Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
859e0882688c0b3950b62bd013aee818_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
859e0882688c0b3950b62bd013aee818_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
859e0882688c0b3950b62bd013aee818_JaffaCakes118.html
-
Size
94KB
-
MD5
859e0882688c0b3950b62bd013aee818
-
SHA1
ae3507d0d636b2999237c8022c6c04afdc5266da
-
SHA256
aabf6db7c43f57d6ffea674e61ee003c86ccd2388f245ab45d3491bccd379b5e
-
SHA512
51e31367c3d949c84524133fb84bfdf7efc22e0c8fe2ee0f24d3b844af25c9b334e1978e87bdbf52eff8e957990632b52d56e0f4963f98ffe16d891f2ce12287
-
SSDEEP
1536:WMLiNHfL/AfqfKr04qFLFN+24f7LrX0ZyOMyuZjBdkrY8mgHC+qpEyW:WAiJPSBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A35C9491-1EEE-11EF-A01B-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000846382aa723aaa45a1607ad13335e71f000000000200000000001066000000010000200000009f01724e29d02fbbbc3b9791c1e59b54dde8f49312a5940f2d0f12e80c26f5d6000000000e800000000200002000000009fc6bbd1c6d086f0ac483ec0052cd97bf605dcfab880396427c254be689768020000000e387d504a7af4052ad857af27bda785453b71fe5c3e92bbb2cd002097fe643a2400000007fd76dcb3b65bf9fd8562f1e356ad517b7803bd419e4f3977cfaacb363b9241bd8ac2dcfbdc0e55e53be02faccfc5fb684052f051f7764bc53ac32897c982063 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8000977bfbb2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423281444" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2500 1964 iexplore.exe 28 PID 1964 wrote to memory of 2500 1964 iexplore.exe 28 PID 1964 wrote to memory of 2500 1964 iexplore.exe 28 PID 1964 wrote to memory of 2500 1964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\859e0882688c0b3950b62bd013aee818_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59407c233c8858e6039dca5279374f4e1
SHA198e0ddf730255d1e1582a64d3fa6c530a45d6298
SHA2563d00d6feadb614e0fb798e745b832b7e09ab2eee6650952fb1a6022e57f01860
SHA512e454f8fb885f70cc3f57fc288a06aa351944367a6021adc7f80b4b965f4bd7d1dc4b920532202c7a500453ce7cf50bfb0cb851f3d6e0713fc9fd87f4c6e313cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c1653b1f8bfe43a1e14874317bc66c0
SHA1c22dc059e66fc2c9ee8a2cc959ddba66c3cab62b
SHA256070e9ea8e8041e856cc3cbc0b0a0ad85611ab91a9951a49bf23c1737a17f1a84
SHA512bbfda569258d1964f8bab1b057dfc4d78ff755974ccbed425bed79e72651eaee7cbcf2d647c00370fffb231489a1042a1f7b74c501ae76d28bb8a765d097dd9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce4872805ada69f025282492b5dcbce8
SHA1c491d864031655a3a59f204b5a41a0ac7613dcf1
SHA25679f88887111433dd7f29e813b5c3d2183ae8a55b6255a3a399b2ddc574c99bfd
SHA512182fa542f339ed98035180f5f7558b28cc03f23e4dce5816f6f17c416aaa2502f6ded51d6777e5f9721b974715112a12f780375ded1a3a0e97410fcabf98f384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5860ef716abd1d39591087871a5e05501
SHA1463e4ec440f579a7e584dcbd844dfeb004f609db
SHA2564b35bd9e75565eb676df9585df5fb8e3324778c1a9a3635860594e778ea8cbf5
SHA5129977800fc66af644de5c1073c677c0bccf5b8ee82beb094b91526f2dd7fc38a0cd9a0cd576ab886ef95f92d50372329801cfce61b06ae6b62ee06a3fdc7d84e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d825e40d10e13c52e48843179f70861
SHA178ee7ff1b66a569f902d994b0e67214155f36b71
SHA256ddc694de966f9be167edb639dedc4f0029c942ad8f4589930c343c0b2a9d19c4
SHA512746b58607409f12f2d941f7657dbcda87492ac36b8b9c2135c842cc322aedeffad38ac132384e5928adc7f45184fe4b5a9df26c009243c67eddf5e1f5f3e2c08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cea88a628ec4d03282b0ea60d32798e4
SHA1504a021f2c3b16d6f89af4c17e3d3dc8d5ed7061
SHA2569730231e7a302a96a79ce374e53c034d103d033308cb3e1c2653a2a312e8028a
SHA5127de0ee186e8330e3bbf11f49f187f72901b05269453bd38f95b247c8e1b35beddac5dacb3b7a67fc8c52527ee26656245dc0dd4371cc0e1ba643e8ee72dcdc65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b948608148aade080e59935b5f4485b1
SHA1fae235adcfcd4a06c838f4cab08fb37d9bece788
SHA256be8fbf220af9ef16790fca8ae2196fe382c4a0ea333c49495ca690693d2aef50
SHA512b07fd25ce572e81d8692a512e94c9ac39e3e54f9edb6506d42308b78d5e068ecc9243b7881c6f739afd6fe2d56fbf88e9462ba7ff9db8d6037873c5e3d24f939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5661e6223185db3173c08a06089c5d5e1
SHA1b1f10a9537aa4ab8c5137f0e7d34f8165130b404
SHA2567d4536d9b4dfd464eccf2976715ba8b38da6a451bfb8e5552e3d0e6154e6157d
SHA512a25c4609d2350428faafd9ec9d3f230417f8651a1ad4003ca756eab948a0ca61c948664d579bc65b2d0a625be0ba163f9ca34d065c0dc359f166d784bd0011db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ccb0936a1a0d93d477b3f02b05dbdd8
SHA13d5a684cdb7bdbf0532df86e5a53f15050bcc0d9
SHA25606fc1ef168027481b27ff73ef4c5ae859c2a32f2e1beffc7f7b74f9c42380aca
SHA5124dbe2508b2100f33ba68edc7d02cf0e71f459876c98c84f550047c5bfb873bc344afb35926207bb39eecd02d04fc1d687c7690c96a77e9cdbc32dd872d687843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581b55ee2a0f442fc2aa73d99ca681981
SHA1890d73036133c2d9afdb1af57bab4cf0b27f0d14
SHA256f8d145cb399ec6947f25bfe7858e8345f8153dbef617b841548d22bf0ad57cba
SHA512b12ee271dd64f84b9d3bae3367d7e5bee9e5ed69c34b83588970a3acf6e37b64b54f86e90749ba7a430d4207aa4f7b9299e9efc4442e752d8a9feb72e507c511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5919c6238a1171d9c5e59a6393e87190d
SHA1cd20aa4bff53e8350cf0918185164f871e2275be
SHA2566c71370cc1bfd0f97864bc6f9faef69c057161f9c0cda435ea87c4414c2c88e7
SHA512eb63529c9e472b93e429f3ff622f1255d9eb9f4afa4a52891dd71ec67f8f7561ed8cb1e3e94c6e74cf32e714784a0bab351d15a5c60342d15d8eb8e7d21c5d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598fd8a1e3c45f9d8832fbe7b208d7605
SHA112491540dc8fa88b0c8b27d30817c620966cff32
SHA256281b4720135356f2f2a10019b3d22bb6ee5f5883736ed8855436435f5fccdb9a
SHA51299707dbaa07d2ff8187c838b752c2238a5f1aef03a5f7700199a1f27ecb64467d3a0c97c9b7744a56069b1805b1ec781a56068d8b2bb75f59ffda40a24d74b19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5462ed3f9413fcd91c9e255a28c6062e1
SHA176966a5b91f1a7eb9ae0a0243bffcf25ee43a346
SHA25632cd952d5a3d0c82fbc877818aa34fbd5f3521942f24ed59ddfdd09490ef8c29
SHA512aa112e45cbbc7125a68f1cd4c0c8f4c85ef0f1bcfa3e6b33a511d874ad490dff547bfef400bdfc1897274a5f39fb926379f588c93ad2c403a99bc65e534f0678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512eb02307eb1f32407be5822e19e1312
SHA1e4c19316d4b0bcbc5102853bef102456a1e3834a
SHA256299c76dee023c7d0a166aefd57df78a56e709caf27fdafb98130c6261de2c07b
SHA512b0df8cb410ee8f9ae9a69f0ea5578720522b9b88ef9798e18f4f5c9a86e302abfcfa95e4b473dec1d5d3dd65f3625d527cfe0a4e27ecbed284ae99c56db83236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5754d1462a15acc06227ad18544ef0abb
SHA1721c5afba7da84cb3e1660994ac96da5bd1cae66
SHA256aed91cae482dedbcc928ebc35131e038f38041ec5158f4d792c65c4b7307f564
SHA512a7e7daae93138f590a0ebb21decb1add27e54365c7c776aaf8b6b3429cf36b3c05c7754154b8685dd2ea67a9a7f3f3f5ac36397c1f582aefae30a8f1c9c35baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582a9628f9a5314f6cd914807c52ef5ae
SHA10ff5797a190245d92649404bfb4faa83ffb13a02
SHA256a84de22dd55609089e5e358f3be50a5e2c0ea04c28bc759d06c1733d854574bd
SHA51215770bacbfe983405cc4da4b4788a990b435d6fa6d663a07b0e98c4ba78da56977a2e7d96693df794eebf6d43d3ff27c65ed1bcc1ce0f68ee6660eb04f59683a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136e93ae37fbcf0257e04bb182201217
SHA18e919d9a4d2c0be45672cce89f50678c32afc5c8
SHA25611541cce16111b6904df9ca00a4527db3d5c7e84c74323c95d25e309949f08c0
SHA512ba57aa123e9beecec442afda028f12b822200c86fec6918f01c22afad15af66c99838a61b3b38f0281d71d0b7b0423cda2b87ae01e7e36421b44b712fff10cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501632069f5f4390a90afb9928e451d00
SHA1e36654d8ede2a62d9f7e19a7624cf73a730c1e36
SHA256ad0862304a94c3270c0dd1cdafdb83a4b0cae133b09680977aa08ab0510d4067
SHA512f78ce36dcc10c8db01c3b35c934fb8f0e5e12e0adb8c4b754abedf21124c4847a776e325e59b330da51ef3d7e90c74c0145ee140d4dd0bee3f72a4252b37fdb9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\fonts[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b