Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
89b43d5be42a5816d7c7135f2428ee58_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
89b43d5be42a5816d7c7135f2428ee58_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
89b43d5be42a5816d7c7135f2428ee58_JaffaCakes118.html
-
Size
67KB
-
MD5
89b43d5be42a5816d7c7135f2428ee58
-
SHA1
f45530f705b331d88478edcc1b73039a9936559c
-
SHA256
22d23033792b7bc503a3b3040dd3ee39b8002fb9ee88b9c31e20a70114e7c115
-
SHA512
f097dae528031d4e62402560cd88c12a8d4bca98e68e168978d3ff03586fef9c7600a40ae6e37bc7a1671f817c671577bdfd73880973531ae5a15f49039dac19
-
SSDEEP
768:JiAgcMiR3sI2PDDnX0g66JbNEbXIEEpbJoTyS1wCZkoTyMdtbBnfBgN8/lboi2hX:JEfb6bXDEpbeTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e3d7daf2b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423387695" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000047c1be5ccc95644a94905d54e4c72c1a00000000020000000000106600000001000020000000f2b500c251988f1ae2917af76f9dc11837a8e3377448dbf1576c4da267a50444000000000e800000000200002000000055dfd84ac52972bb73c215a709e1fc2c538de31a2de54f3426e456a8499e492120000000280d830818a219e5ac3ea5b4bf22f7bdf4f6ee6c39cddfbd21904d8de5387e1340000000a3550564a4ccb565847ee30cf44f532d24274e0c6c7c6d942a1ce2f2ff872b9c050f13eb3dc3f43b4fcd57d504d6706c9481bb678f46f54068204415c4a1395c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05DF4C51-1FE6-11EF-BC57-569FD5A164C1} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE 1188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1188 2104 iexplore.exe 28 PID 2104 wrote to memory of 1188 2104 iexplore.exe 28 PID 2104 wrote to memory of 1188 2104 iexplore.exe 28 PID 2104 wrote to memory of 1188 2104 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89b43d5be42a5816d7c7135f2428ee58_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f91048795837493755b080ad0ab6945
SHA1c0fb16fca3e94871e0c1dfc2a05ffbdd4720f0ca
SHA25637442ce28b8620aafb63fbba21402e6b281347e81adf01603a6abbdea9cedf90
SHA5126120538ad5b613a65f5fa3306ae42b544623642d94a1bf7f301b6e2382633f83f358955965c19c428a26dfd4d9bbcf96184ad3385e4c7be10b9f2afb586af592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502d0a3757891495944c8830624db34d5
SHA13dd686cfd3ed00fa5d4516ad5e6755f55a11f1cd
SHA25610133b9b83a6136e0ca71b1c695a19288e222db3479ad4de329d08cd7d49e0e9
SHA51272c8cfa96da0b707dfa27f33237deeeb756009e45e59d29cbb332b704ba8a106c12a6d92d99f762af8924c9575640fd9fcfc3c45c327302d08e281a09b6e35b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d5c7b711fb4965f467d0eadd5822fda
SHA16a1b18f848da2957a07fea1394ef27e77ab935c5
SHA2563a41f6822ed9b726014f341c536744403855f3fe48aa73203bbfc2d280f7a0fc
SHA5129a17bf89a7eb1602de82aa1422e2ebb04a0792082dd711afdc5ca66ef25dc0cc4bdc502da9ad7bab2be36dd687409273279cf04fc5fd730e66ef7693dda10ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5816330af6b3dbe0052daebd0a389a9de
SHA13ca8c78c9e825744612166eea086a19cab115a95
SHA256303c542e2902fd00c4e7646e9c3d61389dfb24dd86e25e52b0f79f0bc2ff842b
SHA512a506aef0eb41c84b420038b0b6cfa77f1905626df9e2986c185633be69a3c261839484d5cc4a78192c547738fd32f2c5dfaed4d1bb57ba4483cac3c4234db0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c0b51b1b73b15ed031e527f4831e1de
SHA1da949815ec461f6d0bfa55f15da0015f7cd854e8
SHA256c3c1ad99c8b9d9cdfe9b6fb916319e4ce8e9bd940a93585ba5ed49c0012f6312
SHA51229cf3874011214d2ac51b8a95ea78dcf4c03b5ddfe6a9e4bd56a422887a370701ea77e23c96c20a44e3f83e579d94a3b31a573241fff32f64239f346d0a3e810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5d5b8c82d9439d7d6e9164682c0907d
SHA119a35db655e10e4a6bb40dc1ea23e1355b957a30
SHA25664486f53b95899988f69ddf5a73ff8134fcefdf2f5e357ce4e2404f1773ffcb7
SHA512e58202e19e912ddb7f5abba1f00191e905a2c33c94e00f72a8c7d9441db901095d1b6809438d1af861da767e64e3e70beff46d9ed233c888f37f6864ba66cf4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522109e0b0911c66346c93741c7df4a03
SHA1b0a7d120d0f06cc513c85b414d662e24ca2988f9
SHA256ecb0536b1f272c358e3e5b5e5cdfd42d7a49aa2a5827703ee6c828d6395bf0b4
SHA512e41f3bd695ff86eabdb4df27527f0e959c2337d130b859351c23ba379516634e0e874db21e95783058962e9cb96785c70c344fbf9da6c52048ed6126bd8c178f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512d163bc1ed64a887edfbf73788646b5
SHA1f0eab62285926ed417b4061a8941b792020c2455
SHA256ae7c6ea358034303d981a412db565c3fdb7d219f561fae6c19d8b631b0d756c8
SHA5124fcc017398df7cf88a1898f90ad50ca87a33c84bf57d85bcfbd66d8d03583e35d1eab63b9dd1aedfb91f1ebe98ea982fb77d6cda360a096525ba27a869e9ecf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c7d718a0e6abf69ceeb6093346c0584
SHA1953cea28133818fc168f5e41b076b32a9aea4198
SHA256e14332e7fbe65b05a06d0d0835231f8f1d64318dbd703037c38fef4da60c4642
SHA512cf0c6ce9647095ebd482b8c96d544204ed144fe00026bc83e75c258712d4f220ea6e9d6a939d9367225c972e89cb4a4103d5b3a37bc5d31e797d1209f4267137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa6ac6568f71052ec44ceb527fd7925
SHA1095b72bcaada1d91ade4d44962b096856da5741a
SHA2560536aa3007af16c9108cf97f431f769344a752bdcb6dbcef26a760d102f62de6
SHA512b2e8ea0d32313b7926563d31ef2f8ac318a6e994c654ac85e3169a614fd52ac0b9087feaafebc7a72a743f6deb82a308ecd60811915476d2190388ed2a195d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557cd945f56625208e1b6941c7d06ec3b
SHA18342312a1f61f4c338c949afc1818a99af4c270b
SHA256f4d2a60f6974072963b8ced215f77e3961bd6c90d6cce27a17829041cfb5a381
SHA512ea8aa981227c3a9a5d0d6db3d582420e2b379a3d316d3edafde86db29d4de442ae44b53beff82c57175626e75026ab8777f40478386fcc4244b6da6560b9e30d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb64f4eac5b41414997a4d66aba78eb
SHA17612a6a1daf2700ae1629c89a719e4fbf24d53f1
SHA256a2e46fdc7faac8e2e247c5db736fd4093d6b6c02b33d88ee7c017817fc0b0acd
SHA5122d4902bfff0e74fc2f2d82690f111b8888fb4474527541578c37fc55d6136a1bb7160dc5b9a859145b0b63746559cefd62ddf651af1389e77877fc4e6c728d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9b88f88ce7a9c5e1ecf55db8854efb5
SHA16538766fa8b357e8caf3f4663627cf8a9b16b4da
SHA25668f922866013e81f24f8e4f54f1c56f9efb5bd5e9790b2bbb0c46da8fdf97175
SHA512390481e64544a22f9387cd0bd77487f753c087d6c255582089a01bb642954f78dbe09ddb96373dfea3b4006156fea7e40603e0aae32c96d75bc1102d34190ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ecec5c7b83867d8cfe2eb9fb691f85f
SHA13e38940e6893debe138f728569290b144d41a0bc
SHA256f6207d5c9af5d50cf14474d5550508cabac7024fcaf3d1d95a7685db86e412c5
SHA51200bc300c683eff57105f714aea8e76bfabe15e65c8b698d9ea3ee3442bef06441d439fa4fbce8b854b1fcd346be8b0c2c68e8f5ce52fe55857aa9c7af1a9d1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5870fa7bc25551f6463297ccf344eb888
SHA1ecfd25df8aab1f4b44bdaf0892e0ca7875edea15
SHA25689aadced0d32b5f6c66fe10d8548ef04293b956925605e60df03221e9a89701e
SHA5128b788b0a35912dc02edab9c541ba254267fb84d36fe0895d0780174174e2983509600a2c1b0d71a3eb3468583c12144f053be1cfa0614d7565501c1f1808e2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f7e647cef4586efeb1fc69bd16d7c94
SHA1dbed7c4bad351ffcd50fa5ab2efcb794ed18740c
SHA2564c5762c236cd386488fd438c9c2b06c685f6a5e9977a3723c2446bc2b5071601
SHA512be0449cf2dc911fc8f67ea797b1e916a2497a0eb4afed7b541f954f24fb071aafe20c38e8bbd1395d29bd08e438a72eca248c77bb0f97c0d5eb00374f1713b1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d064e015d152f183e0a45431f03a5314
SHA12d24866e10c3d95c5817cf54acc122f46106d124
SHA256e6da851e06ece6dca32d272a17e1ab2cfb85351c4af75527b91ee739b54dc4b0
SHA5124cff2cbe326ae645537f17c92bdf5e50b24240818a416100e9ce6cabe7b6c68cf7052f0d6885e2cf56ee4a0188a77842486a72404c674aa4169fc0119577f8ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65058596d0a7193cae3f81154d3a90b
SHA1a459ae400f563a11b2bda54444e18752661993cc
SHA2563ce9b4f03f1f0bc4d3e5929e0e746ac53ee291affd9b70d1caa4b0c253e0cbb6
SHA512e6e9f812dcc84b3fd4be99bd427ad7c2409983c65526f690fa5c8c4d6c99b9525da56a210e8e6e07e16675863a0a0bab8b79d61d66bf25e34cc73b9c7b125f29
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b