Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 07:35
Static task
static1
Behavioral task
behavioral1
Sample
a473647b846eb6d4989fe40582608853_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a473647b846eb6d4989fe40582608853_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a473647b846eb6d4989fe40582608853_JaffaCakes118.html
-
Size
132KB
-
MD5
a473647b846eb6d4989fe40582608853
-
SHA1
e4d9a1986891f9e7cae635a922e33c0bbb0f1bb4
-
SHA256
6ebc0fb15b3d2495d36901c05c8ea04e64d1b7d3854d20cd797027f54303fd18
-
SHA512
b33474f6bbccffde7c47b570dbbaa6b6c3fc02ebc9dad1dcd0d2acacaa640296139c913cfeeb35fd4d195ee432de2373eba377b9762e09c4d4df9222e0f4ad8f
-
SSDEEP
3072:R6O/aQVICOxLXGSg3KASAB3hKko90j1UvvXDDx6BzBF:R6OtVmoRdtv
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0aba15164bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A596051-2957-11EF-AFF9-DA79F2D4D836} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000ed66666f5866a4e433fe9b567ed383728d270b8b1e6517785069548474dfabbc000000000e8000000002000020000000e21cdc3cf78380b3581ab2893df95e3b6bc8a8a7140e7b2697be5f1eefb62ade20000000b7db9157c0879901a40dfcd10038dc9c31d374b480319621ee2e4eac784c192a40000000d19672c4f1498bc00c7f739af2d2ba1a70765cef60946671658d47fa966f2f477d105f1f4665c8cb79a5f2ec3fb7d662eda93bdcab335ed08019e5cd706b311a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424425983" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2304 iexplore.exe 2304 iexplore.exe 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 1968 2304 iexplore.exe 28 PID 2304 wrote to memory of 1968 2304 iexplore.exe 28 PID 2304 wrote to memory of 1968 2304 iexplore.exe 28 PID 2304 wrote to memory of 1968 2304 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a473647b846eb6d4989fe40582608853_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c527ceb4d19ce545abe4081f6bf9ff
SHA11516c4eb3d113ffbd640e8bb368b78ca350b33ed
SHA256dcf6e0a1735e3dab71c9ded341413dd388508937fc9c3892ff7957dde817240b
SHA5122500e284f88bfff9f08c79138af6af8600e2a2d58333f1b1d1d0e1a566913042eb5499a13ce3af5918a81882d2e57e7070253a434503d46b2202975a9af744b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5636a8f022a5cbe35ebafcb77f935a382
SHA16a298ce173d8c154cb5d12ee8d22870fb4b1680b
SHA2560e7d9be54a59c8fe6ecb6834de6a1d5504f1eea2c56b0ba4ec6ee2f64ee47995
SHA512eb307c03d1aefaba50d9983bfd6d52aa55391ac92ee1b5d8cba8b5b7fae075fe5d903c183fafe1a7f121c5042147242c87fe0c5cb6359b314275569f59c698ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528e69d3d4ba9c27d8fa008ca2c357c35
SHA1cdca701827f92a21ce66f05753e8cae62846c567
SHA2565a0ffda438662ef2b799a12c7089e753ed78bb387dd75f01a97add6c388583c1
SHA512517d99ed88efbe0714627c03d0864232460520b761bfa9009c736138284f5fb3fe05e4fbe28d45df58ec2d22e126d777a23eb494283e1790eae9a6ab59c8fddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5214771f972778d152e80e65c71cea2
SHA1f7f6a53af39358a803fddc28b317d1da7791c115
SHA256dff2fe5db86aa5c814c05eff7193f800590b25eeb29f642e09fcaf2861b865be
SHA5123b27ea533875fdc62ef4bc4d54dd9a3303748059f2b4fd890e162340d776b73e4e22eaf2e171c16d10e957c006765ccb95a3564b65a951f2acb105e28a663893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b95ca2ec58f98ed74c583c3935378c2
SHA1d721208add84d639208802477fe79fb4700345ce
SHA2568297cc1c192d8d72585cbf7e70475ebd231e715965265e5dd395777a40d5d8b1
SHA512854d91045afdc5dbdb56ac588fc638e8e09ba68e0b5b7c45a790ef2943225366adf4bb6a4eef4a2f7f0ef7f25ccf53af5b6f9ba6f14e5d90a38cbc0a3742af09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4713284af1035e6c316549ee20635c5
SHA1f26494832925580bcf525ae688b1c3fa19249265
SHA256da4d958799d41a57adacb4e073859e6ecb14d71f0046e2551b4f19625c5bafa6
SHA5120112fe16dc38879fa826ab91f60db3ac31cac2a564415faf08ad3bcb19c075f5b65748ba0a93eea27862104f833bb579f877a56c4edf026fd79a14da7cc40411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5870b4486f82bc6bcabefbc4b806264
SHA1358079facda4db4d82ef85c090bcce84b28f966e
SHA256367d73c0aefa2f037db36388cec88c164db6d35fea0a7aa14823728313060d45
SHA512c87ef56d0de4c3bc610a4ed2f8c18871684637e27f1c9ade14d46f90eb4430f84301af19996dd5e58be2649defb59d377c73a40c08c73a71d5a0ad8b9756af53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4fd3b724a456afdf9860f449ef6cb27
SHA1f3d6d88a78187800fd95c4326e70b54b4c101af4
SHA2568ba705ae6dfe8c9a59b839625a352bd09d703a734e2c147ceda07a6baa90846e
SHA5125912afe71bfefcd84f20fc08ad3c7300a344e9d6e368c6e7687fd3afe4541e57266bbe72a905c74356880e8bbc010ce6a5961948b76e28203a074310fe19d536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573944e25096b00e294af8b2028190a3e
SHA17d0e0edbb6e178c7e7b1b667e55764dd5ea1d481
SHA256ae0c82232f09c3ad64dd97a92a3fc3c6b95bb3dc0a061d50051535ee460d94e8
SHA5129da94d99999fd522268a64fc4d27f2b21e6b71f9cc4182278a5d61cd3ab3720ae631ddf52363dfa5cf2f7afdb29e5c121e947da4a57ee6e0e3486e36acbb1e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542268c89c3c653b614c950c4553e0cfa
SHA145df13dac9399902907f37a7edad6093d2ee776d
SHA256b73d6e0f41de1f39704223416d2efefeaefde60da6aa4b7f161cd0dd1053b64f
SHA5124f5cdc6da716bafc5da5b1f0badacfd8bdb6ee3f210e25a7f1889e82ba76b2007e9ec331c504410c9dd75b4fd163e710ccc15a6482545a116e6c0fcd342c6d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51855c66f90bf91874a4df8b44d6577ce
SHA1c0d6ea24a07d9d377d760dd72ad83d09138ffa7a
SHA25659cea982a6c0751a6ab2ffd7c188633200a75c2a3d55c7f0ccd3ca2beaafcfec
SHA512a5612fee7477b24c94af1bc5d2c68ced8637dde4d72778e250aa42c34b699afff537e02be11dde1e5edda4b5889c4a3048fac23aeaff5a20b8ea816b4f3167cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e124b36a21ce372dc70af17f88d76fb6
SHA16c0c5b438661c1670b67a4f5ac903e2646a91cac
SHA256c014f791cb67e526262bde0c35ee9147c603ab6d59b753d9f19962962e9b1421
SHA51285fff3c6e103e9ecf8f7e43f21f0ab1afd41a8e53b0138eb961f0ad39cd23ec7bc882537d3513b5272c8305a9264eda1901b39cac304404fe8dd7796e4ea226e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531bed833e9a15d654d37b94d6443eb77
SHA18fd198e1dd9f434cf9cc6cb6938dbee6f6604519
SHA256bbe5c587e0348e6d6ed76db137712c819142d151a6c7d922c0d392a827d4ef5e
SHA51228453e3be839b0606a3c67f7d5f522322f01849165a5ed8264ee8f11b492cdbc748897defbe9409c2ad9c1ca987eac7af3651ae9e8735865dd27429a11ab3fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e1e0ecefeee7ae3ae679ab5ab18247e
SHA1dd4786b446453e92b41737bf8f0c0e0dc56ce211
SHA2563eebb9875888897e2129984d54a4d3e2547b750999676ed9ae651547c008f190
SHA512adce9ecffc8bdb7ed5384a613b0ad3c65a574cd51fe68b8bbd4bef5ce9bc643b1efae10e8fff3dcb49cfccb053b168b1a16c6b4ffeabfab0f28b557dd2f7317d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a2946096cbf5bec1428a13890aa356d
SHA16e9a5e2ecf59b676d95e53246e971bfb6fb19676
SHA2566053ca8d2c9ab8962d7aba2698c235177c3466aa7836cf37697532a3afbfa312
SHA5129582e4f4165d10bb1f2124ecbe0edd08232069067b5602690d918ce614eacde34dd84bdce14a536ffa4b17fc761e209e04a9731c8312d8273ec39fffeb10a9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4a4f598f0902d8261b465492e9e34d0
SHA1dbb498289bbca1fc918ce6fe4b212195b64f5de6
SHA256a6929b09b22087ac97fa3c01306a7fa7e0e5cef8a47a798828d0d9d4ac87ac37
SHA51249a88dc08546a59e31f7fee325d8cdcfdc1141113615a329061bbe5cbeaaab60d8b40817fe8742909b716543ca4555b0965bac2c8765f0a180cf7a2d05e43f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522530ecf4cc21a5f1a7c70889901a037
SHA1d33ae2f97dafc34acdbfc0fc027d0825d48a6d4f
SHA2568b53f1ba2b6c3668c74d1e2e7ffad6846dd0b12c82ac30860431afd05d6da58a
SHA5121ff5d709825c13f72986ed679fdeee6cf2b425adf179639e344f2431b5910568f7e3b8183cca988356fe566e749b265a92db2f28c57564e496f0c5daaf4985c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c7e770b780df4bbb063ae6d5d795d4
SHA1fa7b056af2dc84ab915be3a17756e7799c728e4a
SHA2562b52ba39ce727a5d896bd071826ef547124a2f4e74d94b0eee1bfd733bf4da8f
SHA51217e2f7d564b5a615f8a8b30ee0b27591d1705930945bda39dcea88a23c487a4c073e840d5f4bf48fc8c9b1faa2337d8eb9d332b858ebbc35f2a1c97c78d629f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524d60b63495c13be4041cb3fddbcb7c5
SHA1e6cc0eb103838cb932a63fd91805eebe4fc3d3db
SHA2564b0d21daf3fc55010cefbf86a4389260c3383d351bed23c533f0819f60ad5fc9
SHA5124ad67f6463ecb72d21a4f95dcc26811f7c6874d8b38a95c1035bb3a9bf74229523ce574f8e2ccf673fcef9b2d1369e04ee6190aeb3f6dd3c0cc3433e4243d1d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c156bdca03dfd9eab44c4aa4d9a23c1
SHA119646879f18c3cdb584ea8091b79d3dac297697c
SHA25694409eb5b379c66030b08c607643fea4738cf38faebdd00fcddc9446ba83facd
SHA512ee2106be712cfff2f7157b73e1864deb1fdeef77bebb01fbc730f7e841c54904731ce4dceb8b10df5352ca81a5190dad103e45e6542400a2fa46946eb57b2d5a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b