Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 10:32
Static task
static1
Behavioral task
behavioral1
Sample
97e0c38976a677fd2044a3462905ddad_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
97e0c38976a677fd2044a3462905ddad_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
97e0c38976a677fd2044a3462905ddad_JaffaCakes118.html
-
Size
887B
-
MD5
97e0c38976a677fd2044a3462905ddad
-
SHA1
1dff85c1dc884d75fefe3b72313b539df75615ad
-
SHA256
99b733a241ec9a622f60e43046dbb0ebfd347a9cca3c91d8cf9a2bcb50151943
-
SHA512
652ab9a32d09f1ab01e1e92148f400a475f71465753fc9a4743055021a30bf48524b2488082cc99cf3113b3a4c14ed515837977a8bda9924a79006d83bbf718d
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 404df5a633b7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000028efcbb7286d0ef40aa83363a5e9415aa27bc4da9c826e6989805a3ad6877f18000000000e80000000020000200000005ecadf19f56fd1bf7471760616677a259b178f5bc1d7566bb9dd616b6ced767e200000001f9a5ee0dd8481e0fe500c2761f0f3d63c80ca083554d865d5a2369dfaa080c34000000028f90ff9f8758c8ec79c110a4dfab36a8fcad2f6a32c6bc4a9546bf3d621b3c4aa35af9872cd5d14d8f263acbf0ec9be0ed893ef596553ee00818bbd383bbb47 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E375CBA1-2326-11EF-A7E9-D684AC6A5058} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423745407" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 820 IEXPLORE.EXE 820 IEXPLORE.EXE 820 IEXPLORE.EXE 820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 820 2220 iexplore.exe 28 PID 2220 wrote to memory of 820 2220 iexplore.exe 28 PID 2220 wrote to memory of 820 2220 iexplore.exe 28 PID 2220 wrote to memory of 820 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\97e0c38976a677fd2044a3462905ddad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187d9f3e0b46e109834848bc7dffdb68
SHA1f41216f922d5b13bc94a6a48cf91739e1b46b48f
SHA256f5bcb025fa52a1bb69937f469b84f91522337bc9438f466d6c619e136f7b01b8
SHA5122b0d4f5c216aa122f8cd43f5ebef058d4d3d4d756dcc117b8702485c3651880030c1bb81d7e3bd26ae5182b11d138c116cacd99f582a35077fcd2cf48c9042fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1b5a18e4a3266b27bf130bbf68e3256
SHA14fcc9ce118b15eed2652d23f51e89da4f1d0da9d
SHA256c4549c954950a59b84b573da1076debc99c43ca88a84a539e5a56f87b695e056
SHA5129b800dd6d779647bbe645cdc348aa335fb0908fb2aa5d04df89fb9bb5ebd7f83b5506718e28f33cacf87135f00e3e350102921ea97c9b8a21641507a2cffe1af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6cf940a4a6182a1188bc2f20a1d42a8
SHA148d5524d6179a4593a093d8eb103a4554e93e9cf
SHA256da80babe19f56061fa21add65a01e22516a46958f6c780bfe6430950b0256e30
SHA512154bf364ae8f769f4e15e906d2c5c822967c4099a1b3554e8dcc701b573e90fb01c14c037418dea1713f24e9113e9ae23ad2e4909736c97f128ced7b134f9683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf3d0170d81156e2aaffb3288a1537f
SHA11a6663e04eb17f05d94161560f95fe4b8ae1a1bd
SHA256e42fc7eb989dafd6252b58d446dae07d00f3ffc87f3b67a91301295c312bb48e
SHA51245e8a577187f0ddd7a50c8ff37e80283c0cc0b2d3ebe4f2afb37077a667d3deefaba5f7459d473109ce9c287782df5dd748f6bd8596d6cadbf40a38eca3bce21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555d54155e208879d32b1a819150f1454
SHA13206985ffae946acc025712189dcfee1c9de877a
SHA256f687442e3f989a995e232f71dd325b15e9d258b72dc28603058e29876fb54b66
SHA512346922c75d8be8adb6e2d35c65b3925ed8ae4c040e7bba70ed362e8d116d21ad129a8e47c77430849ef4ed16e751b32979dfea52be1a88db3dfe828f37052804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525d1102baa72a85e161eb1fb7951966e
SHA1ec332cf6f6d37c65d3c619f857f626ab5bbb2aa2
SHA25626cefb57a5e9a0fadef38820c637d8bbdf4f69493204e6e74c3596069a9c8f87
SHA5124455268b80c30b780fba87924adb046a67656a4350b1385bc326aa398daa7783620d086c76e9d48ef92f3f8eab3500f81985a9308cf2f70257a67a14d606ef28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e07c26a36893c47833b6d45f1f3a04
SHA1509a892a39008f8b578b47aa938574d5a52c7849
SHA2567bde11fc4d6506f788a4cf520eab13920fc09cc0cb82092606e8148d870ddb9d
SHA512ecce42020c8e4b2cf2098f0cee8af4805f5e7ab80a664406cbe2d8723b27e649635c7e6ea9a660afbd058f83ccbe9a34ad5e4d39faed4842790c6ac781e52190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505de18289b3f34a3a02cbe721b5a5a71
SHA14e5ca0d6d6d94fd8bd294fb23d36bf2f835b9c46
SHA256fe449543186905763f8bcbb544698eac01fcf33fbcdb0c4d211663a7949f292f
SHA51262697a053638b647a4e9562e219125171444c65e7a0ea450fe59cc43ade3433c0a3ab6a213f7cb49c1c0eb9b6e2ec078d9d4c41a6894d8b090acdc3c822970fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f4d7f9762b6a94d3f0aeb3073aada74
SHA1332092e8a4e8e86c964720f0cc1dd503d2819fc4
SHA2563dbbd8b6248177951215e13a832312356475965275d8d1bbb850788abc0504e9
SHA512adec4a94426f96b1f3ed1b30a42b9099a8e213c81dc6276703930766e7dcbc63cf1988f0fae7f1a0d1861de80009f3784fb9cd3e1b4dc27c6bc0ec806c39c07d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a815cffcac1238f414790d6bfc49173e
SHA1a379d58ed9a4630045412e6c075cf1fb228aee5f
SHA2569b338ac6051f13c2c16b167f3ddc9062e5318783c68a6ceb27b229c8c5978722
SHA5122c8fe30bfeb211fe1cc8fa8f4598245768cc1ed8d4a7986cc5d7cd775cc34db2cd00498104d14f22c9bedc7493bdb2a475f15c432bcef4b812be221949701097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d9fe8bdc6b369b8e30b2ad1bf04cab1
SHA17a0461ef1e3afc8302e37310599b89ce6689b34e
SHA25600ab70b98c419aa4bf2372fe0d9ee08e01db4dd9687f6d34692acf221c77dd05
SHA512e39f134d8136ba8118fdf9620b3de8b1cb2136e5b4f1707151e18204c6984a5e07b247dda29147c1da5bc1160b267baf33e229a75716b7aede49e12584aaf9a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c40566bfdd33f1659086d2a4e4497ac8
SHA131115697a4fe00b75a0077eeebde98a94f09352d
SHA256f93a9ce07b026b6c16202f9bb81158656410131488ed3c2c372375869a8fdd82
SHA5128d072997d3d119d973392d9221c471ae204985c2a6603c9cf9da20c1313fd27a1a3f5ffed275ec27581297f1a4fa74a35fcf3870de08cad8f27d169e1e08f9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9993919ee9dd866badebc50fcc99c6b
SHA123c82fd735220169b6d960842f5a688f65b3b0fb
SHA2563403f7795e5f9948fc42e9ed8d7caf68ee666487654577cd46327a561ce223e8
SHA512c8aa912214015171df2acc70dac0b1cb94a50dbf0825ee591ddc14dcba2d5d20a83e9a28c8cc2747f57d0cbdfe1d3a50cedc32f0983558db72e88ba6d0a6075a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503c253a66f217ab00471a714a7545904
SHA112c22e683e2061fd766df2e13e812232331ad9cf
SHA256bf52224455de4c87a1ce69a06c36801f56f8fa48e52c0e71f5bd6233fc241674
SHA512cc04023feb6504f22dc4d44faff5c229ac2e96809ee5e3b8b8b80545896abdfa0bc6b6b5ed8a77d474fb6d6c28c0251879051d4bf3e3d84dbc34c3f3228e91f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f54b0c6820d9aae8cae88adc6f159e26
SHA1a9afb6c5fba51ff24e206e28715aa427d855d4e5
SHA256cf49c5924de33648929a62bf19944440192d9ae3f312d4b52b37b33e7ced52ad
SHA512879edfb3cefcc1a3693b15da8c00cee908f76311f93316f0c186b7161b38400d273d0f0e8e8bacc91a838db567fffd344e8e6fd464c8aeb1598bfadbc46a213a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522dbde8f95f3b09fc171a4301d0de15c
SHA1af5afeeb58491c9489abf2b88cfd294a2d677ea0
SHA256012c49379dbbbb9dc432f2eb9c6e2f76724fff3396f258a9f4c8e039135cfe26
SHA512ce2e638c574557853e67336e962dcda1f13d055104e496649f4ce4cd426fc83154bbd88a0c6b631901a638de7b2c0b07ad63696ae320b5898a3c781ea1d08f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502ce89ce12e2ec74d5972a7e417400c6
SHA12c04cfadf05b5bc9be438a016a457e0207acab09
SHA25651c92421bdeb44f8b31ee6a00f14eb56106555d62003f52fbc80f874c8837a36
SHA512a3fdc423616c062948b08fa562ae782dc63b031111407c960d2810db56b166e994d5c4427a6375c96d2697495d1fe4911616eb0bcd7479d5fc7b6787a746f83d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59969dc07d5a19aec32c7fe32ec2ad577
SHA185976e9b87e4266c83c89b2cfc0f76c54b651363
SHA25622dac1179c591807f5e312ddf2e39c767d515e57a7c0a5d5db144203112a6255
SHA512805023d4dc657e1ed11509c57a18f273442381696e367a78db545c3f93fd3ec1c2e5f69f6a50c13a1ec87e9b02e87610b6ce0a28c720babab4d012f6088dd722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e16cc85cd43f30c3e59d5f89b0f373d
SHA161686afe233fce8bafde14a5d64ba6ed8ce714d3
SHA2562bc758b3d5e916986b57480129d44190172c6b9a46030eb3970ac40e15be6ed6
SHA512d1eec64b4a140f906a73494d8dc938a690d7d7125869859fac9735a9c4e4e732d9847a76b770cb38b1d24344970452a7afa06abf3a6ef17387ae4157704148e3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b