Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 16:47
Static task
static1
Behavioral task
behavioral1
Sample
af682166d9ad8feb25b2f519beabbc0b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
af682166d9ad8feb25b2f519beabbc0b_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
af682166d9ad8feb25b2f519beabbc0b_JaffaCakes118.html
-
Size
13KB
-
MD5
af682166d9ad8feb25b2f519beabbc0b
-
SHA1
28577de797998a44252fc7105c82ca59620e410a
-
SHA256
d9bca7c1d1ab4efc5e31417ebd70ae9b1a84a83075978ad1096e445d5d7f807c
-
SHA512
f93146483759c62565d3991e51dac8315eff0609b6f54da52e0efbbd8783910b53ffd90b66a351e6aa47f5c8bf0d7d1dc519faa40389a2285982db08f8aeb425
-
SSDEEP
384:CyixLuwRliZQFAi7uuvL6MN2RbPj1WQ2G2a+PKGdV:CyixL8QFAi7uEL6MM1m9V
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000014a739a753d6bd4b80e3c7a20406514b0000000002000000000010660000000100002000000092384a4e52ed4e710800c2aeeba36e6b15f43915b4d753d0e3d146bbcd403988000000000e8000000002000020000000dbb956e81832ed4974bd5fbaeaec4f6fc1dbf12e896136ebff1e7a3e6e7d26b5200000003f0f921b192200de83da5b254ec608f0e23cbb6329662542a60ee3ee6218dd304000000008734545d5554db24011d7010dab81e74b7c4cfa93aaca683d4b81959fdd8039f4d0a1f21f8025eb8dc2c62fae4b0177f589a31ad1d67e4d3f36bbed9f901fad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4051c8d543bfda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424631939" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{011965A1-2B37-11EF-BECC-D2EFD46A7D0E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 3024 2984 iexplore.exe 28 PID 2984 wrote to memory of 3024 2984 iexplore.exe 28 PID 2984 wrote to memory of 3024 2984 iexplore.exe 28 PID 2984 wrote to memory of 3024 2984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\af682166d9ad8feb25b2f519beabbc0b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e34ae91ad033e3b7a6bc3e99865f8de
SHA120784d67d8543ef31b7777b4772d0bfceab01cb1
SHA25650a3dafd8cb8384ceb22b10c2d56229b7022ceb411c6798736aed0e06b4dc1ad
SHA5127d013841026058474782ea89c20def116c1e72027f9cb0ea36ca7db1dca8299439075e03dc996c73cbaca4485380124b5f799cfe7f0f32a39f360decc45eb1fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d8d94ce47d1bebb9aec2be4b50b410
SHA14dd8c75b7afa583131e0ce38a00a17f930675236
SHA256cb2ca989a9430b04a04ce19b566c760c6982d1de3dc67adf50f5cb777a75d122
SHA512cf3c13e4432a15beed5d28ea9faed4a5ab4b4496004950b856cdab3873b615827aecb3b2c310b9d369f0f39bf8396ac23b833fa510236ab8b3b6e9622db63368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ed373fe5a98bffde07ca930c9514c9a
SHA10217419e7ca88281bfcf0d182183a806e9df1c5b
SHA256e6bc01c66f103629f8c91556f654b174c74e3ae62a4877bedb78a20f6e87bcb7
SHA5127ae5b21da7b2345e1ce7455d7670c75b275dbbf3aa61437f3522c190696e48798642d963e31dff9c0c1539e9c9b2d4c02afe3d4f03181cee2a562c1932bf142e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5892d7b3eed6132f3e385d706969a6b87
SHA18d6d9e77bedcd21bdf80b6fd970ef9be2b6a671d
SHA2565f7f92cd66093dd6066db57bbe2336646f1f41196b0997a879318cc687fc3f86
SHA512745320853fe71ae5e1ab4a6636cb2225f10061fdcf087e53be38ff9b8f257347f7caabd86e018fb3f6efc7e47ebabaada32113f27f39be4b65a830325b6b3969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c7454caf8395f0490c5f9e05baf4922
SHA126326ab04c96c65660649daa531d4fcb1b74e174
SHA256f76eaeca7ad5f0afbe8496cae2d27277a7504b951e4aa89c42c6dbb45b44e779
SHA512886aab1d8d701ced39c0f409513c5b247400a822ae3c6e82aace241e179ed8a289ed158a174c3486e6f2ae0aeaee04681a1bfd157ac3cc916c7f77778e15e5e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1cf2124f2a8c83c0b55a6bb443b3b27
SHA11442f765e7767fcc60fa7a4b30459b927ca49911
SHA256bc0f90d5b3e2b7c49e3b88be38d8598756b1e3ece45e9373807a9ae73cea32b5
SHA5121d89bb160ee05c136a1577ecab9334d86da83e999cb52cf09fa6c4695b7f9af15c7af581c2be269ea70c9b2fcb90a35edb06651af786e0b08637bf2c49262c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556881287bd6d7e4fde6265fc112e64ec
SHA18e0de2b83bbc26f1458b8052120261bc9c0160f3
SHA256dc2d486e3f06fc1a69c5145d1d31c049887c64dc8066bf9bb5a075c7d59e370a
SHA512d6042d73f0ad3f70d9249e963e5cf46e3a77fcc63583d178e93141a845129c2205abb3121fe82a352a3b2b03d77c2a81acff2154fb1a2d68915f2686f629b51c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b618e1d467b9b784badb2f6b2862bde
SHA1dbc57c1fea2b845739a8ca6d9acd2ed201762171
SHA256c6b5529d1fb7c938e92fbc60c94705ac8add1f36b548a9fb94948ce4b7a7f70c
SHA5122a33fc66179103523b91ba352c69dcbd02d43a9e16429853b8aace4c4f26c402b58b607c077543bcc120e900a919403358f1b24130ca700aaf13e5f12b75148a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d24c21181379303634b703eef1df379
SHA1b12bfebceae14a70f3f87fd9a6019897a2186069
SHA256981d35e7e9ffc4d83c322e006f1f380aa5a74d2c5f894dcd38816bbc3a4bbb61
SHA512bb26e572ba862b40e0191cba7e5b763a8f8e3ccc51470a43b1c1a498a4798f96cb17db58a769e4213d39b6d1b3f716076a38d1a0917f5b4a95349cfecf23b7fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f1c84be47088f8a500ea354756a2d9
SHA1c5a294aff032a614e5b279be0d72f061d14dadcd
SHA256734c1bdb30a4c79fc10623b05146275624c0da8a01c5862d2dc3bd592c73cda1
SHA512b7221aa8e26c01f5cfa5a6173c6f0372d65303122b602e169df2f0042731ae8f3fad285f71a5e268495ecb4762a978b9df1549d01222453216776a6fbb4b1767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ea3525cb4c8c9b235227381f6a5b55
SHA143e1bc14c7ade339c1f6bfafe7a5c7ee3d5c7489
SHA256f7072f45a68aa71e9baff6916a85da1ab79fc4f4d77ff3490efbb8a321c4fcce
SHA512e5f322b77691f56824c23b269164a984d9323df7005ccf103597eba39cff028ed7002e016e774ede1f6b832f0bbe77a67aff4775f98b6630cb37738c4da67c1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593fe884c27cd3bcf8688ece9239e672d
SHA10f784714ebf6cf02ab5cf33887bdec5a3bef9f78
SHA25639bc6aa1100d64ae2200fd1f6ab4507aba9fe027b38bd103e530f7e21db28388
SHA512f674f4a9c17dde16b76f1550124f384a2c777ea1ef7df91ff82d0e8fec34a388348a354da66286009e53172454dfdc93a1514cf4726251daa7208f75388e454e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a1ff96783e42197fb5b7db03756f7d
SHA138333abb803bd11d07048d1a505eb5c10a33bd31
SHA25617c22ddfea658b83b9e251ba07a1d386fbab8b7a68c0dd5891e2c87a58622db6
SHA512f23be004484330eebfe2580cb25c5aaee2a57024df84e6fce6f11e34ca68fa55a001c7d0f56595cfab0bce6bbd57316f84de6d26f753cb91085cbf33fe4dfb81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2a771dfc681d6b7ae5696505f03e8a7
SHA1cbf44795411f046aceaecce43c39639e0cac8dc4
SHA256ed6e76c6b52fe0b76d6a7a92ac59d747871e6d912bc43ef5d69e8128d5180ab2
SHA512b28f4b9ea734560852d5d0c5c576e29f7fd7ffcfd77a387041ac6aa0fcd5c42e21a12e5a08757fb093865ff904485b78a60e0b778172f17efec48a15e6781838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5765729e6859b25fa6bf9275ef3822121
SHA1517af1cb0cfbd7c08b01b142b3161a622810b611
SHA256c98c067c4597512ccbb3dafba7a08cdef3ea95148c4cbf44a732b0905f047e81
SHA5128e42532bd4d06d9d2cd8f65e42be0e60cc815dd2458bd9315c7ba2e619f6b7be0cee8bc3f68465eeca6e4c79fb6a858746e7a8a03f49d8974dc36632974bfd3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bed1d56813d2d534aedf80edd750a33a
SHA1d379d8c43661a924aacab86de4c2a9b54e4c37cb
SHA256e88a9faf8d8efec4ec2e31217ef35ebff704f5252523166ebb2fd210b6bf48a5
SHA51222839689c2b3b129644ffc84a253eaad8dde32a942cced0c218b649cb06c7a2f10e5ff1142ea00259b3e8361a59dec7b61fbb600919f40ef19857f757aec63fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ccbdb0a7343fcab17c2939c44c55c8
SHA1ead7fe8d16f18e35327a64732364c85c05eabab2
SHA2560eeed1520aec78f71f7676b4137243c629621e477d74b873556b629b934bcbe8
SHA5120fdce3613ccddb7f9fb492a22e633aa17397af6b916db7a4a975e7704fd428605c56a8facee5d65c6238e0f37ab71666da3aeffaf9a74ed1e9d27e7b407588a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b017015496025a7200107ab642da3b1
SHA182abc7c647bdce4d9de42e30199b02fe2a24b32f
SHA2561ea97b7a9c4bd3ba5080154d10025c7108b4b86e6417c63b2ce0c068263ad7b5
SHA51261384a423df34d9ae955296efeffbcc645f6c7ce74e35b56d0b8e7f7ccc7723cb102f61c2596171c997b26406b5c6b12d8112168dd6d11ff30d611a65dc8c514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5681a0a686117e2ec8789371194384338
SHA1184b2420c971da401e5adf352c53ebc1c717a92e
SHA256e3547138fa3421029048f632486c080aa400e8bcb377cc25a564c5f8b624433e
SHA5129e6e380a9de405bc421522d9b4556ca96a49582e290449b26765ff89328970f25e3243daef7162c08068a844d1c3324dfce214ed9a33f392ab0837bf5061675b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b