Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
754a97729473eb13583ab7998078229b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
754a97729473eb13583ab7998078229b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
754a97729473eb13583ab7998078229b_JaffaCakes118.html
-
Size
22KB
-
MD5
754a97729473eb13583ab7998078229b
-
SHA1
9f9d9713398e310ce33911703be61412b065e0a8
-
SHA256
768f6ac81c8042f101909508db15e8b5c3650f4f04139ae93f79da076465a18b
-
SHA512
44a1afdaf9df762b21c1f3c5e43d666a72ccf8c2a2a9d1a470abd9510958d1dc5e830f5ca0c1be19e59744d0f08570a68b127d4bd4dc2b5e1a5edaf1653e0c59
-
SSDEEP
384:+/J6Q9ipoEHPu2O3P3D6csYs3qtEmhywOUcOn0iOWOo+M4gO5pxyGiZdHUqLCEes:OLwyEHP+/WY6qtVZJcCvYaORxiZ/rgyn
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422883860" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104739c75dafda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000061a94d18ec3ac14482bd131e21572b3300000000020000000000106600000001000020000000d7dbacf7868b139816560cdf82622e6696f50ebf949e527917be2111ab1c017f000000000e8000000002000020000000f79a09e66dc2cddc37d255b812cfdfa4a18cfe881a7d748ab50f7a08e3ed0630200000007fa8f321c407b27b89de7e922bace9a553fa1b653b27051a6e6e80a9601ba00240000000eba893b789352a16949fb8f4c273c13acd9879900b85f3ea8f18d36aa41e5a7848935e583b8704da023c0a174bb3b79f2846369e57e200ce8d6b54016da7061d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0DB4411-1B50-11EF-B54F-5EB6CE0B107A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2532 3064 iexplore.exe 28 PID 3064 wrote to memory of 2532 3064 iexplore.exe 28 PID 3064 wrote to memory of 2532 3064 iexplore.exe 28 PID 3064 wrote to memory of 2532 3064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\754a97729473eb13583ab7998078229b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f24967ead1ecbf4c1a68c5a9e23f1186
SHA154b2eb56a1e91eda98e8a2b32eb3f1c869c27eb1
SHA25609da1b3d34aabbab13aa5ff7349f79be9398461b5a8e272e77ed0ece0a72584e
SHA512a8f273a82e7d96bfeb27fc9c294e180135bbb4f54d7abb4defbe8f3ba3810b5cf4889b6f9ff5a4af1d1a1e87193cd91ac5d966c67f0f93d3c74eed829a576536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d8c3a1bdb4a994b1dbd78724cff80d2
SHA1ad6a4b92c5853575c8e2902855d90a7889e14cdc
SHA2568e61f952f672af3c5d0fcae7985b4684a527d031ebd32b0c672fd480e85cddf5
SHA5128b0e30668f9185c4d17d0083b667f224c61693d61649f6d3d1471e27b4f02c2437297a1dbd826a29481b41f2df213b9bf98ea7c55465e44f4da8516f044f6820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55370746e3de5ac60035ca95d8d616f11
SHA1598d8d3d1b296599abfb20763c05c714c3a596b5
SHA256e161da9e3287aeb472e2a5d05dffa2462c52ee3479e1a0077d35189ae8ff1dde
SHA51214f8b7a83582495fefe050490254fc7d18413dcbb5b5b320c4f78a7c251db8f8918a4b41729b1f6638714e5d67a6e1c9d3ff49c5e76f19953f5414ea78cc61fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5625ce5c42a15263ad7359dce9ca2d73d
SHA1abe99170b8dbaeaad5ba851bdd90d2b479bfe1d0
SHA256e91e8239d93fee6dc4962bc416502a6c61a37753b2a100a6d1683d5872b61f2f
SHA512e7c8057e6ec6ca387addf136b64c07862759bd3cb33b80ef51019d63815e8597bbc6910a801fa4575458ae4f5862f4792eff6a5a3d5df9da5d31f31639186429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ea713d305cede0123b232a80de2b252
SHA15432e23e60a305af06245df27d7e1ba7dafe11b9
SHA256242de02675b27dbcd5793cfad37a52d20b8b2837fc41f7f03d51b6e71d555421
SHA512b52c17e83476d1b10d9ef44493751dc6114634f9bc6a991258197a89814ea01522744cd93de224f01916d4c669a0ab0886d0b6bf628effb04dc28715bc2cd77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd162dc01fcdc81edadc57234e33840a
SHA1b27517bfab8a298802cfc5c174afff5f5de0d1ec
SHA256f8d800e0c2ab04438d47826cdb90db5117cde0fd76da8471ef12c838ca72ad7d
SHA5122c8f199babef453fa8340bfa8d0a2e7d3b012b05f080909986a8cef9e3e1dd30c1676cabd3750898e53a301f5af183c8ad2ed805f2b218be077fd2489595cfa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a757d6020b7a1ecf5cab21487309137
SHA1f4d51046fbb7c7b5e9332105546229e52ab53207
SHA2563012ac412dfe0965424c2637eab880fe255b3ef500dae909d08e6a6c38ff31be
SHA51289119fa36ed4537517215652d8d445c81e90e9e3c2e1b6b1cfed77e1a0f38bf91e7cd16abfd44c3b0ba0e663656a8b2629e0ed32afa491163502e36357c7d434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd0cf9f20ec044f3262af6658b19d335
SHA1d5f3f8503bf40dcb44addab4453b52415df051f7
SHA256a81c7e2d5e1bb9275a462d329e67bfdc7a6339be60a40201ae64f3804a36a7ac
SHA5122f2b0942208c2bde1c2a21b2f546df7b985631d5e87d74b95307f7b6af60803496459e79ee3512410ef53f11623a217f0c1f3115db2190e94d3527cdcbd685e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531e447c919e9537b7fac9643ee1eba44
SHA1823bdb71e68109e4eed559ccf56bff90210b70af
SHA25672cf3e2b335795bde565d5794b3d5f6aa4b30a69bd4852a75a78aae930b0e140
SHA51255cbe24d598bc544a4a09b472ab2a66d663d9533bce92f3cc855fbe013f2328458a9fe81e90307c7af1efd28a95fdce1784acdc457288997732a26a8bd383dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce166bd4780faaebe879b646ebb8f5c1
SHA1d0860c323548a4387c22c7bee65727330aabf7a5
SHA2568bb07853e5ff6c05939c8b02e1774f3448cea94d9d46f89c527256eb96a9f382
SHA51213b4b975c6a0bbbaf5037cc591c5d5d0b66e59df6f02cd4251f52a4afa38454b301c4d21df0763afb7388e96bf142e252700046999bdefce3f2522daae392a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5156c3f53ab69a490bb9baa53b4b3af93
SHA1cda92e5cdc2f629625c01e80d950e95913587801
SHA2560cbacd0ee3961ab9ba8d38cd592b541af82484ed44dfcc408bdcd2acc32749aa
SHA5120c024bbd2716538d3d27f647b139f40ec1dfc9ae15e04f87d1f656ba195dd94c3effa9dffe121b07bb5ad4c79216080cdb981fe26029adfa95ecbe19e8a8b086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6b1b72d9767188d68ea41eab8bdd86a
SHA1735b102e03a45415d1e4595ece9830e81af2aa79
SHA256622a8452c0db166bb2d48e6d563bda6eee4b11c8e886fe7bc1a55264734e8bd6
SHA51284215e6ba7c30ac58f6caf45f3436121645fa5dcb33cc0386aa766a538cc9e937cbf21c67515834c9d5e655d94cbd3062463dfd658d6e0a668d221d78d6bfa11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4e0477d218499a83080025f51959e96
SHA1804705ab48d3644f06314241e7500d02d6b5a685
SHA2560acc0c57b33e899b12489ba285710969cbf0ccf161eaaa73c3ee5a957c91d21c
SHA512b81a14b893387d38c320a79d13dd567debf246abf2c55a04383f10cc724e5d084092973b7993015e61e67851b8baac6e1af458a982e1c63c89893bbc93ad2a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5619b01c58e145191bb4a6f088a8010e2
SHA1b4ac84e4ea6c04ceb7d55ea0e00b6f1ac55d7e81
SHA2566aa8615ccd41b0a370134374b7a92b8d1da050f5525db5ef84e50ebb9dc032fa
SHA512acde0b508345a8fdc6778df0a3643a00112abb01d6d2f1adb102a8c7bc8a2dbd0a3baac0b348e9ead1263db2369a7492a768c9cbf4321c55d35eaf7f9cc48a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d2e303e5d1893e20d37789328d92876
SHA1b268ea3c3cff6f6db428cfdb73f7605c78ae02dc
SHA25688b9aa15b3ee5cfe1bf9ebd0006bfa276c73c57be77bd4d13c22e88b51f64b8a
SHA5122885ebe1790fd6e8c0fc725cdaa2e53b5c0a703d1be2f7d9a499230cb32ae86dcb56af618233201f524f0fb2fd4ea3dc35c7403f792dfc6737c8e0879fcb16f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597ac578692bea79e9fa5f1e1ad5755df
SHA1fa6cd46fdb735e597f99b0049a9f15f53a3a6ce8
SHA256d7cac7fa430527c5a6cda6d27ee039d03653bccd6bc74628a695176e5b337f4b
SHA5127aa242345986a30849f8d6453fb31d7c28fda7e59a4598a4b4c683d0a006f8a00fbb7a571ee79deb320f7f1a430a8c7258765e8d25b9332a674fbe80f0aa39a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e95368154eca5942f175410be6bfbde
SHA13ee2200b3f67b150391ca33cf1c987956ddf5f34
SHA256ba96db9fcae7f9d79ea17b56a5d70a3a158c92a4916e38a18c29220a91ade571
SHA512472afb370115c9b87739ebed2ce2c3c862223539060374870f98f0b79f00ab50979c9e2b20a6e92fb2002bdd46f600e0d9996dd383f5101e298b9033bf8e4e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f951d24740a99362901cd4a900c217f
SHA12986cc5697b13f88a5cdbc5a4352844314ffcdae
SHA2565a858648cd5a7734a7b38a4f1148a6ccd52e8227e7fccc17f45eb7c3eefa187c
SHA512737d5c0839668aafd419c7e03c2cf4e94d61eb66cf12a80b353dd9c0235faed7fea95eb5d7f17ab8ed0b0d56d20f4566e2cbe602d6abe8d449b126a9a621401d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e3170d25d66aeb2214bdeaec4397670
SHA11cf5515f58d02ae12d3cf4fa619a6835676fd69a
SHA25640d6438e0db931e0096453a1005753cd0dc42bed736c81d1b0304866bfe959c0
SHA512ee8571cbee5e3994dd92df8bb9c6253fb6249428f947ab0ec60aba99824815c885d7d770e5bf9f569ae56eeb6c2dd80e48a1c21be6f0d2b485496af445b2f1ae
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a