Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
7f7bc0849b5c5e9df0e9ba32d9bb6ec8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7f7bc0849b5c5e9df0e9ba32d9bb6ec8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7f7bc0849b5c5e9df0e9ba32d9bb6ec8_JaffaCakes118.html
-
Size
70KB
-
MD5
7f7bc0849b5c5e9df0e9ba32d9bb6ec8
-
SHA1
04fd0d1fb8da0187ad2a3f0469b757b6487380a7
-
SHA256
590e4c45b25b471435c605b510dbd03b7a22db0de2b4831e2ab582f04c70341c
-
SHA512
2f91697b7c20761191c598fdc929db05da4b3157580dd6352ed7f0c5ffcc554c11f28898a50acc0a4c910ef87f186eed2303b928b7bc9701b8143154095260da
-
SSDEEP
768:JiXgcMWR3sI2PDDnd0g6KcBdX86T5oT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQv:JRwfDOTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0481ed77fb1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423118394" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{028FA6A1-1D73-11EF-B238-4AE872E97954} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d245912254f96a45b0590677e25d0e3d000000000200000000001066000000010000200000009162cfd2dd2e8005852579de2b1352d91caab6370734e4d6e4689838983df1b0000000000e8000000002000020000000b555d571607eab80745edaa00af4fb5c5f8c65a1f472bb36db14d541704ac83d2000000064714aa76523562a6eeae12d96d2772a0c22ff2a2a79335ef8cf739be62b5c34400000001f4e4d2569da4b7c545fef6e996ff091e7b7f35d13965aa79793944187b12ff4f3cf6559cb5a8fd3709d35788e4207734d703c6c5f947f386a6d9729d1191d40 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2476 1732 iexplore.exe 28 PID 1732 wrote to memory of 2476 1732 iexplore.exe 28 PID 1732 wrote to memory of 2476 1732 iexplore.exe 28 PID 1732 wrote to memory of 2476 1732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f7bc0849b5c5e9df0e9ba32d9bb6ec8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d378c2cf7546a538fd60fece51a61c
SHA12e6282cc06e72c0ab1da77a5cc41a2a9adada4b9
SHA2568c6dcfd9b32d4e852ae64cdf8f7f44d0a93b9b0e955a60c5e45fd9d860b37dda
SHA5128a5363d7f31816de670edce269fb2076c96a35efc39c6948b4f8de5b8d390aaf6ac55421c402978bb424c4d642987ab9db2506207cd78a5e18b9a0bd981fb4c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df62114e468f8b873de164b3172f8b2a
SHA1210dca64b4189e9e86320462bb79f036b236e318
SHA256e2aa379e17a06b5e56c69115a91253e3761fe4599f9ef3aec6c511f275343ae7
SHA512405f73e960148a7c790b24e8c8ab90fa823cae2e5f2c3dc90b731669736aba841fd6ecc0399a39f66ea0707eda881742929891a13f982f187cf47bf63e0435d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5438c316cd0f70cd5ba9578c4a9a45251
SHA1607b3c55ddef96dd52c76c0a9c3b6629fb4d9f8f
SHA256d58d5684452c0bfc6b1879ca9e2fe8297abf606c76ee65453f9cb7f7b6bbff4c
SHA512f41f080298bbd5b5c076b56c108163a061188b623eb1ac0819cc9fa404b95ab80443d015b52d38ef16125e4053d48dfc934bd3ebd0dbf6efd9967d6492475237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d82e61fc2f0b26d485d53dd5c07b529
SHA1ba2604ab35e669e609f6f81873146d13312e8a72
SHA2568494e5b17836ba5102e95ba3282024c7d594bced72b3a80c9539702a5a6510f9
SHA51271dc94d8f989959c239880a6079407dbfec8414dea7b714e3c35759e09dc9b713135fbc886d9d9c9ff2263a420fe2b869d24edede68c203fde1c47369d3ba082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce0b5d99581e9ceb09bea7cd5a05c997
SHA19a07e4fa4e712780ee20e328afe121154c284153
SHA256cb72b06e2dfbef46f3da49afd9e152a60c1585b82dd5c8128907a83fb04cc258
SHA512430482cdcfcaf21027012f14c1e60d78d23bd74d223a64ba369f0e7bae508d3833f18ec2c853b2d4a3240075e46da51186818c496858c504c59a8702549ff490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b28ed4c29df441f78e177290cdc03b92
SHA164922663ba5251a29c5146ec1c3e18a1275a48a2
SHA2564c593995e5788675562019756b3d6f8c84442b09984f2455c1459bced72fe158
SHA5126285139c9fbf2f260268fcf136e9ea7d9d33a35e1e0ca0fcbf1669fe959c7d315d935f9c7bc25c32d893cc357c7562ae47362dcf18c0bc9c51233192df8b036f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f78ce958316333f58556da108c94d8ee
SHA15b17f4df71862aa3cfe3b9e5fa7d9061c0fd522d
SHA256a69df187de56adeb668bca9ff3adaa81f10b4932875ffc3b53052b1ba4a041ed
SHA512e4bc5131c6c72440fb2f56f86528f4d996b364f2432fbf3bb9a96c3ddf43d7b759de58fe50eb104f2057ebf1aa9b0cd754309ffc8877f657c144339f25300364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b66c9f27ea1ca3bd5943a1558f9ce2
SHA18062c8a00c8c628d7250dd5d9c034900575d48e2
SHA256f490961c56735805116537014566d0b523e4459f0c3447cda13d451639ff1554
SHA5124e521e5c864b6831415f9a96492a2edf11abb49693dc0bc7fb92663b3807efdbeef3f86671823caef6852001e7623624efa0637a62f1a5d52cbaa619ba9abf55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ade2fec7ac4b3258f21458083e51be
SHA187855bb11bbf6f5abad36aee8919e55dafd4f13c
SHA25613082f0c6b038b586ea3a58e2d06110957d5e3c4a0cb5f936657826f233e9b43
SHA512bfc798535d88b7f9102214f4cac336e3871db9c0e4d714d81f855d26b0afb1c9fd42312db72240fc3a4d15e3677d2644a11afe2e9e5c924ba4cd7d8e280fa25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ff3a7f3bf393ce0c405137dee6a6b3a
SHA145564c909b0b47f9aa14698f1d9f922f19fe089e
SHA2563673cd189843767f07d6cef7c4af740b3d48dbbe2851f0bfcec1a06359701786
SHA512eda21069dc5e2d066cc6e89c1e816f923675d4eef7de4315893a060a586c16079df63b7a53799d6159fd786e56fb795dbe47264c18dafeef2e8b236eac4fc5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5529a44828da6dab008b97daf2f37502e
SHA1adfcdf8eee3de1c6c488292de9d99167d69328f0
SHA2568e4464f5eaf233e444ac58e142e36300e8f0c2a5ebc1edfa969db50680fdc2eb
SHA5129e792c1ff808e488fc8a67e0840e14bfc9cf40bea3e23ba0432505d971ae56c6138ab6153960d6fd2d0acc4ab3728c87010daf5504d2b0986c5b18c3abf79ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a837056f32fff0bb99ac3e7cbb5388
SHA12e867cece537f5c075f4769b4d4191049ce55196
SHA256a90d4c0d4828417787003e44a56104f9c09603f066a2e38b55d3969480ab56e5
SHA512f20962c6da1aaac46d4a6d0301b8c08896b2f0b9d5889ee0c072e628bd37498fd42175de56c3e8b7ea4ac60cd1870c3f04af51fec8ab946baabac1c0636da4b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564a24830985070a58b667bdaf6f4faab
SHA15a5ccda77a82900fcb1c2892cd1e117173f9d5e8
SHA256831d90321f98bbc22b8d363ce196c0850352232d368b9920e29f3b61e343908f
SHA5120cec971b6adcc4bddb2b470e636177925efeeea1b6ba8b9070bb88950c04ccbfd8398eacb2ee81ce2ecdf6dd0eeb3cc10c51c1c2322cde9eafbce0bf304cadbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575802f260137c76d269888e47c034937
SHA1073948197b7315b48f25af48dfea1fdd0fd2df8b
SHA2561ab558051c2e5d183964188d4d396cf6f3628975c4239ae112a2a8ce7120b59c
SHA5121a996969409ae765bf55a6d45b275997d9201e9b019ce9fc04150542549e800c8368be53c04f8816f1f3074e37832535278ca56aac76951066c2b017fcdb943c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d433b9f760edca946eadada419cd68
SHA1a480b70c65849db18578a82fa36e3f348dbdf02a
SHA2566b6413fa25a0f04210ea2581963a11eec44dc83b5d09e5c1db7a4af68bd47bed
SHA512cd26c79592f2aacdf9280e0c1e7ef18ae4d82be13d55e1459ef23b10090a6625cad0354adf77197c2b4cd5c3d3515360a3f2ac5e3cf51839d5c6ab78292b8bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8810fa7c05ae4e6eae1d40fda292cab
SHA1eb4bae02f9b22e64b91ab18f34d19b0523af3710
SHA2560d214864151727ead959bf31e10e3636b45aeca9757541359875945fca73f38f
SHA5125ca0c0ec5f00ed8e385c90767611b2fcb91ada17622588a3749b6eb6307e39099f6b866057308b3fd25fb9dcf887b62a6cbab005ca730456e151fe31d24cc19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535d18697ef91325cb6cbe4df15af3056
SHA1a773a238b85524578878905bc10f5e93db4ba7cb
SHA25663b385d7400d37368b66df7f1ee04122696e8b3af1a0369570ec8e6ff8c5691a
SHA5125e1bbf9221674f88facb07c7b5d55bc9ba69d3851880ce9a48502f8df45cfbe2e6f80a10dcdf7b08497d921d3cf7bd0df9e7fbdb1db8cd7f25b2d1914946c961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc25700397cfb6b3454fa99ce599ee44
SHA10c02513d5458f9eb4eb4f0db93b547443e17ba94
SHA2563d1b77575e25b6c907abffeb0a0ba27f3b3bdbe173817eeae984f3cbb700a594
SHA5129211726df1dbb42e30a880f1062c8d99a6111890df1097f57073c558a1d698bff83e39aeef18c2017be8dc74fc00f4f109fbe664e9ac585c4794679cb09b5a84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a37d9102f5eb96988ff4b47f7d98c41
SHA1fcb91362a4708e7a340ae653908b18f8040a0e69
SHA25657391254d28ea6a6d7e32a443d9ed04262b0901949c5e75cef722437b87350fc
SHA51208c0ff5c65e66ab1aaa5e2f9cbfa10e42c473880be06a1f534ceb9b1b7cdc5beb2bed5fdf95d900c055bd13770d9b3cba07dcd94b05ef4b0e9a27b219264d736
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b