Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
8361079dea5245cf03eb678e379a94ea_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8361079dea5245cf03eb678e379a94ea_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8361079dea5245cf03eb678e379a94ea_JaffaCakes118.html
-
Size
884B
-
MD5
8361079dea5245cf03eb678e379a94ea
-
SHA1
a8697ec7478c2297f805b4c735a02555549b78cd
-
SHA256
a6b2cf08d1e590dee7af714eb571bdf74c5121692f931782b145c674281997a0
-
SHA512
105c8af3309d2af8583d5a403aa43963cae6fefed88ad7581ff8490391833bf12c83da3228a84f65fcc55db25e6c5b4d1bf5e77e071216687a17010c8436f992
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32B18BB1-1E53-11EF-BB79-CEAF39A3A1A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000da05977f544bd5920228a73d06283917db97a4cf5fa2ed378fc627de9b7b4fa8000000000e8000000002000020000000e7cc2d1ca0582fccd166fa81aaa1ec13fd1145425606ceab9fe10367cef13e4c200000009081504521d4699cce9f916904028476f42d5444adadf1ac24a407612cb02f0e400000009322a0eee38c496315dd13e3945edb693d171c17bd85ed45d833561963c84425a380dc95f8926869be56fa6a6ab4154d14df7ff30289b134e83cfb6b9e26d85b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808745f65fb2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423214682" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1876 iexplore.exe 1876 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2096 1876 iexplore.exe 28 PID 1876 wrote to memory of 2096 1876 iexplore.exe 28 PID 1876 wrote to memory of 2096 1876 iexplore.exe 28 PID 1876 wrote to memory of 2096 1876 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8361079dea5245cf03eb678e379a94ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c18e5cef9915818ad0c9f0c9e8a414c
SHA1a54b539951249409a3895ba7018d333f2302164b
SHA25610783108b6eaf342f9b075bdcdd919a88da3ee86c3a0d94e43771302d510de7d
SHA512c2ca91a49802090764cc29fd74926dbc1ce9c92f9c22b0bd749cbb92ac5201a743bb2bcc1f0d8ff9bc75e51f0a5caccc07f765c6bd9d5fbc6da73a74d6578f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513eb4ebbb8d3f4926a266e13d04c0285
SHA1c0a3d9e81f670d1ab1591f2293f9398e4788ed2e
SHA25698f064471abc734075c0bf2cb6916255a9f2034f86e856247f4ed7ae7f40ae5c
SHA512fbf38bc722ac0a766c5059c0fce85126fbb073f5bf0293ba7ca7d8ad9d1f5e7d397cf80b94184fed2622600d0cc2e4af1f2144d4542def6ad8bfc5780f52f94f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57df10db8e7faf62d6eced438a2980127
SHA1aaf3232e49a66d6554f4bf36534136eec79bc20d
SHA2566f20cc2b5a17448e511572ddd86312c28a030f03af059083c23fd3367814f4c7
SHA51200b9f213bd909a27464d2ab60935d5de346cba26f5abd2b57644614e3dc99b96388a273fab650c3139b40c3d9b9ea3d951def7df562098dda8668066a5c8dea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbe7e0a5c9c4175884ca568b4f630466
SHA1ff1a63b97fa50a3d443490268e57e27a7e9abc61
SHA25665572b5c951eaf28e3fac5b1a9f50b181739834fb74240b9bc963228e643d5cc
SHA51276fc41d116d12ea402076988d16df99dccc5f35d513ef8e16501d6eb24c2ef736d4e3d06aa4913c778d8c1ec6d341e87559b5a15574b23f76208620fd25f3f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509d6b8d7e34c3bda5c9eb5c1c0aa62cb
SHA13fb8114d7855b54653a4ffb7dc615d2f45cf8f78
SHA256f05be149279d1d2672953cb54433ddbd976f26de68016108a1cd9f8fd412a6fc
SHA51254e45c357b1191381a02ca0ebb62554e1d3e44ec82623c1214819ed1c08f86cdbfe806f6dcd1f08263a8f0022e8dbbd645d551d3da529c71d84c6d50fe9e35c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6ccb38e7f34cddf28f28460e5d15a89
SHA1b9ba293e09955c7e531b7685367a99c412ad1883
SHA256f0a4d49f61de8a05137d7577d8f9b4aa6ad71515a661a555783236370e09be33
SHA512f1d712f7c65f2f59037e6255422572dc924078556190081c3b09cecbf7935b487977454648a298c8a4c52ab9a52d219af7d1981a50c74e425c064e40ecdde297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a794b0387beb8d0c4c3f405e5488d7f
SHA1e7fa803e75164cffd4abebba97a879dbd2e26f51
SHA256b0182a2fa12185d735f6a416de6fe539bfc186f75a58fa6644ead54e1f7d5aa7
SHA51257aec21d6d278b767c20150cd2969abc0ccd593ab3dbac23ff7b11b939b4757a1be3ff424fc46204cd02df1a3099955d3a59aaf22f15755c1a8731fb45589a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ef975ca945724f302b8b835d9c2905
SHA1eb0beac6c6c45ccfc83dcb53b1fd98f248f9056c
SHA2561c20cb384559dd49dbfaa6881552919821cab3637cd2bb4a4a18e3e4eec0b7fa
SHA512aaf7470928aaefe3877845121d18ce1150129f777c25de7f8d3290deb53cf1d7818aefba1839d9df3435e5810923a6aa4e427f25edc0a57c29ace323bdbe5d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba9eab1b9f7029064b5d272ebacd206d
SHA1705d761eb3c96e4bbd88886bb20e6c3f152ac64d
SHA256274947c95f13d535780afb6a87f1dcbcc5434fff72058e9c8930697eb28ccca7
SHA512f3c76e63105653f10a8c4579c8f8b46485ff98c2355c0749e6288ef56aff4c8777cb8f0554091b5f54482329eee41242fd9bd243728d04d843db7d68d9d4de67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5282f12f9b54723b030080b9ba51da275
SHA19a4ed20d1d67f09a2a664effae05f37fa79ce8e2
SHA25689eb0e6c0ebf91d67e78e5e47401c3b6c17759428bb6d0880e753ea3847f2974
SHA512009d5f312cdd97b4986c5acf86e7db69293cdbf899829c48f412e9f71f10ed63628aa7e329d22106a72096d45888453b2b44c7df0e35cb70a683081b7e995cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e91bfde4411cf161d34453fc99a97e
SHA1158f1eb97d86dac65cddfef3b200799a5a1aa6c0
SHA256ed0c6b9b4134d630bcdc16d5b0ee711614065df85577195ca8086f4eb45ba677
SHA51234a14e36dabc658607808585bc4ee15369d665e44089333cc003e3d9fad454d765dd4d6fc93394d1a1f3745834e32de47c62a230622b1fd2145301453aa44db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5004a9bbcb61b0bfd62764ebc2beefbf5
SHA184f80efeac7afc46745234ccbceab3d0f1e1c79f
SHA256cf732b82dce9cec70cae2758627f4f3d148e9a80aa007aa03e7a83719cf342a2
SHA5124c2c2814d1700e8e862510e9f44f1186a3ea31e4e30cd6985cfc84db2ccb278dfc497ec65af216e23f46092eeea8919ae48c0a46c9ad075e04f5190517bde09c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83628700ce449c2c8abdc7b2b3968ac
SHA1da1ccdd9505be8717b28f11f3f8f04da37c62566
SHA256990a3cc3fc1fa4195fa2d3df4e12a40073218368b0b6077e8698b4957ebb865d
SHA512bcdd7f0613f5f2e103798e7197dcdbde831cb4651bb962770e2e59222cc0a29fd297c29139b821f2d93e30bca8554210964ea7ba2338530b81da42d2aba4393b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587567fbf25e74417d6b2cc83a2952924
SHA179c7eafe6dabfed2adbd82298cee1f710ab9c511
SHA25665ab647ce51c6c61079806559caba2ec96f28b8c990eb9c47c58369ce4cc9686
SHA512f3a23d6576394c5c14d7500f1f6794aa5f6cadc0140d793f1bd718488fb361e9e5c1c8837fbe2708aee702f2eb86ec0e14e8e70fdc7cbb75cec074c0bcfe7a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec3bcd237e0d26c5cd5c25c301822fb
SHA1086e335b610300edfa9eb040a5112e7af50c1ddc
SHA256d46ae9f894da78b1eaaeb429392a4d18c9ac9af08b2fb0c6b8fe0e0111de6546
SHA51242407bd47d3255e10cd2dc1f0c5b65a5a69477976d0e52e6735454bbd59d3a43c8b32afc12a1b46a8c544cf1f21b85c366c12965c22a04a7d2f2774f2d92a3c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5217cbfc107de39ab44e3d53e63ee3d74
SHA186ffcad4149bab48bda211ef80c55e62d33b4bf6
SHA256130b28f7c1b90335bfa88b78d2eb9336b0f47e1cbcac629ef6ce8fe6e001c112
SHA512e81c70bc7947d911b0e242a26b90269055ec8618f81b7a5765f0ecbc1dfca8403ea864b62b07d3cc003cf46f36100562c7b144eeb5fad6ec15ea02cc2d15d5f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c13099117e1b22e55c6339c39c802cb7
SHA120814647e6f07be32bf9aa279f218c0a34de8f6e
SHA256f7706397223631b633af324ac506c2aad7431bc8822e212826cc890dfc13ef29
SHA5123293b21d836405ffd6ac46889f78bb299c912e21bd9d6c3c314ff8132329cf0902734351e132325e9b8e147c6b6e69c21e14ac107a4e5c98da5afcd6006e9280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c701fe04303ca26fb5865cb9d16ca1ca
SHA1c9c542552c24c7a268e66b86881ac0921eebc218
SHA256276954af99f049965e99b42aecab9a00f06abada956ebbe391a7782f1416b17e
SHA51205239b41de993797174914720b665610746dd7e81311123cd1b9d13347aff120544e53aed6b4eccbc997603ccbca89efef70c09629c91acae2d1595361305780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e3ea74c3e74dda6eb6343ed3f4e237
SHA1aca52eab676ef724764ce7ee243c9da23e336de9
SHA2566ae50e25d0ceba68fe22ea75d121a5a291b3f52c5613ed74eba9b424f7754ae6
SHA51219968e15b1ed9c3cf6d12dfea71a2f4b9abf92610f06c0f0b221b430dd75d5de2205b979fec1b07de075ea7b8de6415fad9e083b92644d5f9e0578e2db1d466b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b