHA13e4209bae277bd11e56a498a3e6c8879488fc679
SHA25605838b989b6a2404ddc601d4a4009fcab05125fc8ca6e6d8affa6178eeacc09b
SHA512c658879ab1bf460b2ba599d486ccedb62f3cb3c1abf0a00043ae5ab3861e39bdefbd9660cb88874ab222199867db204f405c9df11e35f8c39b60c7034071c3ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD56610487ecacac00f767780e28bf07977
SHA14696c08a7d56c089ab3d0eacd4a711f26076a79e
SHA256d75aabfb9a98909f2282b4e10dc5c5f19dd39c3099d2076ff9ebf1e87489fd58
SHA512987ef0de6c6895785529c1d53e46859cbcc845c4e3a0a7e39adc639a794683d0e41a6a1932f7a84ebc66606e184ba8648f756009b0dfb83b5d65c41ab0d82497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531f16dccb7e0b815d655b7f24d432236
SHA1c54ebf5f89235476b536b96106ac4880456ddd15
SHA2560c2673548d7ad1d4841e9154a0809cda6fb495e76c36bc9b86c56a8ea2254b75
SHA5127e001e15a23604126d48290360eb4bec6600b7d72ba0de90df84dce56673208d390e1f05b4bcc04380c39c8e11d6b06deddab837060de8f531fe5d451d28c7b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf9c6fd1185c53b60ecd524af25ce2f2
SHA10a49caabbc8d8c9d80a64f766f5064f2961d711e
SHA256a88fe570c049c6ab2aa000fbd6f27394ebb9081790b0cd500591bdbd30193942
SHA5120c8af7e6f0679af4208edb0cf20bebcc895af1128d893edb6f6c4dac9f957792656cc8f0c3500ba5d35e423c9ba76ee569a50d8c043f5ce6cd68550dd229812b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4c4a549c9461f8a1d52f03c3f05f9f5
SHA1dd6ed034c5b0fd25608e5845bd2bcbebe2e13afb
SHA2567698945866424ae7dfe14e44183120aea6c26ecc449130548fcae861aecd89f2
SHA5129b565ff534ed1888cd68c369f016d940370f7412d827dc50350fccf43393828f239cbbca31e6b7215c94f039fcadfedf6c19083d375e691f57d6abc9e69ef41f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5431643fb8ee9a0ef08a4e1525ed4b341
SHA1f3f5ca239e5fd2c43aadb7e9b390aeea77f4198f
SHA256ac8744baf30cba03b5596263cd8065f3aa77f966da172bf3e789e087c49cc50b
SHA512e63e700c6469ef96ca0eeae75608f5844cd99d3799adb552708d9a25eb81e2a9282fb3fed3589f303bfd8c4c679d85427b5b0018c3d1a1a90e9493d63fb8778e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c877e3bc00863faee33ad75f4fefa8b8
SHA1603e07d789654b0c37cb93cdbf97895b84bfc801
SHA2565efa1689c15b5993d5859874c2fcf05a61415383ebf561fa3531992034cd25bf
SHA512535e638749f69ca9a53b90a55e340bbd1db95c3c37a8df96625f8a0b6d5242b8843be03e74a1ac4a85872a0497003a0b9a47f8ce06b0df6a467b4ed72e606d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd9fb5734f3f8c1dae0299cdafac4db7
SHA145f31287ad318b7bec2f01d980a4f9231cab9227
SHA256a64f9309e957e8cd1e886f3f6754359aa5eb0dae43390d54c9bd5b234bc883d9
SHA512862f38fcaa4e7d87f86a6b64e2a8f87c013760d7a238e54da68a522f0dddf002f9b31668efc4b497793d09f039edf355f7ee1d70e2bf3083770b6cdb2e1ff863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a63caa07276ce427d127bbee0b00e63
SHA1b90f2771561543a5baf6f5deced73d521a5bc546
SHA25646e633c6538832950f6412f25cd35069c3e786c96c21efeb3764dff2497c288d
SHA512e491a12e1e8e9e35838f868e9433fec399525f9e29fd8d6a253323d810a6c93855d2f43bd61619378411fbc057f1e9bf6a66423e5f786c0f5e7789e9740e86bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503a2b1e9bbdf6effbf601d797b9adf41
SHA11fcc9f5b6bddfddfb5b8c433f43a63776674650b
SHA25610cb02bd9871c7a36c8adfb44867198e88f9ddbabb812d66b6c06436cb00f8a9
SHA51217b972eb45d1fd2a88410a04bb2c57487d292bea399fd15df613040b980c0f13cfd96adf6bce7cbbbebc9713ba4c326e89161e2aafe4f1449cb690383f446cf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD52ffccb58265b75cafb8c51722bac0c36
SHA199bfb361b915a512ad41b09790729653f45d149e
SHA2560e40e7475a148f45867664c60f548350a4a4f09f5810598488c8ec10b7d0641f
SHA512962791ec832b153ca2f0b3af4842682face1e6e3783e84a1fe142211eef876de060e7ba00ba9ecd7045460ba5717dcb1ce71b12bd0a5110bfbd30f4724448367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5351a12c998adb650f4f8cf3af8a7074a
SHA1b59cdc5d587ecaec7c1fa076e13987caf551f583
SHA256c7a8ed38ec294529d3e56573a640e960951929d7bb37fdb3ceadb3edb40d703d
SHA51242c82ac2abcd3fa12a25d28982cca310272eeaaf5e91801f58beb0b86a169286e1076aae9dc0f1989e82fb5e1006d075ef01fbf830b515804babdba38fd9bae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_91E41FAE8B0B67645773C1C9A8DB10E4
Filesize406B
MD570bfeabc9c5387fc819ac52a0eb31259
SHA1852c2c801134fa571cba2d2d10374f8bd91eac25
SHA25635b5792a0cda834ba8c46e6ec760c4e755691bf6a5c9ff443be5351af58c4fad
SHA5122fcfa99552ce93affae988c4be45aae9f0b3126752ddca09608ad02b3192814d4eba8a16fd699d21bb0729df48ab4b936b2ccdf5247a4d1f2626a6dff5b2c424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_C66311BFC31F329FE5E6FBB46563B719
Filesize402B
MD5cb08ae0b88922eaccac425e978f47bc6
SHA17c352461cb4c0065d8c34953fa9e2c44264cf545
SHA2568253a49ce9e9bfa51d61eff6af5a30edc86be70632090f212932d66252541b95
SHA51290274a1bdd7355b3e0c8d8958422014201a2d1ea10fa2595e730b310c2d154a0bc85f12412357e0ed92f340444a8a449a2f597cad98031cd71fc4272ae0c6375
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a