Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
86b39b511de46dce081fe49e82767999_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
86b39b511de46dce081fe49e82767999_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
86b39b511de46dce081fe49e82767999_JaffaCakes118.html
-
Size
9KB
-
MD5
86b39b511de46dce081fe49e82767999
-
SHA1
bf2809d8920bf6eb91c8e53b4988ed82416fa0f2
-
SHA256
4b81856cbfe47889141bc63272cb80a363c7b2b2a46d2c9e549ead1aa06eb70c
-
SHA512
aa55f60d20b0a3776d13f220e6e2badf2b7cc4f2261b81e65cf326eca21f231ebc1a5afb960cf689f41626c5daa341ba82c81aaf5e8fc044b64b7ad9e8576178
-
SSDEEP
96:SdWIgxECsZ9tke3Nwu9Dt0SL7xuvfndkLISMJ2P42LZYcdKJGeQNWMJw1jtahIRh:SdQ+CsaKtDOmx6lyMJ2vYcdKSp7MlQyL
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423313594" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c29cb22a27e1f04183cbad4124602a8d0000000002000000000010660000000100002000000027d62184736942309e8dac6e943b546c3eb3877b79357ef74cfa65bcdaf4f233000000000e8000000002000020000000c9a4ba0678cbfac9834be8ab00a53c7d8c4879a49a51e0a1884f95df920db99c200000002cad4a909625a0bcfd387156a1ba71f656f117a8db61ecfe0d6368f945517ba840000000dab344b6619594491326909e4cdf4728df9af01eaff50cfbd5349e4d5e5558cd97e78f41ccf365a6a1931711b395092b4db9c0ddeea8b7a1b0b782f2af969e5a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7CFD1361-1F39-11EF-9A09-E25BC60B6402} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f021f09046b3da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2660 iexplore.exe 2660 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2908 2660 iexplore.exe 28 PID 2660 wrote to memory of 2908 2660 iexplore.exe 28 PID 2660 wrote to memory of 2908 2660 iexplore.exe 28 PID 2660 wrote to memory of 2908 2660 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86b39b511de46dce081fe49e82767999_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbe0f6bbd5a8bbcd16f405bd2379013b
SHA158107c5ee7ad240f71adf1cfc49494f5aaf224a2
SHA2565de5cdc5120b5a3ce4dc5641b011d0c45b39cf4b843265bc7e322b87e9cb405f
SHA512019f2c5c0fe87c2672c4d4513215a9058fb10402911f773bd3e3ff02c30a928965f9ca6204e8282522158f7e49a0b3b061749a9167df3985f267c85322031824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9cdb186c68c490f7311aac4f9cd9c7d
SHA1ce3b4eb2e82e12c7ef5b715cbc791206ad194f8a
SHA256bd07d424c527769acb355f293c45372e924dccb77ec2572c186e233ca8f1902f
SHA5125e7a91421b9937540775a045729d86d664aead05f0c476c11b9147e763df35efdff568082172151a5a42e2f7ab76582d002cce67c785ae36ea27f080d7125bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b17e2254eeebf3b343e567cad9a743d3
SHA12d7814513b358540448b0a994d27a22f92e549df
SHA256fa0f65acd46e9faf1cf539f3f36727194563f90f2b303a22821a2578b1e221fb
SHA51234bec53c87e2223b570c890ecebebdfdbcdcf806d937fcd4bdff5c78e0c59d2932e2d9bfd54330f0c6e86510b71f2d6d4f015bdb6b54bb29a4dd9c99aa3d63eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bf47f198d5144f1ff8c5f644de10cbf
SHA1de222ba2fd6793d25b3634fa5a3b4f294b09d697
SHA25631d7e1fd3b7e56be8b4ae9936f3e320aaf527f24e1a34d9993331f69bc23de0c
SHA512ebc865147cc414c42ea708bf6f9a4738ca88bc7272d119818d8d4b8d8ec02b12954ec4b9040f2007364f70acde8b1379561f521fcaf30ae9ba192d57b323302e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50788717f56010e519390ae44ffbe8988
SHA1b367b933d63e8e901961e2f3ce13be1a3fbc6afb
SHA2569856a544d8d94bd8101dd484b7dde2f1b61f729f2bc8bee702662f2b27507ca4
SHA5125548a6c388694f2aaad7081a64de33a266a5a63e594c5200b12f3d0d6a202373f513483b1430e8e4b58563837578b28527e9b900cca5fbcb9e237b986f9f8bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59185b0cede4aad43c37b096320aae940
SHA1ca86f8d6d3823775585282e506b053e7b8136dad
SHA256f349fc1dba7f37f5b48dbe927a95eac6238eb07ad12c6b8799260d247a0f256b
SHA51261f95abfa32aaf0d71912d5f578df5b4ed95ecdadb29a83fedfdc472a15f0a79264d4cf4e4ca9662b1696e5a4114f383e5124e50a7aec2300c9949679527cece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56816bd4720d7bee1b79df2738c847d5c
SHA18288d7b67ae4aca046eb870fc528156618ede711
SHA256dde94628a313ff022c8ecae519348abc9f7c11e3acebf62c26d12c313cd9ab1c
SHA512c0ce7ff46fbbe1d51a61683c1583c0e0dee6e67ba6366e8ca66377d0a3f03adeef19b528944fd92e8d7e2f60560b6b7f9ffa513916d2fe0e10a1e8a9aa3a627f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b03aa28d10b007ea204a621af6e8a371
SHA127ae30db25710485831ff450da70e81f77724d95
SHA256ba60d88bc70f074c8b126cbc7591bc7dbc860266e03b7be5263d22c5bba7626b
SHA5120af86e765fe39ff3bf205ba11f8d85ec7cd3b04298addf03c90cae4f75e0ed3716c7ecb602553eacc1b10045eef0efc96e1818088657081b7503a968083f9571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee4a2ff97ea83aa25ee61ad4805ed91
SHA1f40ddd0c71e50313a8373a1c797fc1334765b81a
SHA256a68dbc4f2c72fabd854d05aae34cd43e50a7cd3173e648d3a8d9d84776cbb55d
SHA512895e4cc6555329c179803742adefde91b17199581304b622ddf688b8e3a05bec72a926a53a2f1475cd1b80398867d154db30380043c5f41091c1bb9619956ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742549fc6f317ebf4d96696b5256e39e
SHA19e4298bb11f882ee2ea508ebc06b2fc44af5e928
SHA2561992437900fa201622b296293e545378a116cd4172b0d62f6137c4ebf15a0139
SHA512e64f5700e11e62c0402a7f7025c1db5050e2a6ab0978522cce24487844d5ed5cf65f6f615283dac6362dbfa192353098c9215138a99ec848e77bfc6509cf0673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158efc96f8da0a477646c353dee0804b
SHA157869900b776a71a52468a5221707125bd8c43ee
SHA256703acda52779236f8a0d87b7901ad8dad04ce6ac1f8f8779d1154628846ff5d1
SHA51268a976fdd3da5a79ad3b1ba2c4470bf2e63b086ccd94702b6538113219d92286efcb7c0f51873b14040c861f3e55f2dab56508761ae029a98bd33fba0b1bc64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2a00d225d3da2d34d4fe01cb9f5e6da
SHA1b2555321372d391153858d0ecb605743d286037c
SHA2562e9c0789c23d3e9d2f89e6faf8d2fc8ba4f7d65aaf1aa71ba12eeb0af76de538
SHA512332cc6956417594cd9347b6fd0a4f6d2a177795e0f2dd72ff88b1b64572c05a2594943f4989e9abab47d6186b09206234a21ac6312a1a086c8e6221046444f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce33d5c2fd3463b8edf7f12ce32ff56
SHA18bdd540b1fc4b83013ce17f2790f9f146c6897e4
SHA256e1a835554326fee8283da009d69f3f91f0b2527d9c364d347190301395a4333b
SHA5123458856ebd9327dfb40d9fe716c1282ad4748f401dae89dc058675c5a96ce90d42ae5ef00519027fedc02872a1b12326dbe0b282b58f8f5faf1ad93901376c6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b84a294ef4a2936f7d188b6b7423de8b
SHA1a7948b344f78f3cdb1a96c23cc28dd3193ef4990
SHA25655f113e06b1b935dadedc0d34c1bf699135179446eae2bc79720cde92a318a4b
SHA51210053f51c685e806c8966d6e3fe7a2c230df4207de216428f2bbd5827ff14a47436547f38ce5563a25968577d5b2eb9b547e0f672b2dfa722525677d76a6032a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a05cfa2bec247fd2f87a7f35a129111
SHA16f24311d15da51d9520a728a497cbb0bbf0a911f
SHA25640c8487c519ecb6c53a53eb87b9f049b1d04ee512cd8f6ab17514c9e6c8b0f7c
SHA512237c11affdda07283dd6be58f269b1d36f19a64d784a4b37aaf4527fd51373672122b56ea2846cb1df84dfe0084c26db554512b26df810decf26c965fcb6d6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523b7028abcbec2bb7353353f887ec670
SHA159a92a3508610bdafe5673ffea3c49be4fd192ad
SHA25696494c673e3479ad34a975829a9898868b474374108ea7fbade5ca20288a0813
SHA51279a7886be53aaf532151bf12c1642a931a30c95101d2cb34628a2cc64321b70a9a72e3f010dd1298323adbe2c72f61cd6cd2bcb66b8ddf63c96f7f4d473454bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b94f9fe8d837be5628cef401bd31b437
SHA1a3dc4ff22b803e97899b5d5cf64a5c2379e3780c
SHA256e1b27fd4df5bf14c5be4023100f4ae603e611114eeb25eb1f4db83372d5f2b5a
SHA51230689a5a05e439e933357b0fcb508f8561a8ea08a404a2ba715e606dfc94157e5b406b034903404c84e63a33b1f991016f45487e638e8a2fc73b310413678ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5081b6f6b700d5d64b28b491ebd9c0efe
SHA137332f3070c9cb66ca3a46f123aa2f5651a569b8
SHA256363ea6b25c8c4280dfcca70e6e63c12103ee1970f6fcba3e59bb3513cd3284c2
SHA51201bfb6f55d3f4a081505e5edf9e13f09711e9b83dfa3f39a18302b306c4430e0aef46ffa8b6213de1f35f6de2b40b8c082bc028e493f606ff69013480cbe0fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fba8f2c1c19dda5d38f807c087fa12a3
SHA1c122a64c842e1d3f0c5510cc517200991aabf452
SHA256048a5ade756a7b455b63d7e43fa4ef8dfa35b8f2e83c85a6e9fb2ffc736870b1
SHA51212a6865f1d4f72ff430a2b1c2bca88c5b70c96fcaf6e55da059ef2e2787f1cbe965627876e830f4a85882e3a76326d251db20141f3466fc2e98d1fc44b85c2e3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b