Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
8045572f282f220c737c24c2814d9104_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8045572f282f220c737c24c2814d9104_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8045572f282f220c737c24c2814d9104_JaffaCakes118.html
-
Size
4KB
-
MD5
8045572f282f220c737c24c2814d9104
-
SHA1
72dd9f0b13834b961092f7ffe8da2c6d52820bc3
-
SHA256
2d9841b771c67257c0c732b50fd6bd3e81521bf98307501efea2dc3bdc54a796
-
SHA512
4c4e47648100fa8a4af5d093eeab40924562c4a61abfd964fd06cbfaf69904e9192bd049466c5753e057ec2511b5e86ce90e17c1da4cf84dcbc56695ad9aaff0
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oYfi4d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000005e7e46dc4b810df2d3856c811a3d533c481c0cf464f29333790bb3667e1ae51d000000000e80000000020000200000009a11250eb514b8d6cf2a40161cb006aac158f7341c9a5f2dfbd12de627ff94f020000000c77804c74c33c9571f0e4c0acacd1999eb8228697e4e2158a2395bab51c859a7400000005bfaee347a4322a50af41b1a5a24aaa040b85701425c82d0ed42d3fec89565c83a0a1f9f7338f93814fb0159d98cadcc437c6c203f5de4c155106eaed594283b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423136980" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{481F7C61-1D9E-11EF-A7E9-D684AC6A5058} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80c4c91cabb1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 820 IEXPLORE.EXE 820 IEXPLORE.EXE 820 IEXPLORE.EXE 820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 820 2220 iexplore.exe 28 PID 2220 wrote to memory of 820 2220 iexplore.exe 28 PID 2220 wrote to memory of 820 2220 iexplore.exe 28 PID 2220 wrote to memory of 820 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8045572f282f220c737c24c2814d9104_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b6b104e126d00965ca095faddfdf2f9
SHA107def5b7730bf8f0e7be50f282be2407e36d0e92
SHA256d3b82c48769320ba7dc240321fa2df810aaa001ff5241ea18c0cb9942b077ecb
SHA5120602f56178a69f69fa550d10ba10b2ad040c99f71cba436e4f3a910b6ce6d6edfc84ca915d58a95518967fc52d0168451eb769d23b751f663e0a6a78f587f4a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beda8f2984124107f0805de11a588732
SHA133f6aecb8bd868db71dfa265aece2cfa3c86a517
SHA2561e60c0bc8688515e4d543658cc577fce695c1ec913a4a33e3ae8f5be94bae991
SHA5128d0c26de8513d7e2b192bfcfda386437db7e5d2293c2aeee3fdad1e6c473dc5f671ce39bc3c294bd41a9168587270f00a5e1b11c066650429eaa016e5eaa03b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501a3d80d2c40c07a01ca3e1a73af28b6
SHA1e567c67dd4cf62f680fe6ea3f2dc0c839f764a0a
SHA256ffa697a38b486c1803ee51f788be25373b6e7605ea8307add1bf2c58f8cf3a47
SHA512036736631b167b6e357a1597dd7abcf9ff3c61da90fca1bee76191a7134f200f4b17188ba2dca97b5ef4b9216095237c65ae89dff3272d9c09e08788412fd97a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537bcf64cfdcc0cd4a20367b64ef30f2d
SHA15712e0a4ed67578a82ccca9cf5b68165d97d6ea6
SHA256ba97ad6619b7a5f77f91a4ac207de27c2b495dd8eecc5656ff13e5e19910c4d8
SHA512fca41d02ff8b5bfd8049f746eaf87bbb00c5944957c2e94b170262aa1d5a38c0e8ab963188e8eadd1bd1db87f38bb935c1907372b88534b7e6f9e9a8efb3060b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd8be935521b6347c72661809208ba82
SHA154f737db47ce80d39e5b2c8e5bd821ac7b76148f
SHA2562196b422185b6cf49b5e50de61be85fdb243ba1a49af5bcad02adc33bc4bb547
SHA51208dc5e046788742a64a1ace92ff7cdce17c83129e520c52e848f261ca5ea8149ffba43ffb2f03372b783237151dd9170378f0085581983e55ecb81bfba9dc792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59db7fca942484654ae8274db02e224a7
SHA187bf3a96037ce8855a19e74b8d2a3a67261fb99a
SHA256fd8cc452d42e27858c5fd1e93fb40751cce7addaef02df92f6c0145c988a6e14
SHA5124358499d0b779ef451e3e29883f61803f58274a2889226f3cd13abe7849f1086980fef0d98c64e3f2de94f6837ebf7dbaabf4325407ad5ab6758f2f723afc7e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3b81b6ce81809876b006d518d238631
SHA1aff624f1d89d3cc6779cd496fff0e9fb802185fd
SHA256bb195d01a28306cdcf54952a6359e7e403df49e4091e1b1fd190bffd0b4a77c8
SHA512d33030619aca1ef5c22dba6d041dcacc7890b1ce252d7188e24bd2cb1a478bbe24bd0b2d9af13150242b0da874ccd7ecb2d5f476e4cb7377639d83b8bee43987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ec649422fca8700070fe6fab2b3ebb
SHA1d9f55853c2a4ec9e44866c660a62ddfdfb3dcdcc
SHA2569495050c29b952e6323c37cf3051c742b45c7fca2024eac10e32d5e61b926dec
SHA51276e1333a68140472205b39a1a34dce9cdfda37cf9c1df8f3e93f44ef0f22a086e4e680d94f432c2ea21a74ff39eb454c3def65b87fb8172d6f7dcc4930099cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d3fcb10a2f4238ed8a085d466e5ecd
SHA15a2582d6610157a94abe1e36a2fdd91d827b4159
SHA2565c8def9740e352e84bfc740035c6c965222d559246752af862be4a5c02480294
SHA512269242f38fe85290040c96a4b87de695976db08e9f9a4963d401dbbfcdf8c5e1ab6b7dd80bbbbb98856d832cec9479d61d37e0b8417d71afe94b7e6a5884194e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aeb3e35d706fe884f0c1613f130f43b
SHA18e4a74f4b53e5bf5cf75cd700e6d215e5f91c9a2
SHA256b6eedf93dae249ca7f04ec7920034f0bbc9a1ac7fd1542ae0199d4df1ac32eb7
SHA51270987d28df682e586fea2b364675ed2acc14d4a4abf793a6ebbe613bb4e9c5cfd457b0ad5b03136e83890b9e11a66a2437cf9a30068b6efeaa0d84e232b9db9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fcb3dedc3da645eb932531c4f3d7685
SHA1b92094c59db854b13115bcb1cbff45ef93af8974
SHA25667177636a31a4caa0ccf46f36ada0d7b8fd729353d2eb358c7fc1e24881b3ff9
SHA51297fba290dfc0ae30739f1df60c19ae5c013d56d8f3089b6e6036d356cdff9447d6951e5097de44b456d84f4a450cd4906cc67e87364b0c03df196e0dd5ad44cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031b5eb8afc17d1319de1a7e22dbdbff
SHA12395b34643dc938e8637c5c68038a22d2e786a0e
SHA256cc765db1a3be037d87222a48ea049b54307986a43361bc13386aba64e93ca705
SHA512d80bd89bd1187f95e31db082bdb3fc78f12c06ac558155a66c63ff4de16a15e66f8ce41d99794a8e2ac7b63e67979f6a267aaa54dc1ee634dc5c8b14e17af66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a752c77a65682a36ea5c74d57866978
SHA1322bd325b0a5ccd3928e6cdcaeee8f95d1d1ff07
SHA25603589d1c7c573c67d4cbec82a744152673d8178d919bb8a412209c0697cdbbf1
SHA512a6b9945cbfd447a984b97162341c6e6dbcf95b66757413c7f970638fb48d84e5ca4f6c9a1f99410b70e90d4c4742e48720e211ded59123543f64c78b37fc9f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c528560746355140110e4d6fa47d73
SHA15b34fef1275bdba7f57b55397ee731f2be1b1bfc
SHA2566e7392c4af0d9ed504204d2024060a9a26e5452c1be878b93ac081f632a46d4d
SHA51261c22dd57a824c588df78569d89922a5cd034887475a8da158838a5cf38d100d2b05bd32eca80da4b1dd295d1d45b95983950056b555fe66145f6132dad2de36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599acee9b1d8ecab931f3f3638559c2a2
SHA175cd4fb92c2ff8f2739a5db5fdc8678e7a0fbbb3
SHA2565c788b625632519e4649b646d6386e8025d04c66df7410ae55eebe5b94080919
SHA512808555d950eadb4944d86faa2d18fd400702e7931ad1ce5d0d7fd2d5f1c9c79dfe184d01c57ed57e69970a1b24f44f19d171f64420aad2c4b3f6f5030219e912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579ce96ec740c2e864d013e484c55080c
SHA1c7b61e5fcdef1e5fcb2010afe6386b4cad4ad710
SHA25637be1dc3c5117b73ea1482b00b2630f7834b8f50e56c02578503aefd1a7b36d3
SHA512b78ae0aa232604859960bb4887976e54e3dd624c1b0721fa5e40201950419c9e7f913121c39aa6e1a05f0c8b0d3b5b17dd25efb7af22c2abc38476a50e87f7a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54added121f8165e9e58fa53467357e94
SHA1f1dd0c2e33e20abfd7691eaacd0fd16a9b869410
SHA256e797fa8b7fc420385b8ffe8e954955f8a4388b153c6beea4fbf604c11396cb6a
SHA5124283fb826915a375861e3999164f6454d5398124f950d1e490b6d29e4abe48e66ffcbec06a0ae557fc885207a3c4bd980c75f1d20d68292312eef27fa4fa1407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a534a1b502c98118bd5c85c010087e
SHA11b8d6606b43259148e1ef232bba41181af27f16b
SHA2561282a5bf8e184164a291aa50fe5e368760c3ab49fbc0b61808fad9d4906cc99a
SHA51201cfddbb9e3699925ee0f332966b99ce58fd62013fa7f94662b1ea0460717c3f6a32fce55ab8f79080c66bcadfbb9244211dc8ed9359d5fc3d09af3bd3511def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539b5f1bf2d919f476522389bc0822725
SHA15bc410d378c6b7baf81003051fecf90fafbc59f6
SHA25651d3576ac66e9a2c132ae3fc227562c7edab186580a182fe7ddc00367ca43a29
SHA51214748e8db88b6f612ce6172989cdc6ce258d71bf8f4c2303301192012a2e2d6078c8e25eabdbb15211f5ede3c3f61643ad6f6e45fef8853d9f9bba85d0a417ef
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b