Analysis
-
max time kernel
134s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
7219b4932c91ab5192ecb300315d8215_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7219b4932c91ab5192ecb300315d8215_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7219b4932c91ab5192ecb300315d8215_JaffaCakes118.html
-
Size
91KB
-
MD5
7219b4932c91ab5192ecb300315d8215
-
SHA1
be735cadd77e4111a8f8589f576461f9c24e24e5
-
SHA256
65905d017ae91ced76c582866382513cdccea2b1f30d17f9a73a89f568f220ac
-
SHA512
403a582273519feefc65084dd83d6ee296a4a1e552dd6881129970a219ac44f1a4ada955f955e140a790a28b8d967e8b21da5c519032b6b1a12ce05f2458cd44
-
SSDEEP
1536:3eTQVKfMf4JdfoGzcjiQc5SGOSimKrpAbeN0SehKIEMf55wMfcK66F8O3fpVKe80:uMohxYjK53ObmKe66SlsR5NYevpOuJKm
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000a8ca23864a64b4caf4068ee961eb4dc00000000020000000000106600000001000020000000e2d5dca75b75b55e02e12c03b2a09447a2b8a4fe965e84d1a8a7ebfdac5cde34000000000e8000000002000020000000cdd941daf75111aa738b817239d961394be23467cc95ead745b2d2a56ebf0b922000000003ec2829192f53b6bead83541dfa9cdb2dcb718288b97be21a9b630664a75ca140000000fec327af76e4d3c0e1858f3e4b88a6c0a8f9e6943b94685c3001a34e8859b21de875564f7e34c9f7de093387c9708f90195f4a00b5bd1b5e8ebd56c7c7bdc7fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a00cf1eda7aeda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{191878F1-1A9B-11EF-82E1-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422805760" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2304 iexplore.exe 2304 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 3068 2304 iexplore.exe 28 PID 2304 wrote to memory of 3068 2304 iexplore.exe 28 PID 2304 wrote to memory of 3068 2304 iexplore.exe 28 PID 2304 wrote to memory of 3068 2304 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7219b4932c91ab5192ecb300315d8215_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba6b2f81572a46455c5b2202d91c8bcb
SHA182222835aa811eee0f3039d3b0870240d5ea745f
SHA25626faadcd67fe5940541eeea1b75ec5d95deead762366c72b9bc671d0e156e4f0
SHA512ba8e38e81116f54a62f17335a89f3a5a204b214aacf5efc3559c8f4a50d0688eb70a5768fccc4daf3a2b83307a7fdfcd671708df8219bd282524683b1bc204ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501a62067acc9f32a30b233aef354a01b
SHA177eb1ed2defcd90d723f56e671130726d44a0e13
SHA25647a8adbeffa782f51bc675b9b05ab1030e7f765721dcaa09da38e7625ef3c3c6
SHA51291e249d5267e25c9d145a09ff5a72ca60953bc581d0efd61d6915b078f1fc1f07eb5485792b3f9a58dac08c6e21e7269672168d76262158d942b41cb9d53b45f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bbbd790451ad7d6d39fb7da7126685d
SHA1d4588e04680616baf06ea537b7ba8be9a5e8371c
SHA256f7cdc5b8ca9d8e0b0b95424b841e4592d6b4f746de127188c3ffaddf24fa5dda
SHA51255b47a70ce2e90f3c8f6c2c8781be73c8f4ad5fa6650b82d448d5506ac0c364c4e0feac164dd4a0e1dfe18926177c190678f0ceb18c7eb8650f8cd297e51870f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555408fb41d75a1cba6a1cbf845f258c4
SHA1512ac35e9693e5dffbae018bbe9a780eec6f4c45
SHA256afde0665a1d51fa8074ec72a3e62d68bb9435932b4b9fa84082fd7d4e7272820
SHA51293f1bc1ae5928007793a3c7916b24895d6f43890ad19d13519e762af7beb4653b6e89a041268b8780744ba9fe6651fa5a692e0666d553e28600c80f754820a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5166a72153971c49db7865e48fa582390
SHA133a2eb93e8040499bf58ae8b6b16b9e0dbf0ca8f
SHA2569a0ae8118f1c8916948fb2a4b24a54879c6469ae6e84a840d3746654aa3de6f7
SHA5125e1258df6a6df51d1d469c4b91c7b3d4a4bf6573622b1ab2278f062678b3601bf19a8ca6b19a64122d9f9ff05c2f3e09963ebef13ad3e4a8d579c20163184929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adbbef63cd9502a77e362c20a912dc30
SHA1fc62fb6a6b809d8d26b7ccc187eb4441917b7a0d
SHA256605388ec89b8ef86132902b3286721221d664e51101e1f1bd3772e74b33fdbe4
SHA5124c4115c1e045c4a1f8dd740114d78fb65aaa7821b59c71226897b77a1263208e0f01cc62226170cc5fa77cd2a6ccbc3ebdd6204b70db42c4d7013b824e0a2dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a599b23e1543c0b11e0f383ea6780a0
SHA129454c011a1eb73eec200744134086b5fa530187
SHA2563b6c2ee41abfe38792050c82b68c08aab449f2220b343a628c384fc05e1aff67
SHA512bac1b1c29e7d23bf1dd4c908096fb3bf1d1c564bf48cd42df1d086cc7033e0319b7919120cdb28b8fa2a8dffcc42c655fcb08cb5cbea6fe98ba68b5e47414267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c16a25a1d3c14d60d42a1788f09ceec9
SHA16642533e011ba4336eb5d98ed80c69b5ef328a72
SHA25681bba9d357beeaae9badc381cc664e34834e925003f9253cb868cfd3f1eb00be
SHA5127e2bc8376655773eea455e64ae7c94718663ed97c4bedd2ee8456c183922c1087e09b50b6478adc57f3f4e13591b28b2ee8723895b43c1d46547bbd601563c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd5a772b21dfae27623b1e87e54d07ec
SHA1fa60f5b36b09016150459e9bafc213b986d6e681
SHA256612ab450c1d709f093a1278c60e34d0dcf650197b091b5e88b88564ce9c1451d
SHA512dc515074b1d5f995bbaef6e53ecd23130664f8daf98b65812a32ef21dd183f6d14937a21b2bb9e47e502164c6fd3326ba91bd715132c858abae445a5e6a1d021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578bba0006c13345b3b4e3ce15e29c890
SHA1fb510329399f0c358720bad1f74f84b8dada6650
SHA2561db88e579c1a4ccb9f30ee54c2feb16442fc28c1a6ad475424f98179a448245b
SHA51251760e4cfcad8ffa2718614333d2f83feec8d41e87c5f0eb1739e88877c640340636c569c22c401ba4f1a250569fd82ace442c75e8183f497721cf22cbf0f7bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3dbd0acfb2cd30c43896964b21abcab
SHA1e00fe84ab9a4ead9bf50939e5411b7930d7d13a6
SHA256e58ddcb89f7025bf71446b08cba55fc2e706cbe4ab2eb9b9aa0ae5ce866f1f68
SHA51223844677862e6da3eca30b95d35ff0f5aa32a1e6eddfef1d0e4c86988c24b39b4f6f91c0927a41c696e885828df07c9ec14886bfe8f40498df8b166bfd529258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adbd57e77a8bbd3dc8b99db30456b767
SHA1021de430902277a32d99e98772c2e8615d37cc0e
SHA256a62fec2d2dc07f66701deb96dd511e023c8d888ac37ab1ac70d7d604758de861
SHA5121c61e9717f822f7ce8a250ff3d46ab75bc86a2445982a009eeceb853f2a481bab74b2d2ffe878e55bd1e49cccdefd40f3f7636004914e992e7ab8a9f92536abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508c9186d9ccc2adeac6ba7a5fe2ba578
SHA109f97fdae084644db2327fddabc72a567f03b77d
SHA256ddbafde608b54de9ef13efb48c425e613904ef943c57381de8cdf7ff8c83de6f
SHA51202eea6019c5ca9bf05f7ff10785cd856bf3acbdd18e7f26382e196622cf6aa6b64cde79ecca77e4aa4953ac482697196da5dd510bac4cba5708207540447bbeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c083ad474ab08ef064af9c4a312e567c
SHA1b3cf6642aa4801c2f2a237494e7a4b0885f6ee84
SHA2563661c96cb27b5532778c7fb7c7af9b8394346bd2b9c408493683f1770e141393
SHA51285b12b69ffb9e845e3bf46c7cac5208988be6c335c6e465c918a2671f76172a0263cbc112fafec0e81e8f1f7fdafa037f01b736ab3039f738031ab08ceeed570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa5918bb612e3cec045c3343841211f9
SHA1eb881dcb0ebd947a8a7c1d131f0791c33fb89c0f
SHA25603ac414ba9ca455ef982531c968dc8fe810bc027b003feb8850e1a48c5fb1787
SHA5125d081b3c5838412b4b44d183f4e15690a403e488454c1dc08620ee7e95f4d49c520b611a89ebf7fc869c8f134d0b67438993dae4058afbacfec236981450faf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f32137c822129164aff92428d69da348
SHA1beb28795e72ca7340f87495d6e300d9b5c296121
SHA256f5467486509fb7a8bf0fbcfc954deb1c6a41e23769b5c1317ef0adf057d25859
SHA512e3d872db17f07ba3fae1750a1decbd2dc7494e77f6a6783c5fbae32f1c3714d8e225ccf906a76fa2b31d929a80d0fa58c5ab59d5d7423dc54fa5484d13fb9653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b5f6512f8e5fc2d6cc7bf20037acd71
SHA1d1fa276c60d4dde780e2be3df66b8859bbd988c2
SHA256b90eb6db9c784adf19333a1ec6424c26d3577af664800e467f6c782ce189ddf6
SHA5129c4fe2bb45104a58e0aa035387cb91f97fcd527717251df098861745f33cd8aca16354e79e80f7d4a70a5b54f186b7123b829f666c7fb6f5c1e4d3a2ff82ad90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3c103dbdab6260670e0fc9a984060c4
SHA18f9800134c5c0632e228b12d5e34e31f23fcc671
SHA2563bf19583aa4413961db4b83cfb769f3db8b32648fb5479d3389d141704e11a28
SHA5121e43fd22cce9b6dd4890662e3f48dc49871cb598bfad13b108f55101f29a73f6102dd5c89808672aa7b5c2677f4022c9f3e2298541e934a7ff2e94713ca77b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a21da0c89de7e13e19ef0946070a142
SHA143a9e01a4b8b00312ce0a66e85b55a55b80936a2
SHA25658e4806a3862a9bc3f9d58da6ccfdd83f6fd9ec43c4ed3bca969a60ce5236f37
SHA512eacac4e452a7fa111fc73cdff014cd8ce607a74836b5e41ca0558dbb6c16c5f5322a347143877bf26f371142f8ebab3c962cf12fcbe1dc70b9d3056e90dd65d8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a