Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
704e96612db32524c71a59e8422b9cea_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
704e96612db32524c71a59e8422b9cea_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
704e96612db32524c71a59e8422b9cea_JaffaCakes118.html
-
Size
461KB
-
MD5
704e96612db32524c71a59e8422b9cea
-
SHA1
a9778a3c0f2269e702238a3654cb4908b667dc2a
-
SHA256
0b35152b3719d2977b78dbefa8862d72c251dd3c43362df10d6624897bca931a
-
SHA512
ec029368562cca83a9b13760752591697faacb8fffa53b49952ce1748010ae481057650f028cd4cfd16a71f5890cbe37e4d846b3f739c6b3cf44a7592224902c
-
SSDEEP
6144:SCsMYod+X3oI+Y4sMYod+X3oI+YHsMYod+X3oI+YLsMYod+X3oI+YQ:P5d+X3M5d+X3d5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005b6edb07b49e784684aca70ee5ef512e00000000020000000000106600000001000020000000c5cb27aef7bec915028bc47ceaddd8ab92bb8db05cb76594997c6bbccc2582fb000000000e800000000200002000000026438d45ff976dd69d1f9afdd9faf0b0c744613e75210f333b0448436448001220000000dfbc6395d66808cb30f8ecb9519d0d9c77ddc231a7ab31199f62217d538222e540000000f56be7c8ab46623632367c0a45231c155702f6993e31c08d459334f9bfa7e99c8294abaf7dbaa879abe4aa345fff0133cf113b3891155a5f637b62c3eb41a542 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{035DC9F1-1A2F-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422759337" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f401dc3baeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 3052 2104 iexplore.exe 28 PID 2104 wrote to memory of 3052 2104 iexplore.exe 28 PID 2104 wrote to memory of 3052 2104 iexplore.exe 28 PID 2104 wrote to memory of 3052 2104 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\704e96612db32524c71a59e8422b9cea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50379c8f74410af83615e734727151b1d
SHA177620374824d5ea590fb003bddfae9ea25e415b2
SHA256d03afb4738cff4637c169bb7de7bf94f406b2f5ff4830a7b4c3f290e12d37bb6
SHA5120aa3522b5b068d4726e7668f6451e5e176c02c14e298d208703832759ececda637254d17545a1d9df1144179289aeafd28b63d80f5840d003caced6567ff06da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53256bbae5d7818a6e2eb8d49d579ac74
SHA1d82839086cfee0ea30c895dc232320237a402959
SHA25658fd5e3fa0e99626fe18ea86d0cfbac1ba6c2becd7b8b4fe0283e8df658097b6
SHA51225323d865b9ba0b7618cb4b1893c7e2e5babb8c7019d04855d8d175523e6619f1cc5ff44dc322509665a7cecff4d44a6a84b9ef9771c3a6236cdb69e4c11b8d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bc365cb5a97527ced0da15ea25cbc5a
SHA1209fa990cf4733e6316d5b02237c71853fceee34
SHA25659edb44646063f6f3650e35aea4936323d097cb85768425eb20a4e06a990204b
SHA5127aad4f20b702b9a2b2aa1c459275eb19db71dd4c086ab8866a1936c9fd04ac1d5d18e8058ca875c95d48a27cc5cd4a41a8a7e39439963f811ad866e1741643d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51505887f775f503e9700db1014c24375
SHA1a963b67d08ee496085726bdb8182d3406f29d468
SHA256546ca2419b6a207dc3c708410d83871940e4e0b2c51d6df84b133959a1252bcf
SHA5122b79131707399daf10821c328770cfbf478ba3209964609687857c5551a224c46b871d1e68181ccf0aede8d8072fd3567751e601c3d442b084dec81434314538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4e77c523d9a6378fdc344da30c7b49f
SHA18790c836962b580cabfe464b7571a06230eb7e53
SHA256eee88137b9bb21dce3b6ceb74f2caa43ef8a0995c11ba17f669e1e9675e70ed3
SHA512154e088ebd18b33c39736f28de158e108aae1b49503232c46514a3a51dcedae608ac583e9e3fefde3e2ea836877ea37762ac6299c25207870b3abf65ea70ce5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b33e95c58def1923802ecae7eec4b036
SHA1e88b95679724fc6b14943d8ff9d3597d6754d7ab
SHA25617fe7c35c78f054a12d4cc67f278537586457b772d84a2aa5c3e74bd0b42b875
SHA512fd54c53582db5fad8de99c90d622f8f4d96aebba6c301578f4e1fa6c2de2c256f6419a1224f65bf7708f3733cc511938aab2fe6fb7459820369e370762d4a50d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a6ea290203fed2fdce96bf5649e8a78
SHA1a8ccf1cd8388b44d17b681c1e9af3d9d7e5db624
SHA256c7e1d142fa20c11e7fbfc7df6de61ee039bb41670f4fa487c2e6085e5051de0a
SHA51221cdf6e4cae27c17902b21156978ae84792586b332b117f658a87367e6375e272e63f75d10abfdc79eb08f02437babcde77af0c0d87d6e1f956a5632ee3a01e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556c9cf33aab6c4298ac688ffeb9cf69d
SHA17542b175fc2e2d7287d797ad94cb725d9d7dd748
SHA256f98e5550d6ec860fb414ee8ead349ba2473c06f240d5fd943bfd849dd95dd94b
SHA51220a29f150dd21ecc1bf9a30a9836e06eefd1c48d1cf722ef64b862a6de47f933aff76ecac4357cab07eb17347fa8b126156d8833b8b196eaecce838cc7152fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f98ec2989ea40cb42409d21bead9abe
SHA13b6a2091d70efb8cce33f29fbaf44b14a84cc7a3
SHA2561461411c41e067fa51b725abb98668d50d039e9059e579f837fd050ef3d5bba0
SHA5120c7f7a4b72f472beffa8680371c5f4a769d1b648bded3ce514fc477b5c5d66275da7be8327760ea15ac1617aa5e63e6f4090e74294b3c774bf0dc7c33fa5604f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555ee41f1b04dcce1534e67aeee4a1be4
SHA1550a674ff76a9b97bd04745a5423aa82e94ae0cf
SHA2560bd4384b7000c93979a29bd3a8502e22304edcac0fcee244afb13b197ed27830
SHA5124a201e0111ce1498427adaf5549230fe4a905a49b718f9169437d794b36cf8c14f338f9adf61d22256ebab61bd01d77a76b436ed5ede5abd31fbc4b3d17f5064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ca0e6cd4b6f6c5364935f42d2ac291a
SHA183411fc698be014650cca93804f7dac5f39e18a9
SHA256f00264c035e3e0d77e55841c166c9097bd951433526531572d58089ff3e81865
SHA5128136b6d00c9e00aa1d96173fe771a7f91408dbc348cf7e8f13c33a479cc89107f78fe186ebcc86cb3203d68881703934ab9fc6e331af2ff1e2554d8e79b27a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bf68fa39a7e3dafd7bcd23189b1dc2f
SHA1839d2df66110d44b7b905c94bf798c0e1fe320ce
SHA256e1584fd24f3ab999bc2ca9fb412cd0179a355b26a2153ae22e737dfeadbbb142
SHA5120584133d6e1b1285212bcc9408593740fb802d67d43f34abe4ba327ecdc14acbe8d63e59247e8c4e055f09fcc0f3885d697c167c9bcc0e611d8f44d717563a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546cbb95f3f78e12b9b7597295c9bae6d
SHA1421853408e582dc7b32eb0e2fe84fc33cdec7666
SHA256b917bd5f3b10dcf7bcfd592adaff32a3d42bd1e8bf8e343541ff7ede20049a49
SHA5129f2da623d7694f93587e7c6ada1c980dcc7d69245973a179344295a3c7bb67e5bfcd9b52c5485186e6446fd0374e4c55dfdb4f837e89b508a268b4621c725b33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53840ad7ef08d6e2e7f735b20f6de87ed
SHA1e0211ffd80ce53c8d45454262896ca65c17033f3
SHA256984d6a901f919f18c3475c5c1fd952689b11529485560b76c1c8c4fdfa25578a
SHA5128ba95d5fe1a93d687001ecaf38ca9a3a587640f7a67f98ca5e0cea19e9f283ef072052fc6ad086667b4ee686a4c557ef3e328e9425d4d1bbcfb15832b7834535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503a5650f73b5c2882f473ccea737534e
SHA1240f9f0c12c37a85d2522885bf6d9b57b9b0cce8
SHA25655cb3fb0eadb7b6c6c5c35598333ff83e012357d34cb7f5320f7e1b1c0ec1115
SHA51278bed6f26af9e21eb5134e23fa2c5629fe678d770647e00ba8f9d37d7cebcb34dce12e5685fe7afacd6c67f170224f02e05758c06f6ddd77cef1d249921f5a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59537f7c8ace95d35bda114361f146e97
SHA145c4769fa05c49496270cfef29f9d360afdc3698
SHA256ff2d504d5c5d3c2dff2ab9e7db568423fa8f3a5ae03dff96b383b479abf07cc1
SHA512b1be7663c4749922f010d973f4a27d541254a6e538e060497dfc20dee8de7ee24663aa69f079a9ffb3702e9ba529117de95d7fc7140af319c749d9aca44052a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a1e2caf5844a4673473858ee4cf0a70
SHA108112ca6cb61cb19f7be801c36a0782fa3a5be05
SHA25669ef020af1d86f1bcc303866211976db53484443990aaee516c42ee94e2b3325
SHA512583a245f4646cae5bc224a646ebc81c9fca63c352b8926ff04a8e3511abbb92fe4bf0a2c5373160dff68d76c62141a3afca94458a01565599c0825acc8169746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ada34c1118de3368650c103bfdb809d
SHA1849f2a0520c14327713d3a57fdc222678476b14b
SHA2564f87482c8793c0a444f853dea289a5837ab4ec97d14537c72eff840656308d63
SHA512c522a6e77923bc22e2a888b285e2bc22cd7a8e0a586906a938d8038161ef5ba5b448fb8e9ef9126575ba229ad12f0744c72c7eb471c5ca9b763eece48b863c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590446255370385dca248802b67268ab1
SHA1d15951beabbb39909fb388192f7181c78744e109
SHA25668d9304db5c767e28839dca944004c94dda083d57a1b7bd0be544ebdfe08e560
SHA512c71112682439f504515dafbfc154c3299485282053d95d4281eaf3c91ef2d14e7084eddbf27e5592121d804b762a8fc26e6607529ec2e2f4ce531dde9e88be76
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a