Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
7c500f0ae2f5f9e5fd79c9aa86af4b0d_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7c500f0ae2f5f9e5fd79c9aa86af4b0d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7c500f0ae2f5f9e5fd79c9aa86af4b0d_JaffaCakes118.html
-
Size
16KB
-
MD5
7c500f0ae2f5f9e5fd79c9aa86af4b0d
-
SHA1
58445dfda6d24e427cd2fbfa445ea7208143b114
-
SHA256
a92fb89bf1e236ce60c55f5e807bda015cfe499ce371ecb2484c298c056e1930
-
SHA512
33249ebbe1933dbacd3d40c40f87878de15f4c6ef73c91488e6cc291986327120d7d12a05c65c00a6035539f547fd8de1f5c93c7133c083022d6f60ffb82045f
-
SSDEEP
384:GNsvH640iqokFBT3+HuiBES5vNtgTs31yXKXwO8:cAPfVkFBT3+HR1tgTsEaXwP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423046630" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB4AEE71-1CCB-11EF-8B56-EE69C2CE6029} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c6eae7c901e44240902c4a2d43126e57000000000200000000001066000000010000200000007faba3c940cf01639e49ad19f1aa91b274f5f22788d68de382072a5b9d19fd98000000000e8000000002000020000000807d23e8d19abbc4d5c5bc052eeb5a04eada48e23bdde7ec823e1c6051ab0b3b200000003bfadcd0dd83d569c69d87b1c6cdf8d9137d15c1b6a6d4e2791121e1d798fc5e40000000a4a65deca4fa91be7d95737aa2fc9ee3695cc4f5798834a7bff89388b22f8a5ee62ea084b4c5c546e77a902e403fc966a912ffe407873644e086854400aaa234 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906f1ec2d8b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 3044 1620 iexplore.exe 28 PID 1620 wrote to memory of 3044 1620 iexplore.exe 28 PID 1620 wrote to memory of 3044 1620 iexplore.exe 28 PID 1620 wrote to memory of 3044 1620 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7c500f0ae2f5f9e5fd79c9aa86af4b0d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a511bc49ec1b915630706a24a365444b
SHA18e56683a155bd4a1ac8c51b7475482892656ca3d
SHA25691633fe4d966631f401cf5109cee2eb1fb158b8a538541ba784c2bacc9cff075
SHA5129a5a618f9df5f7c03a3b59c3b8645788b160eefa047d5a25b40b6a3e9d8415fc4d029f78f2a19a614204880c114e001e19b3aabc760bbd2122cb8e5b6b837aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5bff7f432d53ba27ddc2c5e0476ba52
SHA1ecb2d359448c0536d3a216d602ffba57de8a586f
SHA256f52ba054a9c56c8a5debc634cedb1befc72909913fdb959bc750d5153ec6c2ed
SHA5123a50b6f15dc7dfd99682c1bdd7e0020f3cffcff4bd89193a39af22dec910f701841c195dd1be3fb8864d773471aea5b01a0228c33b95ad50f43a7041ad29bfda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8d8016b87ba7bf4044f20fbdb143fc3
SHA1f0720390b4733213ea61f8222d4795fa57c2374d
SHA25639ab3c9786b9361c83c5e02ee5c038094e9c08b0fdb79d56b982e6e6739ffa10
SHA5127360aad51ae025c22111ed4f4eba32e2b3206d0c011563c9efefd43adf48bf2dfb8de79270419df706bd5366e5f67fa135c47692ce89b2c53a167ab3c9d3ee40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3501a947fb7a83b8e8ea71d57e08541
SHA19a275d065a70bbbcfee897568e163a1ed8b9f411
SHA2561ba3e951504855ab736e8028e4afe787239f09eaa4e71329b693b34fe3aa4905
SHA512696c9dd72fb7a302543f969321ac7d7c966ea192a34c43ae8188c4cddf7e6602136f04f2500bb5f636b0e3b1679b138f9a8ac04482e4745a39771434e732e290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5593ca88750c514a550a48cf6430c3271
SHA15fd881f96c351266a68f97e4f21b4e8add1dea9d
SHA256bb24f80207e5f80ce3db56b23115727e2374d9334ec26c1e45218b5dc5e3ce71
SHA512186b0c6373245784eb7ee1e4c62705718b15702eb558e05c0065e5070106b76e7f699d40382051c02fb9759a60f253a278293dc8743d313bedbe6890d6ceacc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541f99a3f4c1f26fdaf272579ecd52e9a
SHA1211bd56259e5c07de876daecf2745efacec94d61
SHA256f6ab731b93f6ccd2e56495286767e6d0f0df27f89bd3cfc4f3e3bfa71d21f597
SHA512fc265f76c61d4008d991257cf3b98cabb5567a085af945008f893dcdc29821aa59d5a8d289e3377a34f2dbe179641988442eb2156d2d9798438f745354b2b055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598f146fb900c6f45e1b4f453ef983d0a
SHA141513a8fa5b66877d86b031ad7175ce2667cb556
SHA25639aeb07c48dcd334a97b8df152c9b294ff55eac455e0e6b9b810e45ca119a319
SHA512e4b2332bf89bf643ac6f5b2de83cd094a4400d36e48ddc385b9fca282e4fb9f177977ed6d09d0dcca6f49558e68b92d9ba6957d7d4e181680eb20906708d2e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b27ea948dfae87d6a2f091aebc03f04
SHA1eb2a1011c83b3fd06c7e3f7bcd889fac117eb1a3
SHA25606b11ccbba9ced0634819c3a28aaf9c88f6f35974133266a725b23a7989e08ff
SHA5127ce4f5e0988fc96b1e9fbd8ea8ef8e11ec515662f07535414cf89a14d2cbe2c68b0de9ba5d2748ab0bfc7b2fbffbc41d50b99d11822d78e0f7eab8331cfde5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5873335c0614517766ccbb69395f6c7f5
SHA1f3845ed24d4350c34926322d135df3b51d61b0b3
SHA256ed620d0963b00d5618e460fcdf475d97ddd4316e937805e9986bdbbeec1c842c
SHA512625de12072540b83ad1123992654b5922ce5e75822c3272dc331156fda575f2c55265a58cccac07681afc8cd6706e5f5035029bc7778dbeac44ad780d2b7c2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2dc06f6d97a855837fc2d894b9c6b78
SHA1505f94bae543322a71832c6e4d0821ad9661d59c
SHA25666702e0888187a4cf4bfa42694ff5c710b3a521cd8ce2b8dc71340ed80abf44a
SHA51228e60d6c735b814c7183a9dbfd22075d8567d6c76a4a1983ff680bc441b3b492423c126bab44fecf7cd3b1a27708766d9b436321ebc21f3d4b78fb5d100c66e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a6008ddef287bee42ee29973cfbae02
SHA10c03ffd47b2daaa21bb7351ede28531dc51551ed
SHA25618462b45020e72d37448dccf78f2597e13864742048f3c5a507b20543eefb8c7
SHA5123f38ea23f52420281df265b0cd100b8d32dd114f1535c4183741edfaa917e84f79780dab7ade272bf856e2f20a517e052753be7d6912fe94fdc3e7f6d9934c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d9eae645776b32672dfd9b652fe3c86
SHA1cadf51f4ccc6e8b1e4abc7c61b172b2c44af04d1
SHA256595bc7f1bc27f279b7f4434f9f05e3b82a867b4229e26597becbc04373eb0543
SHA51200f3ec3b79830f0d55e0c28cc34ba260dede95a7c6e0e76f19113165d60897aeb802bb24d8a81532b29fb52da86df4e56281ef45d347811a6914bba2200cafda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9fb645cf9d31e9b5155dcdc723c4b95
SHA1783e38669e28ad0441e22e043cc7caf906da7daa
SHA25633585841b95c5c01177b2b538a99a99324f3b2fe86f266487be763360763fc58
SHA5121cdf7217f6656104d74eaab6d9e334d0979adf84ac35a3daf7439cd3eb124ed9a51cd3aa27879ad1d6e38069cd88af5ded3bb5c74605449b1c91ef84ece7b332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521c9fd0dad085f23bc2ba61dca0f466c
SHA1b1f9766d56f45ae9bc97827366ff75b157294da4
SHA2566826345a38225d26b5608e34a7f053cdadde8d6bbdb395d37be9cdcbfc3d6115
SHA5121aacfc61e45b20f414c32224e6373ea4c1584bc1c5dfc05e343591e565e09a3f3a199a44311a7360640b3c47d2f4227e17c89e406e40bf3afb8f30815c4c696b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52648a2954107839f9a290b6cfb4569a7
SHA1aaa67d0642e1ba6740f1262b911d61b0c0fac2aa
SHA256548950eb976d7554023d82cf2aa1de67c17d40551c9b87b9cfb8df2de4de79c8
SHA5121684c018628a4e5a015dbf983eea2ddfca19afabb2b11b3a9d6367e04d8068ca125945489a7c133ef00dad5e0ac7a6a63f523dc737c92c53c5722946570447a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56767ba59cb1503a505ef391c8822cdb5
SHA1602cf17e1b53f12c08ad41a68d048a96cf765536
SHA256a2dd7bf1a6040f53f33f3beabac794c9f915ecb2e9becc5a1ee3b65f1d780c74
SHA512925fb8ea2df64c8bc721734c4d50a627d6cd5dd016f3cedac7b16bd63b94d6bf565d5d8ed28cdb005b60008ef241c69ce642a221d9332f09e4cfeb1175ace4e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5000b44f0dd980bba7907001dc9d31254
SHA1d6453463a219a29c82e486217f8111a244303d07
SHA2565353d03d7857de6a51ebb97db0e3886cd1af9c3b02640f6ab27ade793015a57c
SHA512d8cd409def1cb1fa7cf3cec74bf1a290c1c35e928359dae1a4cbcad99c6346b049338571bf63dfb4eff3ee9ae96b402be7b83558cffa915dbd19f8c4b5e049f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565797816bcf6aa87a928977614e2b2dd
SHA12f7404ee9d4668f90dd150eb2453ddd771e14c40
SHA256c28daa3f6ae5950165d20138e4a2fd895eb3e14b8a4cf3ed88910ab961ed5138
SHA512c35ac054291b72d760659de48cd38640e7f9429eddb5f7ff497697bb9f7988d1b291c98a1438b5104ab7122e1195e9e8930b034c004e58f5cc3a8efb4ef89b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543790e3de07e1f98e801f5fafa3e9479
SHA1637dc749a5ab212415e69b1298a818665d95e1bf
SHA2563244ed0ceba0c746f327833709c75aac5d083f461635037ebc25270bebc4eb27
SHA512269069905961e6127420e40b846c04583beb8ad3d23b80bee73d7432d7a9b0f282b41077a80901e09fa83b1f6d5658eefd348bdbe3b313f02ee2d0a9addf6e31
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a