Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
81a0756b93c0de21a62a53bfe77cc15c_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
81a0756b93c0de21a62a53bfe77cc15c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
81a0756b93c0de21a62a53bfe77cc15c_JaffaCakes118.html
-
Size
70KB
-
MD5
81a0756b93c0de21a62a53bfe77cc15c
-
SHA1
8d4cd26b3cda48fcd5ffb27060c03057c161786e
-
SHA256
186936c48565572aa8daa4af86a8acfe6e0925f1f4166dc48141a61e045ef906
-
SHA512
f6c736b7e6bd684b9479e3ba0f2abaae6b3cf4439bcf90c532273835f534bf58b6b75db50199585bda1b964c78b9e5be4bd3044794f3bbe6aa35d8b4f321b619
-
SSDEEP
1536:SbzMcOvU0+yHjc2HfeaiDktVzlU9vXcd1mZ6Smto7vo12EX6rNtFRlf:S7ROjXPXdY/Z3HBv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b71988fdb1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B12B6371-1DF0-11EF-BD6B-4E7248FDA7F2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000549a4b2cd274a629eddd947a1874685aaa7112d4a20c48a57bdbc93ede6fc6ab000000000e8000000002000020000000c31f37c75cd45a86ece1accf9e4e0bdef4e38650dc2824d623a385bf8de528e690000000b1fe654e74e3cf11a335c334f8aa5f3d07836417328e45edd0442a37d0acf328b9ddc022020fcdb6cfa3f2ecae8f655931e28de468b5b28d8d9443264b36bcb0bb8fca79edd336cebeedc3e7031108992e12844059e3a056a70cb7c16aeb5af2926dc82114c431245d2fb81b393568db723fd639dfce53da7538db4ed2fa461ed005dda2e6cf846b68d65f6dc6839bc8400000000e9034dcaaedfac53fefb87ff3884da5627b8d4eeb441932bcaa9935cb72d3ac9184914d58e715a294e44b257358dd1da135a705e6ec8a30cfeb462338cafcc7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423172374" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000e8a54c532507f0e7b094434d1a3289818f4f9678dfdef9a2b26bf7f4cb73fa17000000000e80000000020000200000002046c9bc6eff556bba48bab9f07aba7f0f1dc191da950826783f3a3e4759425d20000000959adc250897a301dc3b9d0d1c71b24d32dca35f585c3d762e207b35207d36aa40000000bc41e2e8f576b64cb7e64b3dcebf8232a49277f903a69ca198ee4ed451b7d91cac5e0383ea00f467f5a66b688a2908e2f0953638cf1cdf526f8a44dd19bc4dca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2840 2068 iexplore.exe 28 PID 2068 wrote to memory of 2840 2068 iexplore.exe 28 PID 2068 wrote to memory of 2840 2068 iexplore.exe 28 PID 2068 wrote to memory of 2840 2068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81a0756b93c0de21a62a53bfe77cc15c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53efbef3a8c93b7ef5a8caf0ffe0ade9e
SHA10215f7397628c65112f64585f63ca8f4efc01a25
SHA25660c4d7584ff09ee276a68fc1775decdda06a35faf51547b3e3225912020b213a
SHA512393020b382d9f1ae4c2e6d093531c39f078d0cfec9757be0aab17976ab66332aee77b3cad5b8daf6d182962574ff336d6112691de16825cc1383ecf00c849121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df83915cdd417189d430b801dffd3b77
SHA17a007ad2cc7b658c14a8c8923171900799340338
SHA2569793b60975e6f5184acec70c7faa9a137db2a8ad1e35b032de33220fd84d2d0a
SHA512c1824c3125e994f438926c07a0575c1f55f6e40b4dcc555165907b04e3bb80fae99b2ccd07b8f2af7ded4e9c7017f3f6bf349a9e6423eb4ec31c354e06c998b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df4336deee951912158a4777b8973a30
SHA1c01b92ca88f52e98a8ec1defbf315ee5af94aa98
SHA2562e15d446d72d8cd3c8da3430ea1cd29a6ed6c6725796f3e4d3df51af8546c343
SHA51293580250c55c1bf1cf6f3544f0e0964ef1f1061dd27baf3bd23f20bb2eb51547fda7d6c521847d0e537f0c2a0db3ec1089cbf4122cab37b04724abfe9d0390d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d01c91988ea679d81305207e89f125a9
SHA19a0823c67eff496f793c144e9d6d63ebdb362c47
SHA256bf4c3ac82574561fd02704cd2fbcdaab8af8b18b4d426140249d600221d32481
SHA51201c91385bdc9aa4e317f6a84745683536979759d80f7290ab6077748da6d7b5910d2682079ba054f5ae514d3be170cb602cadbfa46b067ee64c93ecad14bb597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6dd8ec1a35c8caf601a37b387341ca0
SHA108d0893ccded7c20817cbfa106d002ab89ea2da2
SHA256898da7be340c6e38bd1de5dc6d2ad037fa304af06bb033a071aafde0e3418f17
SHA512fafc71ff3d8cca7057a39a6afb0433121b211cf754d2f1683e8aec7664b7fa8c5ec3e2641c12cab7625a0711398012f98fc099e527dd456a319409ade785e01e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581b0b5a49a087e556d9e9eb8b2d85537
SHA1a256873980e741b53cb4fe3f240fa06a0e3769ae
SHA2562613a94137a0b3cf19b05b336b6a5cb377cc1858b6e8c8a529073ad94e30c1dd
SHA5124635edc92f0dffff02157204bf290b367b9c8ffbc9e0438a45485701683a621193a85b836436c48b7ba07add038523928f4cb614a2a9be5f9162070e0974a112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3afa2f2416ba616c75f361d47c7057b
SHA1d17c3c72dec129cd34251c02282c9bd467739d56
SHA256931044f492fe1c5af9b8a88ed61a02bbf98a8bdf077284ee35aded65d04629cb
SHA512cc2814a0ddcb63aac42b267b719b9d974cd4678fdee4ea8295a29a2a22bf4ae55bd1ebd3170dbad14cc153cdee5835a71cccca234ee1cfa662b8b286f594ee70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e90eb1651a69d607080049a6c452cfcc
SHA122677734e2fa43a0f1c4055fadb5458ca5969306
SHA256721d964a74da83e547259eb8b545631583a2878c1db2d121b809b3b718cd6809
SHA5129bb908aefcc58f901f7054f83c496ecbc3b36b74886dcda491151d2b3cd28ea85f0af8e213e7dc9e5822248518c465305350995466046b77a7a78ade02988a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ebc86af77d0bf9f9e14d95be2e559b
SHA1378b9e155515e927f049d0b2e9e2de0187b10b49
SHA256d8ae0221d8d03b96120289649c6e4094759bf656f5a65f9647318cc9e81da829
SHA5120072c378b8798d54fc04beb11b1a144b3766c9220732bfe2aa5391dafd3f621ddd178a6e9a7d4828051d11af6e24b42d1ef0778b86487d89937526ec3940c9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5993f3b5e911524a93b58f013bbbd6151
SHA18b0a3afa8f99cf83dbc6ea8324800156f59b922f
SHA2563336e641f14b95827a3d0054d30559bbf8b791b4aa3c43b29b1794d7196f1df1
SHA5121be482be96c6e2b08ddd27e05205ae969ce001309d354b3bf7803f9c300fef042c56bbfdae79b321b4a162a89c711877827a07b313239654107207f2eede5fa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d51f57fb20b556bf310726619af7b19
SHA14ce319b9c7f78d55491bed64508d2ae257868dd8
SHA2567e340737b49a22694c18f8b01b088df3b6e531ff6b4453edd31a12908b0f031b
SHA51249c86c9aa1707d25a6f5c4d3e2066e193bc32e7f9df32ed4ffab4043138d85c19d0fdf7577887e38f4a1a024cfa6bfd0d64f9d6277589d77f76d766b2c69d428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509e0c7c8c82f6912049b30ca036682d9
SHA1dd82add7ec54d0bb64cf1178e66c9d905bdc8f1e
SHA256158bc10e983c7aaba9dd17b7ef396ca414cb9e7ed536dcce3fbbae6edacbf654
SHA5124fb55109877d1f73fe78e8d38ba3d7b309a1ee00f8a55b21b330449f64ad224d6bcb08ba1f3264aa395ec8ae2f40f4fa600a13496eed51c33c34c32757985f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa9b043bffd1a4310af09de0e384719c
SHA1c1a286524c6f5ed297cc21b84a731f941fb89b25
SHA256bc9d724a50a263d9b6fdff4bd543256cc295aa3fa5ecd18fc52a1467d58601b1
SHA512595fbe0c6a78abb718cfbd0e2ac2c96fbb855a9000dd032d1130311b18954c42d699d277602a6c48c0503097580cb28969ec2835978a9d82844db4a1e1320c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50415deef4ddd99e3effd99d94539f69b
SHA127b52fabebfff9d3212f3a894c77403f1e6e82b7
SHA2569f8592984ef781c258bedf4f738dea8607364a2b9c86bf52d54737331678cc2e
SHA51268d72fda0cd3b1b1ea62c3dc7bd8eea3548c147d4dd7e3475950d65b8f79911ba8106b46c95fc37ee64ce3142ee06f51a97d6f30a8f27988bfc2702e2a35d232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f432d3b3a6bfda6440da0fd9676d5f95
SHA1a8eab2ec78713c8c0d28cdd6ebdbb19deedfde5b
SHA2569ede17e8212000a61f4ea89de5f04e5e2abe22f5abcf5a6586bfd5f916ff9a68
SHA5124acfbdf75626c4bd57522d7f5fa1729539589fcad23c99536f6e60eb756b3d5fd3020dbecdc0bde8ee0855280a86dec5abb7e32bfcd981e31a9ca0c641df46e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a5c152969e599a0b211da3d62e1274a
SHA19ae4989b9ca3cb301b12b93503cb872211e6e726
SHA256ec074152576d764ee600a7109fff5b390d119a8a52c96403bfd2d16d4285cf92
SHA512f731c1562be47dca0337356cc469d95f5cfeacd02b0ba69f219aded48574df9128dd99134bdf6e7707a92b97110f16a2e398819bc039f390c5df29577dab9d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029b9f5f6df7788ca63570bc378123d9
SHA1e4db4cca38a76ad8841f6867a02a5d9976ec040a
SHA2564b90dec76b5114a66e08ef6af0fdc6e91eb167e5a6675fa3216818531cc00595
SHA512a2953f4702f3349211cfcfa339db9d019d9041abca69f17dd26692c85fc5dcd8baf7f8785e58195b15192afebd8677f6a9cc834745c609672e6e8be1ef4490f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bc3f40de8e3127bc735d8e5e3c622c1
SHA1f3f1ecaf49a1545c4c2d274658c18e742ea05a0b
SHA2566bab0dc4764dc1cdbdec811289c331bf2a1cac0ea608ee3104fc8c4f9485b56d
SHA512ce1c187e8e97867d630570341fde02373d85c6b53bc0f69693ee84d4ed1eacbd856f12b14577d7aa8814917a1341a6491d80689b5edc01ee00b75e9d3c4a922e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b