Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
863eeeb292dac17d4493c49abbcedef0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
863eeeb292dac17d4493c49abbcedef0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
863eeeb292dac17d4493c49abbcedef0_JaffaCakes118.html
-
Size
52KB
-
MD5
863eeeb292dac17d4493c49abbcedef0
-
SHA1
37e3ff8afcb9446ef3bb37e7a4413af6279245f5
-
SHA256
6235139efea19fe2f19281f9b144285d0b573459f9a7a3f32635fee3ea2bbf5c
-
SHA512
36d1a0c421cdfcf8dff37f0c5480802783edac93d27fcdc84996efb95d94fc127f32833d5548b09d4fb66d3d0906ff6fd791bdc9a98609b98199516fb4712519
-
SSDEEP
384:NZFHApXITWDR06umgvt4FfIC1Z8PMAnfacYyVYT113jKX5AmELwGLJGbPuz0savZ:NZFYbyYfIaunidyg+jQB9cR/m2jDIG
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E973F1A1-1F19-11EF-8C92-6A2211F10352} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423300029" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30dcf2bd26b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000953b0df0b128d255ba3bdecf69a5007e3d4155f967892e0464b3b8b46f110cfd000000000e800000000200002000000010822efb86e4917fbe855eb716ff16d819d05d9adde066a02ae4496f709284402000000014043de606885b7be99d5e0ae984264e725d0377979911d772a336e715c190ba4000000034d2099456375cc01e73f800d71e50ed56b0fedbf38a1af9a145f4d0d97d3cd2359196b20bdf8a8c9aae581b0b142dd65388e7c9b94644dbc2c48c3f4c4c0826 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2592 1972 iexplore.exe 28 PID 1972 wrote to memory of 2592 1972 iexplore.exe 28 PID 1972 wrote to memory of 2592 1972 iexplore.exe 28 PID 1972 wrote to memory of 2592 1972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\863eeeb292dac17d4493c49abbcedef0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5259e8fc6bd8c99f526c761e5b2d5437a
SHA1d5c93cb34c016483fe5c294e889445819a11b3d5
SHA256318d4dce59309f4abfe722140339d8955f4646142784ab2fac32b1bdc67584de
SHA51200b1cce3859ef36c0496f712016f8672e7c9dc7aa6fd3cb7ac3ccf242f55cd01c632687a3cb0883eba0c4c8aa77fcc931bd016fe702656f900660ac8e67d93ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0dd788333688e28a9a2da7d135b52a7
SHA1f8fa7042f899873dfb39b56d8277188df582ec2d
SHA256fbcccd6a73a6e4f39d921dc3ed7de0d310f317b29033cea9aa750e61db24d06c
SHA512f30595d8215afeb50abf503fbbee6dbe2fd6184eb668632f9054bc667241249ff3efa4d3ec08a1508d915b9eece0789cbbbebd7f9d0c6160d16d404cba91cbb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504607c8df1075525e07ad6aa094b821b
SHA18f15321616f4259947c84b7336447c6a90efb8b6
SHA256446d38ae830723fd3503f59ebea7bba2162d71f70800170273dabfa6baf43c45
SHA512649097d2c68ff31caa9057b0cc225d07d45a5322ef35ef9c24f3d4f035367e3ce6a21eb0edf4f35d091c7ea22e1ba7bb6a0d9c82078d59d5314d01fec96254b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a2eb441f68fe920fc3698337fe8bbf7
SHA1a303e7b7ca5dfa2f379ea76782ba40cf0b2e6242
SHA256939bb2bfea761067b854d19c4be98be3f617b76c6fdb1c2479074ece301d0afd
SHA5126be12b7202e819718e89b66fb51c1c2fd550262e20d619df075a8e9e0a2c6329a78d731a548ac85db7ce9b5d43019af02821e84c846be12c3659350edcceaefa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5329d7651e0bee0515a2a65560671da51
SHA1dc52bd7ce24045f0b0aff7ea0a380c72476cb9f0
SHA256f37a1392c9f40668e04520d2cf03b159e4ea378f3afd122b9d0686590554cdca
SHA512f34fe90305ca369e744846da3e8d25c195cc151d3564f1934bbc8633efd41a18ee983f0bfd4bf044225bcf03d2087896385117d298a04a91a87219dc2310cfb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d271f69111a027a6a4468e66bedd222
SHA1703bd678ae4158737a9e28d1f623f3daa17558e2
SHA256335b3d6bf111f5d3617b2383655d54f229e1b9823e297872eaf975e1523fff10
SHA5120c66b8ed6b0c51877330e1bcede7bf7af1db261e1bd767f2be298727a6af00564c19618db40f1c27453cae2d5add6f6f987d5a154d0fcb2f361b2b5e61b89a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5362fd80e30aa8b990272a3659ab563f2
SHA1835cb81a27cf07934a1cc44b5da8c91db2c13a97
SHA256d10e290bd4e8328004a43e3cca4beb6a620a849db92d668f6ac900575726b842
SHA5129f7917c1a96ce8ab18053774e54d09563848c4c85923990d5f7526692c600a98a831333cfed16ec7cbb7a9d534d312eacb7b70ee10dfc9327093ae87cb4048a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd7bbc39249de17c27415c8725278c1
SHA1d35cc2570d6086551ecd01b0df14186c9b4f2148
SHA256618343e31ee953c939e0e6075083e997534f62b2ecc31c1d959109a58e89cd4e
SHA5124b9282f282e3d4988ca373a761c3884654ef2a92971cb14ed0feebe01047e125f94f6c29ed5e8bccb450feb81d78d3111866bbeebaccc03aa29b12d2b86c75b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c990f6395e69f70184f940047054aded
SHA119564a7b54c25720fc13922766b3dc50b3a283b2
SHA256a0a710154d211b54f4f79126cc3b87a3f2b4c1f2fa7930b0aafdb5448831846f
SHA512fc1a4d00b44550ac5394b3f2cb1819c6ac4a906dcb497cc6f5453ed0222717c1fdc172da3eba824e914c4514038380f83eb95cb12f1e2cf5982a90357748fb41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538eff645218b2ae29cac6879752c6b93
SHA12f681ba63cc0291829f4a055db96c0a7945bc53d
SHA256628e77a005b094d635e0343fd243ac9d1b3ba960211e01a5750946274fdc33f8
SHA512b47c8b60cd67230155793f221bb84bfb6a873ea43d12a4ff87bb03e27fc2815b12c199214b4e9ec868c126cdcc7c9def57dd19cfa32405c7ab951d0869131b98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cce3ea8c09316dce2e3be6cda8d9c3c
SHA1e8da87130598022a08676c79ca395119da163692
SHA256180adece39c06fadeb570f60f4252fd4eb086e09c5b30a8995f9490ea7953b36
SHA5126930f8ccf294a0b9cebfe15573c0a3c51ae7ea8b68d874296831f3d962880fb96b4d7d16eb806d44eb37ee04ebc0444eda7381c662777c77efa9bb8c966cd05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52153c4d033c6c47eabd19b527af4250d
SHA15f716ccdfd86158a39da4f5e7595df50b8615c3b
SHA2561ddde3335f913e314ce48c9a1a6cd9793bd350d92943b78fd1b3bd6dfaf0065f
SHA5127cd86b9f3b160eb8fb54fde7c954a575a8507a08a172654cab33ba2e6d7e4c3b421ae73972a237653bb9bc2ca0ae2d3acb2309d8213eb70be69b655a5361c86e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2eaee14d6349465a4c66d36d26cd31
SHA19f68a85136ac7b5768fb42d99570d1f71a48dab2
SHA256f24ca068888b29b76f3c17126126dab65c756a23664093cba6b74214e410bec9
SHA512642ca20531830d273db294bd58c0143ff4361827ac82f9a01df9153544d58a38013ad15ece2a47c0abc75b2253588fc0f089b3bc45ff24844c12106e9a369955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fc69d6a9418236b09795dd97d7c4965
SHA19ad93f87d6135ea9c1086370dc49e4aac6a62cc7
SHA2564723dbde1783d4627ff93a3e0698b085067d9556c3ae7c6e7d5a6130adef6eff
SHA5123484b6bf1ae5eb8db68ae7068702927c5be98e2a4b855e2fb96128b5b40afa1b4d3782ddae558624fc45f84cc1bdcfe13af63358d3f79c1cd17c9e5db7e79bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5716019f9d1bd7b3a5a8d99657de2d98e
SHA1db2ea2a02a3e679212423b62ae12a8f094dac5a3
SHA256e5fdfdcf1f79266c170eda1cb8af62aa494afc49dcdd5ddf214c3265eff94eaa
SHA512843209409245c26e63d4f49f3b5091ef0804b1ba4980578ffb4e2202f7429ad58e3ac8c40020b769830329cbb19be6e5ba543411e23ee723cb08554ca7331496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cff65ab742b98da54934b0ed97ba6c0
SHA1a1cd21efe79a6ac803a0c13c6524f28c715e66db
SHA2563fde042ab0b30786b5f02ab7457f6d20bf7e3f183809012cc527ce3513a5abee
SHA51273c795e8a6364b5d86fd9e7fb46f6b1c1e1761368d6f35c4673559c925c49796d1b9f922f3ad2cf3dba2334e006824d90f171d5d7e7558abb0bfe8132a930898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59faa967c537049ccd765b96bf6642510
SHA110c6f0649a6b18d85991d302d3e0991a8af15292
SHA2567fa282ade2da492482e19cbaecfcfc10c359f80c0cfa987e6e63da52e8df2fe3
SHA512d5d2055014a73f509f0a993bc53eceabee073faffb6ea3a67a846483efcbf571774ef9db3e301dc9bd063ad57827cd6e2e981ae855e4b67df47a94651143443f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552ad67173ccbc6cf146aadf7991e6e6d
SHA1f0e58ad145bc4182832c05428eeb37bdb0089e79
SHA25674e3b62bca6c3af5f009ef7385ef513ff74face62ca22a68d95b39491152d21f
SHA512f8d8bc28e85740caad8dfe924e452b376a582fa318f79f85f47d64e2bb4ff11613884d56fcac3300507da7eb0acb816d06344a26478d8585d5b86124da3d38da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50211b1d78619182f1f1652b80c08de2b
SHA1b139980ba9b927a457c5cab68abea89210f157d3
SHA2565fa386ed4e00d872967d63268db82e66177b508a693f9d567c60eeab76a18192
SHA51290ffeba938c2c7810258f30c0352201d3697cb12a106946274bd536279317c5762deb61367068c10fdd0758cceaa42f294b8c84eea17ef4d0f65c7e1b4b8b307
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b