Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
714365285457bda801e8a4d20869b865_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
714365285457bda801e8a4d20869b865_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
714365285457bda801e8a4d20869b865_JaffaCakes118.html
-
Size
460KB
-
MD5
714365285457bda801e8a4d20869b865
-
SHA1
e6fff7445457e3973321e1c816931a5cd4120868
-
SHA256
888318f99dc44429501d33026ae57727390b927ab01a7b2d888e812edce21ccc
-
SHA512
12e38dd814c9b4737303bcc13b0e3de1744ace3531b1efbe40940f43de5dfafe221b1f94a4414dd28299e31a4b0095c3b0fa26a9371d6fab5befdfc11529cfad
-
SSDEEP
6144:SgsMYod+X3oI+YvsMYod+X3oI+YJsMYod+X3oI+YLsMYod+X3oI+YQ:p5d+X3Z5d+X3n5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004b7f196adf51f74aae527a84d7f052ae00000000020000000000106600000001000020000000baafd967942afc74ca2ca8612a8e359421cfe47930e950f667ae4c49ffdc6c47000000000e80000000020000200000000a4ebbfb314bb74fc5355aba27c3fbdd8154dc60ac6c4bb7913384e19f3ea6522000000029eae51006f3b8164cf237ea2a30ebaebd7afda2d5dc626bc079f93751a04afc4000000040485346a476524053811f509f336947c7c24394fb9da5dd7659e75d91b8d38722f5fa1ce695ae0ef1ffa7fbcb3f544f14bd31a5f79bf51a13eaf791d104b69d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC9812B1-1A68-11EF-B73D-E693E3B3207D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422784156" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f00131a575aeda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2928 1640 iexplore.exe 28 PID 1640 wrote to memory of 2928 1640 iexplore.exe 28 PID 1640 wrote to memory of 2928 1640 iexplore.exe 28 PID 1640 wrote to memory of 2928 1640 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\714365285457bda801e8a4d20869b865_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503ba0ca05b44c7b4b8d799ca24203848
SHA1122bf5c196cd9e088fb73a6e4500ff0b37d41444
SHA2564976b0125c31e3c5f532cb26b49c9bc21782f301cf5d57c2b190b070fc4dbb92
SHA5121f4ad4f82e5c51393e8c7f08b7bd12f49e01f724c5e56b294673f51d2b19b27579164b993ee8ee4d2b7cd3e02a7e47e362bb67af57d265168944ceb42973f692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e1a62f1ff4054fc69789c614bc86520
SHA1e0a4e037f02e49b7248fce0ddca935b06db28b46
SHA256f7df7ff73adddeb9ad5f87227ad2262547c9a43322d26cdfe194900705f5586f
SHA512bc254f8e9870f4e752fb73d338f2332774f6870a2e43f118482858ad05f74290deec1424cedaa7dcb8b8120424418117598e4ada56c09fc94d0b980e467517fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f29a0fd2551b00d8ba49c9550efe939
SHA1f04840e96c0879d2e57f5c69c239aeeb5de69ab9
SHA2561bd73c20858f6bbf045938d7fb0eabe531fbd048b40cbafb8c68f5dd392f3476
SHA51232ffe90d8c7e6d38888f994d49bf29de776f6552b3c3b87df7d82f167082bc288d2cec5c5cdddf22c56307882c18598f6c385bbe3ac655fb29a1a99c7750176d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599b04eb95953d7f2f159ecb702fc5ccf
SHA1db45d059965bb8211f909815c17fb8dd39f4543c
SHA256af443ca47774795c9a7eed14d5b0953412bc5986fd21a6fcaf793a023186b7dd
SHA512a2d6211d5a16b81f9672bac9dc0b0aaa761597c1b12c750305e7e007411ddcb6c3d2d09f280f2ffcd42f89f87bb676ad0092d69ce71fb95231555f463eb5f724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578acca841e8ad94d87383b49bd00678a
SHA15f87cb84f6171be622d7e512ad15830d912b8064
SHA256442c9f0cba53ee698cf4bb3f51c8aa273ec73c5d07008fc0d357a196efff1833
SHA5126ca678a3bc6188219c77979268d6ceab3e769927c7558fb8b56809fb0da3f66f53149f37b0729324d4403cd0a5ac770966e2096fd89961c011e9b6c4a9620038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8fe3b780815df9bc4aeb51e4d61a6ef
SHA12287d6faf8ad659bdc16eaa2a6e4f1d2f0ba9442
SHA2562877b7b9d83f1649fb518a61ab0af5919990b7f7d1aa2e0097c3eb6a4301d786
SHA51235e718e530c031b11376f7d52b6514a7ff5fc1ff702b526adf7cd6828af563414d69d2a6797d72407c66f4af6587abd89c3a857ae85199d0ee6231306eab2414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b24886997741b67c5307ed8f158fa3a0
SHA1d2f999931d01d757d05fdb207206ed500ecc46d0
SHA256ba2ddd0ed1b4cf9ade0bca8f873e11e648ceda546ee736c1fc98735fd7cacd5c
SHA512c0d4680fbb5d2498fca32c45c11d9c1cb25c4662dd5be4f8a1e177b2cdb537b147c0e434dcb8a79b399483baa0af9478a0cfd52bd60b05754187230d66ca90cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52937ae5b0abc83a14a5554a4654da38a
SHA166050e8d5fffb8060cc4560e9993d5e7c127eac3
SHA2569c246f4a744a99948f31514d0538480051044361213a8ce9209cf2e85029283e
SHA512139d68a3f60b27fb817227cb0b2a70fd659896f8c17f33338e17cd2968e8d6882127ab197dc41834fdd2a6b3f8b23e35e06c512e3a4752273fd912ea64ad90f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52268aa60ea4920c5736bb881a183e5d5
SHA16fa28a508686025d45481a89f27cc554bdf820a0
SHA256670535ad36a7b58a19bd93ecc291ac9ef15c679e89663e4cf79dedbe081da306
SHA512fa15484b044e11457ab7038e3c9f94bde9786eb48ab4b3f0bca07d219c2e2a30c1e9413dd4cf2abe4a5c5d20ec94c4ec9dce1167c04e8697758bcf6838db61cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4d7125d9199c6a8d45be4ef62aaa671
SHA18c81e708d0e52654d6c3ca9d0f2288e8ec521e7d
SHA2562ddabc4f124ff8404792ad89443e9683d8f17b7ebee41b94f86e97734a869302
SHA512c93a76b84eec009a2fd7dc739f9afe2fd1628705371a83e9a7e908208f15effc09c0f232f0f6b2e16c1e7c192afebdf7813f224333d0c8e27d8540783ef2cf89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad34651af46c6c08712874b071e97e04
SHA1b451a1d24656279973d3d1f5b2a5d36c9ac4c78d
SHA256f7680331932fc0c4d10eb46bd2616bf0d0818c2c6ed638a967359b401c976bc2
SHA5126a850c6de34a1d792ecaee82022f91283d0bb20e13680ce741a8aaff1b6e3d19a7222681fba6e9af8bb5394a8855878c7116cf3e5a901d6a136eac3c32213646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5746835a420ac2a981cfbfc5f926369c5
SHA178efc5ab63c1b6b3fb99e9af62c00ce8c383a633
SHA256da6f7a797674188b485c0bda787d2c7859eef079f8bb3aad187484ba966463a3
SHA512c0a3cb194f359a98d56eb4df944a261b9da67707c9e5567a0a8e08bb5b2410b8781172d08cdbce934e851217bc316334f7fc4115e5a0bfef82b0befd290d359a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2a4e335520e6df5a25448c216fc6ef3
SHA1f10740484eb9e4b76518118436dd2f6bed3b3252
SHA256a96d0bdea074095b899f9538749e9913b17a7be0079abf3d778b8897135bdbf6
SHA512a77cf638ddd0c4704b7efb560a6b5720a5834cd35b6b9f5b4383087be119dd61af856c46e3920760fc510b64dd6c337b4264dc4c792a8be618dd826b64617d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9c18e09f328aa5d0a9eec166273509b
SHA1a2cec2254e6e8f17ad4b9ca404932e0e5767d2a4
SHA256e14870789923babf12f014eb04ebf41665579bde1756df79c4d5d8a9e3b288f9
SHA512e13e1084aeec537e145f38d6cfc6c6a9ecf6360fd676033170b5e2c0f2e6f55184692fb2e7a87e00c5a91322864d6a6d5d48f03861e5d2e1ce7e847459cca2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5199451386868d1f6a9247cfdb2b0989a
SHA1864c1845b05894c0d17a6fdae357acd9dd9f5073
SHA25636282db19977a507a6ac536bf800e03b040a1bc7cf942eb9eba4710384b0e604
SHA512dd5d72e81137e537df6d25b9d02ef1dc0dc0520261b1aa2e383b804b3659f48144b5885d2f4fe10a1a0e30e1ad5980faa4e2a39cf471b3d5f99f05619627e232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556dd1485ec62bc5cc842d6e922e4791e
SHA124d09928f4e0459dcaa29c607e4b25bf786e39e3
SHA256088d06eae36c42dbc4589a92d99e5e460267f597de6da1b69b37c284d47a1cbb
SHA51286b00112390bcd52efeac3cc6f6c98653eb122c1fd9a954bb16ac811d97762199a8c438ab9640e5fbc875796b0baa5e35d420af8a4cc167296df8a9864de542d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adee8a45ba67c3b0828395519810dbb1
SHA16057a15d12e44405684822e02a4dd8fbd150ba43
SHA25643a722ab905ece0c9a697c1232e31f4cf2eedcb325a29f140d144d300f005917
SHA512eb3de63e540c2acff0132d75f6698696c4e87233bcaaa4debb2e4b639494b99562b96b0fdf48d17e71d9c64acc2b8517e30ce1ab063d148668cc13d7f9889cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594c6f3cb7433d0b4767c882e3b1b82ce
SHA10aea074cc03ce4fa23fb20141b1464e09448dc12
SHA25646bf07a36eb07ed37b6c24892dc2a89942002aff355769a9c4974e362031fe12
SHA512b74cfd93509f24d806e4de0533177db798cbf051f4bbe1b0533aa0fb119df91f9701a591ab67f2193067269f6c349c7a95600911031d1f5b78935e3c543207aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557e7c27d6f4d55ec979ea3516a235bdb
SHA18d4dd50d85f42fca4f8d05af2011bccefa128580
SHA256b10f74c981bde2a899512ac737962c5dace6b71df837d5e050953a480589686f
SHA51250a8ea40591b3a41c39cfb784d2174669fc27aaa70b6d08f172a51e89321af40da44ee01da6b4ff76ce9b99c61bed2094ef5a0f7def64692d828cee87a8f8a4a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a