Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 23:45
Static task
static1
Behavioral task
behavioral1
Sample
998d47284c3012e1441273cb76918733_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
998d47284c3012e1441273cb76918733_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
998d47284c3012e1441273cb76918733_JaffaCakes118.html
-
Size
69KB
-
MD5
998d47284c3012e1441273cb76918733
-
SHA1
ad84c8fbac002965add96516ae4fb3282b185660
-
SHA256
2996956e275d315bd2c1680f4d750c77101d0f9ae7b57f26f7e1f0d882fdd838
-
SHA512
4fbf50ec93c8bb5d904509dde1b310936d197ad5283e050b7696e97595e1b2c3152f2b11ae1da714f41a105ab84f3cdb371f19685c724e2d9ba5f5dfa0dacd6f
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sJ6evV+R+QFoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpq:J39TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c0ddfc970ee8a041bc98705b77bde467000000000200000000001066000000010000200000008d6572c5c8003e4c015fee5e213fd993dd6c318dfd85993093ae72ab76194464000000000e80000000020000200000003c461e3497f0417dd830d913c62246995ea214ea5f734ef974363ecd3368a524200000009e5b19acad7c8431fbc868f568786a0f1ee04e9fd3b3f6b6f995462490f2603140000000d27b08dae9d41e54b25713c29daaeef176875cae9668c8033bc126199bd8d443f5abc4827d71d56658f4bb9274c1eeababb7ed92538d3827e1b0382532f445d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30764691a2b7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423793017" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC9C8BD1-2395-11EF-9DE9-520ACD40185F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2952 iexplore.exe 2952 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2052 2952 iexplore.exe 28 PID 2952 wrote to memory of 2052 2952 iexplore.exe 28 PID 2952 wrote to memory of 2052 2952 iexplore.exe 28 PID 2952 wrote to memory of 2052 2952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\998d47284c3012e1441273cb76918733_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515a7e089df26bd0494e85577efb98980
SHA190ad7812289e5caf1c934a2c233c96ccef83e87f
SHA25653242a37667ba55bd21907c5bdb656b64ff8da4c678d9477bd27fede8575f48b
SHA512fff6f65e73874d45671002c2bf03ff3da31d6acf5814722aeac5a955615bd9203e1e1796dcf676b1e9261c980cfe98ccb86b411b6d3031da34069ca73f0e556a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eac7e4b7b29f60cfe5068b3500c7f66
SHA1ec564b9eba224ed33d5dc4a9c7c1092776acf51b
SHA2565f8c346e3644007aabd90dffdd0d873d54df0975ec19b38792b1c1a110a05df0
SHA512b72104b6d7a403d1c7b98bf8a38c4dd5c697b1f1c5c08423ea809758f6a7e59808769003556bfe3b6127ca4e790bb8bec45d545bae0743a60aefae0c18ef55c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5688f664606b15b6ddd93022625910559
SHA118f5d29759c4fae34a04dd3bf2dc4395ab22b37c
SHA256e2df26e51657d3c96cdc227b5bea41c3dcf0e8e55f6d31a4d858fb0eedcd86de
SHA51214c8b8f982af5c17c12938d48a8b596eabc21c305e133aeeba5c58a516293dfd41136607d6c439cb3509b42bcd86db2d5174499dc70ca29ffe335079e7039c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd96853cff2f488c188ed4b9defc17ce
SHA187f9c302bf5b5722949c581e0c9ea06d4bed5c07
SHA2565ede1d3eb6cbd6c73e97fb89dc931e2642ffe76038b69df7be91d5e6061d357e
SHA512a114e36304bb87a28e343177ba5f90fee737e1dd95e9c70c2af0b75f16e532a56561eabc2496cde07585274a31c726dd3b03d34fad805eec30238a800dfde2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582d2fdc9b1e3772106ea188d5ac73714
SHA1b788d370d82ac196b4c07abfbb2669d280487ac0
SHA256ec10115fff43a8db09a572fce8c5fb31d521def5b60dc271ea014d46dfe64458
SHA512f3478cbbe54d10bcdea4819fdaf60165654b452bdd107acf79efdf367d26c96af1d177240ed556f55180a7c59b372fa3fb63d5d1edeb0029d5102086f37cc8da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7e54b04b33ef24137d2184204dcc219
SHA16c18855a39b67423bcbc84e3d892400596638c12
SHA25651898353e7caaa5cfe8919bcaa362e877efa7658c9e5bb93a4602792f84a94b9
SHA512c9ee52ce7a6b5d4e474f8f1af997505040c67ba2905862d920b54f1702f5d4f04a642b3d5301d0781620476cea57fd25dabb99223dd2911e5c6a1700af29ca44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55013b42b0646a1ff6ea2fc9593a849b7
SHA123d46d02cf731f05c83621fd34460f8a739ffcac
SHA25680fbc40b7ebd7e81094dc6e6803cd1a3918b58cdb42cd354c716461a168165c9
SHA512a46fe5196ddc50d22d74f7b87b2ebbd3ce59af8d5b436deef1b58a42abc68a4b340dbf681013e12739f7cf079b9a7bdf861c7e5ab6c0b0aefaff44ef3cc632fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e320e84a648c936d7dca465c1802d6a
SHA129a879e711be476b9d00b213add561946d3ca01a
SHA256401c780305f55718bc88a31f2157cb95c732652c38e961fb62b5ab8b40eb9474
SHA512d1f08ee47e6ee4df35a82d3807e8efe41520256a33d5dd31d83c253d40e9e981446f5656ea0dcfbee40e9d58d0207b7fc81efea81e68db2d32a62b736a92cdcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af7db5d26c5c2d9b638c069921cc1e5
SHA15b6eceace65b0a8dca24afa877e3fb5842254056
SHA256e4fcbaeefaf7bd7b0197774af04fd70b227696ff77a80ad2c2f3b525398cfccd
SHA512fa0b080d0986f2b5ea2ddfbafdb64e84b8c9c762ae3f15d28bf60f7b25745be45f8d5128769c13e6c40116ef1eb3799d82f854cfc7b7c820d71838206fa69295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee702859c1e38463be6f9659b5233222
SHA11e6bd0ec172244e61d31d88cc928f3d41f73e687
SHA256c85c9d7e7b41d696188ebf79ecb6d2aaaf5825628820ad963a813d3d71fba372
SHA512467c1738555ce610ceda8c6638f7900d0920f1342cdc93dd58510887a86ada0e5494f4c88004564f76b231645933a835449472a0791254507599ecdf3eaf90d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4635964aeb96f5434a8b7a0680e35d9
SHA10891f60966cb805060612de8a9af6335aa118efe
SHA256c4edd755e3872f49218c3ee9884cec3268b21956f3da0b1f2ce1562fc692fa1c
SHA51227f302db3a09c02c5385ba108ec7d6efd1728d0495588cd46e8c98f4807cbb0058581a356474cacc809ae93f97d21f3cfdb3883c0341fcbd77e49ff43f016f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec6683d05e073e37812acfe441b04e2a
SHA14277fb695f3f4d02bc1cdfe6c6282c2002829666
SHA256e79035394dbb0bad5957c49f75ce2ddab0151069db227e3405191e28a9685632
SHA5124d69946253335d830330e6930071054f201d4875b3b538dda2c057022263c9568adcd389fc01234b9586fa7a9138a3cd7d4661fd63f4d5cc794e83296d065f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bf180486c66c688a8795d553f6ddec1
SHA1497fa597ab47ab6d57740dca0b240d65f072f79b
SHA256c8842349692e07553802db992f9b7b53244a70663da558f610865ee5e9176a7a
SHA512e10f2e812fccca654b8d903448dcf8f2217ddf567212d33d012b07a38da64a30c412c99002eba00d6df54a103ceffa3e7f9ade5e7c01791af40f73d046cb9eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a77ff12d6a32879487239a68416c1b87
SHA11802385afc0f063f79d31bf398f8406691a9f969
SHA256580463213856f77e8067e6f4b8578d10e05c2bf38c860abab9de78da21ef3bd2
SHA51248452a54eb508383398700d33c9b715c7f8dbac48ce265e4888a7e31a3dd132a6c00ab475568ed9c942703c7dbe06233fafb7c41dbdba8c198b6f6ec7fdd16e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a821120ee0e32d7a79c9d2038eb4bc9f
SHA1e6aafe334dc4d18c61b7beb67dffe09e3b22fd02
SHA2566b5c1b96aeb6f20e0c31cd700328034b61f3b06f849cf6d6f01e9244069e479e
SHA512bc35abf76ea989c7630b8decfdccd5ccc5ddfd5560464074009b835326c803a0b92b7eed18d0efe6d0c1e322e9db4dde5edd2f8d177624e22e9e581520a44dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b2f39d02844323e1de9d57bfc4d62e2
SHA18f517db48c614d808f8265bee2a8ae7b71ae9e6e
SHA25676f20fe0fc317bbe6e1016f868f63082df5dc7201420a67d071a700ac3560a83
SHA512d528c820ff8608b71d8149300eaa0b5c20658b9dc7a871bfdf525b168e08d508575045773527ca9a25057a8a7219ceac0e5df54289e90233ca6fafb7e7acd9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e8f6f9712af07e630a0ee30e21e821
SHA14b81f43e5d79a456dc93c4ecf1fd3c9b3f826b70
SHA2564a17d5128eb2f0f33e0060c83ad9dfe6a151af7e540ee74dcfe8495c9d62ba3d
SHA5123bf566ca89653656786009ad37c5f6ddadbf9c5e214d7cd215d3be2570c99894494b816667e992e8d99c45ddb6affd301e0442e37fb78f801799698ec390be7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a201010c45d381a681e259909eb8c7e3
SHA12332ef6fef27e8bb8e037344e4461afd36ab9c27
SHA2560cc3d542ce8e417b44beb619857e1f157e114dd606ac040d7d178cdc6a8f845a
SHA512f1d6729695eebf191aca496c140fda83924fd7cab702648208cf2ed639e301c1019f24a9bf4d9fba10d773015b307e8f905df4c708f15d35c7fdf318923c80d8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b