Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 08:41
Static task
static1
Behavioral task
behavioral1
Sample
66abee9b4acf0934ae641825eab023b9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
66abee9b4acf0934ae641825eab023b9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
66abee9b4acf0934ae641825eab023b9_JaffaCakes118.html
-
Size
461KB
-
MD5
66abee9b4acf0934ae641825eab023b9
-
SHA1
559fb56b23cbe72da5188d7a9ead740d97a7c4e6
-
SHA256
e77da0a7abffea55081f248af236450eb84b3e712afae89c080820ef39137c92
-
SHA512
85786c3ef9e5de161d0d334bde7ceb75a32c342d269665b9f2db56e80c4926217064135f6d88f156773cb9ebbdffb5646adc152ccc4173ee8f7994971c943019
-
SSDEEP
6144:SgsMYod+X3oI+YYQnsMYod+X3oI+YLrsMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X355d+X355d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0040bfe523acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eaf78f90b84f514aa15bf47af970bd27000000000200000000001066000000010000200000002d0129d2ae06ab751bd2b5558c706d96a2f9a48e667c6e0b39b90aee5446439a000000000e8000000002000020000000e1e2a2e5ec850be34a239a9c19ed8fa233e6939cb7d579455ac31700dc0e24e12000000038c77a3ba279f36269465055dab0adfcd3c3e12979eb430610cac2d4d78f3f5340000000b4868edfc5821088f831aaafd99063998a375f1ad46c9e2c478130409156f30313026109a2a9f55bdfa6fdd798e8a721d216a1be49ff15cd89d29b44ee22340b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422529145" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0CD959A1-1817-11EF-BCB4-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1284 iexplore.exe 1284 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1284 wrote to memory of 3064 1284 iexplore.exe 28 PID 1284 wrote to memory of 3064 1284 iexplore.exe 28 PID 1284 wrote to memory of 3064 1284 iexplore.exe 28 PID 1284 wrote to memory of 3064 1284 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\66abee9b4acf0934ae641825eab023b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1284 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4712359b054d60cc3ba8339039966d4
SHA17001b99d05e4e1f8dd07bdf917823c4059245334
SHA2569d068e96c45d318c553a481e8c3847c6aff059b808ea36085ac04d776c2c86ad
SHA512bea56acc68c41f4dd8d3051a26e9065331b38ee8f43dbab03f138148c4efdd7340dbf4a5e0742d5c110cab4ea952ce24b788f417bc2e64738e480330cb968ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b8d9f4c7d70af466ea9bf009e9eb07a
SHA11b1231028584ecf5174cf2d8b1653f0966e84095
SHA25604488785f0f1cae6c054d01af8ab2eb36f892da1ada4b10d1a590911b12dbd2d
SHA5124a8436e19a3f5d2d12420fb67236ac915179bf92d1b2699dd25f941eb12ed201fe1c97f1fe07d5250b948bb033930e64002fe695d69a4e2300730925d126da46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fccddde4524af577623485b8daba3f7
SHA1bfe64858e82392ebe1c939b370e3b62117172742
SHA25693276ea4234bb8fd88356e8567ab948ab07fb412da71216df8543734faaed0bd
SHA512ad8742d22d1311c17be97ca27df79704267f656d8d142ff29d9823e79b1537632248a1dabd640a79d669c935d76e066d19a488ed093ebf03003baa84b4d7aec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dc3f4093709151d42418e49e6170c6d
SHA1e1125db2c6aeecc9ce33c005a5c8fc3003253d23
SHA256b74acb03f38fddec3fa1139e0501c64beb2a6ce37e7c957f188983b1b72445c8
SHA5125999407d5bcb65e0c680aea7bf7d8c319cf51f5561cb35a5e10443b2ee3cd27413206384635de3a4d47900d5aff07c0cfbaa866b67c605bbe8fe08b16fdab35e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e74cecdb29a1bd39d6a9249ef06643e
SHA1d673bf60b6eabb43baa9876ac5467e51c8510361
SHA256ae08a5d561bf2eb8d016131d6dcfbd2aa186e332c247e5c803c71ca5394fcfb7
SHA51271d62488c29855fe55862d0c24f1396caca3b01ac37ebdf1c0fdcadefd7bc725bb7af5d597fc453d86cc6a304c8b5377920c668948ad875bd0d48fdcf3afbffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbba4ba9cdc8de63a686e681f9dec8e3
SHA14d159d761165c616e4de2fd34d79d50ba4bfd41a
SHA256a2b5bf797b04fb09ad7186444fdac41dd66463742b3acfe23d5513884f312ba9
SHA512817f40bbe9f3fdb1e33123c95a9e8390101ed19d6b02fc64657da0820509892d0a3c4f7ada209d67e5a77ebba349607a6a2f14a91f2ee1b036039ff9bbd0eff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5099371b483cbacbb676250898f2c4c1f
SHA196189b05153cd7f5843048008b0b67548fa5ba55
SHA2567bb1f110f58912206907e0b3f7dc2258e8b998e2e09916bcdd8340c297391493
SHA51218375acbd3eb57b43007e5b8b16e64994a4713d98bac23ab9ffa5e711b6cf35450eab9824faa861fd8936cbaba64522819c9f7644abe1ffa5af91cd2de3a3003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd877f48fd83cae0dfe41534008e1005
SHA1a8e925567c009690347227199e11333beddc683b
SHA256fa9d7350bffd17ddccfd6e1063bed62993531d5660ebc423aadfe50389bfa0f5
SHA51281c33dcbc35944933fd3dcf17939ae9a4e5adeee770932304d7c1addb29bdcf53fcc3af2bd71df773751bbb542cfc203b48df9ed2d088916bcc9ec1dbb174d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542467013ea0456c7a90f40b86717a2ab
SHA1eae34729c4b24c900346d41275d81cd73daadc36
SHA256e1956e0a709800cf04b3fff14ccb96c9250931549d8aa452bfc42f56e0fa35ac
SHA51282e07f011f086f05bfc1393a0a541cb54f3b11210be11801f70146dc1772f9f1255f4a632d1a881ca757a4d00898f697a3ceee7fb1bbe17d50637d0ecf2e69c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a8547da94b54405188eda256774fb1e
SHA1464745a6b14752a65d41c3f8d094394f48877923
SHA2562cf83715e0f43158d57f7a53de9c432b67999946d9f572322f8447cb3f3f5394
SHA512ad81c93e1a9c94233766e3853dfe2270c061ffe3ce6dc2241291ce7599228cb8dd505d080e2387aea238f8867bfb6073880f4361e55c4141ecbb5fb0201d4afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bc33699f96277f17d1d610628df2f07
SHA117d22584658c50f37249b60bc1fda3c2ebf25328
SHA256d065dd9698fd6cb675d5e414014f8446c36ff25c2f2f44d35fcd2cb5bc5b6923
SHA512da3b7f68f72e3934a57031b20e4f95010262cfa4d0a9a7cc970a394c18c04a1e4ddb850ec8bc25234234e22d0fbf872af446d23d8c49f0a2d3720e4bd2c79331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d4a9d221ed33146d4a08447eac82b2c
SHA14caa35f58d038ab4382a8239ecf08ffe0ff8799d
SHA256cc4501039b5c028f1affd4b4b66c4e0542ebd47399723aa388409797b85251ef
SHA5126c34a434eb94275cf9f847e4f619153bfd672f0a6d8773f55cca177378a30c946c1704e72b360431a641bb3a38318e1bbc859c8526b91885e1c5aeedda3e762b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54902a3adc1af11dfdb03f7362bdf795b
SHA1fb69bff3e57d998dcda32e5040d52f56870eecec
SHA256242e3302bddc2c3186b6a63949b90be97f275db5b4178748e62102ccb7c2440c
SHA512e0167a886af05501679d509e9cf3237bb947b5e790e0f2121eab6abfbb19e238c27f46babd037bee02e88721e1cc10298c0713999906881f02e92f0bfdf528db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5518ddd8eef6a83830d4e8256d38530
SHA1ffb12f91dc0bb4fc6cadbaee930b036e71a74e50
SHA256088aa9c6578a188cfbe16b586e4b14f4f74cedb2b26b9d39fcead3217d680b7e
SHA5123359d92df637ed4b4e352984b9c881f56ef8930e579755f60f4b19c251481bfe5d39d23236ca3f03535a415cb4e69e2fc232752be126d95c32716df48987364e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590f38acdfd54b950bab260a7e5f6f868
SHA16d14f5cce24a9673406ad2cec8e89b102707d087
SHA2563bfefd798bc587d0cbd8dcb23ce0f338a9ff40bd60808396fb6b4130fe71718c
SHA512dc8b54b6dbc9461564adf0b74d5456fd972859bfef1e7844df673d69b0411c6d7a4fe35f4e023af32a18b0f472fccbcb8afc463c84ac81110e4a30860c1f4abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510d66a4e8caeb476d7065c927e0ea287
SHA1ea41197559c714c6b2ca48cff5864859e29d66ff
SHA2563bf4c31fd29f94d7d9149c94361e0fa6e8609dd42ab052cbef1229f1c7eb080b
SHA512eda9113f0847a9af04363be88486446033578f48981f5ee2091a07688b9dce9495db4372a235eec2e3e596673aa85ac68e3d0a7d26b8d1825ade9f2f92a09981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d73b7926df692954d86ab68fba2dd320
SHA1865800da8c89123c4ff4a35f0278ed2b20364a41
SHA25649cfa6936806afeeffe65cf8fc22958f56b544a0bf37028744d93888d71341c1
SHA51241ccc907f58cbdd8a31b9fa09f100cef643ed96c66bcbc4865ee0a83ba5fe0e3b742df53c6c32e8419698f813e07d46f7060247f4a794293b48dc1775c741ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a497dff551ff7155f3a1642c5b914f24
SHA18d5d258f816218850b9a87a1e712ab06ebcff6c9
SHA25696297a2011ac7c499e172a47468ba34c628adf39653b16594944d34ca921ec30
SHA51219da08129d944a201cdca177a3420bfb9e90379e94e63af00ed489ba0202be3c74c25bc8dae223de88f9b197588c2dd1780db4e9e281e52f6abea8d0c5b44b8e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a