Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
917a1164fb94438b81f003fd1f367241_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
917a1164fb94438b81f003fd1f367241_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
917a1164fb94438b81f003fd1f367241_JaffaCakes118.html
-
Size
461KB
-
MD5
917a1164fb94438b81f003fd1f367241
-
SHA1
3355087921a8896596e185493abdadaf94426414
-
SHA256
997cebb0b8d6d050def9efc23c79e07c231d12df89d1332dd1a89815541225eb
-
SHA512
004a55baf614d9e525126549e5527138c7b096d582fc0fec62a067750a960768d46fd50580287cb339e7d49df1be0968e60d002077d52b5434c235543eb9ca94
-
SSDEEP
6144:SEsMYod+X3oI+YFuQesMYod+X3oI+YosMYod+X3oI+YLsMYod+X3oI+YQ:p5d+X3P+5d+X3s5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423573089" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50696886a2b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ADDEACB1-2195-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b1b396d7d7461e4e820e7adae1e98d0100000000020000000000106600000001000020000000c74bba53e6e9d927ea3bb3d22aad350d6f1cc9b81ff7600c7f46d9fd73136106000000000e8000000002000020000000b212cc932f5c8e39c0846db026dd735be0db1bb3be3db26f69e3a7a9efbeac4b2000000046fd51755ef24159155d76242734ba22e2dbe00f6637c1959d3b18f934740d3d4000000040c096bf0588793f9c9a00b49e0bfafa49d70d737103ddddb2366d7c738a1364cd1c203735df1f01da0760d1af782c4b656a900b9ed66ac3ed218e498e4b148c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2080 1924 iexplore.exe 28 PID 1924 wrote to memory of 2080 1924 iexplore.exe 28 PID 1924 wrote to memory of 2080 1924 iexplore.exe 28 PID 1924 wrote to memory of 2080 1924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\917a1164fb94438b81f003fd1f367241_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54826141cb4b794d2181f607bed4c0d2a
SHA195e22a6e414dbfefe61df6df5c1c453f45b3574e
SHA2564c5820b09b93c72615740863e25b28c5cb414cbbadd96268ed7c9fa40c623e2d
SHA5120062f98c6bf256f5a758d284b6720b2ce1b0846a7e5d51df97b3ff7bba3876a411cc48d1d0c941aff88c14ed466b985710947a8e9cbda240122b36afb25bee60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5127e167fa29190401a97d2f74c2b515b
SHA13856850a6149921126d7a79a027a4875d61d415f
SHA2561ed3f53595ff474173e3b5ba54bb5990bedc5b47868c10a7d3d5b3ee107336ff
SHA5125a77d7011702ec994c6b60bb2e3c3f7fdf1c76d0d02fc3dade8a076adbd536efc4c9233f63b27fb3375792b308ba0558e8e5bc610feab379f5e3911a46a451c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a183b14f1bb7c20dedceaf18345f657
SHA1eb4954890b191e1294ae095b3cd386ceb7357eb0
SHA2564290199b0129e76736fba2ee7c3b3c56e87e76863e30009685f894b27a330eb0
SHA512b2aedf810e88fc727a0513481ac776955e457f2f7bf32383598f41947b8661975eb9be5998a24c432a2a9d84af741798ed677c64737002652584c4d4b62e3215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82a16602a6a1f092200affa4988b27e
SHA1290f67e2ac9355b20c9797b84f02af0e1593508e
SHA2562b8212b8c09dd9d1bdf8e1b8ccc1bd4396a13b735ed24337ff69e3065f97522d
SHA512ed91e8312088fa29bdc3bcccbe325162df04e9c3e7bd500ff37e1b3c5f5743f44440a30c1b490e97bf5da0ac628d174b5c329f85b043e3ac07d95b258a0e00d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd4d82bc8336384523b9cb07871aefe
SHA1be46e4da89e8eefcd4e0a185777e6a6efc91938a
SHA25616949acca73cf1e029b39e54e563d663d3aa532a5ad071ee457dc3c385e123cf
SHA51220a43a36ef7ec3f90ba653ae30cfb29fb9bb4d158056d625c1c6bededdde25a0e6da12f5b037e623bcd49a1b0aaf8667cbc90735c8bfef082d9c04c00577cd3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5299d62ff1dd7be21151aef8c55738530
SHA16f88dc08f1e945076d417888294ddc22bed48184
SHA256693402368f375460c61d25508a6a000e0ea5fb2e8a46ade0497969995b726407
SHA512eda4ff722669fd349d7fbfa17a52637df07ee06ce7791320df1849caf1043a9a094a0c4fdb40cb266e28aa563da9defe4114c373b650115f7f95bce975fd580b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c28ad2406f8bcbe63fd5165442412bd
SHA1c8b64add05c66768d51d8f9f5c9e26d26677c40d
SHA25621105bb7bfd681066217d14599535986b31be8fe91107c3e5559a3c7d89ac5e8
SHA512602c78628432c3cc681a7574402f01069ccca3b20da8f0d003a681cabc653147b2a25c71eb7ef3d9c2683d91e1c65d14b8473bffb39799972363a8dee3d45444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ebc467e98fc34f61975ffea4cccb8b
SHA15c38b673cb7c17e217e6065a262ab6816e89234d
SHA2562350754a012fafdd9695bc34f8b3bc56eb7a46b3a9e3fbd809852ff42b7c632e
SHA512e6ee734ea27d92d8f91e44f0f25cc227c11d93c3d1615122b6bc325b47faa33ba225639a8fccc2b32a33acff8f229f18a20a37edfbc257f256a561dbf4f708c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5245c2ac5bcd07d4c30dfacea3ab57695
SHA1456c698e29478170b239f3ec345e8d72666e2146
SHA2561e0ab9de97a4c98efddcc2ae93a937552fdf3d182750094993bd6c2d7defc789
SHA51281db1698d0622a32ec03eb9ec537378f8e4bfdba552f2e21165b1a6dc7626933ef952ad7ed852b28cbb24095633ccb816bee0d717f14be48be8c2860c8494a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a5da72638e8c7174fe7b16199b0097
SHA1f49d62333f3d7d92e7f4a91b61bcfb3875709a75
SHA2565cb447384b7a52068f38ca5be0f33a787b5e6c24c476380bc445cdcd7baba2c6
SHA51202d305cfead812a363fe1cf26a7e7648783c5436e82a4d1cdc2eb13c919c6d45731d1f60ec1fd47578224c672ec039bb691f3f5bf6d1191c4a1c41904ef0d912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac816ea1b170f7a98bc3f8e5e7dd900
SHA191e6a503d2e91dee00d1ad52ffc24e4decc594ae
SHA25684d9bc142485cdf522939086c736d52ac40c2aab697c6ac825cb6685d76266a1
SHA51226c9eebcadb493cd23bb4635b218911738214c6af5aa6ab1824d06c1dc120d1243ddd67747703374913ecb98a3705370ebf4e67e0e98a995de66f1b817cb1d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57df92eb8667cd1b5a21f454d74956942
SHA155708b62bfa2c1283931e65ca1e78441b32e3c00
SHA256d227b7bc510af79e53c42f6eed3580376e4c859f96414c6b6751b08260423f13
SHA512c818a5e83253da64b72cb9d0132ea6a70fb49752f652fb7cc551673d76fd477664efee7d3d5ef3ee09e5b36f274d65d09b9dada1cf1dc402d7e3db3c611d8d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52471329944bc057299a9507690813d02
SHA1d51b8439a2fecb29287eac3d1f72118b48a7f353
SHA25611b73dbc664d29078b85efc2078d190cd97256b3b70e7a513eeb92a62b100096
SHA51273175a540d37763906453c12bf5a3adc6bcfc3a59ef7fb759d53124054ea6faccf25b79a94c63a79920ed450cf764b8b2bcc920cc0bc69aa19da297e4e0da3f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531bacc11cb99292fc2a055b04ff6f8af
SHA1e70424506de01210636156ae86c269330b6a0a9d
SHA2566feef357f991f10b9b5c84d3eb1e283c1d0dd785115334abb088b3f25c7ecd8b
SHA512b405ed0bb9ddaab37fc4b73b182499789469973e2c438bcf3fe2c9e875b51bddc1a297b57ba0af699d81fcb24f82fba689d19227f36342d69bf6a787ca7cbb8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5528bf201d718b08538887c3b2b20e6cd
SHA166b6fdfaecbbd973e2c32006f8dcee162c0a518c
SHA2561ae372ff823ed1ebca59cbb3faf0fc4931bcb752ea0f97eba25e9f7329655eb6
SHA512ef92ca8216cd47314f6f2d7e8cb79a2df60400e4a40748a71a5a9099da4ec0befcdbdaf0c6924f177cde7cc0ed3485f6c2a7b5dd2ce885a0bc34ffd42cc5d993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f26fd8866117af18fa8054e0509074b
SHA1baed97ca8e70d8c3442788dc555ec471b3e6d185
SHA256bc76160c6dcf7397599d65fef2fde6e3c4acdf90ce0218288d3b5ba1898e27c9
SHA5129a7b6aec0a37b44cb198a3a09c4414ee0275d65746c0facc5bd668c77983d6833e9c7c323fc7e6ab3cae1b3921bafb881b13dd4a8d5057dff9af2b17cb930d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b248466dbf4aae5b36fcb935d64262
SHA1e1658b2c4f7f2e87c361c780b13b897856c23c4a
SHA256738d8b7595b0d1a0f079059c81f320e4f90e06dce2e511d3e754b8f97d9718c6
SHA512eb24f40217e21a98cada817f268308a7fcb60fbcff796a3d8c5ac7d4b29e46ee40aa8cd305f569ac4bb76e18bf299a2bc5596f0764e736b41120f5a5091f1f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db097157a297c6677e4ca81be60c628
SHA1a2802668ecba4586948f65eb9ceb72b74f9fec83
SHA256dfd8b23ac28828a8c2798e98e954cb58678ef21a679768968d4d9ded8ee875e7
SHA51250781c1397eef9e9c671eaaffc9664eb81e0086a6554915ff05a7740586ca102bfc900d6ea9f6ad5080a24fc033660443eba3a5c82742a63e7beb27ac4a79293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508976309f11f188603b35af8104ab86f
SHA15912271715ddc1d85515a9fcf7dad1c0c44d1366
SHA2566d73c4054fc2a5c910f5a34e0cec6fa3dda367e41e0f1c6230fe16088b9cb05d
SHA512471fdc22735dc88068087f999b1a3ed6f181508704a8e2ea42aaef7cd5a06451f6b5ffac5fa4a3a756ef4e855f08dd346920af0c72023d74c1a3f84ae2d88fb2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b