Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:24
Static task
static1
Behavioral task
behavioral1
Sample
6479b1f42921359484a80df74078c674_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6479b1f42921359484a80df74078c674_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6479b1f42921359484a80df74078c674_JaffaCakes118.html
-
Size
849B
-
MD5
6479b1f42921359484a80df74078c674
-
SHA1
ba87660cdbe4443ef986cefe72d85c1744d31318
-
SHA256
2bd3cc97e4f2310dc50a0d2655831c5ee39fe73ce9611081006440cc75cb7c0c
-
SHA512
006ecd9ff231836767c235ce7c4fecc6595ac52ec58df28ed8c8010de6247856c5375e59ce8832eb8b08f5775c57921fb52c435c30d36f63ce0d17293fb1e60e
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70297f96b4abda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dffb12e452fce54fb53e8c9fb036a99200000000020000000000106600000001000020000000af4bf77e42fccd831a2951daf7ba506370c00f60b5cd5c8b48341b523f8df8ad000000000e8000000002000020000000d17b026183e62fd7696647b4f54834a4ef40542739c6f57fb4736be3779756e1200000008b8a59740038262da1aab7037fe97e7d7ba7ed4e20dfcafcbd288ba6d0e9fa09400000006f4b74cc3a185cf68d7479c9bd7784a6d4604054648e0633de916850c2e9d4131063af259ed7da9892146c00096aef08eed93dc9146351d8017395d8cf6970da iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422481343" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1FD1261-17A7-11EF-A01B-4AADDC6219DF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2168 iexplore.exe 2168 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2168 wrote to memory of 2936 2168 iexplore.exe IEXPLORE.EXE PID 2168 wrote to memory of 2936 2168 iexplore.exe IEXPLORE.EXE PID 2168 wrote to memory of 2936 2168 iexplore.exe IEXPLORE.EXE PID 2168 wrote to memory of 2936 2168 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6479b1f42921359484a80df74078c674_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528e4ffc761768b39cc44761124a771ee
SHA108c97421d6e55688ca6af8cfb1e4602a3fb21ee7
SHA2562c21e260e0079e5bed807d91350f8b475954db5e8cb311dea31eca673d15302e
SHA512915c7f6e7f26ab4af0efb62bb8ffac211daff830c85ca8297b55ff3845b858da6ce541ef3c418be95ca449618427610014bf250fdf5b65a1b7e115946818f3d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5818b8bdc28f22150cb5aee5eeaa386e5
SHA1fb494f5b30f93f7c7303ce8b3b1aa1910a5aae49
SHA256e3ee00f881ab4c9712a3d3ce8f97d08d3c8e2e2e88b3cb2740fdc17bd9a8bf85
SHA5125476fac1e77e3b0ac9732c0a061bb535fe936041e39c890a75ec81ca5b811c1dde716f256531eca1775d09ff1037ffbb58786b2fef111270bde1a2039fa2defa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e2ed425aa1ba00ece34940c21244b9f
SHA16c2ce083182a123d8759458c183224b02c2252ae
SHA2561c8734e2e8a4bf9c685362d0c8d1dc2a70a2ef7f1f9ec2df01ae986cc17a7a4a
SHA51207680cc4183b039d5179aceb8e275503da8aae37b78f2cffe53f6a0e07c7a197f54d0f86568b10a973beb149c4b09ed717086587b6fc8bc59f7555bd538986b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f32ec59e79987f8ab9f318e72c2898b
SHA18d08307fa080a188eff8d6421eab2f7e29dfd21e
SHA256c14d10d86c29c1a586282f773920d8257c35a538042494fc03a6e3be81b26a61
SHA5124b2796e56be8e51cec2b116d6bf95ea124c013c7cfe5d53d0e603bbf5e11bd206010d49a3b76a6714b8adb0c8abb813074e663a62183da050baaed44b5ba0154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523d4171c6a9abc0a31b1ede318446c1a
SHA10e58129714e1da7800c79c9a105f118e421114b8
SHA2569ae3b987731b37bf06f52b114e8cc92b04ae01ad31b0d8f66d3fa993e729bd26
SHA5121fcfcbe17d160b46b40bf8655b16e7be72179c577a65e42663d78e817b3786f66962d5ae2384fa90101c0fbfc49e982bfefc30207dc3afcec04f312843e10654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515cf6f11a4c93b56dc69bcee2b759e32
SHA15ac1b3f2f2a6aab2fc4fee7a49c0bf446756089e
SHA2562cf34d2f5f9101a5a025ad7d58c02844bc3b771dd1d4a2736d3b7536851ddb8a
SHA5124fb422a58963cc2f133359ffdaae082fd29a5972b8b38e0b95f3d4edaf894110ac7f72b47390253b6b06d74e68741baa8988bd30445803556a4843b3e9439eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5232529d22a895312f13ca5272f0f6440
SHA1beef11b2f25a097682d80c672d3b830c7241c9f9
SHA2563b3b3df6149b90a6e63c9fc57f5a20d1012fbc6a0464519ddbe5d186ec8dae29
SHA5121b6d59c232fe51c9814749e054176776f8d08c86ac210ca63811663a689261840b0f6ad0ef447f3420a8c6db96679a24754dbf8ca934137c32c56a075a00678f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572c2517a741603cb589e43e5bd19f778
SHA1b802cdf761b1b1a419c99a306b14043bf61c9cff
SHA2562fa3fbd0b03a77bce47fcb85ed122d7aa82384bca615a683e260bd2f8ece972d
SHA512402b1a8a87e17d8d64663c817270a0a3aa362a709e683074431a80eb9ca893d54776a66b125fe454bcda1b25562a15da8f0d16cc64f4e40c6aa6c89abf076dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58acf453eef012c70482bc3252d2263fd
SHA15e57fbc62710bc35dd600545a92481f448237d0f
SHA256d85d1a7c2dd2b9848d4c0b8015f51db381e28957577736fe865bee539a1c375a
SHA512d9471c2056e239da14063f6c81555555fd663dd98acbf264339d2cfa5d5a3db17b3ac7ea54fb172d71f6ebf9048927edfab55ce1ce050cc766186c2f87499ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52096eea25cea8c07f538b09dfcf7fc13
SHA1a7035b0aebb12cfc86a4cd48a2db9034b9119f6d
SHA2560b892dd81b0a1feabbf50285094d26a2737e87f87d5e5d4fee06d72f59aa1611
SHA512dd673e0bba1e6cd875bbfa7235ee54a9f8fd45d64653ccc7bb42d1372a3e73a49f93bde905a1170eb32361d2ea6dc632a9780078cff3fe295197e566d39dfb16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5995d5e7687ecebd6000d30e1081dfdf0
SHA1444290415ff0b6330d07f09c9d2776666b00959f
SHA256e5f3476220d50b92b6eee0a648275d92821198395c12a3ae28d31ff30d57da63
SHA512718bf1e715d156a3f7999c1eca7a80e8180a016ece437fa323d07877ea1f5b6697615531d7b60d02434402c6bf43978c6f24447ddb3d9542a9de681bfd1d67f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500dd5ba60c441e611496e2287ab9c58e
SHA1c9d57d6b54f53cdfe102afbec98c92f777d1d227
SHA256c421fadd76fab24851d46dab346ca23598b9283b28f839f50c93fa10131746b1
SHA5128379d0bfae12e5a96f15e9a0c5e4e98177360ed818748f880758cad2a440e9229b37a27d4f3c6b29fb5e438068fd0e142f24e2bd0fe6c256dff026eb07fd9460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c83573c5079c62ca41e0031794209e06
SHA112cb81dd991126a8a2ee20da4cd687b8f1523e27
SHA2560ea4436df7111a49d99df3d6f571ce1fd5390268522119e9a10a16b380b0aa2c
SHA5122ac224d1052a7e97c63be96abe95b5d7baa48f5c78ea6a6a67098ba51fd62d451ca4c2f1333f5deaf1ac012a6f4a2133f90e231e42008332663cd410a55bf77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5433c382968306bcc24bfd305b79cffa0
SHA1d98109587bcc25539703226073d8d62eb6c09267
SHA2568b587f9f75128d2d97d06f152d3f8380c6ad10330c9525984529335fb6091a80
SHA512db8a3d1bc96678fdfa1c7e6c8c86122bb7c4ffbb0821852e338b850628f1169baea6fab501bb760c18b2b94d328539c32591d0dd74df022b22a9e198ba38ccab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567ba91cf21532d79b7ee76451824f36f
SHA1276400b396897c865deaa2bb5535f347c3733f81
SHA2568cd3e1540496b4f1b4dab5685e9ec1468bd77885385cd2423e37d52b1c7141c0
SHA512a212264ae677122d4af33b8df8d35afef885e44e7c32d156ad1e51cfcb1709d403030b0fecf0afd32b4bcabd8966583047a6808aa8449a5a5815dfdcd9769cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53985bfd6ed9e5f81c3fa58eb15afca23
SHA17ade6d842d0b4e65ec9a9f9a23e5058f98750a6b
SHA2563572cc18199f75e3cdd091018b782fe0a277c6b7faa5290781b70d7da60e2541
SHA512bee81823b4e749ba449eb88c1699dd370fd36d7c476419be1d9d1d372f9b287da5bf69db0193b96037c2d747a4671a8dc2ad5b487e8acfa9e391fa4708c64963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ca54a46d306cf15646123fbda158427
SHA15600db4cf7b053d732930dd70f4f718bd3c4d2fe
SHA25612a70f49a97e4f39b2515b862312fa5b0dafed1d0004ab36e97d35f78e3c47a3
SHA5124535e8a1735afddd9a3985f447060b8e9d2730da3300985196b5a3321a2507ec4ede1368e022d14759465fa6a1bc76362c91f01fcd5a3c269979ca7111377110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4e7597b56598f3db3f1e1448c9b1520
SHA14b3f3f40dcd47f2278f0e15944fd98cba12c4469
SHA256f008669ab82cd0731228ba3e792dbc6618fe5aed901551bc6deb759bfe782a8a
SHA5125c37c57daf1032a1b7de43d762da1e6469d5632ecf0241344274a07e5894b4a62c71b929478c437a2da1707bd0e16ec73cc1d7aec323cf229651428d27a05c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de3cd6158c1f366ddaee64922743392f
SHA1d2d2cd13c2ec7ca19857edef89d8089049224dc8
SHA256d77e539f38e4f168d3d74f7e5a152dc57d77e4f45c2a537f55254dcea0ec0084
SHA512fbb0b94c5d30b147ed9c247f601e9072ca8ec0c9795b72f018741a88bbf23d58eafbeb472d3df69f48695770d670574c497b573048eabba3cb22ae12d8e1748b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a