Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 16:54
Static task
static1
Behavioral task
behavioral1
Sample
762739ba6fea0ed1bb3f8f1d5742e203_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
762739ba6fea0ed1bb3f8f1d5742e203_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
762739ba6fea0ed1bb3f8f1d5742e203_JaffaCakes118.html
-
Size
461KB
-
MD5
762739ba6fea0ed1bb3f8f1d5742e203
-
SHA1
373bed4a35f1d8c0a07538c6ce5a85a48098c891
-
SHA256
54c5bc148d32c19e26cbaec88196db6293d183c15c12e994160f41509a733e93
-
SHA512
ee38caededf240aa7f5674be49f45aae0a4f91466bf5b69ded89e7208d1e4d693caa5e85b901fcc4c806fe3b39287744c95d2180467f241ecb64bbd833a90b27
-
SSDEEP
6144:SvsMYod+X3oI+YqsMYod+X3oI+Y2sMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X3q5d+X3e5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422904363" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0de39868dafda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000918cf8d08a008d46a3ddf218421cc29c000000000200000000001066000000010000200000002d522cdc388a015ef06d9667777ae1bc78f831aa5f6ae916fa27c1c414a56ff0000000000e8000000002000020000000724cfd193fc214e2452e7ba5ddc21c244662cc654ba35573c1b1de8fc4841b17200000004083dd1a8bc4df1cf468f5e7a36f46b319b80897245fc1d2b61e9f7b65fe19ae40000000fb94f6bbe3e47fc082c9a6c30156a4eb0ea16c6ea646ee97b976212cb37a8e32178b2bd0f8123726b88a838c1c0c037e1d3254dec45aabd0d46ebb5c501ff315 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD9D55A1-1B80-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 112 iexplore.exe 112 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 112 wrote to memory of 2476 112 iexplore.exe 28 PID 112 wrote to memory of 2476 112 iexplore.exe 28 PID 112 wrote to memory of 2476 112 iexplore.exe 28 PID 112 wrote to memory of 2476 112 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\762739ba6fea0ed1bb3f8f1d5742e203_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:112 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581bf99246a2208af620a85f6c8f6e7bb
SHA15f7baf7328a1ed7fe10ff09d028febd052231f3b
SHA256411b1e718052c833ad58186a247a5e3f5b9514952028a0d22aea2c008105a69d
SHA5125f52cee4327390238574c725b68c77d1448e3c44770e4066ce57e6b7e3f65c69f87d4515be29bbd737fb927da2f6b3f7ded7ec93a7b4f39b2e2cb14fcfd262cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59029f1955690f83c15c04804abd279f8
SHA1bfc6afe8e50b28115653f2373cf8ffa7b31a194a
SHA25661718dc464bf6e40f981a25835db6f6e5973aac4f835f7949214714fc1828fee
SHA5127b4148870f4d92de14c629d09cb99621412ada92c444efb85c805191caf31dcd01aa50b2aaadec19f0eae0b335df08a0ed4ea0cce60e24410fedf7d1fece5345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fea534de214b1259727651d56c6a5e1
SHA16c4c92498355ef923b220a20dccaf7be2b3d42e2
SHA25673275c3d716e479b07812477f2c1699a07cb6fe1005b7150ef5fc9d8d73b288f
SHA5127bd2bd7cda4f75efdcd517cb8fe856d36a78dd39d1b9cb60c662aa430355dfd01717905a8a694a8bad9c8107ef4e66b5a9864b9466f2da1623294ea28f0749d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ec47081bbe96f7cf59489c6077a9b2c
SHA11542b9d555693bfb6e410619b937bc0c8e30cc7e
SHA2563fd7dcde1357625f531b9dc26f511f3fc1404b7245a132ef9a187a9d720d0422
SHA512c7e3a47cd70280fe45545e85e662fc10495c77a69b03e465e898b4e271f1de001b4723805508afa97ec7bbc16cbba0f3a4fc281c845c4d35326c061f5d087677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534438609de33cc6c7acdd32f8485932d
SHA140053b6c660244cef08f78beb127835171a832b2
SHA256da0346f4f9d9beb5b9272f3525d8dfd6a118d3ee539ea1b128556b82e600c234
SHA512f218c9ac1518a6e45b1d53d1efeafcf19c2cf03d0f6c16aed7dfe4a18701026d0a3cd4830846eee2ccb52ab77ba4b0013e331ec05a1dd31c314d35a8cf488140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559ac739d30745c290d7d4c9b870b7ec2
SHA14ad93764616099eca597c0ff9a6793b98974b68d
SHA256002d303c86b9abe2a6151fbb849de117e8cba0b1727bf58d0a6dab88c595e36c
SHA5121d70d648808ed514c2dd032fc6c145630fbaf3bf5163e9c6e660ac8864be0af54b20a52a7702a51a445deed35d91cd2f4c105319af80580a17b373adca0e3e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e684602055579a0909651412b9128135
SHA1866a6e7cd7d4d103b1677a71c5d77673c896e4b4
SHA256a8e53226feb822875b0553b4b1cec78351d072973074cdc30b8d6ecbed75ab6b
SHA51217859c687f83998d1b9e2559a61e2e940bc4202c38c449153afba275984c5f087f0dfb66e5dd64c3bf729a00f479a8670b60015f92bf5730dad55a751e4a7e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7051426011ee0acb4708aa37068869b
SHA1aee793591a354bd07210c3ced647226dd9483f6c
SHA256e9cce3b14c15b15940236a9d04a5b24aae61c45dae9e9b6b3a4532343fe78b56
SHA512fcdceb72f0b921e3e3c74fa1e4c411a2813924ad1203b2deff1a2dd334113ddad201c4d4f948afde4ef11050c157a6564d21cd0cf1e031ce05e3c911a1a58593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558cd7eb77ef342ef117ff720bd49503e
SHA1610854e6bf8bab79f62e513447755bf9c4ca05e5
SHA256340c9ddf3e03f4a8b50fee6dabf10ac0686769bd1af21ecd5f979250a0850416
SHA51293355b41c921235ea5934aba127d9bc8fbbd6acbc28c28841b55002693859c4737fa175250ee3c004df8633376ce3f2add43e1bb93ff867a497af103702fa5a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554c036cb01ebacf9017893aa9c8210d1
SHA1049914c6cebd71a5034534390923ae6c723a8a03
SHA2566da9883cf9186ab2436cfdb97c2d6338cfc91e1d7bef204f9f385ca5f94eb233
SHA5127d3bac6224b14fd3049ae2012d5fdb669aa3d021887849e9b59b1a1331edae93f82193760aca9ced6b1f8c87ccae55f1c5c945a7fb5041fc8501d311264cfad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595dad3bbe8163f2aa7c49e7327f4ed62
SHA1fad51fad5bad2c60dd785d8eb7e13ce320b5a0d9
SHA256ea6454772a480e167881dd2dd1d77eef14c858e54f64aaab23b405e54194d261
SHA5121f333ec81f488d31bd669aa0925cc5f13ea1dcaf461ac116e6491b8b5f7afd0663084865cd92c8821f5af02c718fdaaf270ff8a04305c9cc2c839ff806d16e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6a1e8bf5134f30f170d2cafdb9f0c8e
SHA120b5eca53f00365b881f5f40d1bb2be8c3aade52
SHA25693df1802c7735de7519ee337f2ccda63f641d5702ee468a16e7c37a785ed9da3
SHA51267e620297729043bdacfff451a6e1fa53cbc6c05ac7393d1746c8cfc4b493e41001e63c61ceb26ad78738ba25e8d5392f9d6961653d3e82baf6ca44e12b67006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5172b78d2d2eccf901562c1579c889192
SHA1487d8e11b10874a40033051deb998bf40c87ac72
SHA2565cf59396e38e768dfc7cc5f43e52ed99c1f4a55dc77da3f9491ad1b84c30cbf3
SHA512fd508ed9c48aff7c15f983e5e9472b0cef9a423087b8db2867a789a7b14c66e0fcaf03bc52a11bb2a0b477eb7aef7ee6bfe906874ad65c66e76f18be2379051c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5345b1c33d7f68175a9ee6ba82fc4c3d7
SHA12e6d2d6f298ce8778abbb6edbccdc9557f448d5c
SHA2563d11044e8368068ccc27e91f9092e52e066d3e798d31cf09ad57a8cb96b2329c
SHA512154ba17d79e12aa7c2710a7dac4f325ec27a2bb0f19c38823578be75501380285bc24e6dcfec0dd54b90416bccde5dc6fac2c6384907cf6b79c80da19183039f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eca3fa81af52d8d519167460b1d55c32
SHA1a5140adf77f37838fe6690c8a9f4c42fe7305da4
SHA25635df84dd87cf9eef1bb2ef432b78c84a1017e3e6c6c8f92ca3a342d1ef3ed4dd
SHA512397eda3aea475df3ced29462bf9ee4fffcd82fb0e072155bc53f20d7398ff8be00132c51e67df2eeb050294277778ca3f7c59ccdba08ee75a0ecea2c29f83cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d9ab0b48e8cd9c74476c2ab618e55ec
SHA131eb41b235e18e9f5998dbc8eda3a3a8a858c07d
SHA256e6a51632ffdd3c261e6d3c1c2b9cd837e782ddb4c294444302c3545ccdd43a70
SHA5129f45cb60cc17dd2b051c0414d10828f83373d2fc9d952e41e3a6063af2b0832b3323ba20520844aa758542e5b7a6dfcb603b87859ccb7646ec3104688652ec01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdec8cbd093cfb89dc528c04b924fa70
SHA1cdb72f7b3278f50a649ddf241e541814e978d51d
SHA2561e74d4d985346a6532f49530e71f821ec6beafb69f9b87b8a3165c201c926658
SHA512900098130c18b1cc85a2e5404345dc0c751e0f637c3ec129e194e60bdb3620809483211daf52122f94ceb88734256696d935e9f9602d699268e8a7a04bc4c4a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fdde411bc2cd0ac7877148c969c9c44
SHA10297c8cb46afbd24940165b7331e2bf204f2da73
SHA256e9957ee6a1983263251d355d91d4ba92fe90b3c7b6c362670f8103764bffc56b
SHA512b73bc6667ff88adcef05fe99cdc1657db3c8af1b76ebfcf871053490eacd91c5ec03a4a3659c2633550adbd3ee81a91b548d9e97ea4ad404d2912bfd603eb6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5876da5b44f72f55f040e6a0ae6358f19
SHA1e87ef64850915dfe14c5e3196418058224d2bfa4
SHA256be3d4303bc72660c149170aba34294a78d7f6c394f121e7b143f0fde5debf819
SHA51270a866953400425dea238988505b10fd40fce3de29d4fb4c3c6f8714d83bc72462210210d1382e0e9b1bf66070d1637f9b18a8362bf784552bfb4fffe53007ad
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a