Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 01:54
Static task
static1
Behavioral task
behavioral1
Sample
890c027f75a9622ac18a47f632db1000_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
890c027f75a9622ac18a47f632db1000_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
890c027f75a9622ac18a47f632db1000_JaffaCakes118.html
-
Size
460KB
-
MD5
890c027f75a9622ac18a47f632db1000
-
SHA1
9bb66ae22c0807750d571f353f484145024360fb
-
SHA256
5c91c27e97ea87908b75ec971cd72154957791da62b45f62a4018cf2b253c926
-
SHA512
fbe940bdf4519f3aa40517cd03e75cadd00f5c9299b109d8d612e1a135ec6749ef966e0f7503ef2830b0881ef53fae8c388b7fbf4755f498ea9d5826fdf96f58
-
SSDEEP
6144:SaTNsMYod+X3oI+YNTqsMYod+X3oI+Y6sMYod+X3oI+YLsMYod+X3oI+YQ:hZ5d+X33I5d+X3y5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000003d7896ff3fe15c1e8fdfc5ea79feb1835fc06b1512c50d5c8765248de32df34c000000000e800000000200002000000007957b866f3a96d3977f6d2f9488ad82b1aaec57e91ec4b301e3e66652c563f9200000006e0cdb60ceaba463274b99411df406e6c8fe19d8f18f6cfa81a4e7203d7393184000000058b46b0259063d73e610a11998a4488fe809a733edba350753f63877e1c5103f306675fae040a79bae435668c7579003045ee21c5d7d76b295e4495a9bf3b695 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000c00a69431c254b39899d4c68a2915ed0a5e7dd2ccd17af2e85001445b8d2020a000000000e80000000020000200000004f9a28d059d9565f9cf0c680b0922184c3ace8a600b3872fd33c0d2da2e119a79000000059ea2de732dbbad306ccfc1a1c323ad1d137c7d7ef6a2636bfb008ab9dcebb8de045b6ee19859c7f019dfc325704e05648cca7c4a7750f1cbce063b5a33e7b9b89d07592d7398068ce0813bb1379b85524c41ffb83274aa2f5f8a7a5480e7f3128a4dff513508e8d06de9202961e331219e75886f2c7d3e99de4fcfb4c5fe99633e983ef22a999e1d7aa3314c30dcb8b40000000fb90424ff2a8aeebe539b17faa52071762514f458c85d3237a43a19b5d800d34976950045ae4b28ec2f4d5bfacd747f935cee2cd6b6b851e11dd715a5884eddd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423368761" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5097fdc8c6b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0619AD1-1FB9-11EF-BB79-CEAF39A3A1A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2480 2368 iexplore.exe 28 PID 2368 wrote to memory of 2480 2368 iexplore.exe 28 PID 2368 wrote to memory of 2480 2368 iexplore.exe 28 PID 2368 wrote to memory of 2480 2368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\890c027f75a9622ac18a47f632db1000_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba011f90d192597fa5973d7a16d1159c
SHA157a2aa2b04d8507916fb9ebdf76cb492d3d1094c
SHA2566063d12dd752f514f348ea1acb5cec271c19d91059f9e10bd2437840ce1d6248
SHA512cbb93373de5dc0b71e86a5c7ef168e66132c7c150a3134cd8adae26e2d1518941ce13e26c46a4ba2dd7245d11b2adc722108f93267498b180559ef48bd62883a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59acadf6229fecb4b7f03995dbfe65e73
SHA17b2fb87d93a68d9a231b6c5dce606c9a6269dfea
SHA2560b66c90f8a5ff4544a3072e0a030fa16fbf5ee587c9779d7074da3987d8265fa
SHA512692a1b542a1c9b414189d7b9649286095bd2ed6bbee7becf648221d1d830d8539d036e4464d40efddd86b56e553293bf1714399eeee8dbc07477f845ba3349b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7bfd0b06062022ae0ab595a3a926274
SHA1dbf04d8d55aa959be95b0a8a9fca68936e4b5d4f
SHA256d8bc08533f768a5076f8cfe300597e689ae9e833852ef648c5dcf49c7d931138
SHA512cd65fd4ff7a0dbb316418b758c6469adf215f521e6e385889c3419cc290ebe4d8ba400dfcb0eda72d07ef2406416f9b3d615c67f3a9401d8e8bcf9fc811abc91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b5b110dda81e675beaf62026a461a74
SHA1c6648aa124c0e9eba61d00977b66ea1dfe1bd460
SHA256e60ec1e68d30399c0e0bf7b7e13e81d8c26ae82d86ed020fc877933d16769c89
SHA51277eec1c3b5801cb98ec707ae6a00053f033c0fb454ebfb4e375d6bd11e5130de74592722631c2ed92cbada113653eb2de62dd21d9c25836d8964182c62542c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bea0ab7581f2042e71a4b47073f8f1d
SHA1d297e0a6e0a2ff84a64b60c9b1530310cda4eeaa
SHA256ccd89bdff6e43478ab3858329b0a2923c45977db4629d459abeb4115e281f528
SHA512b0d1aec29eed566473b121d30457581b0faffa4c5adc64038d4d388ad6fe3486e52eefb249f6f0c72de09118676458b93300fd92bc76120d46ab71742a5933e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3872849bd625b353aaa8785f9f5b77a
SHA105ebfdee25185cad356c054715f9764b33cd9570
SHA2569083e201b02fb035e7ec503065f9076f51ba7fb20f827f3040179fcfe58308ea
SHA512ecbd85b1ab8831f6b8bb9634f39d6facd1f7426cdffd0a8c549a04046ac2a157f7ae3c4a9afd92a23ac75ff10ad2caf9817daa26deab436fef5b8fd71936ca55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1c7f3892b3a260944154252d7ed0ccf
SHA14f2b3c1b40d536a1a7b920598f8e1752151044bc
SHA256f760d6785bde851ac61e13ddfc12aed7eeb1372160d1a12655e66ad5e2b064cf
SHA512b1fae881690647e11096591ed8c5d559eca8808fbdcdda446c69214f03a4a8562f1feeeb5d1cf42f734c2d26a8bddffbb62447d00c329ef8e885f38aea383c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c02aa8ebf88b3c43ee81e6a62959d18b
SHA14457c5e29856d518381b3067d946d72ac9cbd868
SHA25632db61aa100696aed14669fca88d9528a50a1a1409be3e9175e55bfa4c5be325
SHA51284fef27bccbcec4d288c23b58fccf937f48eec83e3ba63c6d7ced6ad174aaea77c398877d2d03ebbd9f76a0896ce47c7b493b0d2b4f124bfd20910fe6b0ba25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df19cd989904f1c696d9d901f6ad12e0
SHA10659256e698f534aa8cf9de8b961ac2967abf6be
SHA2564bbc365337f09fce44ba17c63fdd40ab91937b23bb6bce1f6572cbff78e62709
SHA5129e9d78cc2fac711754acd9ff020f97244844a68cdc1a80510f04b891c21a3c82a3aa664f4db15098094701f96d4e495fd6bc6ad720980f9f7365d4ccb0823f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5786a35e93909c8d738fe6f8eb7880bc2
SHA1e7be3a2cc7b97eddd5627632adff4c59ec84b88a
SHA2563ca6c13b294b304dd17a8e66e94adf6f13a5aa7ffb6f012e55b3e64a8a81d884
SHA512e99feafdc67b19156805c398afc5404bb5adbf31a631fa9328de7030782964df81603263dd71247a3257f4edaa1c6b1efbfe50c09c5eb80fcd3087dfe3ab3293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d071af66f39c901c354949e28fa5b9d5
SHA136f49e00dc7ef6b026f25e873170c31148ff1358
SHA256fd898b2c7616664ac15d0153f63c8cbc67eb3065b3bfc9f7aa60e0139120cf49
SHA512f2d9c9148a9a99035a5154c48a7e28089bcadfdd25d559fa20fb7b5f16d497d8dcede6236aaeb86b50c3d337d29a875f179caeb9a4177dbeac92c8d4477c2139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7dec4d1bc09a83bb9d99554967c5f41
SHA1c85a97a3fcb96124957c27e121cafb211b1e3b2f
SHA2567e29b4b3202c19583dab52f0485984adceb3ccfb1056351aeee51f8affdeea47
SHA5120be7ebc8df4b705369f00af51748b3595283c88811fb29f9a4aeeed67da6ba0807d895906ed3808feee9f8aff39736676a9aa8933d384f45ada73b50bfdd64dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca87863b5d22086b90d6ff3a826f9585
SHA12cbc0f2118e1ddbbb499923a0445a3308789d9ba
SHA256bb92789ef134e83c50c5d10d8533541c734d34343176e536e6cfbfe4dec85eef
SHA512ffce26a24731b0a879c9ed4de9e059328ca9bfe9aeeed4f62a36c23b6da69de3f8d5d0a2945bdd9bd8808dc8b9e1e0e88c15f023acee172e5b36b5d62510a1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dc8f08c1443eefbbdc662cef1aebc0d
SHA1c92852f17235d9dde83cb79f990755c78392ee7e
SHA25651dae8e09fbd62a5a6e671ea62b45ad0cc29b5f29a3ab49e02376735a12e27f2
SHA5124e79d6395bbfe6ad6c1a7f4c067c71446c80953e2b57aedb7cf7d14efef51df8b389c823a7fb138b87c45a21f631d847901b919e26d2e69a0102ec74f92e5c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f70aad0e89628f5523bfcd0869d9b4
SHA1a559dbcaae1b62b0f80f003b8f57140b29e2eda4
SHA2560ec350fba4efe848d468fc608a05924117d5638a62d776f2a7f7d611ca12d2b7
SHA512c0142367c530437ab952b87127ea0ed1c5056cb8bcdc4aed778461d12b96843449a9ee11e33a295c1af5b27ba455e118851a4305dd54e4af8d6bf3fc2151f259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558abf98284f20fb2754b8b5a756b33c1
SHA174cec46634370c021b6113ec62e87696f42db8e8
SHA256a02b100eb2f02a8bee3194324ab626e69469ed2d10f56807d4ebb54943181645
SHA51201ae4f3cafb7eaf3b7d23b3a0fb633a4f747ab840f4e5a17f4f8cf64090e2d2347fb0d9a15cc50bd99a81653a8db45ee790293fe6e0c8e37bf4b5d19d740d83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a2fc2881422a608c1b1d858259145c0
SHA1b831877dcc68b26cc6b418078441d7e2f3590dab
SHA25677ef4ee50d1caf3305c48b31a4dbad94c24a64c8a58be7e6b3b625e66941e18c
SHA512623c4105101bd23a7c81c760a9810fd198ced06105efd53a93207cb3df316f044f940ffcda1dfae2a15d0b3a50723a75d766dfa229af8882978c6155465c8d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dd537b6b6e8532ac88ccf1cc2b91166
SHA196633eda2f8453ee6a0a466b37e091186861858a
SHA2563468755c81da9d7c6172d3e7bef6c2d451f55c4aa03e998326bd65b6c0746335
SHA512c18e7af0117de260153e9e674d4dde1cb7c84962b622e470ae4fe736e70dd01a4dc3c1a0609543a702553a414d6a53a76f60afa7c115ae791445a0f52e52de53
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b