Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
7d0f3d2d20c47dcd584df356556f073f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7d0f3d2d20c47dcd584df356556f073f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7d0f3d2d20c47dcd584df356556f073f_JaffaCakes118.html
-
Size
463KB
-
MD5
7d0f3d2d20c47dcd584df356556f073f
-
SHA1
5c754a4bbbd5595b1e99d360604f2aef334091f5
-
SHA256
dc48d09ebdf394a2bb64370d1ded466b7960c3e8bc30e1ed3def5e1cc1c914a9
-
SHA512
7773a6d56519d819d2a777c16505b6594399e7f46857668a9a684fdbcaa044501ed9b319af73d35a9377f31f3b47602c0706d4f4ec9d58f833ae1f878c0b5110
-
SSDEEP
6144:SjsMYod+X3oI+YxsMYod+X3oI+YF5sMYod+X3oI+YLsMYod+X3oI+YQ:w5d+X3L5d+X3p5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423063488" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c001fd0300b1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e3abe9efd5c97c4c8d950b6a86c91e7600000000020000000000106600000001000020000000ff8c8344a6e59535ea86c41960c20028263ddd13bc8765c9037f5eeec7b71cdc000000000e800000000200002000000003d3f5cca9a3f1d2dd1f39ea215d25f6519dcc96e0b72da240d566d2c7060ee420000000e8a60772fc3bb2a1171ef35a2d7c0d8272c59c49ca09e8c42eeefb00f42b8e3a40000000975e98f60d0cf95c9ab5b6f17fe23d2c2f48cdee6560a08e0ff25bcea208321f747c1f20012eafeb4b7bf867f6e0f7b184f7440fbd721fbe498b6fe2d4387566 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B6CE451-1CF3-11EF-92D3-66DD11CD6629} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE 1116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1116 1728 iexplore.exe 28 PID 1728 wrote to memory of 1116 1728 iexplore.exe 28 PID 1728 wrote to memory of 1116 1728 iexplore.exe 28 PID 1728 wrote to memory of 1116 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7d0f3d2d20c47dcd584df356556f073f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594d83ef7371cf6cfa8f4d56d148d49be
SHA1eaa6a0a3967749b0e64281b1f96f62be7b609365
SHA256ace6f3f36d9876b4c1029e937458230f6f2f8b0e4865f0c4d6baf0995806a440
SHA51278eda8fef7708d6d67a075f16ecfe82ec75cb27edb98e93f9f98b29cfdb100ec4e323c738a2aa7df6905ea56b2ae943ae2e660e4dca06a4ed3b68e432fde5969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545dd6fd474e9f18a33e22ccf0764a7a1
SHA12f9252064a3b1c009dd65fd52cc7ade84957f0f7
SHA2560b6314cdb8f3b316f727e053bdb4ae956fdeb9b01678150c2078d504ebd02858
SHA5122d1ae182e84758ad7304edc354e67472a1bafda18069c2401e7eea01dd61a822306f628bbd1c46acf70e542ba8fb9dd0ef1012ed72fb1da672f7b13b2730c95e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a9c365882ef0b5b32bf0a87c2686885
SHA1d60b8af267cb6c7a9e6a6fe8f78107475da7c48a
SHA25647cbb9d3d1b9f25a7b0116048f1edb0a5e5be494e6ce12180e7e1e09b048edab
SHA512b2d69a5e851dd51969b0cc137cde10f8b775ef1eae561b2d41441c3df1ef0850776472a4dfee755b9c35714926b49b479ed094c9f810b6218249e177ede8ca97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557501a08af0f5b9acc339877fb98335f
SHA180a7b8039efd2f96d0e727bb8b47438da44e2d44
SHA25626a2571ae7aa6286f21c38dacda4952c554f709f6b38dcb9f36eb09b1781c5c6
SHA512f8cab689fea3faed6717b632ba72f248662d1ae4318fb9fba7f8a1a449bfbfe89c8f8cfb20befb688e185a78dc34c61874d54b21af6c993711e1383dea31a604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52febcb597896e2f2b77f6b0f538a3e0b
SHA117310333a3ae32151c803de5aa13f8bbb4a388af
SHA256b8bc831cf09dc733af534685851e694b595266b5eae8e69ad10a286b3a02b2b4
SHA512ab4c5232ff106aa100ed96fa26f51501ba676a5e7cd9103bfd8fb66f4dfb05ab175befd6fc143e8fb49c1028ea27adaea838e77de899aabfa831ecb198e7f7e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcd820dd3f790201e23bd1bbc96a6102
SHA1775de2fee14959963adac364b5b81ceb17b04b2f
SHA2561d000fb5e3592dfe1c5113f7ca130787720d774df683a811ffecc02f2def8e83
SHA512ded29681e54573287dfbe9107466137a8d198a36dc816c76cae6065a68c746d9ee78766ac0dfb68c37a809f66fb8bfe3dc5bc8b1325104a465120c1618380e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5348b50aedcf9e62c4d96be4ae43a98da
SHA181cac172d90f7af95a34fe5d3ca2a129a31c4b50
SHA25683321c67e2bcbe17beb6afd95c7cc876a7bd305e44cfb6e6bf1a40309c9b5b0a
SHA512f1c6f0652526180c6de4057ce39bcff8e2a1a277858547835b1afd15a6bce86f12971c413f61c46838b9364946b03589081944b481f01c40da2d5dea8c54a06b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5412f0ed89ae5b02faa8af68266504520
SHA1182094b3ec31a523efdee54389d734977af4ba74
SHA256e1de173b37cd39d4ebb6a0b9cc7c5b7d705832ed036891e1efa8d32c264ae4f3
SHA512df0a69a2cc1643eb4e47fd1198da1cfb516fa1b9f4b093d7653fc60a52b255dadc84e59217ccf486f18b0ed4caac4fed3fcea3ba470ce26dcc838b3bb06b5244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583ee86940fd2fd3932f6a5ef40eeb132
SHA1a305516f2c736c24ed88573118a8e17e8f9e0fce
SHA256b0885ff29200dc97bfbc869aa01ff1d6577f97b55122324959a9d29b34d01677
SHA5124d3673413851d3a591f6602d9d01682b88c76bafe755acf21425ed2a80f6fd8ea775815592180d0a3a123110ff720b13b6e52b772bee533e782cf63a593b0837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550e7a9f7e721fbcc89ecf06a3545cf5f
SHA196cd4e4948e58669b7563791ff7154f2665a1b2b
SHA25691089eb380a61e10a03d6a30caf784f447912806fe39fdf2ef9e28354b1972e6
SHA512375320ed6020fd6d0a8baad26d66de1ec445aa95c374996553d2490e4589eda480de88cae531846458954afb2f0212f917ea3ff70c87f401859fefe54c4e2a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e51486d8430cb2e9f9e2111e832cf6a5
SHA1adce9e3a70d44d58fb38ed45fca558db17d80cc6
SHA2565860e26600e501a6e35f8e7991b91c1b4753888fed7aef4047bc8dd4bc9e448d
SHA5128df56d079ccd4088570f6e44aaa3a64d7ce337985c016a18b077553c6d38f943e83e4cb77c80984f0571dad270434023ae09abe449798ef48c46e27797d43946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597f73dec226d8eca83a46a81521c331b
SHA1ea9e99090abe75fedfb544dae68462ed45c85c12
SHA256c219ddbe8129068d788d25dc5cf36800893819422626cc7f57cb26e627003d0f
SHA51257d4efb2f680c40b47782a64a8e52fa811fc847a33e5cef27cbb25870f4d35c149762c0da3526225e6aad4b1b2a53221dd7dce6c77ef84327d9863b02d4df6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a01472374eb5eb964d6b29822aa96022
SHA170245032fec775f474be19a5af2a803668002a48
SHA256e0127e75fb72fed2c3240f55fef3d675405a7e9e0d09238fa56cd9d0ceac02c3
SHA5121c9abb192122fba4b1877062303077d0a887d608ceebe6640c066e486a3260ef109e2c9f98872d7f8d4d9777883020ea3004635f0d0a643316b7b841b7b8b501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597239840bfb33b57d10a1b0bbb0618d3
SHA1a2baf575bbdc7dc30d0a4170a25f7851f5a5f19d
SHA256227a031d89521ab69d12b59ed5f667e57c031fd8229595295230fb2eec0e725a
SHA5122cc4a0c32f9685df13feb16cf10b5332060714952ea4ce13edb006ed8a0f9bc6a876f3529cc3de451a92d19e220a519ed9c3d5b3a68f28c0d385c033636113ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554451b5295dc2d454ecb24ae66dafb38
SHA11bcd50d0c4ccac56e0d068914085587ccf74ec8c
SHA256db381aa7ea304ea75afb2f5673cdce8d1ba5f8ac4107ba701bb6f6b84294556b
SHA5129c1219501dbaa0d8db41eb70a47b8e138715a1efc72676ee31db1ccd92dd1582ebec1c65b7979a06976d5341390b70b42f1c849ffddbb94933356c0f6a67e6e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51067fa1053c2059d0d049acae01509f8
SHA107a6fc359a7bb9369d4a18e65a8f78b7b20d3896
SHA2562cd1667d7a98fd2cfb0a64ed2012191d1e1032a970d144b5e9d2c1ec7a070534
SHA5128e516075ecee972965b6e79cfbd47be79f02baf2bb30343edc6324124f6c8abe7d9d5beea2c9115e6ef9bd3a7a7234fdee544555bde8783d702b0339301f63d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f625c8c2cb168778ff4f0772e9c8c1b
SHA10b9c7b82864798d2feb430b7de8ab24b2a5eebb7
SHA256de22111f82a1fbff2abf401834f54ad968ca22bab0903226d33ccf53d6e214c3
SHA512532123a4b9c13d18a478e756df4450c793d503cca61ba330d56c3232cec7934ad90bbdde7b560aa881146aa07260be437d690426ac114355b3ac9215734e9162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f24948d1d3949d9cada803a767d8f1cd
SHA11106db77224d230352645777de4ab463b5e0f8e6
SHA2566ff8a5fbf7747ce1f2cd9906d0c8523d9819e0f528d784b9985ed72f3a89003a
SHA51238013c9275daa02ebb81eb58ca82e9c9f0586ff75815c11fbbbd468e7e0ca9609ed8cc357c36deecf45d614a6efc06c1b14e0657a02afcca96db8bf5ad8382e7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a