Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
7bc6597206abfb076fd17497b25aac2b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7bc6597206abfb076fd17497b25aac2b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7bc6597206abfb076fd17497b25aac2b_JaffaCakes118.html
-
Size
460KB
-
MD5
7bc6597206abfb076fd17497b25aac2b
-
SHA1
e23d420b0725708846ff3dd9f0f595b77592ee69
-
SHA256
3678363afa680d6c27f7a33a8a5c2d8dbabc630ba25ec95e83d35746ef568309
-
SHA512
819f2c550f338cecc2e5af59b04d76ba2cddd8259584fdb7bd13a5e14ea615561480f9e09c84bf1e4620e7078987ba0b5038d665f56fc5ef4e9808e1e5d8e348
-
SSDEEP
6144:SMsMYod+X3oI+YZsMYod+X3oI+YQsMYod+X3oI+YLsMYod+X3oI+YQ:R5d+X375d+X3Y5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423034107" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000002c8e7a96d410950360175dd10aea78df306ca675dfde80f55b5c0d2a0de90d8a000000000e8000000002000020000000a972a0d879a4a657f0e5305554b955c8ece1786672d5f82e8bc4b16331195fd320000000a2ad57c5fa2abbf09147e32961e6254ed1333d16875edbd1a2661c0e7b8524124000000012cdeae5f44a0f3f02e5da87c486a622afb3765e96f932a93234374dc2b78fcfbb06f63dc4a6f70aab724944bbcdf9694c258afa10e6c49b34856b7c114def6d iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3015B61-1CAE-11EF-BDA8-6EB0E89E4FD1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d8ac9bbbb0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2980 2940 iexplore.exe 28 PID 2940 wrote to memory of 2980 2940 iexplore.exe 28 PID 2940 wrote to memory of 2980 2940 iexplore.exe 28 PID 2940 wrote to memory of 2980 2940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7bc6597206abfb076fd17497b25aac2b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aaa1eb03b7052e94d2c0f8de7eb8a48
SHA1bf549ddf53f9f6c184ecd287b69a2697ee4a51cb
SHA256d24a9415b51b87cb664c49942ad29504e0f2a0b3fe05acacb21af2589162ea7e
SHA51250acd7b90b0d8d265220a10ae8821b137da64ae0f847b8e4c9bae69d47caa6cd46401fc55ad69ccfafdb618474b5009092423bc02ca6c413063e4913f2c32485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c0619f1263bfcf70f4b6b3cbd088bbc
SHA1ec8be1d1206b483100151d99285d552da63dedfd
SHA2567aa2170ceb72e1a3f6bdf77b29a0f8819d1d2fedfb46c024dd5e0c7a8b82d857
SHA512ab922a8a8510db499ba1a369779f07f05f3906d84410fb6805f427fd7fa06a70934ebc0f4dccac32a0aef431ec7adf3b3e5a99698b8960c49be17e5150afa48d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f3ede924d69d57c9a2b2d3efb5f08d6
SHA18a3d9274da7ff1de845f625ea88a8f8ac59660c9
SHA2564d65c5cf145f12d9675791c7e6689b1e0e7c10f58e4744aee18cfd150ed28b09
SHA5125e4843ce1dbbab9c32b9fdfb992f67b9a1d7e39d411d34a874f79df0dff333312944005cc45ff4ae1e09e6cf68b878a315f7720c09b5f53fc7f4358553e6d908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f13a481f1567d00ccce97bd8d507a8b
SHA1f9e5e8949ab5009a2255801cb1d178e9035d6625
SHA2567f9b2ffaa5396ef7eab326f99ad0c6011021d99e89f78c2985ddd235055e84dc
SHA512079badf292a6fe560cc4a6870bc172ac4e8a41c8880339a3638c58c1335719c4fcbb8fd8ec37e7c0aac7e146890cea7555d23d1aa1ad892f5964e404f9549b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f20491295079c6bd87a8e3998cd5b8b5
SHA120037266c1d922ca2faef9403036334fdcd3b32a
SHA256e9e27744b772ec364abdd43ab329a169dd8fbf0b31fa27ad6ba50018322e21e4
SHA51244dcbb5b4df094df4ba70b6c74bd1b99a96a876ffe65767449c7b1c22d39bed90da84d404c640d91643e5a22823430f9541b1b902eff0926e8fb25b0810b6baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50de1ca57b0388520f44da632e1d241fc
SHA1e0b37e5fb9de179645d27f32e2ca998c39883a0f
SHA256d8a678790d0bc0042dd0d80adf33ab2cdce8403e2baa387b1f9790a26f793479
SHA5122068980bdd71611adf14c9ee6d8ed6bc69043fed6459b92eab0cfde9d6a01763e537e89e27c9d6930c0a6677e8bf31a697f4bbc5280a755814a143e6614baa76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a167cc158453595f7d64b67e4bc79016
SHA1134d94b6b4390879430f5d15574f726ab6d75e96
SHA256ef0adf74cca5fd63ec0ca56a790981fef4bf1c977b710e9dce30e4525aed352c
SHA5123e89a3ecf8dece2c97dec5391f2ce1c328a98e52bfc0771fd462ac48cf85b28757ff0e9ef481700b6440b5c1c00ae31cdb0332f90287bbe66fe2cf3dd4795d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51029f4651d962038b1ea91547cb3dfb8
SHA185169c9ec5876c725f3e09d0f6b5e9bf1ef8671c
SHA256d1287a8c6df6f19f39f4d514ad346c88c4149f1707f89c96df09d340d139847e
SHA51288c8ae545ea63704bbf7e9ff4b232ef070de416948f642d4c8f2fc2d8ca30dd20dd9776e681b58a1e26157d444ceb0fea0b53b8e4507d40a76c89ce40d648640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0b420c71b9c0cfa21641517f865be92
SHA1ad0ff5f8e4c8494ec96b3bad749754f6670fc621
SHA256784c40062f5d11ccbca93b28d2f3bdb04b91e9cbc452eca2d0f8cd05b828689b
SHA512ead4107ee9a77de888f8345d5e4f57ad25e8ff0eb6f643b4d88efdf4127ba0210f990f0d36650ad13d1590760a10eacb756386ae18f836bca56ba7ec6e8d730d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582608686f49ec72336643e51b7bce66f
SHA1171fe10f32caeae98ee082ea51056a5299c99636
SHA2564a784dcca6e4cc740f0560cb4bf994eb622064509cddb9ae3299e22039dfa7e2
SHA51258e7b68f2142e8aad53dee72ce3d742f04b4a6fd500e12cc6a45bd6b42437386c8fd138570f1d7fadaf9fbd09217e63c20e802644ab90ea0709c7c43136f0b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c45c2f7dd87850b61aa8ab9dfd538a1
SHA1242d820da8682b259a60b82f3f41ffa4b1ddfa39
SHA25664d39a6d5a47b7c4b281cd7537908c7054d1e32014226f432bb336b7cd66f519
SHA512faa3a6ce48a21798711c6a0182f9653a02ec73f50f9c34f9e3d2646f5ff7a1ac8e320292822dca7dbd35f2d566ba02d6275b914988f39f5141e965a4eebccbad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbe22f17159a2c16a212cc50fb05eb0b
SHA1aabe78dcd6ec9a4ba491e0a182e8f9f8c7bcadbc
SHA2569a15a11e480cc85e7db0144c0c4849943ee40bac225d5f6c1fcf84e1b8931ad6
SHA512face42fd005b9e5e8aaab9d7062b61fa85c32c1cc1d75439be6d1a985a73c421a4b2b6da0ffe2808f68224656b96f5b907833459488417e7a5a08295a1b1e0c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581d3163bc44e3d4ee894b7ad6a16c6c9
SHA166b8f1ad96ec84b09dc13a319ce3ba048949606a
SHA25683fa90be08c612640adfd1ef784bc7d7d99a98182fe4afe08ed1870d045e99c1
SHA51268df17dc5f98b2b124657cb1ee84d466ad02a18d6bb205365453d3cf15ec8704c40346c02bd535da2c6d07a8c13d18d05ffc0c49f06e9e0dd52541291bf967dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bb3342ea3015d7bbe99a61aab6e5906
SHA1588a777cc8a68e8bc0d5be15547f029fab718538
SHA25631c051f4799a1514725cfc6db0dacb51a0dd45ccbfbeb0ce08f2a982ea5946dc
SHA512f36ba859a0dca35a2f814c6bc51f13ebbe1e1d0f2cec1adafaa84b2d0af9fcae6cde3edd1ada40387656412a52bc2c71aa6866acd548aaa92825784cc8cfbc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c007a6a702277830b62ec82e2e0db1d4
SHA1cec495a03174d701594c69b886cf300e3f339be4
SHA256a73801ad5e19ca81007bc07273678a063b98e77285320cab3431cb083c3df8b2
SHA5128d22a094ee10bc2b9641bd5e22e68be78843f5a0a5ebce1d02f267d4be7eee4de49301cfe9f3942a172f1e791983d5f52c3e971a4a7a0c207195e239dbcefb18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576a9e454d047929e494031e4045e5eee
SHA1026518ff9fd4b33ef371f40f2722a428880a2a9e
SHA2564c1bb37794d11b24b21dbff43fc6747c60194edc5782904d76522ac735d81d68
SHA512f57e62658f116a52459c9ccc541d1f883b793e57aeb646178b3f423dcf35dde736f69e194bae182e10d8d413b5370428cf9db6c9f0772297ca9f30229d40ffe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c71777ae64366af982beb38162a8a017
SHA1e6e2d05bc121505c8bd9bf0dbd9f63af8cdc8c0c
SHA2565e2ae5f6d612e30b5999eff9e096e89bf92c897b665cfa2899c6648f6151316a
SHA512751698a82ba49f64670fca027045410090eae27d182959a7cfd5b74e0b5d5bbdf4ce40631b729674290825f880ca871015bef1bd369d0b00aa48b4e8d9cace5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dbcaf2c9983ee89876d0863c0e86a80
SHA1a3c6534ca8df6601164ff4b59cee5e55dea08d06
SHA2566ea372a8df3c1267cb573f20696028e74c09bf099c89f1419aac497fa94d137e
SHA512da671309a45908bed891100fbfc64421ad6814bef4e8137a1da63d850c98c1f662c019c3fa5d0420447597424e1403d307f990cb93708ec2465ed1cef3a00392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2d827039c08d44956979dba97f76e9b
SHA12bef26cf57a527af44f9657b5710b5ec0da27b44
SHA256af3cbcc97fdc6390b6dfbc66372d25a4a9d0072669a90a49651a7c10436ae130
SHA512ada82f109713da1a0ed4d1864c1fe7095dbabb3633b5416ae64667cb24b9db2c9084d822b378eb77cdaace4fd1b9e9a41fb766f386ce085f507c62feae712568
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a