Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
802b3952b40a078f2e10565ae76b20f3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
802b3952b40a078f2e10565ae76b20f3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
802b3952b40a078f2e10565ae76b20f3_JaffaCakes118.html
-
Size
4KB
-
MD5
802b3952b40a078f2e10565ae76b20f3
-
SHA1
beabd9a1e315f1b169b5817492f88eb019d3a6c3
-
SHA256
3c97f7752427e8e22e3b933c124bf702515e0ef7785212010d9d5ae2a7ddb695
-
SHA512
13edf8e5b4af8886af9dd6712420e09bf3bbce47f8e45163bba79c356f64359094c0197a19f5f4e15916aa11f5601152bc02b9d11cba6ad965d593e4b4fb5d92
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oZE78Dj+:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423134685" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1009e4c4a5b1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004253e2e83ef11640be8a9950260a87b9000000000200000000001066000000010000200000004cb071bef49cb7b09c88f7fa51df74c877533b7b9817c0a6138b6de47117aae4000000000e80000000020000200000002744dba456a3068aff353eb594e38d299bf21bc45ce8ca3fbe4ce05b4ae058b12000000029eba2a02c58a2dc3f698bbe3b69e4d62cf54f0c8f9909f3878e40d6df6ab08f400000007837f31f36284ca27b8e1bbd236434332e4e6b97b9d88dd787aa747dc6aac6215a733a4efc03327cf714d27c3bc0493b732f56801e6c384e665225880069de0a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F04019F1-1D98-11EF-8A46-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 3056 3020 iexplore.exe 28 PID 3020 wrote to memory of 3056 3020 iexplore.exe 28 PID 3020 wrote to memory of 3056 3020 iexplore.exe 28 PID 3020 wrote to memory of 3056 3020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\802b3952b40a078f2e10565ae76b20f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57551b3159e8e5a16407c8f4e6aa75041
SHA19f7d4d4ba70decdf89d96043a360f64bdf964993
SHA256b21f9dad1b829c8821bd2f648d21d8e8f7da58099610c98bfb75db47258a971b
SHA512d1ebdf6334312d3fbd3cbbabbe0f787539c2f748d34e1bd6bf097f2b3e8ef867f4f409ea8b142931c6079ed3bf9c2f191dd951d84349edbf0d65d0ab2b34149f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b193777478b2d40b1789f1e7b6ec95
SHA196ce5c4b388b0e7a89900bd309e80bee9dbdaa45
SHA256b0b5dbfd9d4fd5a60e99b9ff47d9a4553fb8a05af73801f970dacb8e9b249380
SHA512574fd02b4fdee5eb5fd611dd8efa3f74b1aa80bda1d73bddbb6d908a3be5c1b95c0e74c945ee6801e879223eeaf750deda28cf2fddbb3538b9067161c270b4dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a9d534372f6f5a20e657de91533034
SHA12fe942238f36db4086a96b774c5d57fc4219b5c2
SHA2568be552336fe24f73a09f2b0760aaccf002e0f67a395b0018e081bbbb9077ddc3
SHA5123bf49e21eae58e347294d410e005acd0bcf12c7d97d022a38e0e2e58b0d1da7e20cbc0b1a47c387cfe1625a4c81418a8804acb5c2fafd0775ca6822906de4305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f627d6b4d9464838b903db53e668d1f
SHA1beb76a93d19cf9cd67ca8290d973877fd549571e
SHA25681334ea94787e567a68df2e68231b163de5d1ce6ba743ea2f465a947971add8e
SHA5121671db4d5c2b8f3d64d0853fd57f1d6964816813e1d795d06546cc3e5c795e5225ebc8fa8982730346eb1018cacc82446c8db734c6c78e449f05d5821995fe47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d59fc8a6ef0c1aa39abd819b5dd2db7c
SHA1324f8cc2cf0a8161ee30d2d785ed5550a56967a0
SHA2560c0ef858fe6daaa25dcfeb22fac6a440523828263accb8c7435269cafa61786b
SHA512f529dd10271d49baa1494c2c3ac96397d04fc9b485ff2b1aee53179baad1a00ad3cc9ee7e520909d00c97c56d2d478d99e9e60c733c199c3a54f7b0f26b82f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f79984d5747aa28171f8605f7b5cf5a2
SHA1b163e6c3cffa8e51dd75dff639412dd717e306f2
SHA256bb3c4d01d656fd5be8fa221d55351b6d96497a3409b26ec6bd073065a37bef17
SHA51292eb5c95e514d9d67862313779e319d360a00877ba9aea885c08f420ec07ac80311e8e48f00332cf6aa54f69f5e385808c4a4241bcaa03ca8051bf7e808fff2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa5b43b477f6a6ac2493bff577262994
SHA19db7f0f6026ef8b41e44092fef0ae9fe326ec907
SHA25675aa64e62033faa85bed38db0d1dbf6abdf456b95f4a69c33eaabd89ebb3c26c
SHA512f0961090856427c818e60ffc76d2f808904f71a70773a0cbc2bbf365b8536f86fe216fd71e8de4c5e41a063a49bca65f91eec69282e0829ff9591c34330d979b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d045e0f1236d3d4bc42d7a4f96ddfac0
SHA1eaecfce7bf634006ac76aaee92d48e676df405b0
SHA25618d1699ef38e0216082b93bace2ae107dabb12954449a2c3d4317c9c70b45035
SHA512ddc555c58b2e5ef438ab54f39b8aecd41f7757ec9aa8f03c9cb8c30d02bdae5a97aa708cb96f7d5596375550d363cefa379566009e47f839b3f8256af3207b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa90a2b5e95f3488bed0f1b8702371f
SHA1a6541a0c31d390c247976b32b1095ceb89cb4c39
SHA256b9b40bab7f660c1ddbfa69ab03b3045070820d71d545c41a487be35628b6d068
SHA5121753d02e6a5c2ee159d94d5cd8a69138c105630329e3389ae7283ac01beacb39653b9b2c9ff4f7fafb54002565a5c6d95d80863080bb83df0aa269edb3b9afd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afb63df753b538b8c6e8f359c2ab939a
SHA14180ab616e0cf058d0d62d3eb6601233361fc1ea
SHA25682968e19b8239385950a68dc66dc09a4c87f3e4b6b161328f503cd2cdaa8e2bf
SHA512da08388849e51682b62fb5c6369dcf7ad546de8fef60784ee1ac5a6c9c87390235a79aaacb80ba1c63f42485d6169f8fbeafe7a1534c59d8907f79ebb3a486ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51769d62fe0980d291d6f07900db79486
SHA13ef63a6feb4af0989127a7d37ba0b40bd10950da
SHA256f17314a8baad0f574c2fa8ccbdaaa1f1a4db790cdd23a502516d7906c0b3181b
SHA51247c04a13f88141e74153218b8640244f1b46e1aaff70bacf757498bce997fae059e9df9f88be78f79ff3172435e93ca891cb5a5266a0b38961f2ed0d751e683f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1959f665eded12780f25464f287df17
SHA1dc4478b176aaf8612e945e0c65e9f4889af64107
SHA25690f556b0e01dc9edcad556b1a82a12d062e744a7d622de6b43d145440b76d16b
SHA512be0b7c70b58089ec8ed374da4b399f80fc42891363420155577b9e8dc5ae35a37b8a6b7b98155e013a9b847d6c6110bfb6fc1cc89dd133072491861dc5130601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e09093b360e54f3ae4fbdcf4c586cc1
SHA199ef708693cba7c44a3bd295e04dee4996ba2e37
SHA2560315f329b12f4e617dfc9e68b8a7cfdb132c57b60a1417b088be60d0726ae2bb
SHA51296edc37c69ebce44270ebf503e4bca6ff73ec9318f30ebbd3703d37342269456e1a4a078c7c7a119aef4f262ac33daea71a29e6e8e431d40d0bd23eb66a44564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d671d3c9c96d901c23782588db9cdb99
SHA1d44aa8a08362a8bfe6ff5dbbc1f626269a475385
SHA25674cd462749f4d975d4cc18e01250c4fb8d2b1bb1e3f8cb3ce6356827bfd8d3d5
SHA512add17a6df7420e3686be836ba66758327eaa139efc22f74744c22d6e6383f61e1d553c363a4e296d5cb8dc5be99c60521efb306be78731eb3a541f35a05dddf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e1c8f5be0ff1c1fc9173146e0c65461
SHA1868700e8ab6b1dfac5eff2d79db8bccbdd501df5
SHA2564456cb2dbdd711c8d83dd4c474d595e73620c93574eb721374ec7ca2ee333ac4
SHA512be89663c28ed6851b19067f3f9238ac7c403618c9812394fad5684f9a235e20e64957fb21fb51f03aa466bf25785407ec759f10bb9139dfbb7041b02f2f7d95e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7c02132c25c6eab49101cfbb8a72ae9
SHA18da3cc5003e9abc9be9b02f063b027e049d24ecd
SHA25624bb4d8eb67df4bd08a253ed5e4f06aeacac9a19b48daa080f1c43ebdbbd290a
SHA512c1ce70f1a446c150cfe2675d21e1b5086de5594784b44edc39e1657f9cad3bf7cd74e493192e7bb0a591bbc06f2924b4c51861f61dbe125d9d2e32ed41301541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c72637e68eef5f517a4587cea24018
SHA175ad4268d4fdb1ef88f9afa9c36a172612aed40e
SHA256a9b9a8c85cfef1d2d2f51e45492c6b81268d8403f4c9b930c045284cbae5e49e
SHA5125d21b6b3f6fe54b457c422c38578e7bbf85317de67ab759d445da057f25f0afa6488053d6143f57306e0b24c38e28b0d817fe6e2368cd4efa8f94fd6299969e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e42e4188e943b90efe1c3afa1d3928e7
SHA1ffb3255f7413e18a5726484cbc8c091ae31e9b60
SHA25679f7e1ae869d46658be3bea3cfd49dd651220686c959c557fd59b2b5201f3fc5
SHA5126e724519b7d89bb67215c6a34673956b151b1f4e3b0cff4c08c92a878e32b97dce26b82387c977b20bc741f86f773339f6bfba889cebae0ca3af102329d9d7a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553fd418bbcc90249e9d963ac10116fc3
SHA1ff42545ce16e33c58db08f3b576cfb6aebeff481
SHA256e8d7f92d535f07234fd7ba6e327367937efe28fd10b457ab225c2355e2b7e228
SHA512b183815c173b265b38b8b2d2caae89437d6b306846248c7c2645ad9d6ac007cf52e1d6209155ed0e698a4710f48addcf11270a84c88c8b8763dfb4ac88c36e0f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b