Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
928d25cceff944b3adb354c9c848d330_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
928d25cceff944b3adb354c9c848d330_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
928d25cceff944b3adb354c9c848d330_JaffaCakes118.html
-
Size
4KB
-
MD5
928d25cceff944b3adb354c9c848d330
-
SHA1
e6af763e7a9204f83a3a6a35115628777b18589d
-
SHA256
548182a5dbae20ccc725608f863a683efd516369fd2366d110ae6c84d288f75c
-
SHA512
43d99e6f30a257800a9d9e5beee12542f79387b9132204bf5f67d93b54095647b9516a0328e5b79b6411450379a5292b4dcd6067af45fadf46d7a59fd8602c15
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8om27vyd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000eb9cda1b8cffaf2f4806257add5deda470f4f058bad8f7aed5817a1de8770f64000000000e8000000002000020000000910fc3e8eec961387627bceab59fe7ad8d5d7a154431e44b0822be8f3b20d26820000000fac85877f3ef06ea58b2058676d6d286ab530d32dd0187296fc8574db3bbd09840000000f07a0b9703009b49c1f274d6813f0a77cd303f46d89cd3c83a48f5973ddb6f0951beaff8daa7f50e65cabf545d0a7f7ca200224dc04c2d6a77c974619d5f37fb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC12B1C1-21CB-11EF-B587-FED6C5E8D4AB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00791d0d8b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423596413" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1864 2024 iexplore.exe 28 PID 2024 wrote to memory of 1864 2024 iexplore.exe 28 PID 2024 wrote to memory of 1864 2024 iexplore.exe 28 PID 2024 wrote to memory of 1864 2024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\928d25cceff944b3adb354c9c848d330_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1d6a37495b86bf6ce48c9ccf97efbc1
SHA1fa4a7ad46d789376a75ccc51add40a724fc62814
SHA256e020a93e7cdb2eb21951430ae133827a6372696b5db07fcf62a8be28ae1beb33
SHA512f14eacc9f7e5e0d45f5374e1aa5e702b3955b309740c1522da72aecea4632ca28c0314005229e2f52ac3fcfcdaeef8b421c00c83b1ac846363c5bf4b394debb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d17ead96e0a4c963cfa18c745e8db2fd
SHA1213ececa8f3c69828ed474212b7635a961282c64
SHA256db78b89039e92eb0332556460fcc5323ad9fd2a234618ce7633f0adafcf4c72a
SHA5128eea3a56ade37d80b242d3d38b244d04360f49de659f853ab3fbeba8f8a7557f5e6f09a1289009fe6385c9f770a15685a4a87e5c1d278201dfb2df23f4c2772e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1dded8b4625a379a26c15fc795f8d69
SHA1b89a9c5c4f992d67e6ea3319ae37243660fb8f23
SHA256b9003e1dac2aad6400e763e18fca3f6c3192baf931bdadbb6d189bedeb30cbb5
SHA51268da52aa6feba231a242c784c6ba77825393890e0c7c2cce0a4859ccdad13c883a9f2fee0e82e07a457d5404d540857b887d9249bc282dcb968d0de04f2dbc59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd37e8c71aa47dc224638203c4684b12
SHA1fd6f5343ac34ff196c2079a851fb2fa8ecc17e73
SHA2562734ef9c18ecdc436b1cdf01cebdc066893b79a71fe999673f7e25382e120d15
SHA51230ce40f2bd5e1250d9edf148e78ba869fd254045552df8656d217dc9a8c26641993fc3da97613d48e151ab22d9223346432c325bd38e2c3f6a6b2914cdd1b5b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507666a9d949f84a8fba94abdb06d9fca
SHA1a6800bc06b160726a4ba1a947432678bb1cf322f
SHA25675b70819a619ecd6cff02530d6940bf66c63327f78238fabc86f929e4240100a
SHA512a1ffcb47c05021d4f35993c843080aaa1db39320efb43a2a0a850e90dcffcee117d69752c2880cf7c3ca2f641e34670545b012e07b8a4222543b2338ba47eef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7262ea9cdcc804f789c51f336f141d6
SHA1c80b8885eedb2c560df589858aa264c54fac2f97
SHA25626f538bf8aa4cea83089c96a7ad78cb64dd61536332e66bad023be634d4abb16
SHA512b51b7fbcfd4ebc096fa69c2c064fb8032769ecf508b55279108c6284a6c8da6dbb7a08e3ddb7bd0742feee9167d435e7a1357525c0690dd9daed080c78a4468b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fbbd2a300136653f3c3df028539ea74
SHA1aae9eea86927e574939822d229078313544176d9
SHA25630fb6f32f184e785038815dd41346bda4fa8a2288cdd189a56107492d2841632
SHA512b79bde83ba5908a63d1127ddeb7bb1b7b7dfc717b405958d28625f5343d690148057c44d686f6f5cda4708842e2e901541e2ca52cf59f22fecaffecf591ef97b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e5cbbbc0d9c255dc6a3b1a1762fcce
SHA1ce91591b1e56fb4316b789d5005bed7c0e5b7f9f
SHA256932b11c296703ee4523b6e951d61139c2a7abb548495d185d9f4ce7b41845717
SHA512016169dae2c43fe5b6a82dfeed08c19cb42f1d3d4fa604083a5e5facfaff828cb4a6f99dd34f03da4e0868653887aa0d0e0942c127dc2913b762aecd213f2d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ece0c150943bfd466d5e6c2b039e8ded
SHA15b129d35d717408a947e24d1992bf2dcd816a66d
SHA256218a8560660824f5624fdf52762b43fd3ae9dbecbfe640e3081c2a1907ff49c8
SHA5124e91dba56cd59e4e3f4cf14deba8e065baf68aede4a556edd5ed7a35e5520368d7ebf35f26dc22ac6a9e7b600454ec8f9bdeeab78a78af545f4556de099d0005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ad1471956bd0062a010e15f8ba13d0
SHA187ef0bbea69aa50ef4e56876cb97739e060ed683
SHA2562bddf31462ef7a1a98dbd80da6fd973b7efea0da5d75180f4a92f8b58e7f0815
SHA512ccef0f3e33a03c379e9b1e8a6da098ca657acfed25810358af5e05a3fff4d479abe8a7ca74edff92ed0bc96ae2e63f753aee39331c84370869551bb5ad09c0e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55138d7afaf92f0ecea349e7383ccd8a8
SHA131706eb1cd41daa770c274b2b3c73ebd96b8cad8
SHA256e753933d9a21accaccd34441ba241740feddc062642c0228fc08f3b3f0873720
SHA5122ca8db26d58c45453a7d30fab42dde5fbe0b6fc36827e4aa984ff2e8ca6a2e76c206ff543585e967f10435864bd787cca1a47858ed3f1dce61bde4497c4c1ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f59cef52324abc93370a081e595cf56
SHA1d30d22a9998fdb3b64c7d555ed5576678c585ae0
SHA25616a34abef35112de10f69fcb21f4b60ab9277ffc1291032e0c2d240ddcec6f83
SHA512de1f86c3b9807198560e97f812944ff7526868a8f33eb06659bb3def1437250ea6cb0d33fae9f4e42598df1c20a0a8d37a0528a3e0217ba2e155d15cf4ce380f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d9c81b7a185dba4debcc8150dd945a3
SHA1e6e7f9b39c8e1364a385997773d766b3f8d33cc2
SHA2564f417e5b7a012428abb94a2404aca71871a97fb744bca36aa05b425b6487310b
SHA512538f4a31cb1620e4c8a64b54b355ed32f8a6a62e76a1f4048d0799fd1a3a7c85cc8373c6f22e6c71e0b5bd9849e894c9163fba00235ae618dac71d5d089020d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b230fc34d32a51f8101fc2d4563710e9
SHA1944e40a0b4c27398d145ac8aeb6eec8aecc150d6
SHA256dc165756979542218f081cff7a12bae5babf4491e8756528b9a9176f92933950
SHA5127ae56d96fb9fb8684432b09138cc5080b7deb4074465116ba778b911ec5e05072249a128f6f95cfc1ad5a8d15554b6f1f628ad8cad69fe1c01ffaa26c058df3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257367ecb00041dcdafa96bb4bef7891
SHA124399b47b1507df2dba75cc6dbe8b47c54ce35e0
SHA256caa7347fe16cf15e916581ae095d81b828e911b4cdfc2fe69ebf37bed9f20422
SHA512b0e9eefd492e0d4a615fd42fd06a178f30daa38f1910b9825a5cbacff3009f27eab531c9d9ea2e5876bd45f6a2aadae4b0154d854bd470691ba651088389b3c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54443d156a60e34a348819dbcc2cb3af7
SHA185f53b2526e75c84a41595c955bc348b073dbb57
SHA256d92734600ab0ac743723c06df332e3e18534f2feff9a0e96ada401e4cd26b32d
SHA51245911c883796466a71fd3701b6050953e70de68b704fe058faa4ccddc9d0818e5f77b3e34b35aa422ad844281d6f6aaec19c3ee235db460d8987388a49742315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583a354c15a5e3637d7cdaa80f04a1793
SHA10fc1b819c0a03be8d065d5e81ccbbf12511d0e04
SHA256fab7ce11dac21f47786394b9bb348d1669f52c5d73d15d3c47d59a1f42aefc34
SHA5121b4eff5d1d06ac5e411749c19aa00af7740cc7a27e421eb752cafc118e7bbc0910699aa76e7b1c9985773fd17a26f3d99db3a4adb7b150f9bd45c7042e263bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516559455d7aa6d1f7c917c70e66975a5
SHA1c531c6f995a86b66acb61a880125df4c82626745
SHA256292677b225e0c7e6021750276f72849876eb3e16a69bca5e52ac9d23956d003b
SHA5123cf795330e38e92aa5a70291f3aa6b4c99ecf8061e4adcbc3707a96e7a6b9fbef710885de5ea3d0153a96ba4873af075a0d820b56a94daf159b1d0abe34eb3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd125747ca00911e8ef46135c1fb1f05
SHA16045427124899f997a1278d43a93fcd43a64bd1c
SHA256c09ca9846e568bd2be947bb5630ad9a7d23521d2ce22d60ff548a89497372a41
SHA512f62e4451d8383843785a6146cd4b265b80be0d819ca3e14ffa94a549091b7e4e2177930432ac1e759028ed0fe66ed473df1119aef08c7223d2f7c21521183c41
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b