Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
90fe9da666da006d39081c7a0c8322a5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
90fe9da666da006d39081c7a0c8322a5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
90fe9da666da006d39081c7a0c8322a5_JaffaCakes118.html
-
Size
17KB
-
MD5
90fe9da666da006d39081c7a0c8322a5
-
SHA1
932d0715d6a2a7e2f147bb20b6d9f1fcf481cd46
-
SHA256
dde3dbbf1defba1d84655012f902529542a75dc29061b661503290151cb18540
-
SHA512
058dadfa722e030c892cd3b40f9bdf55afb40c2c06c8139fd311997297d89cae4a0a2d8e5d47e54abfcf971c6b56566b19b0b3ca67603efcfc4cff86d878ee2d
-
SSDEEP
384:xvyO6Ppgsb8ySXEkCp9li5aOZ4f+JhCNSXS27QLKo:xvyhpgsb8ySXEkCrli5aOZ4PCk
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45895741-217D-11EF-A57D-4637C9E50E53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423562606" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0081111a8ab5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000054d4ea5ffffc83fd7d0ba33bf124db9b96553535c92b6aa5b149d7208773265c000000000e8000000002000020000000744735e8bbe4f742ad29b5cad1c041ed3d65bb7a34509516ea7e5bbedb4503d620000000e07aa53bffa35def70ae69887b4bf21a8c9f7c37498580fdafefa21526f685c94000000004f91ba198da3902069ec1a2b1d7c4a7ebc088299037fdc60a736cb9a240c43f60a621149565eae1a1355c851ca20bc93681436425acf045f43de1f50188cb23 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2140 2420 iexplore.exe 28 PID 2420 wrote to memory of 2140 2420 iexplore.exe 28 PID 2420 wrote to memory of 2140 2420 iexplore.exe 28 PID 2420 wrote to memory of 2140 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\90fe9da666da006d39081c7a0c8322a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7880457bab1b980c822b3f3a7a750d9
SHA179eb1b3ad3d71753e904cd82f51763c974a25689
SHA2568f596ecfa8d7a85826637aa62bab7db53f7024de26352ed4deaa5528c96ff282
SHA512ed180fbd525b3b18958ce5aa355aeb4c972e8bbce70a3c8f8254c5641a57c6ab464a4611ef3dc4a593067f39ce12cee5a5fd0eca6d6a7cf0c5cc962254ceedc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb2a1d6665338fb7f191ebaa7be4068
SHA149b4d4fd173a5ecb172474a827daa360ae4aacd5
SHA25635ebb22814af4cd13d1bb2305fba4484cb16a93a2104d899df9d6d0074cd1d6b
SHA5128039888f1136562ffd730175d723ac50f45e411ec44bb32c348d771edc8caa6a41a5ad18cca65a23cf9b35c1f2689832d76d4a287032e703a9a3f27567c56108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b208be2105814f5d312336fa4cb16a
SHA158788309db03ef113a1f2df2bd50f637f03197f0
SHA2564cb625f9f6f5c30833c494015a5603b601541e21bef2bce54f0ab33e97d7a330
SHA512ca6e1e0258bde894c2d19eefbd4ba9597822956f958d3c61748f12c284a3d43f7a9e85848642169a67ace53fcd5b3ecd01dc2f7a0dd1a53e3bf9cb5caa364629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b073da2ac76b0e25f6b5628bee602e0b
SHA19aa8ba71ae3d1bf910317d89aa483705c5eae9cb
SHA25631350cd4394660efd02c42cb32bda4008e1db1ff5ed9c1c35ea2fb2ac456c927
SHA5126a04328b6ad7c54f341427d4e534f3490be2b3cb695c4731f0648822950db97131b00a3b15bda221e6bdec9c8a6bea4a2564000f3cdc76036918dbc616839da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc76121ed415635fbf4476cc633d3ed
SHA1915035d974cb67b46bb18d269912dd8ab0072e0e
SHA25604f3aa0434461646ae5115c8039140664f286e0eefa90d7bd8c35578916e626e
SHA51231f1f0e029bedba184b8929ec9f55cdba3900128ee279cd4ddeb7dfddfefe0ba0c0eb26695f6bd92cd31de22a16e60f0e5a8dd4d1446b1244b5716c8fbde8539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f7d45267b77d5be4fd9dcccfd6407d5
SHA13d441ff7b4addda6c2cd32ced57f1df28e3dd241
SHA2560b5014c7127840abc3e6f75898fae21bd7bf5b91b7297ffbfd9fb6d11df8c341
SHA51201077f1903c739062c91161dc164ef91bb937e1c54862f87dbc5b56f083ea7ce20cdd7cebd4814c33ae72e1d485bb6591e24876084e16b3bb6db9d90c88e71a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad2a59102cc75ad7d2ab405f6a0bd19
SHA171d9753167e336af8b6fcdff2b4419c99997271f
SHA256305a48c4bbefc6f79ec2b062add858bf5a36e836afaf5a590da9466a47b7ce64
SHA5128d05e59c2a386223166b805754f86b8695bae42ba72e0f6474e3e6a8d809ef077d16a1f20286045de0d398187de919aa340f01fdfea6ab46ade496a8399f8bf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59db49c9d5feb714e66e37fd13ef4674d
SHA1fd0b336a99efd5df6502873e478be89a40bf2c1c
SHA2565f1670ec00830a8a4ac72152e4058727bdf8384d9f67a55b4fd48b33af843579
SHA5120ae9815621e8f5cad74a89758e2195f9f6bd3929d419557b4817124037b341ad6707d42eaf8777c2d71aa56a34d4c55907d3aa8635d18db088bc47e150ddea68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51992c756303fd1c5af221b8f86b1eaca
SHA127bacb21d810fb4e2ccf6be93fcd37f4def1c619
SHA256158ffa20cadd94f8fc5047831abf268e1686a82464193b7857c2b41f3d6025fd
SHA5129a57792c8b09ac1f06aaf6ab4ba92d48e3684693f83679cfec37c7246e52e9ddcdf0843d2c3afe7da6ca3bfc624596dba80484f17cbd1dee923558b9005a934e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593963942f1d1cdf3f82db9d73604ede8
SHA143cd6d3b6e14b0e5ca0d7d5c98d8ecf8bcc2f33b
SHA256039c0ac5242ad4d1df061bf75c4ab8395ae2a9fdd7a21d6bc83c20322251d2c5
SHA5122280f25c12c1486cce23a4fe77a8556c21ea148a77a9af10c45fad8eb615f6f4c2a8deab9cb69ea2d4f51554b4869cd128faeb187528d19032e76780051e8d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d133f47ca870a4d5167431f83eda3fc
SHA116315794d0c0ca7c3ae3f47fd30c6683edf61cb4
SHA25695b99080d43d14cd7c6424b3b21ad473e8289ad98a1a7c7361364cad267f0e80
SHA512277e7438ab146308fcab6e35e4b74c5f47b81952511eb4390fe1f914cca182c4a0c6e6baab9a976d1167938552bafc45da578b5d54980d91acf6f871b53ae9cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7eb7d1df6070b415c6a9253349173ff
SHA1c7433bc1fa67ac88741a37834a10657dfbe1d875
SHA256ee3a1aacdda0640e399f827afc209c61cb1d8fd77256f63f6ac05eed0a501b22
SHA512f487015671a0d7f0618875233de4ebfbf99f9ff4f719d91c04f55a793b2f7081cfe9412003c40e5c5da72b96f7bbae0981f90ec76622197b34cb070eb59c391e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58edb90db29c4bf8e42e967d4f82dd323
SHA138f2c438a06544669b83dffef9c468f69758c662
SHA2569652bcd8d35ca62d4cb3311f4fc909a5e92f7af161c1c71d252840b296d033fb
SHA51202dead220002a355430c98c77532dbd1fc39f4bf54f9602f6a26ca4cb4a84ff9ff5972f2fefc8893fac511f1b21b1c32880858d330d88e7f4774f4734aef586a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afeb826a6179f50cc697e6db432099e5
SHA1ec0fc606b6675fda5076a3cc3eb5320f9d88d0a3
SHA256665b8a282c1d097ec81f5a6626ad697c343bbaacd99a131b2210004eee8e93cd
SHA512216958b7059b82a59a76ab723664d9b05467bdf53ad22b1c788bba69d77f464baf0bacc7b3bdaab2b071084dd34667bfcb3b5d6d63195144e5dbf00238098174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584688c526b90b030378125de4db41313
SHA137e47ba26570ae09ead6b8d4d77a062886d3b7bf
SHA2565fe2ee80823f24c875ff8db6e9f8ec9da618ebd72a6689172a8b9321bb3d0c47
SHA512b3c110431c544efaac66ee079cdf3ab3e859aaf55d7b6b3db87ec0ae10c51ea4a11cd391de9f1fadca04f9fd2cf108257c0a14940e7a1991c1de1a89ac3b8922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59da2fc1024153f94f8b9675b04c61be4
SHA19e33b8136cedb9f1a75e6396605012e2ffb21aea
SHA25662b7e19e28137d07bc00cc1f21aa8c114e2e0f0eac1dc5b32bbe8fab914d2894
SHA512d159916af47bf17b98af5b784e31de96f143ba9e98efaaa0bc2a0ccaed639056b25f3237d397252cf67a32b761b79027d5ef89aaaf993fa254aea13ceb73e08c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a75afedf28bb042cd219617da8e5b9b1
SHA14f9627b58e1587214183a92d1d7dcbc829f9bd72
SHA25616f3a2ab8dafd6c89e05de323ee303fe7b149e5c5fb86ccac3f85bc12a388cdb
SHA512be38253b5fb2304a04658a478e885877f33312b556810afff8eefcaa9504d1247a3e78e499bfac428fdd6f661dd6efb721147ca15d8e55823c57d85d65dfef06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505697903be50d63e56118ab5bec22e1b
SHA1ba114093264f9251cfa4fec27a48a635d67d5e23
SHA256f9636df5d3821f04c6d4493706206e31a40d4632aa88ce09def0c8f14d4f17ed
SHA51289ecc5fe30a59db68480e26ee92073d19058a46b96e3f125c50f7e9a4b7fdf3bee2293ef3d40929b661fde4a5650e7470b73ab47573211f956a9acb2e5fd723e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d64ff60f16b35b6ec45e15232d226e3
SHA129337ee2af5acbd25d6b882469c3e020c0a30424
SHA256bed3a4983734a1bd5c4ee6f6f153dd50465eed60889cf14733d73d243ef18a37
SHA512b73cf2d35063b489e795bfe144932c4849b89f8140a855f2beb860f916c7ee6e9b7571e46b6375630201df424dab9d182bfda6356d941d22ff1968d7f1fb0ab9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b