Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
7c4673efefa50608df855a1f4040e267_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7c4673efefa50608df855a1f4040e267_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7c4673efefa50608df855a1f4040e267_JaffaCakes118.html
-
Size
461KB
-
MD5
7c4673efefa50608df855a1f4040e267
-
SHA1
37ecf0cb8e89cd995969b8b0760540a9d328a7f5
-
SHA256
657567488239ac2f2a66748e7db95687b9f817f21f84255a2dfd47217ffb2b26
-
SHA512
a51dc6e680e65a1f1803885cdf854b2e3e140e9e8186b994417a151994f0e6235f9e63d355691b5d1c03ec05cb6f86c481b06d46f6f8694ad19cb60a9916a4b0
-
SSDEEP
6144:SssMYod+X3oI+YFsMYod+X3oI+YqsMYod+X3oI+YLsMYod+X3oI+YQ:/5d+X3L5d+X325d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423045656" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 702f557fd6b0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a69260b98522794b9defd9ebe1e4f4a1000000000200000000001066000000010000200000000edc57ddfafe9f96942f50c98251906c8c1ecd9b36d7218e3477886b57c7bb90000000000e80000000020000200000003b3b7982fd0cee88bc182d9cf320e432f408d21b04277d4a721a6022c722b67920000000973a6de10113ba934e5d1057fec7301b94fda29fdeb714c989eabe8d56b8a554400000004e49263add85ebc8dc1978d703483e335f1c585b68ab61fe2afa84b3e5354d70f30b22e11e184bccfbb979c2c5aa2f2bd9c1428c8bd5b2b7b1101ae3cc29ed7a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6C32DA1-1CC9-11EF-B54F-5EB6CE0B107A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 3044 3064 iexplore.exe 28 PID 3064 wrote to memory of 3044 3064 iexplore.exe 28 PID 3064 wrote to memory of 3044 3064 iexplore.exe 28 PID 3064 wrote to memory of 3044 3064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7c4673efefa50608df855a1f4040e267_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a141b46da8845df29003ab98f793927
SHA14552ed41db9a236501bc605f5a44f9e4e043608f
SHA2561deca781a22c98f8b52bc040c536a45869b5a274de06f8917a923b53a6459a68
SHA5127dd498836f262a0719102a0f0af72214b0eeafe0efd67a26aa25d367cb9f36e84c6f9166f9b3944208cac63c133693c50682909282d648ab7adab5fcfba8e5d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ef80b16af6ab5aeec9aca404ceba633
SHA12fc8f5c8358d4bb8815767b4c45789137216d098
SHA256679e21ed6bd688f58b03768073673336b1faa76b9b3f527a7ca693e779c4fccc
SHA512384bca1224b652fda6ee3418e74139baee94baf8ca23d9e0868a902f1370793eae9af737646ef0b90e821cac8702447badcda26ed3af9649d302cab4142b9c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b334a8fc53ccb09440391c7a6bf7ac1c
SHA1b16e6f66f7857769689bb2820e9b084459adf0c2
SHA256f6bb87f83b5bd4953c43ec3f21dcc6b545b497a4dbf6c26e330c1af8a059df44
SHA5127c115ca649c1a5d527a4c41016dcf6a0f86d2bd0864412382cddc11e5db088f5a0562ec66c9f135bce19f50bf79605681c73bf21748ff7fc27c77932f979194d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb6aa58fc81dad3467fb8d24c7de9b95
SHA1a875afc1bf8302feb0592b8be0251e2460bab416
SHA25615229a4379e9ba3a080badaa91341e7badec0406d392077228b4d0cc88c9e5fc
SHA512ed414beeba3bf6848ebffa82ab90bac373c9f24316e093ee8a9155c9a846e5bc7658925cbec0b85ffab50b27202b1434d6db566a07756c8a85f0e37de68ac067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c0f8e5338b7bd6fc21d4fe7c8bb4b72
SHA12d1c618f182f2d24b3a5fc6a13bdcb6c95080acc
SHA256352f93d159618428f6c7ad655b327c998638aa88bba1b3e8470c8a196ab2cf4c
SHA5124591c862e05effee89cfc59f7dc773236cd3d7efd1283f23dc55df39fb87ad4f7605afa568c32f2e542425a9be494f23b19dc307ad26cc77d7db80c10ad24c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb1730313119fe1c90313f05e2708a16
SHA136065debdee2632625564741c2f2edec46b82dfe
SHA25683db368cf20bccc57d8b50c57472f9431210ec54ad32f0c1a934773593f712aa
SHA512ba956942130ad2c11c991fa6ea70b070fafc9497fe8aca1f5c5e00abbee14eb3f8fd9c5b2579ee26e5beeb253f4b71b0b17b12d9dc1e9c0221bb5005ed28802f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d1abc292ac4860b8799dd56a934a6a3
SHA106013640117fdc458a27c531428fa2e834cc4de0
SHA2567c332f847e08f5e71b2c5230c9e30db22c0121ef4d320017b6c626f9b56d913c
SHA51255e56eede5e36428542609338b4bbb36961d1f5d6b89422b21c38d7ef1a73ef9a6f8e2ed487040b7d451f596929200622a4ea0d0a3f40fb3ceb850a9a9c8dc6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a10e5fde236d9d8853bdbd626758ceb7
SHA11a4422e21eceb3f44113c8ac41fe131319bf3ae4
SHA2567194b24fd5e982965355915500805837b6f2c40c4a8b3d1a42634e48d4dd50e2
SHA51248b7ffdaca78a08df1c226bb8b5a94ec0eb02ee917847bde43100a58a334c195d27ccaca0458987207ee4b5cd7dd2d23a5cebb1daa77df711de40c627e15032d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531021798188b22ad94fffc932a8886c6
SHA18f52d0fd7b79e1d5402f2b50f353c477c29e9fe0
SHA2563b40d533977c26dfa9ee2c0e74fd76a607fa0d0cb276defca369bd714909ed96
SHA5127e66f1f77da8efa4e1b5a8c83e5a47a38f789fa6eb0b8a22eaef647288e50dae144be2ce73f5af937c8ebe182d1a102cf138c294d5e033d34dd0f09aea912645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5901e86a5321d3d2c59d71a3e081e9f02
SHA1beefa2e61d8755d62b9b858e3e82cbed857017bf
SHA2565ef965374ddd823055b59badfca132b5284e616a51196d4d84ad8de34f52b9c0
SHA512adf81d04a42d0aec1069714b7edcbe95dc6a604fe328a005e7cb1c465c01fa3bc5bc15b6acab2bfc9dc56138c04af0505c036ac95f776bfa68186890c0e1616a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5609aa7d4498bcae5bb07fb5fd5ddc4
SHA1f7b86decd321b99a1290ff120a01eb60ad9fc84b
SHA25628075848cd061251bbf16bf60a495f14b0dd4fb45b10dad50389636f4eccd9b4
SHA51286a9778451b2919cf5ee62a56e52452a4e5230a8089e34d05bc038974cb41192243a879c685ec471dc599da19bd9ea6abcfa3bd378a73d7e5a7409c9551acfb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e3946c03a399c2037f820ae11e8edb9
SHA1afab4a8bc453b3bb0d875dcb1dad16fa003bf346
SHA256699cc0484ce03a5b4751e3367adf8b3f6f120b4f538db69872063fe3846137e1
SHA512c672aec529bc2d9cb907cc015f42a58fad2ea0549f8177ce9740ed1e7d1d28391b5b0f64a50ec90a7aa137fb636c2260820cee2039838cf8e8cb521d5a3fb0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5244f7a9f015356989c010b88c3d7c589
SHA162a749605065f313866cb89df4ed20aa322fa405
SHA2569171d79782fb03a53143d27d42e9869639c7d436c031ad3fcfad9a9fb977d7c3
SHA51230718aabd3754e2c5999be2c103240b6c0cc164db89e7aa1e58e76f0864af168ba9cf496d09fcea3132a8b8fc503d6d3b6bd13c9e0511e918cf10be033b35d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af6426e693511e1395b62fd3cf8d8b16
SHA1782bbd51f4eb1561aa7080909cd705033fca2853
SHA256a220bf27433cd11baa203c6767b16e352e99478c304cdcb1d0b23b145121bbb4
SHA5120b7a7c6e384f94272ae6a4427844a8cc51d460e1e4e364b2072f35f07b4b75f7ba427dbeefd7c9cf477013df9891dede3f24bcd2920dda1c001eff9210d1f2c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53308600d649d61b50c023d921afaaca1
SHA1626205984d6887b107d5b266d87fb16b3a0ee673
SHA256a88ed2aca44e271edcf530a8bcd7658eef6cfcda758572a4ebd54dd9f93058a4
SHA512d8dad8591b2ad202deb6a436cfc6c27a1f5ca1f1f026d2a11795e313e37371ce8777123a1ca4555f6b3c908683d0ffd7909369895cb87ce8c42dc4c76d07fafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f0456824e804477770b5542638fbfe5
SHA140a2e954201bc6a39072d9dada3fbecc657ecf5d
SHA2563ce1621217a014e7e69c077f2220c369ac655bfac0375b35253e9e0ceca1a250
SHA512bacc7c5af261d0c0c0610127f5d2190e5e3e66b625a60f44d06617c499c0993d99a08df85cce7109f24ba8594b6f100d3b3fd2e4942ae7e730900902464c0537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2495488447544fa16546488bcade687
SHA10b67e1fb5fe4b25196f7de1feb9da82bec5d9eec
SHA25605c363f2a93590f910921099588b7f26a8e30c4178bf842d7b7f51b84f104600
SHA51216aae56324b37e3fe6319c107e746943234f780ec2a2111ba3f899cca1fb8bbf35c9c1e8d40f665505b8a903d8646d1f7fc2e05653eca0368acd33b64b9d62aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba2545d42ac63dc30b04dce93ac5ca48
SHA1a769b038781a9fcf3a870c5fff5b8391c70583ee
SHA2569dd2c5a2b6f46541f90596ba555d8395f33c396e307615b1a84c6d9432ef9bea
SHA51244f21355828ad0ee2dfbc3dae6686e09ee320796f7fc60078b5dc757643d575474755e3a90c69eadfe4b3d9ab0999f44c5d5509e64b876dc2749b4a2d85a8f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e3d2964300283dfeda501054a32be5a
SHA141e355c2d417418443e4f4ca711c72b5ceef031e
SHA256f239e504737817a9d9c8bccceb462aca85cc93e21a0571228104edf54a1605fd
SHA512f3ec356c2bae126669cb76016c36ee2399ecb809503a556425972bc26e0ea36ccb241720fa8f481fe9ac544d9653b373083fb15c775f30891cc8fdc36e9e6f61
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a