Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 07:54
Static task
static1
Behavioral task
behavioral1
Sample
89ce44e79a5dc899348587a233f5d932_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
89ce44e79a5dc899348587a233f5d932_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
89ce44e79a5dc899348587a233f5d932_JaffaCakes118.html
-
Size
94KB
-
MD5
89ce44e79a5dc899348587a233f5d932
-
SHA1
22443efba5734db044f9ab324d6a3254ee520f3a
-
SHA256
16d302cf190b7344b1a383d3c2fd023eece17697b888161c8bb8528f19925453
-
SHA512
a3e507a814d629b852337f60ca7be2295aa8a7aecd389297dd9a9770c2783aa7b08ada07ddb21497504447eb0a8cbaa5b6e99c52bd6aa17da9651276c3526e1f
-
SSDEEP
1536:WMLiNklZQGjRNtA7LAqFLZdfP4zPfat3JFgZKyzBdkrY8mgHC+qpEyW:WAiSwWBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{332CE591-1FEC-11EF-AA6D-D62CE60191A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423390347" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000571f8e7747f4245b94ca9f8209d2ead46e9c1791387d7d98f59b433a35806836000000000e8000000002000020000000b7a0401a6f2a19d2384ccb565aba3f1f15790eeb3ed0ee136db6933a25d1ad4e20000000fc8934a7b990644bbc3cdc3c4d022946debc7c8453fb1f28df8d35dd4df61ac540000000452fa5cc4ddc8f2d2c0754254f2790cb53b6b3d68124f4834f7c7ae15e849182235a65040cb7d8731aec4208f20af249cfd5248643b31ad5e05dfbc65636c312 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30c1ae08f9b3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2852 3016 iexplore.exe 28 PID 3016 wrote to memory of 2852 3016 iexplore.exe 28 PID 3016 wrote to memory of 2852 3016 iexplore.exe 28 PID 3016 wrote to memory of 2852 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89ce44e79a5dc899348587a233f5d932_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bcb581ec189f46a85e2771fc04febcd
SHA1b0ac19858cebd7acfcd503e44e41edcc4a0437b6
SHA25605a6e13f3d8d82770ea6aa2e711395800dc30c3f0a60341f610ddbf715e7d6cd
SHA512fd4fb879333467d1063093f69fd7aebbeb2f5dc38bd8edb8d0468fffebdcc1708771297de309e0643b9d8182686d8bd4ce59d2d9a2cbbfa854b1b62e7b0fc2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112df68658ad8d081f0bb45c2b8bf762
SHA144dd64a50bd27cf61a76a232443487f8015f9ca9
SHA2562b4dd9e9180b228b7bfddf67a0941aefda45135c52fced49594cade754852489
SHA512749731bc472ceb4357e71aaaeebed6145eefe84e50c2ca16a47cd445ad2edcd6ed0ba1561ca1d40dd61c7827ae87d05f297bcdc59d04f52b38b719f2d3fee069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b30e58ba7110a612ca665d73b65d30a
SHA1f5e3874d61bfd65189da714f0af64083787c38ab
SHA256a9ba1dc426f08fdf99930587d654e6f06cef3204bade4dea0ad27864dc6422d6
SHA5122a6665aa356b5e6f81fc43ebd1369cd84a016a5870ebb5d4ce518912eaf011170df238d697582be0b740aa7c1d724f346f5f2baa4219b7cb3bb48df0eec9a977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f95adca898c0dd3c4b9a85b088ed01fb
SHA18489147fd989de27dd90f219c688b45e1b0d596f
SHA2568ce2ed392ad8d015a5d38576d5aefb4390e436ebcddb596cdba4b8c577ab9a35
SHA512bfaa98089fded6e7a67290ddb4bead41d6659e186bbf7b482fa296f954a25e186609e13af6a76050d95d062bfa8ac45331751159bf9eae5f1225fc8486b6b591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae066c073250a0aecc7941eadfabe9b0
SHA10e3a212e96aadb5a3a18229e0d4df3e29900484c
SHA256b449f532e4baa387f71558ae217d3b4eb55b0ddeb78c1d76549b64d86deb54f2
SHA512ed7fcfcddfc2f90ff7bec5ff91d2b0bdd0f8ba000955180f07e366904dfde50137026c5e61539c30a73428930af5673a3105b655d425838e46d3e1737cb1040a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd84371dbc967728aa90faf90d3b6276
SHA1dc8d7d9be31aec484dd613b58918a1da6f6fe390
SHA25629f6ca6f93335b90d52235ee99f3a5679177297c0fa5b5a801629c723b75e0fb
SHA512637612d72401063a6f7aaff682732f0ba90b0755b7b7515b110dc95f3486d80a935de01affdc989834be71aed79001cb6364947a4a6bf9210f13b61fa9ea676d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d061bd9fa43994842bcf906422c5b862
SHA11ac4041bfb158bd04c306c0a378c7a53535fed90
SHA256993cdca57de0fea0f165e3eb99f6639157c47348001816e101d8deaf3d3e5828
SHA512fe80ffac19ab928ca66c17408cd728cb940f5dad268ab1c69b0f1f1dc76339765a7ae80ef11d36f2736965ef9c260799a332a00459e5cddc50cd490dd8d23c96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac9c68ffff3119de95adcde88a716e36
SHA1b3836ba7b4932be179f32eb969f9b9518d53d9d4
SHA2562b484c35d82999de70cdff690b571092d50a5a62f135445f855e3f7cc02fb472
SHA512aa813d6bdb815c457ba3beee794324547b382cb5952e95608e91cd1d970d58cb01e8052fb000444e841b6cb29eef19591d8106400d62a92d00e5ca16fd3c85de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5641318732e842745c3f7bccd91974b90
SHA1e27cf8a77e1fb6d2f799cf340727694a1933af98
SHA256cab4196bcac593993857ad2c36e19dd42771dc63389e7007ef6edd2cb97499a0
SHA512cce9bf28370f876d372d43bd05e8f82e5a5eba8260d7874845689bcd5858a52b4fb76ddcefaf9b7d8bd4d1b125ad82fd948acbf93b15a1b80f385b3aacb84ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50571df635e7437689cb8617450eea42e
SHA169f0dfa7ccec631eebee1ec7f6e81d38ab449a57
SHA256c4041ddfb7245d189c1ffb736caa58ff321c19485e365614eef1e534fa6e545f
SHA5126cc47a9c789117533a37191bfdfdd940bf10c8e4a8195aaa2fb82c4e319ebc73b619159df4306f0b7c21edeeeaf92fd5c9bc104f5d9203abc047988ef25501bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50082a2716d073793cbb6c04c989b3d55
SHA1cae1e5a42f08c6a6bf65fbec81ee0ae5e5154d40
SHA256d382582b1b52fc8e0cbbafc7e87880027dd7090a594622f28ffb277098dbd2d0
SHA5127ddfac1a85b74ed0ef783ed7c8824a6b22ecf7ad8da9d376e389cf8a59a6ffd931643b405a6700a349b9c9e37a14d918be05eba58970993316ae37e2d71856f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f8eec57bb4ff4bb61e5607721c062b8
SHA15df35e4941cffe4c9e2ff7bd0191780b3e6bfc73
SHA2568e59574335a86a1e116a424b4fee03fa4a22193be4fac5cd8740dae12849632c
SHA5129cdd06e8501403790dfa038311698f958e9a84599921232d48165fdc6f4570a778478dc33901eff2499b05ed7fe415ca7280e8fe4b213c622d32c5347fee5792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d68a0e3f4ea8822c12a8cb3f305d572
SHA151fc338eb073f9d9adcccb73e31005bf70a335aa
SHA2565a9d3c1e9432ecd2b1ee9ca15b11f31fa70f4748047eefe4b16ce4c17a8531da
SHA512a6b26b6f9f35fff6a3971f1193dd51868b2cd5f68118314b658611c811796937ba368e1689fc7dea54bbd735950c220c6d19cade04eb4ac289969546a011385a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2ebf5d98153c22ec38d1747e8b6599
SHA17059bc2efcbb7a193b36e932f2e7a20c2935966d
SHA256d799bebdb5db8817e714b8fa465f0c20e9c8cc07533b4bebe6565cc4b12e4c6b
SHA512353615657ae1a3ad8c566240b9f57c9fdbeafceed77738cb3e6e95daafc216643750c6bd64ce073b004a20bb705f2e129a63a31340be902e73f268125ebd6032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a55c1d1e7797ce98f648f0ec861766
SHA18ec219f25018c550d3caf37fb6922713e649f68b
SHA256093199fdada284c99d4dab8d8566dfc871ef7002b5d8874ff7ae286bb49db4cb
SHA5129f604bc96580f9de31ea10a2816c1024e40efe3fb82583124a35ed6b1b1f4b1795fbc1d0dc445cfafa7788112cc7ee0f34bf3c0420dccc25325b7a63fa84bfc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e93a02500b6703e6667d3e54b96becb
SHA1a49575df0c73ada3ea2d65ea80394c7878245741
SHA25658ad2547e86e9a77caf24b69598655db983a6d7b2b42ed937ffc5c85af308643
SHA512332a46451e23c67b6691e25801e8bb76fe2a2f8b46d83d87b65baa8400336a74c8d8b9b9accb253ca4eb4f4a040954645ef37a059918555a0e4ae23425a5129a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e27fe6a53c0ca95d0ad00bf0bf115d12
SHA14816ec437921cf12bc856d57c7e43c58fe30fa28
SHA2562e4d177e2b01ad7f235b59dded3bdf1fbd50d10a3c3daa6a732789c99f0c89a0
SHA5127aec949cdc3ef673b21f05316e165e1c05ccfb75751f1a63a1a3079a6dca072826321030e4990ed7649f83cd141e701050ce10e8e27f0bc3120da82081d7bd27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e505e9296697801fa055af18a4f79ab2
SHA1a76492e7393bbc7a785e5c9a0653444624407c65
SHA256ca3347ddd7e24fbc5f60c4427ac773a42ebd8f479e128fed8d6b049525379139
SHA512d44812f6129b9a0751843f8c52e37ff84993fbf99767f12582276fbb11592cc5f23b0227fbc6b76498be96baa6fb5b3a95b50a87dd139493cc3598210b31ac3a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NVDR4C1U\wpml-language-switcher[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b