Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 06:17
Static task
static1
Behavioral task
behavioral1
Sample
a4296c76906c445a0fc5d0ef2dca046f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a4296c76906c445a0fc5d0ef2dca046f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a4296c76906c445a0fc5d0ef2dca046f_JaffaCakes118.html
-
Size
8KB
-
MD5
a4296c76906c445a0fc5d0ef2dca046f
-
SHA1
e2a77a4dc0151f3bf6fc0040998a6427f51ff51c
-
SHA256
0c36b34f76e5de326d017af9736183e4e2c2fd98102b8d3e28399859876bfb3f
-
SHA512
fe54d583c60b898a2cb90308752d6aa1a341a44d638af84de4d5622f5666102eb4787782d29e59337aec9bc891fb935f01a1aaec48492b399fa3ae63745e78cc
-
SSDEEP
192:9B9fo8tgbW2ZWEMJNj8wqocAD93OnjqJUXs0:9B9fnr2ZajnhN0s0
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b068e26b59bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424421308" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bc1f62b5286ed742aa36ac8449a0fb41000000000200000000001066000000010000200000003d64d5f83facc8de92da036d011d051f7e149a89e0f209f8910eea0785be4d48000000000e800000000200002000000028f642a029a7e7599e014e35cb7c9815c814834f5ce7b20744d0c2a7bda34f60200000005d2e78f28e83f3d3841ca58f36eabfad1fc7f24ece46b788cb1fdaa43504137d4000000090338ee86cf00fe67d50dbb28976f68d94f249b2751c9abe44d89998326c10017ed9992f4eb5c9ef79ffa0428eca62a37520e58d85ed40349a7ec3e1cb8e552f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9746BEC1-294C-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1156 2344 iexplore.exe 28 PID 2344 wrote to memory of 1156 2344 iexplore.exe 28 PID 2344 wrote to memory of 1156 2344 iexplore.exe 28 PID 2344 wrote to memory of 1156 2344 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4296c76906c445a0fc5d0ef2dca046f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4701366258983a711108ffc43a2448f
SHA1377b20ffc0c02d89f8c438b79479f0c95e905685
SHA2561016558c62472097bb6ee72fbdb81f9449f69f6e839a224153171f50b20199c7
SHA512dfd9f398b93ccf1a7a93a9da131aa51a5e68a5cbba43280aae647fa2b29bf4dec2db6fd32871b200d0ed996f2ce60b8cb77e534078813cf7d322e1357c7ac1e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c8837778e692c05f6772c612a89912
SHA1f18da24a73ffc88da6eaab0427a175aa563f8a91
SHA2561adcb56ac916fea66df9e69ba960f9de57b930faf72c0ea8fe54d7dc19ae7eb0
SHA512d4e3c050ca638fd67ac3cce2f217c1a10d64dfd9ba8f3ad5b0724ac7e8b7222dc60f3bff6f2e0ed83cdd40c2479118c0e02741a1285a231c1de9844b7d192071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad09cd05037fd3f65735eecd31178cd
SHA1efd7c77b145e3d2769cc97cf1823884da6117a68
SHA256a835977859ef55390223f787c3e40f3228e26d27a134dc484bf0fc62c619a279
SHA512c0e4675a1d43fc57847ec35171c41045b9fb880830b07fb176dfb5e4b06673d216f553cbee3d2b4b9d9d7be45ebe3263dae8c3a2e33463984b85389eab8c15cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516449fb8caacbb76e67b35d6c31663c1
SHA1ec53714fb6061f61d536902dbc36f926473d52bf
SHA256cb5755ece75c877af0f5503a0da1345b20969ede6744a504d726f9cd4b49c80a
SHA512be2ec11f170e0b2a731bdc6d9e4c85efb95b79cf0b7b0dbc8c587e0e0e20253ec0311b1590a15a6190549697d457d3714582cd2d7789ff9aff14083a4a40e5be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daf773a603a510860aa73d1d85ae9031
SHA162f021f15b65613b5710e4b3ecbef4677a55b7f8
SHA256354b945b97e9db6bb1eedc75d367e0f2deffac89af96131166fc2390b239ced2
SHA5125620abc967339d0d588ab22f8101e6ad6ecadfa60fc2afe3701f5775545d4988c471e4b28b2473fd78263f8d417ad5ab886561f3df9870edb334c26203929aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a68b6e125ce8093ef9bad4a8b7bce6c
SHA166f761026fec436c6cce6ad39ee09a820168b3ec
SHA2567d5edfd29dfda867ad73ac6f1b220288272cb1301a797e938bfdc7e99da32b2e
SHA512ba2b930dc9e960b2b85f11109dd4339dfa5432fa3bf18e25f1c442aa261711c72f7069e0755bcf66bdc65f5c14d381d14bda4f8e1d0b75b0810cf706ca226f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f430c61e8259b6bc6909778b06ff1994
SHA1255947b83e071571049653d1aaf78aecb41d4fc0
SHA2566af6551c2d5ea28a525f47ce04992bf0c4b8c595c17771b49149719e61daa7ca
SHA51236f26912e6ea65a6ac51787153fa4f20575453f0ce2e6186df5a8d615072dc74e1edcfb6f1bc279f0aa4a0402ae69be5644480641d5b16199881bc7ca4567b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad52e3cf255798126d08d9f65a5e986a
SHA1a7d9d1d00fd196507fa12c6e58ea17d627e81f80
SHA256545c4768b7a2e147d79985317ed61899b59b0309a7b6c507d8561d38ce9916d9
SHA512cd5f64b7ca4a512dd4cf0849bd0a25a65ee3ad572a0b9bc00d0c66003903d7399d0ea2ed70529ace8f960dc369011de203a1eb95c2dd6b26c48215641153ee57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705bd1809fa9855af9d9dbdec9e15f30
SHA11632b003587c8c277702aee7232362a85c9d0fa4
SHA256871e5caab9e397e8485c0ff06f7f3eb0603d5730176e1cf2bedaf75e5dcf9d3d
SHA512e362069869269aafa8c6b4981ea20a4ea1af90c685b6432edbed2392ca8cb9feddd2e42eb8203615827310b8703f3b3b45f3085d689f93c437a55e4642bc7566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caba800cfc086b0f574a5e3c45b55e6b
SHA13612281b704a7214ffe693246d661b10a93eb76d
SHA2561f8daccf173e6b74f031d150702a9c88c7e9227edaec01d3992c6b9d7d8caa3d
SHA512487f9cbdbd7c7976c9a541a1399433874333aae868850e6961af76b17975024ab8e3ce6a1e3c731803ed85f1cfa85ff3c1811c288d40ef6f7e55d52b10c6a0ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d97a9d48347cf4e4dcc9d84ea1949783
SHA15cbfef71de15c36d392954259756ab3df571e8bf
SHA2565e6420ea00ef2c90869374fb9e86775e21b95f963e791ba292dea778271ef115
SHA512f1476228c9e03819062677e4c0993c855c055f3238d1320976a96958ac90fae2e64f5eda05f4b385c89014f2db1eec656541f222ebae53736981e7f6efd18151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541ff822df14816d9824b53b635ad0232
SHA196c8dd142fb6d0d467a5444c477bea6db3fdb588
SHA2564e07ce3eef76250d329ff7a1e5ee09e35c580dcaa7cd4770cf219522c4bc6ad9
SHA5129dfdc95fe85cf89a8deaf2072cbae13c0fb0b387155eadce946e7a551f0d551590892713b095ed46ea735fe9de0ebcad32d03c0bb7e07ab0952bf15312dba3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555e0acbd17bc3deb0000b9f932cf800b
SHA128746d46485401c07eb9368c906cc696c13122db
SHA256ddb5939c18690b84d08a7926399aca54fa1ddca25036a32dd170d90d9ddcd610
SHA51248e07bff179317da84df1b3e97b8fd4cd5d3595d4dcaac6b4bfec54d76f2545c39b091bbaded017e1d72db799544f23a461551bb07f6d819b6e95fb409e06b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fae7c76f65ee145d9ecc8a8c6a8b7b82
SHA1d4d243001b020dd49ea2c20033ec1f9917da710a
SHA2564b5f74d5f9822470cf58f6aa2322e1b43fbb093ff33a90b97483f4e015c2d46c
SHA5120dfbfb17856ffa084c8a3b150c584f431397e785a3ec922686ebc24114bafed510a905691e7449032c926f45959dc6806148902221f8960282ce8af6038bc93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f6a2ea85cffec6d292a717530e2ed6e
SHA10d1dff092b1e27bf05a5063b928043603e69149a
SHA2561d5e35c227e3d1a086c663d6fb9cdf11a2debfca6a7e81e6dda8905b321709fc
SHA512362a96c50b29d4594473fa845767412555b49c9c06db9b42ba9020c940c7a8ba66659ab5b2de5694f988fba1bc271404dd908743425696fadee81d03f2c2925b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6227743ccc6012db643848467eff0b
SHA15ce4682b2d2cb10b9953a696e203cedd7ccd1f4b
SHA25617f8e2be690a20409f5012894bf1fa6054855d874cfbf0b2e8a5bbf9dad2f59d
SHA51239f4b5a00ffcfd9f7133c0496580af254b9475d655fd7a1371112be228fac35d0ebb6a3cffc04d8a0184ec25dd9360fc3b51df54a5e9119be68e79469ea2ec6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5380456215a2b89287b85f0f67ddcfe27
SHA18f50565a0c63572f3461802de25ce4b9b00d6feb
SHA2563591555ac5bc510d0d1b81e76403f63eafbfaf70986d0e2948f2054f184af785
SHA5127c914ac2bc18aab8cab7efca83d1a32b25a2aa4731064b7d5cab33ff7a97ed306b8e25ac75c1ee8e65324ee97484d424c974c9fb7f91f77372f351ee5b8d6c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c493749a6e0b20d120f9d14427332d95
SHA1476a1f330920cd115a3d0e9f6d31c96f0e3432ea
SHA2567abd432dda36b829462e213ab040e42584bcfe53ffba98c4ebee4b0317ccb05b
SHA512afc211e4e2d6e4b1879d3f467452e0379d623a83242fa0ece3bead2c2f10301f1a3abe9a370b3db6d922b9b580166a7ae7a62864ecc969eee07de1fe6894a6cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f84f99ff9b7170b3435475816e15f5
SHA12538767ba4552bd871852500e8a086c386efcc01
SHA2564fd68226a3693dd1cec7b800a89d8f6c777817bacdf18c26f308bae3d5d19e0c
SHA51289a49f367d2bc497070450360cbdcb9b553b054ef0565a6741252b60a8de75c2055344181fe751e0b00639edd586df39c4a3c6b55243ecefc6e217720572d952
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b