Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
8737f20b69425f4b7e6b86dcabbd1fda_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8737f20b69425f4b7e6b86dcabbd1fda_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8737f20b69425f4b7e6b86dcabbd1fda_JaffaCakes118.html
-
Size
1.0MB
-
MD5
8737f20b69425f4b7e6b86dcabbd1fda
-
SHA1
9475d98ef4d92f2690a56ee63b507323fa082967
-
SHA256
e7aa6eae8ffe8345d0b65546e5f3f53957e3ed92723a87df6a6b1a3ff621ea9a
-
SHA512
c38a6914c53b3ca071ad10b4f7e29a4ce24fb9613998bf0d30495c328deb143ae8ae3bebccc033a1817c32ae9a3deffe8ec8ae9d54c788fe1a16127c657cdcaf
-
SSDEEP
12288:NERSq5oLp1Bp7kZ1HPzVYhI4QbqXieoMworRzcm:NERSq5onLIYhI4QbqXieoMworRzh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7081228261b3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423325269" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c85542098dc51b595807da7be6825b1ea319aee54ee27a2df9b1376633b800a5000000000e8000000002000020000000ea2eb62369c770071bd4db8e2ea1021b780e3ca2b648a5205d01664f0af956ce20000000e0cc4147711993e3217ad1a8f597a1d5696d46e52e4cc6564a5aa5ab960573004000000051297e6ecb889604731ddbf74e1fc04e195cf1c8372cf145ffc9015c000aaa5c561ecd8a984cea13a53315cc931700f49583d62023c512fd97ab35d58a01d582 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD1485E1-1F54-11EF-B195-DEECE6B0C1A4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1608 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1608 iexplore.exe 1608 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1608 wrote to memory of 3032 1608 iexplore.exe 28 PID 1608 wrote to memory of 3032 1608 iexplore.exe 28 PID 1608 wrote to memory of 3032 1608 iexplore.exe 28 PID 1608 wrote to memory of 3032 1608 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8737f20b69425f4b7e6b86dcabbd1fda_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc6cfadcfaa349315fcceaaa440c971
SHA1d741cb5e7a7a9f78322dedbee4cd44dffc2fefcd
SHA256622310cf49a4484a9c41def020743fdc6b51c38f59a2cd04548b955419409186
SHA512f3df85c7bb413d2fc696af08cae183e73f11b7e972d2cc2e465b29d2d65017c125ee8746b15120e674da67a079390330c04d6d0294f78dd2e670aa0f788e9379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599a0cdfb3db224a89f20158857d0ba30
SHA16347b98e0774f566191b266b8d45099d6d703033
SHA2564b498bea3b1560eadfeb1c54af9536943bdbc863cf771ad9624209d813eaf39a
SHA512ea49d9b68a0d25204d921ad3ee6f0a933c7c84f06848c697f21abe53ed39fc0734915e5117df3b850cfbfb190983d99747a06b0ae82176d874ee990c46b4541a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51371f1be0bf5fc2c31e09c635abc66a4
SHA1cfc8efc73ae8d1830d2ffce1d45f619e5a6cb273
SHA25608c79d38b783fe8c6265d43ea206b5be93e202c4553dcac5a259f2cd21f2c2fd
SHA512fec61c0cd0063fb6d75372f63a6ea88f5f8c33be7c2b6ea738c5c83fc7b04193e6d7bd397f1147c27f2200814175e3d551e369bf213cb34d2a70c9bf875f4ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad770b41609870bcb30d177f4a5ce91
SHA158fa7108f73618b286340bff3fde789f130ee9af
SHA25651c024996343ec649cf914aa2046970eba266f37f17a4f7167f864edd8b497d8
SHA51209dc7de1172987ff994d765e32a7627e8369dd0494ca7f5f7c497607ab6fb08962dd35a5059d0480d459d407e71de16cabcdedb373219a4cf38c91e3fe0f825d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54209366d973144f04481f6c05849c990
SHA1f539e71d186bc28a2bf3966997e4fd9a4660ef8f
SHA2561c6340ed0d1b9e63153d6ca1f3098522b54c7a3649a8f26fc07f2e5a78e0cf48
SHA512e820370d4f0f8f901d39637b1563217cd51a05b120416f3c781466ce932805455a1e80a72bb12110f41c69d96483774ed96db25aa9ea5042762a21ac709416ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59132eed8b7b70b1970832df096cf34b9
SHA1527e723d284d26e3b5e50b0b539188f23580a0dd
SHA2564c80e367a6159b941bdeaf845e35a904d202cc82dd44d0bb4d4eb9d369e18300
SHA5122fafc9622d9420251f66d764accc562d29298fbfc9168a8230a8edc490e2a1ca0294d8fd82513f5a945b6e71dfc6525fd40d746324ebece36e9c6cd55466d217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b16ddf034a4cbfae6b8f5647c02ca91a
SHA1afd1a3ff38568d3864173e4e3e50fd6eb9ffdec6
SHA2566cd7865c7f219682cd5c38e1ae65feb8fb4278246237520399746d3286d038b1
SHA51211b37f262bcff945f481064f940b5db296dce03197bf545fa512a487f10daed69691ea387f913192bc98eca318b0a2a234d539db21be76bf23b3b88610bb6fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5298722576a77341ecbee5de09901f67c
SHA1b64dab7afd7f7c7a3c77cfd3500d7b02546076d4
SHA2565a2be4a115ada3068114760513483457c6448988055ac21e1bc729c9b451ce80
SHA512adf33793e9411b275ed21869e73e918808cf94040da955259333b0368f3c66f3794d2ba6d8eef4e15d5ea2fbea866ca9f763a8c6cc79eff07fcf1c1c7a997be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c63d532e99753569752558da19462c2e
SHA1592a2fb3f43944c7874d6658b98ee9bf389a8433
SHA256553316a46f668948cc7f9112ca1fceae82ccb37125b2dd32a88254f4d2123300
SHA5122ca3ddb8777d8b471929e4e90e7177d9bc996c87f78b1ff5ed0fb3ac6f459e6cf6ef037c545b7e543d9b7c6e10aec02ea97d5bb4b0e0acbec970d1390dab4b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8edeb9c4a85241e675f5c8e4de98eea
SHA185656a766c16d3b473dc853b0219a73cae817f47
SHA25673ef91e88d801bc1860947ef8dd3377ca68bae51ba5b0334f996f316b221cfc6
SHA5122ba59e066bd659c7df9f95efffcb3e1999808bbcf0e1467edeed49c264967a6e8725b2bdd24b1d262670bbb3e23758ee77ecaa314853cfc3262edc8dfabb71a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5701fbb210a8508cb2d1a892999ff612f
SHA12cef5961bb6a54fc9b203d265ce0bcb28baaaad8
SHA256f5dea3ad00e428bce9453bb2e24e273d879f4e2287e344c3d092d3920436f8f6
SHA5126a16349b50e48644c6135624b3f6dad3e87f587041ef8d0d151eeabc259d2a47ee6ac0ed1dede20a4b128b63fa56b93a31022d8d74576cc1217a5804830aef4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1176b8c0c2f47b0812f7f3e936e1597
SHA137b65a52c823705a89951d07e6a8defcb968b70f
SHA256af592f63ab81ba3ff7194f3c5a33a2d6462cea1eeb7769aee260becf1022d659
SHA512bf5412a849e0368824459de5098bf3fc01e256ab4ec1c38aeefa958e4f7ac065f5a930b3681d774972e506384ac418db16b85bbd48fb6cd7d30aa04b0595d0df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc8a7ef7fc5b7326aae257486ab014e6
SHA100216eaa4ff2dcb9623dd58d78a8dc57f197d600
SHA2564c291a234878a3dca367a55c73e7536940e053d7f00ec1e8be3194cb49bc7c29
SHA512783b17a8acbfff342f69f7e783a1a0e872773c5f86f87ed5bd652d9817b1e9cf59158a79cd192b6729a14f4b6ba31661f0987bf3fd281432d40100c591574deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d50e69fb97703fff9eb3a5475e97f9b
SHA1d620a8afcfa7c0e3ba6d04005a6b3c6351ba1316
SHA2560a06bd20b1d11240fcd26d2df5b151348f50674cbf6e22b7e50c2c86de951e48
SHA51266dd666d09849e9c723ff8d6eddff6569064caf00292bfc0ed2c00c1869d78e08d6ea3ad99bfa1c6dbfb400c140abc158b55ec50a1e237a78c791b52273eeab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5febb6e53b65b21cb3b581b3c03f27824
SHA186f44ced3d71837b2547a311fdc322eb17f4efc3
SHA25627628a20158b2f9c7fc72ed168f9233e0e5d06b9e34eaf55b1e2b2be67dfaa35
SHA512ac3c7b24692b2fbda29c6f873699ca06dbc2ccd9a4dbb87e16b7018dc4b9b4b5d547532a9f01dedc3a1c47a693d407edb3ee9dc2d1330a3cac98ea847323ba22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c293b290d1eebe24caf0033f885012
SHA133a48678eab1dd707ef6ea90936917ab25dba28b
SHA256f507d4dcfb3d7329c63ec197c3d5a33fb723903675275e471f29abbeb0b5e97d
SHA512d4b6dd08c1ae2b2961d429b39c2c6d5e48e4f08bd697638b7bac910c6b668764cdf5405b4a29928064ee98988c61e815e36d43ce60762686f7596c13b814be09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87c57e6e0cc414e7aa77c3b5d9266bc
SHA167c680a413dd9c0ec8c703435955cd0f79138387
SHA2569f76501ff9d66f27d151e3bc9904f033067128e3feb07a062bd61e87bc295e82
SHA51245810613bf47d7112e363994f7631162c3cf3ee28ee2a6c63b62b4c60ae06cb97d7c63c3099c2193396e26a6ac8eda0b7756d6ec1d0421808ae6fad007418be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d44bc7c14fe785765fd2f8019e99ca13
SHA1158f6b12a9b60d0a0eb3d552a5a79bb1bb3398cf
SHA256d9166c02e277f31df74eb4b083dcc0a799891adc346982bf04b20d8a1ed035ad
SHA5121d9c13f76d5c7193cbe5a7b7d4e9ba8d7d7171b0e7e918e3a9b14c50490dbc26e1be1a5234e0996ec97a3aa56ba2fe3febb90ca60873ceb097ec03262c7d5be5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b