Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
611bb319229618cded90d4c007af2e02_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
611bb319229618cded90d4c007af2e02_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
611bb319229618cded90d4c007af2e02_JaffaCakes118.html
-
Size
21KB
-
MD5
611bb319229618cded90d4c007af2e02
-
SHA1
c1e3ecf1124741ce79372b9059f6d9ff6015ea7f
-
SHA256
dddbccb9fec6ec8364e0a7046b82126d1f6bf557ecf3252a9308709693ec7840
-
SHA512
1088b1829e10e252bdbfaf70e1ef4ec53419c660d97fd3142fccdb78458dc33a5e9e2fa49c057ed08e4c46d0fe034d28d7eab348cfefff1e1e3c2f2a1dc81b0c
-
SSDEEP
384:ziVK9XMVBD8c8Q3RB5UfIXHmTD4QAmccfIk9xhezzVc9mT:ziJgcf3/5UfcmTOOIk9evqmT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422405657" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b21f55df55657b4197ec36ecc6b7695800000000020000000000106600000001000020000000f243debea2e826564768f2088de7b2c8aa176f7c67de667879335a433cd593d1000000000e80000000020000200000004d46c520f966b82b06843d2a62962550e2f7c55dd2e8751a78974aab504913e92000000028161531706c5cb7dbc1c800ff3a5a0dca7542b805f684c02655f53b6e4d16a840000000c80b14be6b817bdc712853991182072533cb52c04589101c2b305c74b7c87d3b8bb932fd6e883fbc5326671adcf31a9ab1ef7d131f539f5538d70e1a2d2f5814 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e002e25e04abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89A185A1-16F7-11EF-8554-DE288D05BF47} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2804 2364 iexplore.exe 28 PID 2364 wrote to memory of 2804 2364 iexplore.exe 28 PID 2364 wrote to memory of 2804 2364 iexplore.exe 28 PID 2364 wrote to memory of 2804 2364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\611bb319229618cded90d4c007af2e02_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b10257ce46c0d552cbb50f2f1a24d5a9
SHA11d25b9e236c9868b5fcac0b6996395f6557a45d3
SHA25610ad5459d0f51b1c617add192ae50175ce9397f01c6df7e189ca216b2823a80e
SHA5122da43de71490b3214395fd06d19a44c05d8d131ad2b66081d494cc29e2c9e8b31fcd40f7b60ddf70e1e975ce33562e7103b490281f9732ac3e1bdb6be1688909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570293a7a9b8393f6bb8d0fae519e772d
SHA1422e61c9e7276cc946602fd56502c989ddd808fc
SHA256116c279b047e8aca5e8b36f7e8964ac09e51c991881f967792306ee204e98d55
SHA512307b9fd2d0a4d47ab00bd672f9af460cec5537786bdf65bdb8c99d609cf5e18c6768b73766e117fa51f6acbdbceab71feeb1a9e9d58b64095a6f6c70f5e2fa85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59151ff70c49072e10d48a56538824ebb
SHA1e2ff83c81a58685b7897365e6820adfb3037b167
SHA256f92bad5009569c23f1ffb79ca866ccf867fe9e63bc29137db234afa785e078a7
SHA51274ee412fb3b14835c95dff9e1cf7e693d9b00701064f55d86d64e1f085c1088249ce507f9b144c29f3fa00ac23acdc4d4feea18092121fb6106b650819c29cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545909768d1bb45ffa1ad74457d98a758
SHA1c20454d4a239767975114d1f67f02d9d8cac0569
SHA25658465c2c7f9c0d48f6b50abbcb64b4f0ba7db529e35f7a3329c9ccdc458d51ad
SHA5121a84240ec237d2207c198bccea7addf53cdcd51c2cf9084dbe0d2ff314a81cb2556a52a2a95cdad967dd650a048bc1ffe82b0d33a9a3f964b71816b7148d9752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552e0db5968e75f3126e9b7c5ed21fce6
SHA19937a9c9642c676ead75b8dc6129637fade7a254
SHA256668960ae6314afef846b323f22fb02537423770c69a09a5cab79f6f831ccb190
SHA512e4affc6f8f26245a63ad76ae88defc31d7ac7deaed3930c396b0c4e762e163ea49670016b08e7ab4f535ffc696abeabb9138c94b2b165f028f162869f4a4da0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bce09ea58ec9c488e64fc54d8a1b767
SHA1cdd5aac9236f7ecf79722c9be60c1cd06908b2bb
SHA2563f23d29dfda420711af0b956dc0768786560018672bc53dc3e08ec80f60859f6
SHA5127cbb19f8b3bd024f3618332efb8e1975fc93637a0f39e0d5a14c0800185ad7781a5ecf30ba399df8fbb30c5afc24fe0be204878cc59616ad5dcd604fd986e1dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577276f3a798cb41fc2c8ab28ce8c3ab8
SHA1c8ec1a13f065135a611159e77d765eb5071fd147
SHA2566da9c15228ef0b188cfcd9aed228b2685d29157c1220f70b3115c10a3bf51bea
SHA512738ef2341f84e4ecad37ffce276bca8204bd42f9ff7bd0564b6654cc59d1bf1c0c818a261c0ce6c6fc591f82a739df0272c90e8b0bcd8b67630d6422921552ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55870f0956536ed5ae523d933a631caea
SHA13be95d80c484c90391683694b826733327757d7f
SHA256ceec64b29f511826be3a3d8602475d14980b3c811f76c21e737dff1ac91a6dd2
SHA512c51faca57246ed8b8bd034aeca50253c62fac73f91763a50a0fc79698b947fd2d643a8dbb79286bc4849cf412dfd4903edcc9585d8f3a799a036bbaaadf6ad4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8e0507326e20dd1b2228215d3318870
SHA1a50a2c59bd0e24229bd553a4a06432ec68e4b2d1
SHA256f58cfc3c613e508ed913c5dd7888007965e2ebb92c2d1a06899ce611e4b15b97
SHA5126ff3a22f0c1e67256b48b513af0514c1911f60739a240c0bdcf61dec47d0c693057dd870ad6134d94f69cfbf98fbbcb813c38679d92a1b4783b6fc69c875efc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544900fb3d95be3604b9b0b8549c7cc22
SHA1d81472fb5d254e2dbe9f63fd8ec4650769a27533
SHA256b4bf5742106c6e09faa9dbe6476b3fbde0b8c10b4431f818b261ac5abc713397
SHA512bd72d58d5c42acf9bea621f3fc32d9e50a941c87577c586c633c777cf9334d7dd89079bff8b1e516e4bd436a1f72ff7a92f75205c8fd27ebce693654819f0007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6a7fab77ef2ad7a248acdf739691797
SHA1eaa61deb2b9a30d9828071072fe34a461c0611e7
SHA2565902ae7a60ca072dc2596c4b5c723d20b4192d7c58d3c1603571bf9d7f3e9765
SHA5125b1b745def3e686accced900d3382b586159843cbc983f775fefbb2f0ddf3ea8cc250329ebbe8618b3c9d16f176a8192986fe95b5a210ce7bba5b2e1c84d1ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5097c803c8b69689e8371773401f02229
SHA1b3fd9b78bea228577260c52567482d2d4eb54980
SHA256d8abb689fe57d231f5cb6615d306afcfe22b3be8c5ad8395b6686bf6aa8fb60c
SHA512710fbb713a81e56eef56fd65ff9b9016f69e831764b474b0d0cfe20b52ac2036fd01d77afbeeebbdc85e2911082d781a7e8e5772f5b06ed3577b66cc7a877e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a188a36a58fa82887def7001d655850e
SHA12546f2ab0b92928af87fc921cd227013e847f078
SHA256e96c6a973cc50dd502fa511af6a95c3e378504860f7e0922a137ceaff4f44652
SHA512b24cab5494e7ce451d8a3374775d24df2414b661f7d2b1e183ff006fdff7d32349d06db78128284005c9c768bb91afa0bbcd5884bc148a749be91a57e704d2d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a27cfaf9e2841f1b5ffac04efd28331
SHA1ef32ac6bbb876d8f60d1c9b2d218f2b5a10b21c9
SHA2565500fcb322da2bb9655d08c22697eeca961bf9f60a943782d55a36288ecc96e7
SHA5129ee5235598ce95d45cfc0f5786c0b6ff55de439f9d2727d548b34244006c0eef832310b038acf9c4480ccb654d9a7876f99fe6f64e795a646c63fe4a493104ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c03dfc146573542a379400727923ae46
SHA1fed87f37804ed4216ecd23b20888f427ef73e58f
SHA25614c1c896597c7a80e50be453066c5e3354bdfd4ddcea07e17640d1b3f090247f
SHA5127984a7bf852a28e4839392072d195e8a40a29de5e3268e4dfdd9359921ec412eb593d22f05bcb5567dd0a2fa27874ef3211028b1bf41cb11675c2449024c3cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2dbefa541bdb1d42d07e018ce163ae5
SHA1eb1e7950eca00b91209b30263caad3c01f361988
SHA25673621e02e74a5e94405de3ab84c12d80a59b363d2130dc445e948696a581242b
SHA512547df26a5c455891c2e0a245ca0f26e157e915f9bdfa6b300b341daae09860de077f3459cb8512dbff02cbe6875a6da7058707d81f0743fe0340b7b32d2571d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac26889166c8ad9b733a1df44413c943
SHA18eedea94415f1ad40dec74835299533f2cbc6ea7
SHA256cc90bfda8ff96d9cfc365a683ca38e0dfcc0371c83ee8e7c41bc649b05e3888d
SHA5125d17dc5a1b7790e3c8292a53932eed3831709e6fe8c958a55da515f48ff47054b387c8e16ba6acd6130876d57a831930718fb6751b7505669e1464be4fbd3b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5906c18f851cccb89d505491360c78e87
SHA1e07f7c3efe310e608ad11c0db1fd6cd3f6957555
SHA256640f37e45dbe0d5d08cd1edda5f19b5f0eb6abb6daf838a98697203ae768bfb0
SHA5129f809a4e43123bd60f52ac401f0f1c2895a51ff0a61dcb221d846852213270f6c0def29e7a880543964259c54eab9a9fdc6b4d05f30d1103958f011c14b323fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7929dd0b08d94fd84027c0c87ec0b07
SHA15821ebb67af9c5f5176d5220d58ce50a53655fe0
SHA2566edd2555de3bb95f78b4fb99caad631abdbd02e454a1f77b31294c35f364cac6
SHA5126235b0f0453c28c6dc466df36c9a8b79bc2f4d8daa9f8bb5b153c59987e14db4839db1451c441dc48b7281f387b4cf631a6de16992cfaa8a683fddcde50012b0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a