Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
72ed47abbf7e95826dc3124233a8a554_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72ed47abbf7e95826dc3124233a8a554_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
72ed47abbf7e95826dc3124233a8a554_JaffaCakes118.html
-
Size
39KB
-
MD5
72ed47abbf7e95826dc3124233a8a554
-
SHA1
0e60a662a01653aac94badc1102f802b187b84a8
-
SHA256
8cb9402be0ec4ba3fd810796d82e1db685c28871e258cabe3c29fa5ec1426530
-
SHA512
fcc981472d828fabcd66577883316e35186b96028f71217626cc3cb63588a909e7b2db721bd4438c6e71201f36119ac634af8945ec149dbcc2ddaf0f5ec913cb
-
SSDEEP
384:aPWekO0/exsKWQC2KE6Tyyx6e669fEKtUFQq7He9qrKE0AGoPADQ6XH6JJZc9v3r:aeekO02+gKuOri8cwb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38F44281-1AC8-11EF-8C89-6200E4292AD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000d3c911af6fe10641ed3aa985a83a55c04bfda04c1260576d8afb7fac1df4701a000000000e8000000002000020000000155ac44deaae25402b5b515670c59e655637cd6b15da02075d3a52a4a3bf5262200000003bc03157c32d3a97ddda24c78ee5dfcdf9ba70eebf78ea7ef374e63e9edb391740000000fc3bd2e22b1634343e9ac8b6ba2c51f80aa067e96de6e78a0335bbb32d5f624bd579c1a0460af164983a9c94a2e29c541e683c9d43c3ab68e86467170f23f34b iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b0f80dd5aeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422825139" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2836 2232 iexplore.exe 28 PID 2232 wrote to memory of 2836 2232 iexplore.exe 28 PID 2232 wrote to memory of 2836 2232 iexplore.exe 28 PID 2232 wrote to memory of 2836 2232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72ed47abbf7e95826dc3124233a8a554_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b57f5179d30160b0c17a7f7b0ab4ebc5
SHA15a4767af591958cdefe32443547e28edbe8cc20d
SHA25643edf789aa678f18a77321b817a3e83b2e67426298b6e54b04f929dee3597a37
SHA5120da5870d48c9303acb7d371ec7d6b8aa6e31e2ff4a3562e937130cafaa7331ad0b78009e215dbd9930fe760d176d099e41b408291c38205eb4c5e1c2c3730373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50eebfc346eeab379971d432bd977f035
SHA1c7d456efc32a6a29839c92d60e8162cc8159800f
SHA25655f675849077740ff2b9a49cef2f555e4b3033b33d7b7edfa96c7d6e241a1e8a
SHA5124ba049ca7288ccdd246f9ab6f929d665fcb5fb81108579f3feb83689b2e89daad101ea70d15b09c3d7c4682bf673a159009f1c28b220ce3df86e127b4ddd31a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e79985b42bc4030a76939fa965081bf
SHA1cd9516cab32420e35a66e2a7c239bdeb5ad02ca3
SHA256bc0cce58aa8692f9ee69217136772dac706077e53547121f3aa99c546a95df65
SHA512d0cf58e7fd30e3be07f1a5c2f17ec32ce2df6ac315c089bfcbc913cde46cb1a85aaf822c9acb47d93a2c232495a1015d6731be5a5148456d17315c250c83798b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e9d837d21f411705c3838f1fc174ec2
SHA1de39a66ea6757177b7156848eaa08c862c114bab
SHA256136a6fd0b8f3068f334bacd8c89c873de5f804e9b0c41b2740198ec42c115c7b
SHA512c3b917ab7a9bcf56e651c5818cd8e0b05623371bcf10e45ac185b4f3f24e128ed598c2e812a4474c73b622b1041f66ea2113d1b215edc866c4c9effc4dd64570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fe8f4d632cbc5255d5f4fdb016cf4fd
SHA1fec9e87516fa9e5cfe2e0bed4623c8e8525efce6
SHA2562b4d6c0aaf48cc3f39280b1f3cf2c25e77cb3a2e917d0f5f6fac3c223d0422e0
SHA51282c35c3d3d1d219cb6a0eeb5d3524c186b8a24e3cf922d6bc3cc650f693b8517c37fb51007ed81b46f3bf93b9721b94cecff291a09e8b11b4cc3eddbaf61b06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5088e2019985e6b931bcbfeeec3c5d664
SHA10569cb731334d74cc7e00835f5df310fba600f44
SHA2569a41c18e0288f57ae6cd47b63dedf39d4386580cdd686a1d6f1420fee6601fb9
SHA512ac327dd6cd3d2eaa51a2a2560ba110758105aedb8d3e6b4a907f47c823a139ac37590d39405bf7b8373244748ed4fc40a07a3bebc8da99f649383d5039af9a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59aa084ed5c5de9f03ec35fe2731fcffa
SHA1c954a1e844fa60ff00ce0573450cc3f460fc7314
SHA256ffb39dc2ee392ae4dfcbd30dafd549adcd0217dec9664f35cae8c1cf33a7992e
SHA5124ddb2c424f180b6774c6c335e5b7bf38dd4181bd4c97b0554ed9c47a39e248179dafff3e4f1dc37b8ebc7519611bf4eed59eaf55342c379fac6216aaa58ead12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d67ebb31021466d8b57b32b27df5bdd
SHA1135f4620f0b9b3cdbe170f11d0541048e5bb0d59
SHA256042629302557c5126286e1f734ed88dfa5f8302a67570e19eb09caa52b83ac86
SHA512ab51f9b69e2754dc20673482ac8ea7fd372a4c049963075e09d0f344c1c66e8d73c966539581d4697ec909983bb840918e48833ec95afca5165d41e811c283eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ef41ac3868439bc7d2ccffce7e035a0
SHA16de6d39e76157d2956ddd69e974e002bed01db19
SHA256814d44884f645a623f3e47f18e05e68933387b28c2f80cfc5145669b6d3a5068
SHA51250621949c4d21590297771a151cf230d0f4dbf59e496dc7227c66a2c4c41812286b77f62ca32ca17d45de75768f1ed4e67a069cf6ee53c9f246c668526bfc339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd1ce5e6ba2b43ea2a1566345da23faa
SHA13515d5e3399ddc7eda72e076314cadeaab7917e4
SHA256b778b60ac58035aaf63df949bb0d1f1b3d386182ac54ca5a4da5e6f07da2dc44
SHA5120c2f2408a00df646defc8ad2b373e469e262e0d948701b0f7632f0b2cc40d7c6a9880eec688113f14db773e3ff3c2406ecdd33cc5e3cc4657fe1f493636372b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fb20e2b5907c82af6e78a5e9dd5a31a
SHA13a4bb75f70401391fb1f914aceb8f3ab231d3d79
SHA2567f3a24da418963c795489876aa60aaf9b76d71ba1fb32b88c38c9b292a520c40
SHA51238fa9b2dd555ccca6f348c4a06603f02c181a774594b92481944840b60ddf0c8174cefb7fd124dd0c6c7b553518be838c6be7e0bd30957d3fd5c8765d54e3175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e6d76d4a335868e95b0037e83676e8a
SHA1fef5cc18475a7798f956c1f700d8450273d723e4
SHA256c8078ff885de9e09192cee7101ef1781e8dc9d8daefd8c23120d16a7963370f3
SHA5129fa61006d4be98e97b7563842799f684664cdf59d5c2fc11361120067186369e9feb24a8666980739854d44ee836622e60488bb67ccb17e915dd43a7c67564f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b831d7dc4a6b75884960d9f8790329d8
SHA1cd867fc46f0c0ad73fdc794344d05671d08733ea
SHA25653db3e596dc8a82e3e55488a26794543080fe41b59c25721523c1f3a86960cc3
SHA512e16182c41137ed9d84d63f95377550d2ac0128a72b716cbc85ce33d2729de2d048184ee8764a634d8843492e20e3535b98985f10c927c6bf681e6f19ae8c0818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ed3ba8285177ac6745077176af829d1
SHA15745698e6c9d11cc9f9e8dbd740e94a3edb47148
SHA256af5a426c73850985957f024211be3d0117d1edeb03ba129f78795dfe269e34cf
SHA512e37ffd4b92beb939e74ed2b2dd604c4ce5e210dcb17865a0ece45c2663f45914432ec2e26ebdc1e521263c5c37074fe7544c8522ee3d1062c0178fb6491910ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513a71139733cd92661f9249917c025ef
SHA117ce7346f0f980c16999926afaf20ae0f5b50de7
SHA25625a29fe93671bfc55448944ead75dd1c16be5ad1f521c4336ca0e3de7490dde3
SHA5129d1feff9539abdf43a507ce14068fd85e6ffbaaf64b38e6c61a514b3f167ff01b942aa0e982efb0ed8a7be75d033abaf5d9476b23e8f08a943f11a40b371d18b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54201e7707a5103d3a81093500ec470c5
SHA13f7880149084efec0aecc55e6daae5bcdad09876
SHA256ac23731c22da7532f58eba6a957a8398a786554d0020f2f23feda3c51591d33d
SHA51260bef99bf5d411e1f4d2fec0a37cc81d66d9903f0bdcd1327cda1c2bd0cc981a8ea2f43866d435b465b5bf87a6c5f378c14ee724d2860dc7d87e57fdd950f777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bc68ae43a8b0c56ddc694796418af5b
SHA1c935b3c60d01ceca76b1f471ef2384a9a694d0e0
SHA256033c4fee4756d88dfb096e637fdd597a81d7488211b27b45d8c8bfb42988d709
SHA512790cd3b7ba338295e1710872cd0d42eea5c701a94f80b6dcc1813db14d1bd3ace21895726a7c68127d42804a1554a2f3e81efa19045f268a7244382104e723d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c84a2d42eb117249781237523d508eae
SHA17d58f7065687cd23585543c651c45c11ca5aa38a
SHA25680c06aca2e9a8aabe684ebafdd686397b9be8bf3d45755a6dfd5673694c029ac
SHA512cbed5ebdfb6f90df88f760784b455c20551546194a45940fda61f7ce5d3b920debb1272cd6b4a0838a528366ae6993c3dd99d9b14a64d47d75581d77acb8f6c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e0d972c512e19a8bcc323128b3555ee
SHA14693d21ed7bac5933c27abd7c10ff3b8a303c5d7
SHA256bd90c2dfe5001894a05e4ba07f2dfffaa0eb8d7143e1e5a78febbc8925ac0115
SHA5124c8f29ded8fed3ac757c735733ef5aeefd6947ae3d94640f22a1159e961d06d7010e50aa08d7f8ce194d439e63e46ecb04debd82f728702a3b952294c4899f5c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a