Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
80eb9a825e266f3117d7e03b95d140b3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
80eb9a825e266f3117d7e03b95d140b3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
80eb9a825e266f3117d7e03b95d140b3_JaffaCakes118.html
-
Size
23KB
-
MD5
80eb9a825e266f3117d7e03b95d140b3
-
SHA1
6d85fc4451f1a9c2d64f3c42e7ad7a5ec7c0bb60
-
SHA256
fb874ac053fbb431765bdb68210335bea59fe38071b1ea46bbdbe1568ebdba7d
-
SHA512
b4c7408e0587290ad407000cb43ae77adadeaa24f4ea2b0a8c7e523f9c7d12f1ea2996c480ad852dc260e5fc8585d02a7485f044da0a980f66b7dd4ff27116e2
-
SSDEEP
192:cl7vFZ7viHht9TsVi7NaNe8tfnlnGtWf4CMcZ3AdwWfM2X5WfPC7f9vC8OWf3M1V:Cfu9lQfcCxGb7RVDBTEoFM
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423151689" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000e34926b1865a5b7f7bbc15b7362024d7c7e303698f14de078ae89d4114cd1e2d000000000e80000000020000200000005ac04f45b6996c9b7544c328e1b2f7a0c0f3e552d71470f385dec0177e2be7d4200000007ed6bab3e55880a282dfaf0501947e9a398073d0ba443a2f11efbade85b671cc40000000b50511d6f622a7b12ab89939981f23e17a4b1bc2bf0000801c4f304f519c3c35074b0636840fce558669f4f58e6af0d0c8d7d09ccd27a37ba01f328f3c697bca iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3005865ccdb1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87EDC641-1DC0-11EF-AE27-76C100907C10} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1752 iexplore.exe 1752 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 3060 1752 iexplore.exe 28 PID 1752 wrote to memory of 3060 1752 iexplore.exe 28 PID 1752 wrote to memory of 3060 1752 iexplore.exe 28 PID 1752 wrote to memory of 3060 1752 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\80eb9a825e266f3117d7e03b95d140b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54923b194bac762029caabe5d3b06e3b6
SHA107f098f621d1a7966239ff94ff9c0aa5e4660d04
SHA2566d9039bee8ca4455796f3fceeee55e23da3e998b090977f27ac880513f479908
SHA51246e82940175f4bd258cf5ef6546d849954d2208d9a88e59bd869a0bb83d3dbba7cb5fc72330570af5e29d56e4f96f8faf7824df5a3f7fbfd23da9e1c8778a4e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ac5a69733a15bc08ede195d0157f74
SHA1b1ab8d4eec015bd6bfe1bba807745b15ad217013
SHA256a96c516268a76124bda4f58e389e45f5019c01080e5b2ccff193018306a87784
SHA512aa335bf0b287c0f3eca52fbd590a67201281061b52f7c391b03247585ef64b7aac8015947de9ea16dd765a844698f8389dfaa1542c40cece217e0ebb8ecca3c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5405a42a966552dcbd283d4c15c3aa336
SHA1d5f2c234335d01aa21716aa0184d559ef490be9e
SHA256b226ac3dc17d00c4ec06249d0ecde4fd88d5c31332a3879f9e44532393470b40
SHA512b665fbf1fb625ecfe5c63414c15a4bb940372b4b57de2edc54595e83ff310168a8da9c0e73e71352cdc5156e20922b76f42584413a77a04e2f11aad3f4b5a8cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdabeeeae267f2618fff5cb41f64238a
SHA13be60ed64eac0fb133e105a08db67e1181b4579a
SHA256d6410b92fe765029d16f0b3636caafe9c8f854a59946be8ff66fb134a713a6d6
SHA5126edf1a286412a65c94d3d3e5d2a855bb8b4a598644283160217f66bafbd359f6d3074ccadade3ee0c0dbe9b9b6e142e7a9a5d87d732c0b437e192a1f5f2f4919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a1b2f8da1ede3b969323380f7bd441
SHA186db71aba78efc11cf6f708590f99bdf55c85d5b
SHA256f915839a544cf762d3332934655ce45146ed37f8d4b44d0bb22875f1e557b70e
SHA51274dadb7ca5bda14a7e22a2182907b498d0987a626dd6a1e6cd0de84dcf0547dcd52aaefd5e3146c628050d7fc153764e9c787a605255e8f297f8a3a5c826f526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57edf7ada7af678b8f87a402206d0590b
SHA1dc262d404704d880e6bbe0ee0c1d3e1dad9ee0f0
SHA256190579f6aa54d2142f6216e8e037620cdaf883a1ba07545f94a437862653074f
SHA512135c29bff211bd1c3b515fe73917fe4f3b0071d79b63283acc2dac25d087885009a186d12ad832c03fbd43937e3afc69802d3cb074e59797cc7c0ad6541a1574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb5bcce0b37b5e068e10b5957bfbd60a
SHA14faa1a6f097f2cd0e0eabcebd804b8f5955c0557
SHA256bd058b4273871033ab397fda4d17319ece834d177870768f11192290e72a5fbe
SHA512b02e7a50e2f26abd874103d6ce34c8e2461b6b5ea80d461a0ab5385d5ae6d440a74d7af1f48f46a15fa40461bc6f8607366ff331cc2c644a1f69b906fd963683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567db40968955d2c256e5a2b6954fc59f
SHA1a6e3e46eb3cb059260b8ba222cc62e0d54bd766c
SHA256384334f97502eb748ddfb91d11bf7885218b01d3c51ed10c32f60484b633b6ce
SHA51293fba3fd4cc2e07be49e05cb455d2fdd80856c5ee12a8b98e54e5a8cf20d96c3de761975282237eae6a42344c4240e4587d1f6d97bd84a2b1668f2a3908dcdf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e1c4eabb87b1fcd6cc335f53e02c6d
SHA1e5e085a16b6821938aefaa4ea3658a3ffaa87a9d
SHA256133c095ce4a01bc8d9f5a9a8f79bf024cf23c0b1892dd91c179ff2583998c9ef
SHA5128c8079e1e464a4f6f7e9fc4f1f37ae04292972c213ab3e2a81dc771d46de80c696650ac76571e4d7a27fe2f3aa251b371abdd3ec2c62e6251618f516920d26bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1930e855dffd1df5ad91e914272af17
SHA1068414b14585b5c5243b6955e35c45a30d709246
SHA256b5a48b1c83fd617a82131685e59ae0153b8bf347885dacf41945917d0198138c
SHA51272f6e8169a2afd935a4b5060e71496139d3c96d7148d4b404d8504084de7c3a5d439cf1bc822d84fb12539dc6d6a8e53facf59dcf0014662dace6d748020ff8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5439d00f0b1b492fcb9f4bc82f85c3cdd
SHA155558ea90387ee61d0628d8988928034ae4557ae
SHA256b339f78589821da6486d1c98edca984c71b9659a2319d0d25c0d96032daa489c
SHA512c10efc549c50c756cd35cd2b8ed1749e9f48ce3777f7a5e756ff4a87dc3daeee56560b4f64b22472efdeab39096301940121fd24eb317b5c39496d56549b5c74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544be826a520916994bc7d4e613da0fe1
SHA1fc7e2b05043901bc44cf98fff37d98c4d5b63f48
SHA256af2630f8bd917c1753cc1d8eb0128edbeed9daeed460a383e2d396232ab6c5d3
SHA5125fe3fafef50578b67dc31eb265b2bff0a4565d74623784e16fe59ad303eb6040f1fa565730547bfe8b912cc61fe695079529ff1f690567dbd5e5b84a7973e5c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad90b5be0c0a3c7b1fd70835f704ecb7
SHA16b286f9fd63b5af184fe0fab908f0c30f2ec398f
SHA256d231de17c7852e5e75deeb712089fc57347d9f773cfd7d4c8ad4201b2259713a
SHA512485f8c004f8fc5992711ebe2c923f4fea5bfb6b368667dd95e0c221e8bdcf511c401072b41372c3f80b6cb60ce13b2a2dfb872b9b32c366a2bee9eb68e3ed35d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5739000395e08ac107175159b339652
SHA11e79848c2c64b3705c0b78ecc16e3af7ce5e04c1
SHA256b90575a16951be4e0bb14d83b05a9cfb707d154ab95cdb593fca5a7c17490944
SHA5122b1e39ac51fbbd6fc0a3cb82fecc839886c2680ba9afe31aa4a7f2d4560df0a8eaf761c840c8efd0c78056480b7f7f036af08f1c47f6744d90640f1af14d0af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fdfd036e9155b1a27743c6edb311e15
SHA18eb013c90da3f4978766c9d3cac48faa836ca827
SHA256301dfd827391e5e198b0e3d02dab106ed452cd7510016eae0440a7a512851caa
SHA5123ce2ecdf4ddfc8cd9505c8d57cd86e22458986deb1b566874c07e6eb0e48b985f86422b0bafa2825171e8ca684199ba031f26611976112b365d022809eec4e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a521e808c6f4806d26e1104544468454
SHA16ce0b57c651834d69bee94a419802dbe8e52ec3c
SHA2564b5efb59b8d3d9841365027a47abc2da92c29f44413b91599cb77af91c6a8e10
SHA51292d25302cd59c08b6bd879bff238e0c253731a4ac2597ebc4427c9a0af8cbde1a586e5d5a86a9f7a22ecb87423467971d540212cb7f7258bb3a57781ebd1c6a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f11ff6105a7aa8286b2807f0951f67b3
SHA16d9c281dc7640cd8986707393a43e01b88b9918c
SHA256e9890edbf41e20ebf3ce67d4ba2963e25c12a56590baa2380e64df46fe485405
SHA512397dcea8082d0956ff5a41f9849ccfb77d9f07c0538b9d929eed3c2c9c7e7b08da220b177632b7864000cc1a7fc59797b1131b5438e0ea19dc46a1ac9872dd24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506ec86a8a86127ab524ed5878ebbce7a
SHA1f6cd8fbb3c601a61411d9d2c65b3c6af9cce2174
SHA2565da63fac27768af8f3179a07f07ade13bc2ba32307576d1fe6084a34bd9ef47f
SHA512e7d01a6783073cf10b381306c030e193d4eacfee5b7896a1d785cde256da5ccabf0e4f0363fd048a922afe4a046a305640bbcc3215ee18437ad6421b495c7573
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b