Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
90c18501f9651d57947aadbbffa01ffd_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
90c18501f9651d57947aadbbffa01ffd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
90c18501f9651d57947aadbbffa01ffd_JaffaCakes118.html
-
Size
461KB
-
MD5
90c18501f9651d57947aadbbffa01ffd
-
SHA1
900ffd09b2a25e2c455d4653951e9534920d6ecd
-
SHA256
7224cf1ce9b1b07c7289942fdc4315690251db7f2323d14b911569ad5788b05e
-
SHA512
921783d0141c45e249daf54774f545951b395b848d02d3abb66e7be2108c8994e95368e86b7c09dbf493ae12119824a73b96d005f510d0968c68c1d164744182
-
SSDEEP
6144:SLsMYod+X3oI+YC4QmsMYod+X3oI+YwsMYod+X3oI+YLsMYod+X3oI+YQ:y5d+X395d+X3E5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08e2e3c7bb5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e342298deb1ca8a1d49e2f3b00e47a95c0c50e25ceb58e6e62365fe9aab851e8000000000e8000000002000020000000aeb4e79bad21f24f893ab67b9fd21444658ef2e4f382842003a7674abceaee7a20000000a122d5db82b0daf644396266970bb03b689cab0e1e82e8e9553b28cebf3fb449400000000bbce25ca275254b1b99612bf6bcc4037aac8d368d42c8b8d2f244bfd3786d58c9743cdc8188de2262a4d848dea0e56889282172b8108caae920fa35c5dfae12 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423556215" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63A7FEC1-216E-11EF-A538-5630532AF2EE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2712 2164 iexplore.exe 28 PID 2164 wrote to memory of 2712 2164 iexplore.exe 28 PID 2164 wrote to memory of 2712 2164 iexplore.exe 28 PID 2164 wrote to memory of 2712 2164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\90c18501f9651d57947aadbbffa01ffd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526c970d4b0e3454231d525d88adf1d32
SHA1818861bbbc156f4613163a9a869150f22c4616af
SHA25633df8c361b4d5f51a6f6c7c15e35b399454e00f60ccac30e0529f96ef62db148
SHA51205f3dc35041a3f7aac623f3be10fac62c86ef6de0a2fbe38a15490121b0a40ef1ebf51c2962c7917b810259dd35f26f4a8ee206f79c13f063f65b6ae369758cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5114b17c3e5a5067df2b4fab41817f7aa
SHA1ee3db33b4f57bd79cf8c9ac66b5550d91ccbdf16
SHA256d37175f78d01728243c03698a7f2455a281d434fadac5f65849348823789745c
SHA512f7bd346a7a146959fc671a0ace30faace1e6754ae14bd5d6b1d3b69e83d2a7c53d80c623ae2a737bacb421e14c8c45e3a8420f605b27fb38093f448e1ddd8d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5977aed92e1205a4192fa1ecc0710e658
SHA18d98dcfea6d0ed2413c25520e5dbb12f40ce5623
SHA2567e23baf93fd6c98f2ba3125714fda520f78bac1e0f766a76dac6e105083af24d
SHA5129e2f115f376de83b987cbc4404218517d72d7fad6654290788ed8233bc6b3c106177c1deb3c2c739e8736cfdcf7a781f98822c5cc122936c217e2594d112a14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f1e41abcf7c41b948601d4c8054d5c4
SHA1019a5072bdb0de216533b3454239747d8dd725f9
SHA256ddb838c801510d01ed460fc8ff510bc6ae1d7d53b5afca626796deed8a25ef9f
SHA5124508f8d8075b770f38b882d2144c4d5ae459227e620b24a9e5ca9c24a75bb8aef0707d1bc629febf5ec151e955e1fbd00411565d1df8b25f00da7203bdac9643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b239ebb8ee028e2690bde1e333eebab
SHA1b7c73edddf5f33d2faa642c275c16b415121d67f
SHA2562041eba641c45cde190f893c32feaa92e55a20d9203a520be62eb32a4ed21475
SHA51216416487bc5b6716e44d03df4b5e098a1ff9571164730f91cbb363f4823305b0cd229d77791c2bbb6ca4b476e3565cf6725b4d1156819315b96184b9c491183a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2035b975d0c8dea7bdbbd579c5ea98e
SHA17f4b39e645fd3df0502fcb2f179941db08cd89cd
SHA256ddce57f1569349c9bf84eae19f06ae480b5f188456d545211b0cf1fc3bc906d4
SHA512c3cd6861136f25f3c397ff476caa969f612db421953823c3b74df0ffbd0c5cddd43367d2a94ba470bed5813a18ec8a3fbc838a1c089e374dbf643346bbe9f25d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf00ab7b7e7fd814144674e8745c3e25
SHA151f66479800bee510356dbc440a3067a66f73640
SHA256cbb0c1020772961041b0971bc7a3ff58fc6614d19893b80a7ee00336febd633a
SHA5120a78002b6d5cc22f9b00c6b427f385795bb2a6c6b3276e853903272019d571362fcef9d364958a0ca5c4e6d905d7a0750cbdc15b83244fae626df5a65fef5391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d9b76192b37b6be65914dc9b1821aa
SHA140d23b5fb6c1010ca7081a62e495bcc694545e55
SHA2568d1ac4f51b8b95c36c82daaa4b95eace8155ea6c7c853687661d0f6b12e12a83
SHA512cb7fbb38bbd34f7b74cce9d71d1451d61bc70fe5aa8e02a9350a58c4b48834ce2e39ab7790dcad38705eb605e0b660ff16002efaf49f01e6d0c312a3a7dad11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c9316b0ec0187066c13b264445ffd59
SHA13e8ee448948345bdb330cf743ec7de03334694e8
SHA256b653bcc85c0b44f79ec4b6b128bc8bdb73a93ac5d115cfa72ec51fcd2c287872
SHA5121ec877745b32bd6aa77c49b4e50d9f36a4ab8116ecba847b59c2293ea0bdee150f70db7a623f30420a24ed56f1d01a7ec7afb7e23475ce32611e6494a756cafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd17fe5b16144e67ca59b802d1c78745
SHA1d21afe07a9d855612500579be1081cf171c2a879
SHA256914dca1153a796cc1f2e933a4c655246344e2d858252210307decd71acd9a61b
SHA512f4c0b823f25c686b34227039b04dd7e36c3aea8abbd13c1063f856df4d930b91aa6bd7cd0237fc04ea265b296ffed19b6e8477d55ebee94ba292c2d4268552bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d730a92b757c457f725b66367fce2405
SHA11dec7da7d46f76e5087706ffd6b9295bb2d38bdb
SHA256d945e27a4507100753fc50bdc1dc38ba05f5d5353ea641aa3edca04d9e709576
SHA51230dee88ac923c95c4699eefa2252a951194aa0c5f97e8d44e153066a12271c89c25cd7130c15cf13331e86c025ebcd448ed01ac9f6915997dd76aa6f150f774a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f4a06ae58acab91f48f6656a0805b50
SHA1ce6f25f0ce5afaad6f300f65cc6b269dfb7f41d2
SHA2563c6fb3e7eca7ffd789807662fae2e63894d2bf12894af2502810e1ea5802434e
SHA5126c5889b81513f73089c28a43131538d6695c61c73176b2b3660baf8228b10218a7c478c7cf95beb1e43d6f7618722b06df1ccfd8e151ee3264a15d59b505d0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3047dff41e41805ef119ecf763af2f6
SHA1469fccf639e4bd4d85a4ecf6fd20be75892630ab
SHA256969e26f5d369fc7575892d7e6df411d0b1b653f2f9fca12fca358855192f7a29
SHA512b8d32135c13ed195c7e681e811a5513c17942ae58662050a13af033120a5f06b57d0c6602185f02a510fe5ce13abde835498c46cb6825e3df859470a5196c0c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535be76e763936c62cd1a1f8fadb357fc
SHA11872d85d0ba39130a9b66cb126157715cdc1072d
SHA256b314f56acf18fcdf3ddb3716d1bae32696225b1ffa669d77bb96ffdda3580e56
SHA51276b8d0654c751ab82459cd2bf3eb8e74fb7317f62ddfb4e8f958ee93aa9ed1c5acf436d54c5a5c4b1f136ba572f8512bbac710d2e652d2197eaed57f770e69fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500dd15d274ca2dd14df93f1a991aba5c
SHA15a6a9d7c9dcb55733e894d7f18d1a44a57328c22
SHA256f95d1b016238c3990495c8da659a842fd5ea06062befc4b84ff74ba2df8f14b3
SHA51228f22ae95c4c19a96c8d83fb1e502d4f35d470e5d3d449ea394a8a59a96751c75497618c62ea220e1f877f1cd77a7560a4062bdb9acd652f38b137f33331f1d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5658877ae0efbf18cade81134fe3ddfcc
SHA1fff5d0fae7e44fb0eac2be9dfaad58008ae64c7c
SHA256e57a4af5a3a97b0c7fa2d52945aca1f51bc83bfb05205caf1fbee6cfbf8842c3
SHA512a4027e08fbd5df8316bfdb2a3f4fa61ea809de609ba9946f7208505b90fbd965a0c952d24d273f8b673bbf3530d7b0b26ec325954229c84c2fc34f1879162a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5777901b7672e2bdadf0dd85a92c0142f
SHA13e3684a98d0817687a351f0cf575c37615b3767f
SHA25699c58ecd5ca1d97fd30532dc1f312a45f7b26793d698cc153b4d5d3983eb2b93
SHA512e31173b83222d387879c50d79844c457582bca58ebb5500db50dab1330f8acc1fc1d6e6395be05639c48e8d22f74cde69833f1b8954582995b80c9032ed5e855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6ffb63a78d01858c960cf5182b5a7ca
SHA13bcb9a617929abd70f67a284975dedc2de777a08
SHA256a9069d596b214c63ed40623d5ddc08ba9dc6eb8a1e47690c5e7a98bbd5ac1b07
SHA5128d55df6dcc0a732e49371f70c2eda20d591b36dfabebf08c1b9317a0ebc53acb347cd29ef8c537e93f2f55f7dd568bcb2acc0665fc442d6caad002a990486319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aeb91e3a9bad3a0b58401b5ebb6573e
SHA19fee19aa4ae275e137333935791787c2a68a72c7
SHA2566c93f3c468906b175656095ad9bd7695bcdfd748edba04298208cd566f522a68
SHA5127ae7be9d3fb4302fc6b87911222d5a7f30da93b263a8a452c3ab9e8361eac752f7336b727844b37f995875445c0d5dca6038d7f09eb4e8bdb06a9ad1cef9932b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b