Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
878b511fb59c5fc05f94ba176cf01c37_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
878b511fb59c5fc05f94ba176cf01c37_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
878b511fb59c5fc05f94ba176cf01c37_JaffaCakes118.html
-
Size
4KB
-
MD5
878b511fb59c5fc05f94ba176cf01c37
-
SHA1
8fcf276b1e60fca75693c464e64eb7b577341efe
-
SHA256
3762fdd5f6fc98455bcdd6e5f11922e086b39a0ac015f54ca1fbb5f07e964b12
-
SHA512
7c477da66a9d048bf4dea55602f82c94d234a40fe11f0bd6daa578b8f6478dacf5810e738077e326934f5f80499372a37c306fd3cda6e27a9e78d388c8b5adeb
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8obchvd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423332649" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f2c659d152b7314c89ecc49818e5b06700000000020000000000106600000001000020000000c785ae18dac3853ab782c04ea9508fa389491f18a7f3736501279111bb6142dc000000000e8000000002000020000000073819203774bbeb787d946edc4524fbad21224cd6a942617a2f1cf39393fc2f2000000063505405c26254e6fbbc3392e510f78037701b24ab4bfe4e77f89e1e23c68901400000006d5fdbaf130b8d54266b6445f80475f671a15dbde6d937187d81abb6b6e9b2af9a8a6c6d688188b1bfd4ecebe9267c9cb8c57e8cc222c9c85c35110880b14349 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DBED1B51-1F65-11EF-87AA-FA8378BF1C4A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e390b072b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2660 2076 iexplore.exe 28 PID 2076 wrote to memory of 2660 2076 iexplore.exe 28 PID 2076 wrote to memory of 2660 2076 iexplore.exe 28 PID 2076 wrote to memory of 2660 2076 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\878b511fb59c5fc05f94ba176cf01c37_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eb8ee7f3e24891aef546d20e74069a5
SHA1f158f1ec4919a1be3463ff385b9e4eb590d34178
SHA25626b95a212b501dd2bacf593dfbec126c99197cbb49a98dc37b51659132a488eb
SHA5123805c58337c886fdef2e18cffef0035843adaa01057f2e505fef84fe0c4165bd8427c804cbda4466f5700fef4bd8e5ec54685ac4d0a93c237a67e1bcc9cf241d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a241b56975fa37e428e172b46cedc4e0
SHA1849e7b95121f9435ee03a0de55b61c3023c30d13
SHA2567075d061e2321260681b920a23c18cffb227b19769b5acd61d36452766e36ee9
SHA512896057e0d272d66125ba427588f5d0a4f1cc479cc7c0821646b37377158ac7b68e0a4674a68ec899b5642aaae9084f241515363b25e2c0f0b0b6afee6118af73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5364ef57747b00f0bc277e67fd60a7c
SHA19435e68cdfbe4d2158573dd65ef0a48458f7ac10
SHA256eb615f9cade1cc22157051eafba5fb02b98d91e417c7b84c2c199cc5326caa14
SHA5128c4a56b8cd30c12504385e160d1c2a6782b6240263010b98511c0db4733daf7ddb654aff2bb52bbca42f3ed546a33829eae5d6357f778f76e4804bc74f49ef8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595334364b1854403d857d1587855097d
SHA1a02a1b092ca1738cc306a6d05d887ab82ee8ef13
SHA25658710df013c8aa636474665522882b82a688d4d5773d3695a89431a6d0d68109
SHA512cda2a60b99a69348a347888e7672ac3eab0457436eca3d467656509d8cb5690468c5b56d628c91506aba7960c1ae9d784bb95580aa8c211933c8aa50a082195a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad33033779d62f06b60a71f5996256f4
SHA147242a02a3ddacc89a1d7ba168289cb7f1e87580
SHA25643e686f16894b6149a05cccd334b098679898fa5e7a3e99e594b54f37008f029
SHA51292430ba301554ec303caae1308a5d751cefb3ae7dfc66cddce1322b2bb37f333a7193ad14b47513332cef45fbf5b2d22883a44f12fbbbfa16167abd45a68e580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55847bb6934cf144a9c07cc3242024e16
SHA161453c9506b236abcafd3079e21b84f68de54709
SHA256b6c3b4618c4a44b0e7ac703c386dcd586e28d9c833eea2f6da8c1ba16da83e77
SHA512b698c034993059942e545736802f515151b1e30126cad0270fb269459d4a4eeeef39af4a42f6872bc8936f5f7a669454b3e2516a8189808456cddffc3c8e2593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1ff0fdc7cc889f954efedf6335217d6
SHA168949d54149bdc17a6734b9216b4893268340489
SHA25689882eed2d4341646d220945826a5dc988011b5444fc925019c6645ed174528b
SHA51251b7df8ba7d9f2178cfb628d0794dbb492f6eafa9aed26cf4739f791b926cb1d9db056d53d421efd568fd4422ecfe3ef38bedf0e9005cbfc5340d8a777f9f0d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa734431cd1baa2de06a7bad37520119
SHA16bac045765fe2d14084602e40b1d4499123a7b6e
SHA256df9276de00014d5a257e8446a8c610939e6175ba65bb30a19db98dee4a54a1af
SHA512e2396779d1cf318308be3feb89ffd8c050d3b9d1617b79f3e5f037f310e0c1778c3e133b939b6baedf62fbf874cdea75bccf1b089b3d3324857932f1a3111e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f7271bd828939cf3a0ba6233be56b6
SHA10372d3c76298f90ddc7460493f17b5bb84e302a9
SHA2561e47b75a07afc4d4d2d417da3034f37d94e58c69b6ea8fc21933bfbe09922ef2
SHA5122035c5f031c3ea036d2fbdf8dae0327033b882cf9784154102e41c3d43b3e062935f21ebf7c85240ab24e83ec10bb5314f9982fc143c81f8922be576b1d0cc51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df4a665ac1a100bce20ca67a8c8ca62d
SHA1ea209dd8b2fc8ab79709d48d2c64317a5e4f7cf2
SHA256f40a394e69e54cb5a941e98dee5c759257f7bd28aebcd36bd9c3fae9b78e0e8a
SHA512052184f235302c46bc2ca467265323f28a8eea31233cf48279f646c8a87a7ac9a4438f0a28d222542d5d31bd757380cea47639b57a6838fac8bbbe7b0725bc90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5288a9e3728184c5af7181ab248daa370
SHA10dd63004b7b2fd681ef217f5ed56072ada8f3a28
SHA256b3002e8fc1deca997bb6cc929c842de365a4b3d3b092d00f3146820343869aba
SHA512a22771eeb4154b141a749433541713130e3bd1f4845808fd76e040ecc6cdec1ceec431fd72f6228dac52723becaebb0c253f5476440fc15507a071615cecacdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbf7a37705b4fc77b96be011b40c833e
SHA1fb5e61119254c49f2458d464a2a9d52162a2a44f
SHA2562ca8adad66b542f59c5e6ab7962f5e6b0f9b357feddc3380324ed751e2cb4161
SHA5126cfc75d611151fb29cd3ca095fb386f89a7718270a63c4841e0c6bbc537859a4af93cb4e1f4c33fd7484dce1fbff7054b75e7178b5657b7445359fbbd7280b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef93b3a4d9db062df9a33d54f8aff161
SHA17a9d530094c41d8bdf725300c096edc387856601
SHA2565f314627891645be0df7392348e78abe1946307d64c702eccd9f65107b3b3273
SHA51214f33d74bbecddb786feaf5449f222a0bab1c436b9459699e089a84444ad8c205186b742bd5884f2c9dd9a71caea8bdbc4fa859ed9cc95b2162b7aeeb8e5a3f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e202abe4c0af37f5e7f1bd6aded5ac8
SHA1656300d325eb33a79641ca4f1fd9e109149abbfe
SHA256894265c578b3a00b24bbf58ac9883f06b0f50a19b0cd4e52a2640e7a53423058
SHA5127834ca3b17f354703f2538f8533e31bb09189da2edf403937e179b4bcd416822927455185a48e54ef55ceb1cb4389b58d47fb7dc13aeb659480cf8de7b6b625c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52450eb27a1e55cea9d5efbd1a053518d
SHA12f8439a1226d5f92007bec6d493b6e98f9c3189b
SHA256b6cbafa5cd9a47965704ab4485a7da493105d0506ba10ba49688e9c4fdf14c5f
SHA5120833633462b5fb86b41c9a589f3fa070af17dd0fb34cf4556ffdf5709dbd6170c62db44600912a0f6417f0c679982ee5535839e8bda4475491e8adec66b6ded3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c521f7d4c9b764ab58e4e117543284f3
SHA121994cfa0c0ab8d84f47cebf314a5348fc35fd01
SHA256bfad5e6615304f7940b84d04b735cce7ee7d34101aee76e7173bde4db536c554
SHA512e41eb8b888d5fdf8f0101399cd691ae95af5832d118350f37d3821aaab145748ab0a85ba505219b0a177c603ba6f3eb186da1a525e1df2d8a4529e23480ffd67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d537fba87b0d712573ce04c8b814057
SHA1cf7848c405ded2677628b9f83494cc87ef435892
SHA2566f3c4648ceb5ad61043bd1e4cc6c16ae6b2dff8411988716e86ec11234ae0867
SHA51216054421a75217d7478112130d29615eb3f6d3ba2479d774ed05f23882093725303f179007ded8202a81d52587bac712f808d8dd996fc74b3e9fd5db5b134f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ec824ecec60a192630ac49766f20504
SHA150f889c07a20b2f58d59585e83ec6c5e368b6eaa
SHA2561a55cc2a8c0c1e595b6727bcc7ba3d0a9a1163b1d1d2142c3a020d49897b5f6c
SHA512d378e83a5ccc0f2fa711c0404b1fcd63833c0295dfc998a65b0ca71045af371c805e0037b10d8eefc0bea33e1a1cd97707178b28c0ad3540aaef23e42d7d89dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537059d309b8d366ae1f8f14876fb0815
SHA10783799e644040b8cb4b858d7b41c686a4e822b8
SHA25661f4e6dabf8744ee80fc59ab07ebfb0b7b032f77b0a6a3244606fa483f522322
SHA512a4e9d697b7a4315446243fe35556fa15eccdf6ae6adcb5f66b036fda9a3dcdd1c249df307059897ec960c3fb6c896a35b552c3c7a861d986965e32893f81131d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b