Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
845ee12e75387df09102b52e7eac00e9_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
845ee12e75387df09102b52e7eac00e9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
845ee12e75387df09102b52e7eac00e9_JaffaCakes118.html
-
Size
69KB
-
MD5
845ee12e75387df09102b52e7eac00e9
-
SHA1
b53c9db5934c5e23a48650ed2fd4729fd01cc04b
-
SHA256
f8f09555436e399f3bf08e973478edaad99e9494bd0887ad9c1db1d2c1e053ef
-
SHA512
80fb05c97d98e22c21c4ffebc80939108bcf589a523f6fbb2cdb4a18737db8030810cd3eaea0310dc6e0b4d3b5d5a6c8b5f6dcadc9ebdd6eee46f2f4c8f44b36
-
SSDEEP
768:JidgcMWR3sI2PDDnd0g6cq6YoTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVG8sB:JbHTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B875991-1E8B-11EF-8CD1-FA3492730900} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f1a25098b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002969505e0f07c24db2b2b2dadeb10c66000000000200000000001066000000010000200000002132d04291407cc89562d9ff8e998c54d09b07925b44e463fb6446097eddf4f4000000000e8000000002000020000000fb420c5ca10058fa063ce525d51e01d8a01898df81c647078891f406d07a97b020000000559731ad43878b332cef505cd54bec7e8e818f3eca842a9a65afaa03bdce145e4000000001c6586591c23d5df0e310acf50343325490caca27851b42e6660da0ce55def3d9de668940fd5194083e20f1d41e419c482ed06eee56089ae1275be6cc29d932 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423238858" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1680 2176 iexplore.exe 28 PID 2176 wrote to memory of 1680 2176 iexplore.exe 28 PID 2176 wrote to memory of 1680 2176 iexplore.exe 28 PID 2176 wrote to memory of 1680 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\845ee12e75387df09102b52e7eac00e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD566d1f71702c1ef556dedf6366558c482
SHA11351a8d97e101fd17381d7d0dc232af4b08b86c0
SHA256f001a03aa71c553fe7bb4e9fe8e42d495ae726c657d8542ff8f1a6041c1be8f4
SHA512ba6909f4997d6ad9211a5d660c2c4ef2a0cf5560f49f0b21c353ee4e400ec06f625640a46ac1300944d53dd2c025f9c10467013a15857d9f7946c5206b7cc672
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56a8c6d3f93007a4914957d758b645855
SHA118c83fcd9ae5b55983e45516b0521e41472a7190
SHA2560b1285b663aa849abe4fa6a8c291508e1c40d754dc6a9e6160bea8e00ba98a7a
SHA512bf46fe9430b92d775b300c001601c5f9aa7b3750e7da2dcd8e9b9437cb098467cc450613deb51a696be4d75c5bbeed0c4a78b012103b99f5854300a160933306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5247ad4fc744e5e75acb16d587ba8f0f7
SHA157820fb5c085e2f9beecada5b385a382963785e9
SHA256a4b475ce6d29c30f452b559b9394d073e9804b0e06815ea1334a28219d24d991
SHA51251172f4c9a48dde7f8c5b1d89d841c7c6da8e46acca1a8390137835a02bbc5d17929147b490435e676bc3570915787cc87e6aabd89668680f80f2a0942310423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56ac40732570a185e0c8cc98fd72deb78
SHA1e7183d1674efc294dab7a08b1cc7572018dbba4e
SHA256b3c85f8633792d89a22a9bb45d0646dce3e0d55d57e1e93f1e5e5dc92db9ed9f
SHA512d00654b2c8a7c494f9e2aaae9b7906aedecf9d8fca6a5dbe81be2c03d2cbb7506d1c7379c38c866b2daa9941bfc5d6c18e018eaf83ef9bb40af98356d1226609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD511e8130cb268cd11ceb0ec47fd70b88a
SHA12da745072541c8e90c99f4026b98004bdc9cd168
SHA2560a1cd20f4ae3391831bb93c6210a3a4bcb0e58545533cf15ac18054d6c5ee444
SHA512942acb05b7f5f4a741894b7efd7b70276fc12a3818c68cec07832585a8e6fc03054dea482d80d945fa4c15b23dfd7a1a6674aa758e490c5f4f6a299541f6aa55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD521d3cf025f7325714ed4831e54866043
SHA1073a02fd884ad7f8da800221a03689651ebf745b
SHA256d4b29ed7e5cdabe4d70264c88a0878c719c7db683f6bf4ff8da438eb501bbc1e
SHA512599b8c9f64bc030b5c9caa9b6a44231b2f171e47432f27d8ba16bebf45a602d0987c8334f2a8ad2663cb62844173c5ab3354a89e8974930528fab620c8efe6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523e865c82d8930c0e222bc0941e54461
SHA1b48ff4af6545af806d887086b4bcec76ad1861ac
SHA256ef5c17c331c65fe2c49e802a394c3f867e2d55954f9f188baa21df2105ffbc22
SHA51208d38084817937d021038d7e98b7cd1b372356ee17997842a87c1f902515b4f461e629e942cba1806bb27f7aee01da31deaf5fce7806d40d3b226b4f85557b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f354a13abefb5d4b46f9176e4f910186
SHA13be1715853c99344e6dc2d199917dee836453c7b
SHA256c7d215317741bed3ab79ef31bea655cf1b930be90e19f945c307728e5fbc7965
SHA51249e2fe96f6b25790ed3e33f710cc49543eaad7b6685801e837af7a8c839671404557fcb10359b704c4cd8e17bb78b1ee784ec6d7fb9cb1f426a705e61f3d0da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a9d4deba3536f24d612c39b7d78ebcec
SHA1048273d4f8aed258c91a24fbca7154ecfe13eb9a
SHA256f67fc171ee9f9e94a8b3d1b6212d6d442d86bfe3dc6d5ae706ae649ffc5fd150
SHA512be8351957b386e7406813cb7f4935ec012a1d95c80fef922cf8ae2e5f8fe6302ebac57ca451b28155726ed11e41f982b54528d0bb7b305e584ad5a06b302e2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53aa2e7aa5902b3087a7a07cf297291a0
SHA13c252828ff04fe0889e7d8cc5374f6f24917c62d
SHA2560405c5347eb98e5ae3ec56e17f4f8bc5ee67a9ce61e8f86963802e3ac8186955
SHA51265ccdd5af811cfef6321c5b916ebc5716ada0f138c3f0d06d6b0534f9b1abc662edff58cf9bec0e1006b372f36ca01894d2aabcc4634c880a5a64bf1eff56782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e75097520a53e7f97b1a8b2a077d2106
SHA16ea548fdd8b74028a9a95324897400cce274027b
SHA25602756f6f293dd6d2c351af29fbe6832da52c945a712e64243c4e3752851c73a4
SHA512fbe6ff26f57127651c830f49898152e01d0724c01b673531c7eebe7a91555166c2dab9ba7001aa25768c4e94f618913d0e9bcb4fe14dd897a43b4e641604444c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f2839568491b16ce43905a0465e6483c
SHA18cc5753cb0fabcac05989e88f20530749a015579
SHA2566940a1bb50356cb08a6953ad3b63f8c25a06265ca09e5f01c7c4d8929d051b4f
SHA512274d0403fc6ef18b5d2eae846af2796f41027ce1ca0b1da8e16ae024069135ae970591bbc00299fa3459355cf2dc9a4845f72076574b82d82a30f914c9358067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54e0e5ac45edfdcc557f519ce01d8ea04
SHA11de4accfaebd9fb6a3e2dfbe67ab67225e71c364
SHA256dfdfb17727c71808c95fdd2f946bfa7532b0a0f8519f0291d70c8a1c8e3c7211
SHA512c35bba269b11d8a9370580171792b29d523422df04a281b2e2577aed327e03a210b9346cff68c46b2824ad615bc226eca234850e7daaeaa8b8f161049d54043d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD534ad6b59ea92923f0435966e6eaee63c
SHA1f9efde2df143fad07ce093184bded3be5bb52768
SHA256163dd0c717937ac52b4f8baf97a9ac69859976795e74b414fc4450ad0fc5ba25
SHA5123192dd613e8ee887d84119e396e449facebb9a5e0e9bbe1c61ddc0c0b81f7dd7cbab4acd65ba6834bb87b6826e912dc67832e6456f94533bf69f103e9767fd4f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b