Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
95697b4c21dc15847560f0272789d5b9_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
95697b4c21dc15847560f0272789d5b9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
95697b4c21dc15847560f0272789d5b9_JaffaCakes118.html
-
Size
60KB
-
MD5
95697b4c21dc15847560f0272789d5b9
-
SHA1
993e5b84c818424265fd6fafecf2f7bc3173869e
-
SHA256
c9806bc147d43497f7d7e4b10b31e2e5e9d2fb85752e51bd0a0e8d00b2c286f1
-
SHA512
31552d2c7753a945180199d8938a11c54ca5421569dadad6d51a8a2233fa71192d22941a2deb4c1466072af4adb67d85f9b59f9e3a182167f8e1a9c8ce012cc3
-
SSDEEP
768:JiegcMwUc9GeCSXuhjaCHoTyWhCZkoTnMdtbBnfBgN8/uQcc8QFVG8sP/Ijkk5nt:JgiRxTRgec0tbrgamchNnWC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05688D81-228A-11EF-9A67-52FD63057C4C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423678033" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000001ecbdf9eceaa0ac64b5b88da9ffa747b01a9a9fffaca3e20a141c51cfc1b0b6b000000000e800000000200002000000013f76619a249bab942260f874bf2aef35e2472434c9a28244d9640883163ccd7200000000fdfd7b17f66c33e914a8fcd807e5dff0790406a10a0db43ba9ad67440173b7740000000eeb4424d850273a0b161b94896be4b72fe6bfc7c61dff55322a88c803d9d47fcfe8ef97caa1254adb6f6aee9371c93ee201dff65004e2f8c8a30095cbfc37802 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0700eda96b6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 iexplore.exe 2484 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2912 2484 iexplore.exe 28 PID 2484 wrote to memory of 2912 2484 iexplore.exe 28 PID 2484 wrote to memory of 2912 2484 iexplore.exe 28 PID 2484 wrote to memory of 2912 2484 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\95697b4c21dc15847560f0272789d5b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca1b70639ef77acab6d1c0e6fe08d650
SHA1f522214cd8136c8a95df401877398a7cc7b77561
SHA2568b968ca32ac3122d0f611c33408624ba7cae91309800bb3bbd96467ddceef0f9
SHA51250f8562e3a235c1d93c61770b8dc783bb2e6f3bffd4f2668ddab2612e516d0a4f48d0f15e28dd4f4441d948f5d399082d84dbdfa96255475beb1540d2538f50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc326e8322d626e5275b64b14c5da96f
SHA1882edfd786e709f81aeaf8dfb07624445ee8b0b6
SHA25678e362e81f9ca823111b7e21d0fe537cfb15d1e989fb521bc84f9cae0f490483
SHA5121082e9f05d5e8450a679b3c92d3b78a82ce138257efa736dce2978bed168b80921116df86b94eef6def24c383eee2631b8fc47c11477f6b727662f67dc82f259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de36dc695b50b91e4ea720f8dd92034c
SHA1f841af8d61336c5186a10ee6acf08b2eb7c6f281
SHA25672c9a4ca41f268f085ed4cad380986bf7bf0500ff0fc1981f0bd10f2c232e122
SHA5129fb86f098d64540a626bcfb7476bd08c45f03d5f02f49c4f7608b9c631ce632f348a407436e2648ed73e4d9d324295132cd36ad77ce85f6b31ae75574cbda708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540bb20b025f245f46d6b38fc1dc0b210
SHA18661f9efdd9a69427563d12cf2b7a8a89a4569b6
SHA2566a6cca5c17a727d2a659967da6f7227f7d24d1a790d9a7862c7140607decdf75
SHA512cb81c386b26e51ae7dc4cad304f27a5077aacf5c6003fb7f21ad32eb619c1667af5c3d7c9bc5ae34beb3e3c10982d1c0489e1405a51f61cdf8b2b9e16bdf12e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513275e93c1ceb43d26747abaa583d833
SHA19b947fcc8c76bf826629dffee5c4a4d0679946a7
SHA256c13b0f9dbca5b0d163b91ca7f3ae3368e4a4e726d1e14e26475b503a46eb5dcf
SHA512ae97d7df05532def1b1a8f6217e74c78751a3d236f90ad73b2b20a37c25e466f8a58804dee44fe330580d441a8c2266bb548cb5b99ebff2c062070b1d095bfe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a09db084155d587bef522f7a3b957054
SHA159fc9abedc02b5463335e9bb3e1bafcbdbe9ad60
SHA2563c572663b4ca2e8cbd1e10779df7e6d82e8e52774f55a6177cecf427793c50b0
SHA512c0f8e634697c41c8003caef48095297ba7094e4ccf50d32552ab5a04d981f0dfd03cce97f460c7516dabaeb7bf9da8c61e13885d63877525e56e06978134a585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b6901cf3b37bda18628c3da4757a64a
SHA10d051ed6f339535281f16eb5f08be2fa4a770aae
SHA2560c8b7083889df1e5c779e9b2f3b1f7f75f1ed1dc7912c9fbb599353cefe995f1
SHA512cd187ec75a5d4689e639c6bb2e5c73428764b065b3e790bf69faf73e3d7b307f2c764828df39e944df074c5891aa738343b2e954271f809ebc5988e120bd638c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595e3b8b13102ee78e6388afe277825bc
SHA12f59d2243d7fa2b4528443e05a24a493fee86f53
SHA25616c910d086170743a3ea511f0dec71909915aca0180a483c9fc757b828f38cfa
SHA51273cf491847db8e5e46147a03e6ee4e03ffa688d285b79afb50d804bb6cbaa6f159c6c1ca48549c740c855d25e53ea779994ec7f39de1ca811bc8ffe06e80d57b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541ed1cf4a7d3d028d03620ce98e5c342
SHA1af3f665eed0be63ad18d24eb5dd5d35f1df7d7f9
SHA25670d73174948e6bb526ab6ac8dade78071d0ce4be1a8c2a3505260f0d20f797f1
SHA5120926766cb60ba65fce6735c346fe528c0ca528340cac8000cad7a22ae1ff19898f379827082df81a2dc84ff1e8b23bf1ff2e756b31b6afc237151ded1bea1ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54872b153b70c4e0b5e2318dd128de4f0
SHA13b81a8cc04794aeb2478ad90bcc480f518e752f1
SHA256129c20ccc5379edf82acfbd679919bc3de65bc23caa9aac4480042e35531fb20
SHA512f0d1102a115bed682dd48d1dbfbc37598f88e4f6963d2b1ff1530e10229fa24ef3674eca910408afca3488b52e54af993f92c20206f90c2a5e6cdc459d971654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eea8c9c646ab685ebd329cf92118b55
SHA19c452537defa25d9271c7e171678e283e7a5d6a2
SHA256fd78b88dd5ff8dead925bdd328d5193ebe33f64ad77bab6d833f46bc9492fba8
SHA512023984995fde6c1701dbd2117e790848e20014d08253564a87133291670ed4f4a94c13340fbad08f1d47e861c9e851e5d9a8f7f0ed82c011717fa1cddd6e9c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5179a4a6932481f83cbd322fb1edc3c75
SHA1555d749665ba1bcbd082ad4d2a917bec28d322ce
SHA256c7ab41fa6899c268fe8fd3ebfb01ed8cdc2a55f97d8f6cf8af60c522b7bb331d
SHA512ff01371685ce4e9ce64487884547485061d32c267461329b0b9e5b71a984daaf5c6476dd92ca221231a6a28f1414340f51e26a4114941cafb36a6b53f04c6860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558192a679d069189db1088af6840723f
SHA13b13248fc7269780f10ce472104983fa20976643
SHA2567ecaf8fa1e4357c229aa35ba8f4557b8c9c765b85d069a660231189a6be6004f
SHA512c3670a3497153d2944a7c49fe851d3bc0ef62c085c7563154e98d2fcf416c2a89fb61ec304f62c56e1918574359c9e20cd1cb50a8e47e562f6af0288a5195761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e160d7cf0b91fdf2c0c2ab80aa8637a
SHA141877ea030ad3c33b8de281ee829275d36a0de0c
SHA256eba796c2047bbb507f6d0d61faa69beb240c8cd3c80c6ca2ef58aeacc7b76239
SHA512e48304875f7e2ed70616439c40241c40476c7f94fbb53e0e97322a2a64d9268e6aef6bdb3e7be143c2cc3957e4d3b6b70f92b95476930bf8aeb4582184a8c43a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b16266bc094fac540cc01e0533a8927
SHA1155f7dbde4b3b6b56386fb96a1a4267b2e3765c3
SHA2564618740c75076f07576273a4cbe06cc1e75f4a9168d297ca97c1b1960a96f4a1
SHA51243c131b8b87fa130cc9211d54114bc8e9dd20d00db5f3176f9dc45b8871480ea5af6bd8fd8defcd1e3eb1d9f1de08da0ae19d72ad24d9e05623b80151f954483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d3f6347d9d71c79f73a0f346e1ff6d6
SHA13824412546552b0696ab76ceb63ef55feb810bf2
SHA2563c92c2dc278c0a502d29d029c8ebf6a14eb8e1975d060e0cf1addd3549b53fb5
SHA51295c79373ea4400eb1b21476b2285a8323eb7137abc96142099879ed4302ccb245eb6df465af1842392cddde48b712dd0b5bded5de5792503dc46ee24f010ffcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569d57668b357f53deb0cabef5fb56797
SHA11088ab577ee0ba92f602a716d89370783f2756a9
SHA256b7763fddd0543a3229b43a12d3a0990bd2038ec627de7ead0685d3f6c69e85a9
SHA51208766a98d84c6c0d3a4eab960c81a4111ab25c094b0ebe849c32ecc7c19b3cccd5476266192ea45a26244436c953db573572ad82d0a8690b806e91ffbe073abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eed12d87b5c68943bb6566c70c8cf56f
SHA14fb36e383b09e2b2a7bec444f92f9a6eb6f4f939
SHA256dabfc51af13b4db49f8ea6bc3f96b4f4a85139a91fc95bd6e9b912cddb21c884
SHA512b33bc3650cf08824d5e939e54f0a6ed9eba659cf1c1a7938ddec7cfb3900a237066f5b642403b171055dbde9ba6907a06f062a49adfbe2d250804ce5820da30d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cca9e6990b0dab2a16a7134c38d4fac
SHA11c6cb53fb4419f57159c5f66c32a27f3cfcb08b5
SHA256d51829e25efe3804408cce37530ce2dd07cd74aa19d3b8a713af3df9ac6bc24b
SHA512dc846b4c74d6a5d3f02dd52570b06655a41a0f51334cea9f1fb5d955bba3abc8d67cb4d50ba1552b5f9408eec049a1b27e77965c0038e71202221ab9f831bcaa
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b