Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
675760dc9c0f9e3293cbcd8123861867_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
675760dc9c0f9e3293cbcd8123861867_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
675760dc9c0f9e3293cbcd8123861867_JaffaCakes118.html
-
Size
68KB
-
MD5
675760dc9c0f9e3293cbcd8123861867
-
SHA1
79e426f54c753afd2ced4605be95d82ce693bdaa
-
SHA256
b883f104ebbe65c5c52d3203d3640695b553ffade2c7d87ef96734cb0dad7d88
-
SHA512
d10319077695652e2931ff09e1c20bf482587b5a9c7af4c3a7538437cf0bf218871e2cd68e168cf57bcac2f037056b163f24a06fa91d6f01239647dc292ca157
-
SSDEEP
768:JikgcMiR3sI2PDDnX0g6og/CKfoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8X:J8iaKATcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422544743" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b90e69b9ff3ec34c900a4df5d6c6523c000000000200000000001066000000010000200000004a60ea1baab75681569f61fa8e4e462a6e062e68d69c01d7aed6ca531d09c255000000000e8000000002000020000000c21042da7aac80d327422e519b6155f0b8fef41fdecbc1eb0628fe9a133ebc0920000000807e0b4a2204a500cbaf3b344c58ecb1317c7526d62f0b605d9d3c0b0af29a084000000051dbbfbc85bc79b25bae3d194983397ad96d1f6b1d6904d9f86e53fd1d4238e1da39e9cedc2138730b6df3e4ac58cc8f73f8ddba6e9318b3e87ac420927592a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F51A511-183B-11EF-92E0-EA483E0BCDAF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3006e33348acda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2432 1724 iexplore.exe 28 PID 1724 wrote to memory of 2432 1724 iexplore.exe 28 PID 1724 wrote to memory of 2432 1724 iexplore.exe 28 PID 1724 wrote to memory of 2432 1724 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\675760dc9c0f9e3293cbcd8123861867_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1a4b104c9e158c6464b957bfb85f2ae
SHA1beafc5a0ffaf93798f1e08186c9677b84ace410b
SHA256118e3269c115a8ebee7c14d87de704e281efd20e6842eb01ac9dd808ee8d9a93
SHA512890cc7d5e1ce099fcb8ec5c334ceb42d084ee5657b4541a1b5b662e58a80930d19ca684e563d2d36b8f18a0fca3e6af4c18327a6c9b2b5554d902a48bfc7b79b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1f0e76d80485bf69b95223da604cf2c
SHA1a3dddbee78a5ad9cb7e10c0eea59f85bec9d5e5c
SHA25680cec191c2c6b494b378fd1eaf19231ca4558ed80e2095cab7a56c28aa8f0b0c
SHA5123ed3e8069481ad83285a28dbc82e8f9a147b6e0127e4e467aca14ac62ae51cdd6439a08e7351dbb13534d03b36a22e327b6cdfc27d1a822c6e8277bf2aaf6f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58940a887e1e1378d60da724c8b9f4a83
SHA101119d75dd706c9e1afc27ff2b6ddd7632095daa
SHA2564595216ab456d44fec30793c025a2dda89115d26f4c8ea5847bf522cc25188a0
SHA512fea44b07d1cc2144f5512a9c757accbebe035df83cb1a8c71ab78ac01b3f894a99881849c0ebd719ed8fd7feda5d3ba8f70234ebadf3033d0597087e0eb03ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595ef071104ce10dc14cd2a107927b032
SHA1a393eb09dff68a243caac6ae15d8eeef21702b96
SHA25694b8caa68b66d24d6ce7389fdecb30574ee9e8ef728d3995a248df020c7b0e01
SHA512b3b0c6ef794b6c069c94cde276d8eaf45da89beaeca7119201a98ac1dd2d50f9fb7168d8e3489b62aba76f3adcbe8d9b7bc9e404306c95bf37797eba2d2d6c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599f39d46adf505536a96a2a6598e4b58
SHA1ee47e1dcda40200a21edaa3812ccc6d9934a46a4
SHA2565fca73ae76c64dae14d0aa0de98398e330f57634baac345d7af0006f068a9669
SHA512c16a89d0307ce97738ef5574446f7256a0f2fac998a05797e3ce9a3efb9db65c13bddaf5c59e2400da7d16ad7022ee82bd0bbebf0168b9c0434ee6855013481f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f6d867139d1776fb129b2e224e6ae0a
SHA1bd72e1f4f3ea12511061ba2956c6c2c940495285
SHA2563b28b4f0e22af3b722b5b37b528744f283a70979b1684a664622c8e1e45ab60b
SHA512818fcc46db2911b955c8479b75164fe8e6218f90608690f3421f451b82048d220906db1257372f8a935d55e0d4b5f6f3ac82b1c9e6f8fe42a1838c2ee0575d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9e1070266558cd11d2380d0268848cc
SHA18164515989ece10718795613ade87b8b0947731b
SHA25689d133057674ea7f7dd8fea097ad32807fc9aa40b9bb1a5aee7d8302a3343b2c
SHA5128b1104191035dfe4d2459ac04827f3ed73d770ab10d64ea76f5db71981bf73d6aaac04294acf01e4fe7ab2ebb0bf8a108c04ab102ecef9cfe029826ab519d25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5841f1f1cc2b91ab19fdfeb364c70017e
SHA1afa8e811962582d15d2e80f1a006edb5c19c04fb
SHA256e93f0e04a46cd3fa86800d8952b0c5a7a48596f587fbeb5acb2246ce0a5d5ac4
SHA512e762507ef289c6b11c3154000b51e4cb79eb448284518a1a8773fcf0b2d889415c5b6c5d91ff6f2661d42e3df904c28082b9a19a642403f09310c6df0acd6ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ef53106e63e8c6c635a21d5f8fe9107
SHA10c5d433a0093e012af18f5dad4964ede598b06d6
SHA2567ac7d914a2d3ba753d75353cba39cc5cc53197b6399bcef1e60c990093475e85
SHA5121cea7e3ba37202931e40abc6d4cd08dc1cf05cb9d54039ed90c0013beafe5e69576e4ce0766453c64a25b459791cd41f7f90188d4384b115441931fe8d9a6e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3dbafcbaa1530e2d125ae2450ed3c6b
SHA137687dd294881490b262f6196cfcf675a9d0df08
SHA256d879f29448567939a94bfd1797fd6053361fbab56c665b886c610e96bff4ea57
SHA51289f3fa4ded38105c15e983fed48cd02e8919a037f56782c3209acf36e57a4ff97e9a0f9939cede5eed4368b1998e1b3473f291c33e4cf7b8ed6288f9a31798c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567fc3f8c4f5959532d13b3471837b8cb
SHA163e8f7c9ca359ceaf88d4fee676606b773814859
SHA25668609635ac5c764e53e661381b63c3de070c55a9a9ca7867dfd87d8b9254eedf
SHA51229f2099e86695ee3966b5ab96e2f1960842ec8e97681fa4401ae64e3b00b66119c5c57970a4604a7288f5eccb65e21f88b7f25f6b539e0854e76a90c703d860c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c2baf03693b065ec4b72f36a8803c92
SHA1627c48b142aa0a1b4fc243f15066926d3998f718
SHA256ec14f317314ca6508bb1d9e6ccfdafe7ff91d3cd3e2745aa94070c3da8457333
SHA512a565f6ab307afc88269b401a4da78367a47fd19783a475d541355847694454b796b7648834be6e0d46b6fff1815d2aa8da8766458cea91304023b193762829a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a04cc4b5f0e35eac446a4d064c6f1af
SHA1bb343b98c3031d3229cda16fe4735cccd3bc1574
SHA2562a21791dc2d68e6c3088bd185d26ab094fa6ab09723dac6bccad60e851429165
SHA51211acc977a93edabb3e87320e9187c0436b1187b0cce488c4a4ddb422e32dedb8317a34063279dc057cdf71aac616356643cbfd35f4eb60f5bd8d831241586435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f567f924bcc4a535df1703745e3712cf
SHA1e76d8be5df1970b252cc6816de3670bd6b5c5e8b
SHA256f849fc71976f6ae37f058eecb0932f58120869f7b25ebabb4bf70aea78e798e7
SHA512ab8fadbaf858949c932f69a6af58df434167a9c6bd979e1118477528a4870bbba6a7cb5c8cd238807ee13f8aa2b221468db9e1425a9a144280ea18df14fa12be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0b9e6bb1c62478ca4b8d4d56204857d
SHA1c89658850992d49cc52226479bbe2b54b425f2b0
SHA2567a352b589db732fb9cba3461aab816e38f1a04f8aeed0803abeba9797a9811d2
SHA51270ca35ad1d88886cf00f666023902a47b8f508cd021da4cc65b7184dd278a1de7c1cd106954263dc42546bf0737fa2d08c07b44da81feea0c5d06d3efc18e05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566ae343fa58d3b40a11501261b7ffa9b
SHA1ed610d423d2d93695867432eccec66e1e981de57
SHA2569c61367c4118cafca337a710432eb67a4bccd63aac010cef592954591f3ba9d3
SHA51206bfd1709eb478235c15c23d12bdbdc7accd701f5ae6e55a9cfaaebac1b0e64350599e4dcf98627098f6e2c0ecf2840239a6ff251fdbce6ee512f72dca3a3e4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f99e1cdcedca71fb14513355749f902e
SHA119e95e5997140ce61688f59b3008b79e388802fe
SHA256288680a3ce5ba31c80162b7d9adceb81c43f341eca30140ce4567bea898ab662
SHA51275816908d2d4a2d8bb694b1be146fc558340034ee4cbdb8a463b4884b442b2055d4ab7dbce4918c5708918685bdaf02ffef52761c7ba192b8979d76cda63432b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fac17368ba8faa584d423638eb383efb
SHA11bf913fb1a7e8e015fa441a831675a0f0703225e
SHA2562530c3d5b89378d0d37314568eb03d919106c01cc2ed8ba31e48cbbe0e7f6c8e
SHA51207f0fc41e08e6237fdc6cab548d9224322185a51b1cbbe238743f5f22963066c4561551fe874c3e161266d15a412593228555e9ddbee0b5ad46a3b98a09aa16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51503d0904f5ce9d791d8e4ac1f4e8070
SHA107cb61533714368eb502b9ff51524f371baaba63
SHA2567953b081e910ee32fb6fad057cd9c8aa5e37d834e965adce51180064bf5926e0
SHA512abf55968aa0e8e27ad7cf8a5c65088e8ff6e9d28d839d6f300df884c2e6e39d6473adc17d4cd8219440cb6aaff70a80d48da44d9bc9bb88a4be1fd426fdcc348
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a