Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
93ece3c65d2d53c53dad39fa3d331376_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
93ece3c65d2d53c53dad39fa3d331376_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
93ece3c65d2d53c53dad39fa3d331376_JaffaCakes118.html
-
Size
4KB
-
MD5
93ece3c65d2d53c53dad39fa3d331376
-
SHA1
5eabe40e1eb96d9d18a1803934d14ab178bc42fb
-
SHA256
e16536127d6aa96b16b4a73d9cd3ace03ac67802fc727267fd9e725857a924c2
-
SHA512
80fb84904b85a1e9a2635be20c4453575d88d7a7e34dd4473671fe09c1694477b1c8654ac85c0c624b467a79326611f48fb25c92440fbb101769a8f6bc7497c7
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oSRd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00D379B1-223F-11EF-8DB2-F2F7F00EEB0D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c02b51d54bb6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423645813" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000ed6e65861471437cf34e88cd51417056d18679106cf74d72248ae1db630a4dce000000000e80000000020000200000004bcc626ebb8d29270d5196a4fd95b8abc13a4f2ddce198ac53c0a50d45f4749120000000af56bfe1ff9c69aa46cc760bbf34c2b985c8fcf0a49e70e8e8c6a771831479cd400000002eea70ea098439f54e86a7a3189233b7de3f4b0be873c4717d589c548b2a37f457b0f8f56ab8bd9f3b005d3f843d7cf1658075e8afa681d7b32881d7e642d7ad iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2100 2408 iexplore.exe 28 PID 2408 wrote to memory of 2100 2408 iexplore.exe 28 PID 2408 wrote to memory of 2100 2408 iexplore.exe 28 PID 2408 wrote to memory of 2100 2408 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\93ece3c65d2d53c53dad39fa3d331376_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e31c490ff034b55be23009fe799fecb
SHA1fa2fc217bd1171f27941b6904b686fd14c4bd1ae
SHA256af1b3a89dc87c21735c9fe616b29de58c798e591f8066eda9892af0702810166
SHA51277b1495b03cb1d113373333fd0104570a7f553e1a96e7c0ca2cfa41f153239c4b50b48cba1bab6f19a8f183bd525afb3452f7bbb2ba2b4e922438b9f2a3783a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bd994e60de66c2d06b8fa4045216b96
SHA1e7a203b84f024efc4ae3bc2d4286988100d77b2a
SHA256c2ed7a8a604fa2e1ac682bcb1e448b2854fb2bcef82dfec15292184b9ad7af9b
SHA512d28da0d2b335a5bfb4fff0e724a5add14ad8d0989c3da0735da03a8204b7e9d583caddf3dcdb2b07b1178d3877aa75014963f5302246b4371f9cbde3641b8cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b9edcef94c9d0fbe162decba3a2859
SHA19c574c1d348b9d06895390f80dd06fb6c72a180a
SHA25655e8a78f42aff3c13dd10b9ac9284c7d69d27eb967aff0a7b5721291955620ed
SHA512aa75dd01b07848b602d3caaa0426d8f68cf8c6b14bb87f580852420088054a61448c387f57a73057e7950e9ac748fd2e672a4bfe75843655af5cc57dfde86583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56539897369f53c37e768d2d1c554a737
SHA18438657a9920be58e5e5e1e350d5c228cd1dab4a
SHA2568fc64d353f31381796304fe7889f34686fae77171376a5f7b97b364b3178d24a
SHA5122098ea67448db54a860a528de2906289e9b8248c42fa39671af2e58a56f69b99072e246a4491d85aca5d5d698323e69916032e371e73fe995e9120db26764eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570cfb9d8236974b52817ed6d3a00e186
SHA114fbfea89f759d6f8519ca82866dec8990a9b9d7
SHA256ddd68fdfb732af9de204b95b15f423ee9311fb44c11df7658ed1bb5112d9da53
SHA512b81208cfcd38e47f9db30df923edb7fd4e1d723812488839febce03e29c40cbdb47294590cb1134f0a6d4ff4b5c17a9fddbd1243f160a4287e4b817bc1c42d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541b12c97046f725ba403d9f0f62ac9b5
SHA1c5bf67908b726b5950a4938a91e6190ffd93325d
SHA2561bd4c3773c187dccc1f168e6620b375c6bcc13dd0842e2f9bd1f6beebd205cb8
SHA51293cde649a45046583957254ca9416ee53e8e5d871bcac678f019d73bfef33debbfb3fc4c9a584253135d15bb0fd054e20c11e8d4285c04d2d85afc793aa111e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595d3295bdffed0f401c29acd45e99fe9
SHA191db251fe71671c8e2b69d20bbf56cd0b66b5f9b
SHA256771f7f08e4876ae95dd88ce5babd3cdba15b39fba94963cc62ac92cefcb5cf5d
SHA5128f1ba0aee1048cc2e917cd0b01e369bd8182a05d72fe9ea5ad63ae55be56a28cb4dadee76ae4e4b532f3b8d02b70cd705a6ad4702fb2923dfcd7d1e7fe1ced9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb04e80bf182b3394564f0ef24dee3f
SHA1e4e373aa31ba8282361e14cac6beeb5d07f9c464
SHA256389c59a836e954edd2fd8b420f99bfbbd5dfebae92bb72c6b5e97af976afed62
SHA5125b16acc8880821c0b11db67096b214209f69e8310f8f88bac71eca001bcdd86145d77bcc618339744e88d3f964a1ae065bcd6cc81cf6ea89aa6828617e266427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc87dec428056ef7274400fe2f8396d6
SHA1399d7f646abc34c8738b6c2a4f59a5ac6b976e2e
SHA2566023a3e9169a0c598c4390283b1540ec12b40e806d3ffb7c6ec71a52aa8ed00f
SHA512252df0662a3a8536ca828331835619ac838d26add685cf5562f60245744c0065cb8f43e4feda6133a8f324fb0d5e2a0f2803d96c2a866cc06b4e616ec72bfeb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e11b664334328cfc4045b70627dbd9a7
SHA1e3ab54907ae01a50107aa238d859f0b2aefd4551
SHA256cf58c79649d65670eaaa41346810749d739f6ef3c21f9e7f21f401d4071ed2a5
SHA512499e37aedf6023339696645a258376800844b53ee134fb3082183a281842edf5ea67d22effc9e953114fabba296e99c500bc1aed2a6fe1065f301f6949eea54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c4af3887fec54f520fef3e180333ad5
SHA170f58b8cf7dc13acb0adccf24f3b97f5f6872327
SHA256ec6ed0e6f804f84411fb41f5ee76a9c4594992df5b2021c9e2be8efb6fc9aef0
SHA5127187af8b5516e33842d1dcfccfb7fecb479a864605aeff37a9c2ed8fe2371739624c62db57b8f0d8f3824acf0435885100ea505ea8a1cdfb558e2e29813d3a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce503bb9610d815a7bc6243bfa346e7
SHA10841ffc53f362833e1df84712059d60f53a9e888
SHA2560b6039839bb2474f28b1078ff279375c1c8a312645fcb3565b3ee30c79d51293
SHA512a884d37c38c96d0c9f363fa300d865147822fa4cfd24cc4f21ffd49b3efea3fa3954627a15657ae4b1e52388c30f92ba23c0bbac9dfe40e6b5dc0db25e47b829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ad5626fd0394076313ece97c8f89f88
SHA1ced44d6f6c3579172db751b52e61aa66c4357261
SHA25600d725906a1927555a82f87e3bade12fd6c5b1aea42429ae6a1f758f584506aa
SHA512a3a393ef0eca6534d82b8f432aee0274a9071c1823018b32996a5c75a2afcb52f6c55031b91a9c94d5b5555e4edba64c391891f5718e8ceba84d9195a833fe1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a45e0b2ce84c1515cb40b80fac9ae4de
SHA1c44dc88369b999b61c7a4aef8043e0eb660ef2df
SHA256c78ae47f2468e60ffccfa0eb12d5a18020a91bccbcc103f7f7999a5b5567c0d0
SHA512190768df5ded0d618029ec4c24189019aedf5eda926cc1a011bdcfc7d802154516e80c78a645e7bf0a3afd4ad921a1f69c11d3e3e3bc327aec5450b83809ad29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d35f4f02bd3b39040ba583fbc877a76f
SHA18da6973c3975649e3b05b2d89266107f5c5eba1f
SHA256a1fbf14ea6e41f4c0f5d8aedf9fdc10983970d58bb80d2061483cda3c7c2b2ed
SHA512149963f52afdcc352d547807b5330c628a7db1a644b4d4161d8abcdf036c93e27f57baea03ff732ba77731b36a04380fec37aae45c2dd2e7d385296577b735d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584b6c2301b4d789126853983550ff142
SHA1c039c6d763d9d0add7f4b16ab796c5c0276b9f1d
SHA25610b28a948dbe1f6c928c0c3fac7f4a39152ca026133b9c2c88c7bb291745c4c3
SHA512b1587be6b2cead3e450afa7ee191874754fc003e4ece789d0f4f62e01f818e91d8dbe3d15c902da0403f4fe2052ed49ccee57cda9811aa25fdb0645a2bdb3b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0f06aab697b64d854642bd36519d059
SHA11be845662030d453fcc5813e26fbdb1a6d531002
SHA2568e2d12b697fbf1afd5ad2ce95f5dfff6df90de5463bb7fa2771371bb77889ffe
SHA5126b19a4c5e1745dbff98f24b2ea23c11164a69aae5623ec52f53f7a7e49999b1b92c62f59dc424abe8910201946827b39d39d4a9bc08f31520d9918bcae68512d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551055ffcd316feb9d6fc8df7b344f896
SHA1ab7890fee3401be891ab4d326bb0a48a9162e7fd
SHA256dc2e289c962a3bea36afd150d7df6160a2764dd012f039ab7aff68dbb3a121d1
SHA512f76ee9afac7d8ee1ec96f3b4b6e7966f8935d307cfc3c495dec1baf6e00ba300e87bfb33b3f7e1db521f71162781be909572e44b0c08d74cc1819220c4bb7860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56060356e5fdc8f7fce79c29c2deb7a14
SHA1a64c9f10788a26fe58d1f7e898b40f9303f73644
SHA256f3256f40ae46547feced9416c463738139e8313364066c176aec38ce3eaf2fc5
SHA5128ccb7b4fd8f3a370fe2abbd7cc9f54e04413570aa7f81b6ccae4acfcdbb592e4503448b2572a8bde9dc4d51036d03a89f7453dd45db97982026fcc15f1ad8014
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b