Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
992be3eeb2a69c752e6cb822331eb769_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
992be3eeb2a69c752e6cb822331eb769_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
992be3eeb2a69c752e6cb822331eb769_JaffaCakes118.html
-
Size
4KB
-
MD5
992be3eeb2a69c752e6cb822331eb769
-
SHA1
243061d6de9318d5f5c35503ae139813e2ef044d
-
SHA256
3bfb56e709f1558d9c0353513929b479d535effccaf14b60a320f587a31b02b8
-
SHA512
16d6b886cdde5730420848a533d54eb518773061267b906eee2406fd8c412c74085c4de8848adf906db7b1061e238cd0b1ef9106a3c272270cb240ae814cfa54
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ostd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDP
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97EE4D71-237A-11EF-8745-52ADCDCA366E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002c5bbc5cf7840b4da46b5361e092942c000000000200000000001066000000010000200000003c06fd7cee1fe08cb130e47c6477261efe74889915dda45003966d70feb1b6b3000000000e8000000002000020000000f43b5bf68c06f7a0f455730fcac02f9068ab315cbfe20d354d3048e6c66019e12000000027485a9f94799503590de8a5db1a0d5de39c450a4f0244f509dc3ad8ebc9ab9a4000000025d231c7891d57f4287f2aaebcd93840b4017ffb493f6312b5c67264b433745ca27ca59f7e540a9d051a6dec4e789c14dff041f6986306a74bfe381fbc4f8a1b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a065686c87b7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423781359" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2036 1952 iexplore.exe 28 PID 1952 wrote to memory of 2036 1952 iexplore.exe 28 PID 1952 wrote to memory of 2036 1952 iexplore.exe 28 PID 1952 wrote to memory of 2036 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\992be3eeb2a69c752e6cb822331eb769_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5349e2cc6edf9df88b9b7ddde541ef7ca
SHA1afb39ae9e8860a8080f0585884d1ee03a7eb2bc9
SHA2565a260c7d0041437306b3eaeb754729ae2a6be3e94892aff129f70a042f558439
SHA512aa9cdd9755776eabd5ae056224fc34f85f34d549b1c18e53dd99ad6f4cbfa7bf8db1decb290f1000886a4d2fd03986316b858ac949a2206571e77c13ad727ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54888bc6e3de7156ced45ae0a98862cb7
SHA1399678eafc7066f68f57bb42f353f7ba406aa8a6
SHA256bea45914945c82cd30cc338599f257f30d13ceda1d15b8b950d94590ed266f58
SHA51279cf6426c1833974e0cb32069eea9493cafeba4a909fce17f12fb21340934ba3226b3d8b8969b65b8f30ebf2e50c32cfc78f3993e0adb2f6a8b2abb0070d8c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6660536310fabdbbf09ae847c48d33e
SHA153ac25db6a26e5d8844047b8833310d89519f485
SHA2561a986ea06838f5ca446e9b3256c2980a6f8e8395b67be024771556723f14c996
SHA51202fa521d14044ae66de3e37fdf5c0eabe155a24d324b9c54630a8f9aa5d90f17e2df50185e53cbd31761e97b6dedd933bf389ecd0797941c2d95812811a1bed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597601418e186479b5641da9493ef932e
SHA18780a5674f12d03ca1ce2a809687862291ea242f
SHA2565025987f1fdcb45720ec92a0c1ca8d24025ea6bb58c5daccf4923774777308d4
SHA51252e8fd864e7585e69da9157f3457fa93bc341491684fa676aed87df89dc6ed1d7f9ab9c1f853aea49e3263dbec156ea216ccfa72392d6ac1976da69119f7f294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7799c7fbf1920445df9fa58e8726eaa
SHA119600db36768d856f3b376820897377b4e2e1c49
SHA25628862f2989d18230855abf93c898a7a9fa836d25f523c6f337a5ac7466e9a8f8
SHA51228018fee3e97d391d22fb58b06b93db1540ab7bbede166e82a8c530d77004c9332e804150e818c12a0897e5b090fd5cde4df177d376293356499da59d0ab1237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51759673aded943266779822b380f71d9
SHA1cbc58d61330a126098d037e4b9e08d4895af9fc7
SHA256b94bf3448bb8370e6245e1c4a66e0f254e079b8a310b3230bfaabcb5f4f8656b
SHA5123ac4b3cbe09dddcb6d12eab27b3aa908cc8b49a6a7d7358a43b460a8b8d6e428a28686384ab4da63fbad7337ab45a2e19cd5b45ddb1651b04b7d4f718663501c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c6a2fdab0a88466da5f4956f3accf92
SHA1676526874a2a3a1860e9e04f7fd44808f1e9913c
SHA2565864daedde685b9beb2f941d8f208d2895b023d585a119495a03738b2327f3be
SHA51296ab988dec159c8f6dfbf0cc19f89d4581ce430e26e7fbf8858499807cdf2c4933d6e0a31bcdb502685d130134b111c2b080eee917b1413c8bcbd9ebec8853f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549b501489120a481f9ebd2bfc558f0fc
SHA18ce46c237ac630f2eed0240f1f5078f2d52e7aa7
SHA256a3201f119206e8ca256d6e5a73c2f08f20b5ea0aae353d4712cb4e83184f967a
SHA5128bb5ef76ff16c92d58cda500af4429c8fbfd214db1d4b88496966d8f15064a4c5f19bd514ae3fba404b79e9c75cb06e95017a72d380c26f42ae23f5495dcbbf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5404096f389f65fe0c6e3ebc606677308
SHA15a0d8153d030f339527bbb2fb73b8158cd8c184b
SHA2562cd984648fc423c03c00659f55041957c9e220fbf7e36111ad83eb2e68eb971e
SHA512a5033660894232148093585481e141b9ead5d632fdb6bc12d1d26a3e632160721987352a93587e84f098e99b0d08beb7651c8382b195b3388bb3908792b5b43f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd133de9f82669d28057d47d6faccf76
SHA1859123016aec31d05fff8b149b3789cb09de8871
SHA256779113e68501e2eb375d60874472aadc0756625f8495a372e8b01b14347e3860
SHA51225b8e9097734e3e787b64c8e573eab2dfa3ca3a4f1a5dd96b54fe024fa8e2b6d6d4ce15db887ec71d5039654b2705248d28e7052203653f15d8ef09898a046b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981c9469ffe168791741f87c0dcdbbcd
SHA186884d5271a7c397c2e883151a8a3c64ad25403c
SHA2567f7fadda2b059b606e4cc7530dfb9170c2578dcd55824f5fd06d26af0ac93aa1
SHA512184d93ba343fedf0ba3f0695863c2ad56303829503717e9f41c599cca9bb67d61220ba3e7400254cd20ad8d04280b01952a6f81d5fd97c17feba8c4b2b1938e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f0b3437f38ab4901c294ebad375e45
SHA1f4824fdcb86e569285245769649b9bdda2a1ad77
SHA2568b9ebd4c129cca013a78e16c996aece38b48c09d8fc878a5eb6ad29b0509d44e
SHA512e8cbbe7522bf2cc6161fee62739361c0b27bc79818b4c4d126eae72b3105af0302e693ecafca4e34ea5aabe0661cb78603b7d70a978905562b4108bdea6c58ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c368e9d43ef0bbca8ca8893faef31ba
SHA15b1d8312e420c1027c2ad6911773cce378e31875
SHA256d36b8e251ff694f9c4628e9124f2cf1a48ad8def5a284edbc8379aa4448a8577
SHA512d056a96f4a9f387341ad76c5b6441bfd38a8e5a9abe5ee1cb7b26ddaf8c46f4b35d022069947196525206e1a555b366deea2a48f4aece97445c952521248c9fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b0bd9c9667172cd6ce03767ca5c1bae
SHA192df4c32a1d9fd4bcaf04c0c6010726cec9f4b6c
SHA25672b7459f2a6dd24cc88b2fa17ed8a6d088524016ff8b71170508805b1e0b7556
SHA512ee993fbd4dd81aafa89e130d944b4ecda48450460e9423654ca34eb4e8fb386d65340d31805485e31cf2b3f907a54fea33e97a4a003141a49fb88150969e533a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea9e9365f03a39c569c2b82e64d26b3
SHA112a85dfc358adc7d2ad960f849c4d89d83a2fd9a
SHA25647363fb7d81900bbdcff242327f58abc76c8ff6b3a864ef861b1f9fe2bcccd3c
SHA5126dc69799e7cf331ba0a78578102f8974ca4f4c6182e65406b343bdc988610f78ef32a20dac1e827a181626160fb15109b42b7f874b50007564dba0b63c2c38ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500126eb815652c5ab501a959ddec76b0
SHA18072232f6c0b53598f4fd1c71df17eff321db7a9
SHA256ea55b4e0cd2c84be505c010b5ff7a4edceaf09bdbae906dfad8c8e4cbaa94d91
SHA5125ec932c72736cf93a3c8dd603401e6e43237ef3faaa17db30c26d2c0a9b51d15d4963e27d6b5686ce1e1b222a038edfb632db3aa8f877edbc40d2f63b03ce55c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c47e407e9d4a74d254127469cd54aaa
SHA11e6e32156f3e3f47fb0f73f0da0e350d9107a5cb
SHA2561b46178653b2389ce86d614088d7870ac199ca65caa7a04a1eabf060bf4dabf5
SHA512be71e8be5c829a54e20404b685b635da1b3be2b03210f3aae3af251ee0b82ef103199aafc4d0089e1dab0413d15611a365013e233cc044db60dafa58c4cb9d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55436afb396eab71ae01b8ec8783cab7a
SHA1616abfd70f49827a4f24b7c2f545f78e0bef6337
SHA256dd2fe5d71209d1b02bed1089810bb3c52d0a85406233fe3b1f7a8188705e84e4
SHA512ed90029c775a3ffd7d0e59bff7ac4f4b502a333d7fa0d309757d5081c41eb6188c4c38c9330ed63bdb0d75f72d3d9ef537bb976026dd20a3c438d2e7678f54c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549bee7e69a324e98ce944ff4ca937d44
SHA1d9a36b5934941e5ac391c3178c2041fc26f018b7
SHA256a68f6b47eec6775b768e1baf9ef329dcc0e5f0ddc5b47859117d6c91c0d007cb
SHA5120c7e12e87961a17aad65f0844bda3062209662a145b4917738aa994e98eafd6374fb60e55a14ca8b9b69c98fce7d53a0fe291bf5df9d59980749e04b47982a6a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b