Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
795fee246cfe868a3e4510ed3f868b2c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
795fee246cfe868a3e4510ed3f868b2c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
795fee246cfe868a3e4510ed3f868b2c_JaffaCakes118.html
-
Size
28KB
-
MD5
795fee246cfe868a3e4510ed3f868b2c
-
SHA1
2f64fc5c8ef307439316326a4cb61df95b10eb0c
-
SHA256
6d0b115d810a76aeebd66def9e6d4b0a9112e0a93cdf4ea6ba1050ea6cc28914
-
SHA512
8f222859aecf54a59e2b7bbc231b5e386ac658700425c7389fe3d88b5e43f1e1b33fc97ed7a7cfbb817df8adc7373a7498bc7bda076a42054e49c395a5187cc6
-
SSDEEP
384:K2RT23T6/Lz4l+8i0/eUuFupNTCXwaOp35OF1Yfl/2Ln7GFNCC0LvUIEoq:Vz0lU021yNkwwCFNPhINq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a2fd07c233ec3e488b3a8873a80a51b5000000000200000000001066000000010000200000004ce32f76f867744bb3fb0d777ee4c245dcca3afbec0a8f4f853d5019d791fe52000000000e800000000200002000000003c29dff0623e75b3da3e5afeae9dcaac569e5719f1bc9665dc248ba05f0c3bc20000000bd4f0d3a6ce5061da45a43b01138b7cc233bb85423105deee635a89574bc84c7400000000a48df4f4cde8d26f30ca0a8c7642aa78916c8110b94f06cea5d504f8ef73a09e4627aaf0ec544e3cf0e1442fe08a336eaa3c9c9d70ebea2132b050c03a760fe iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f037e28240b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD9D5D81-1C33-11EF-83C2-E25BC60B6402} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422981243" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 3004 2524 iexplore.exe 28 PID 2524 wrote to memory of 3004 2524 iexplore.exe 28 PID 2524 wrote to memory of 3004 2524 iexplore.exe 28 PID 2524 wrote to memory of 3004 2524 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\795fee246cfe868a3e4510ed3f868b2c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5dea63073940912cc349501bb0210f56e
SHA12a03566ff4371d1a2da00bc90456424c1e981149
SHA256a183712574ba33480eac486df3e2353fd25f4faab2072a7078b27e54be225baf
SHA5125e4ae6ad07bb96e94c683822829e65e03951cd373be325ecb8afdab49e6ff3ab6f197d000f73d46b61d25f781d96ebc3d156bc710c9c24123f1c0cd214055e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5497554e914b8e472f68d27d581624a03
SHA1878326652c0f31612b6a4436e5ddad8ff8542e23
SHA2569910fb6f6d5e8537bdccd91c40be86c67a67787a7728abef80d52e54fb204ab9
SHA5127e7f296b2bccf98f2164daf65de209a8a0b206fa6e270f20d70d5b520051c70c992d363aa1052a9152f87ece1ba60b78591be401782beacdc19f253a7deb6811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea095f8850674b949927071620dd6f2b
SHA1ad59a511a216786f12137bacfd43766ada52cd37
SHA2560161e3c7e8ec75e718f429520416fa45b07b38f7bb60bb3335dbd5a7ac08d648
SHA512662ce8da54262826dbc5423310dcbc6bec25e33c5297c26f2d45bd131c5149454c13f89e20020c6878daca9293665ba70f5fd240377faf194f212b5e7d155ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3967b50ba493349bb04b0018fdbf3a2
SHA1eeb2468c2d0091bed0c7a9076b2becc810d1f4a8
SHA25696b79916896caffe576b19e40ae24b773bd02ba2ca4a480eddf2463efe1e4916
SHA5120ae27b03e6edd83899f88beb97921cfe70ea038fd2c3fb6fe9f61f136d1176d45085f0b5ba32fcdaebc23339c1766b3a9e69d086ffc48e717f42ce2a8cf1f5c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5231965b4fc34d6e5b244439dd0cfd073
SHA15f3a1c4e6fb423eca89ca39542fab6e5898dc034
SHA2566500207802a5c154e23cc8b15a2de3c62e0ec0ef2bfbf00c7de9d1f410ab91ae
SHA51224425815c125ea1834226eedc2b841fd7e604c1630e5880c4040afab43af0b31ef039cb44b799905f07cfac1398987584b5f7da2401a23a9578518728b9a988e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c919c881d331c08299c54617ff82eada
SHA14959e4448b2b4f344dbad5124f08b20889924567
SHA256eaa62de50257674b6b94d56fd420ab1d54759c1081e3c4ba0ee9393ad5c95bbe
SHA512718ba19a64f37dbc2f7cf2bc14afa673f7432ea9998b02624e465375e8c6f180fb3aae8189ca8481ec1f2153c16e04fcdae215d9705ca0cd6e97357bd66ce2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579e37bcb7b584a77300fa58b451528aa
SHA19c050f85a8e7a3d9209468fa4265076b2178ed15
SHA256ccda791ba8fd768fb4c05a77fce854586af1fe1bfda56e8f348e0d4e436b0431
SHA512082a2331a31b6b60bc6dbc6e1b22637afd59003a00e7fd3006812c8a4b8e33d6e6c4975e952350a12adf2943cc93ba05843562515e1470cd1bf272de95983637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c063e0eca2948e112a9285e185984f9
SHA1b71301690e280095fa8976a14642a39530f4b2a3
SHA2560c614c022750f0dd9941d5b70490a4515d3b5129c4f689359a4e382e2efa721e
SHA5124e6290d3154e9e74cf372f061b6b46d51c9b705eee4a639a9fa708decab0125e93b9afce6aa02a2076b8c07fb02d61fddb5471134dbd672342e38dbfb8c1f896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b83bf355ba136acfd2b4206fe4be5801
SHA18c4c4e9d60cd5e162eda70b87a696362b5e51781
SHA25621b7eda24235443610a9529aa70127b3836c6cd4af87edcf942d29034fc91766
SHA5121f26370148e2a6b2c2c1198d248fdae4f7b61dc1617371a8f5551f2f4cce4c5184f9aac7c6841dfb9265f672fbeb895c85c069041481beddd044c2241e03a1ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556621a1a4e332641e3bc95312f29668f
SHA14f6a52f67d51956f732fb8e49c498efb84eb0c80
SHA256932244bcf9f2f8f8280c1d36c4f29d957ce93110e49d56b86e17b1f7853db49d
SHA5127c01e048aa395bd22ccd335f46137743f5c12ef4c3735b6b678d4f30bd41dfa104c05c0e63269d599a3bc1a7a97171f6c682242649f7e1d598dc9c5ca8d3413b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad4d175b1fabd563ae73b1baf2cda6af
SHA1671a7ab61c4b2195a7d25635c118a485264904ea
SHA256d83518a9f67ec308a98f1a792dd32b586a03231a546f3f795225e6bcedda92c5
SHA51219ac4f51be27d0dba8de962c96ef7cf1ec1d76a7e0e577e586a8607191f6a12d775400b0c99c8f6d44d32bdd186f38d003fbf4aa3668f64f212d73533dbe5f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550eb50f8bc51ac91a19a0f7b54c33044
SHA1e7e1a089bd773b8c7ff21cfd06a6c4e9665097c6
SHA2569bbd84f0a0e372547dc9413a8128e95d70945e5b807d05d3b5414e4614c401a3
SHA5121a970f4c3e2d2f501ceca054616533e33462cdf98e3b017756ceadc47da6abab869bf5f3318a04e88c98a94c1444eed85d07bb8ff6a8ff8e6f67bab6ec097762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565c4e8d057ca3fc063d2e8afdd421e09
SHA11543480b5e67a9a69393a69fcad33d9a1fbc99b4
SHA256703a41a9ec361a2ad2f20ccd567bb57406aad72c3d804bda3955459178e268ab
SHA512112baafb5af42b93ff489d9f171cb47cf791911253b773294d124ca22305207d8efe6aa79f2f9225eb665c22533fbb4b145afa2d570b4b8985a184f3dee950b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c1f4b5f99d3129af26b47a2807c4ea4
SHA1530ca04880edc722d536c19107145195c2d96b00
SHA25668f7495c10a2d033fa25e9664796b221930d36719be17ae4967ca6f6a0bd79c5
SHA51234e40a936f4fe6598a45b029ae0224b9cd2f0c944e95b2570129985d2cbd5c627f54367447445a0b0968d783a28bbc1281a1292549d2ebbb580721d18faf7a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58484226c5583e789ee40ad2f64d9b316
SHA12b9f1900d0e7a385ef64d60304e8ce9bce04a912
SHA256fa2b58833626ef23ac4af5121ccaffbe570b229c2d27757f1fc2e38a73ba27f4
SHA51238c558c38eaca58b60a0e496497146d3c634bf4a0f5cfd08c863147a51b6d7a7d6f6d1d6bc5aedf41f7f404038d9d0f897d3850cefdcdce36c732c0a5510fea5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a