Analysis
-
max time kernel
118s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
b19035bf3604b7acf73effa87693cb2b_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b19035bf3604b7acf73effa87693cb2b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b19035bf3604b7acf73effa87693cb2b_JaffaCakes118.html
-
Size
126KB
-
MD5
b19035bf3604b7acf73effa87693cb2b
-
SHA1
6a3801e7819cffbf52e48ecd9fa4d15415a0da39
-
SHA256
a510d70d1530d6441bfd19d5330ebf734c97adf3a05a0642a7b626be7a8b9ecd
-
SHA512
9338c9be1ad06d3a81ddbc3891746f0111f32ae2630dc43d6fe21a3ea44561f2608b88d94e09204b4e15a3d956533b096a781aac3b092642e2b8e878c1556a63
-
SSDEEP
1536:3XQHKRyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:nQHKRyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a80760000000002000000000010660000000100002000000013e322073d10ea0cb04fcd46962a482017d86bfffdf07998056cb4ee83d3caa1000000000e80000000020000200000000c4d1e80f22221644312e9cb55849ee5d9dd8adf683aced749612a4e01852fcd2000000023cd933f960eb2d9e792502587683c6453adb11a075fb91f447b5254422b836840000000182ace4940623d82c1d0550511dc81e0cfc565b3823560f4cdc400744026695d94ac044ed57e5e679961a76a5ec80ad05f6e4cc33c35dccb1b3c097ce37335d6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424670984" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E99103B1-2B91-11EF-B47E-DA79F2D4D836} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06c74be9ebfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2952 2420 iexplore.exe 28 PID 2420 wrote to memory of 2952 2420 iexplore.exe 28 PID 2420 wrote to memory of 2952 2420 iexplore.exe 28 PID 2420 wrote to memory of 2952 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b19035bf3604b7acf73effa87693cb2b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5443f19ff4368e6fa3e9622530db000d9
SHA18f5010d9c5393ce7f7464c3a4b1f383199873ee7
SHA256e4464ad3881048001156ccaf793fe364929affd99d409ca3ce5edad4896188da
SHA5128260b6097e226f7fc1e937a819878a4a05949f6119bbd9281f75a7bd5d58b9466768038a773ddd5b82cfc58925819c7af9cdba55a5e73c6bb9e35ac00c291274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8e291df4856e2ee139ad97e9de4dadd
SHA14871d81b5b1cc1154ab6f626172b407ec7b22260
SHA25614b30b82fa0c6da0b01666fae70cb8ceae9d4b24d1ca9454e03bd75700c07ff5
SHA5129f5ba26946272bbeb4dd4ecd820ecfcf601fe41b1a7ea484d717b8c53e99385b933e766c347516327e91e096e1c77e1f6b8656055d9a56b8b9f7a01af1e9f537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592692bf9c77fb17054ccafaec90f3059
SHA1858e5844df915ac29c3b0d302b57bfa25ee789a6
SHA25647106d1c5ebc60e3035215486d179a42cfbee4eefe209b7e70c50ed2f1182dfa
SHA512d05abb632affc650138aee11ac4e65a170041fc697521b22b710739f27af54fcef0bb041fcd72bdb9b7b3418de78680fb8c6f2b2b91ad4a0e2b790aed0d612e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521e3ea3c97fbe04f8be5ecb4213fbf10
SHA1035329c181156b5c8a299b7e82da7ab774a830e0
SHA25681d604186e1c46dd7ce1dde8aed3c4d5a7db2aedc62d12b9456a72dbaccea2b3
SHA51249b0a620f5b23d4e2055089680db366909fca6ae4bec5a52dd1f959e0f260675dd7d5b3aaff9f72440971bbde4f8bcc859590d7b66981e10b643da046ae9e1b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5016d25b714f23163369a25847a729abc
SHA1192f704fe820d1ce7927e32ddc34b11ecec2ac25
SHA2565c7b7f367940b4232cc7eeee605b4d73187d74beac5174637552359c1f5132eb
SHA5127f49b651cfd3c0d275f22326c8969284e4584832b3ab3b98e1b61412e5e48929cbee957b94debd891d306e9162786a5e8fe6f8ff10eb0bab1067dd3836578aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a54e62d93e3e12198f8c7a2adf5a511
SHA1f671d16a76767846a316d9f1f1e43611a2413e85
SHA256254118651675caa6473d3d641de350bd3de4e8a5402d2e86c58e9f9237722d8b
SHA5124e267814275cca661c25be0a4607653914bc8786e788ca548496de19c8f5302c6db9417ef14c3a1172f977ce95fd065bbdbb6be967865f9b8aff8133515c84a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f9cf35e25e598a6eaf6aa4b5a153fe0
SHA1781b4e62372f950c60893de189d6c4874a18992e
SHA25650c36a1901c8b161b1614066dba0b583230fa81231c3db87d958f55a7daa33b0
SHA512aaa5efa4852d58a9763a9e738aac47331e4ecb3d41c33ca6c8a8749e3f05a178591fa1c6e5a80d15d4ec247e5275e428870f4f0957b5ce6453a9d2c91ada1660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef80453d759f3ad5f715d03612e9a3a9
SHA1c9025e93d64f471df62fd811efd54cf5c6818855
SHA256f4032ef267159b1e43350edc002c38f318f1138a52899d16fd4ec4860b1cf01c
SHA512a3c345e18dd171f96574145fa9e8d301fcd4ffb665550a24f9b21c67538f7954cc973dea633591688f96ace323016a2f07e24d98a80d59763fd2b762bca9f28d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba74a61a1c5c8b7859e3f3f02ee600ce
SHA19650a7336676bd7607e8cbc8caa26d0f080536a3
SHA256c1ac2b79c258dc3196a96ff7052e70fdfa814bc4939870d5a7d5d4b0dd5286fe
SHA5120e06a2894373cf719f273b1ab5deff403dd3f0de29e7ee5cb1d22ef542482ba17f6b8e9ad13b431f337be9af42595c40fc036ac1df04a6d3b0ed50c85b7a24f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2239ef1a19b5d21d75d0953784e63a7
SHA1eb58f07ebda9839553b8eb6978329fcf3c7344e3
SHA2568479de5335e7b0ff2dc672cf9d5cce044b7b79d9c7f5dddda42054077f33394e
SHA512771f2d3c37f80e6152d02db70573118958507571bc31d60b08f8c7450f3871809b298f886eeebb904c6cb45a23b1c21515404cb32af58e6803eb03e3e7b3f998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df3310b1fca8366c34f41a6b8ea51964
SHA18320c0dc7553682885fec499c6b811776b9990af
SHA2563044a7ac7b0acd04bd67b934825b999e28dcdbc94b0003838a9dd4de9eec4dea
SHA5129cb4b0988c9be8038055c380da56b8ba8af8fe0087c7913ccd5047a5a4d38a26e5be51d2af332e35f662f2ebe3d2c13b6a97b5e6b5685d3b1285869ebb17ecdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed8aadea6250271ca6ca7dc51afd099c
SHA1ed01f4c365fcd34049798bb583c2bab153ec6325
SHA25671c9faf01024e094a1a098c085be8c429d87d8dee031824832e1a38ea2a246a9
SHA5123195633a7b85cfaba8209e36976365363d2c6b8d102a2029535f474d20174a897e556a03ff59ddacb205d8bb6a1a4ef0dda953b1c81d2df324f5834d0b1ea6d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9117cd4997429744e9ce0939c700294
SHA1e03317a40c2e7ca9123bfd884ce6f340480c931d
SHA256d705ca9a1da8b0a38908791f5157d12c57cfa4617607de0c70f28fec02af71e3
SHA5129204ebabe88f29bdc8906528941f8920ac923ab5e2617c3aff75d3f820fb2edfbe86ce2ae2e53107903e866cbaad6be21b475e15664b787677eb42d59d880a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae52524d47f23cd0dd58fc514e1d8224
SHA179c6ace66576d78d13733b342e6c0d19f86ea775
SHA256b3f4df45bf06ff56760dec87e877d1826de631e76e7156dfead3d2a7f8595ec6
SHA5125da7bef6b11557a4cedbe5e7793ed42c81550fc20c7359d8d76ab232ca5699bded7e4da526d3e76bf446f821fe174c0dd641f20a5b304593d54de46fd70e3eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a8d5896168a5366ea0d98602ba7aa25
SHA17cab62707ffb46da2db5b31c42bf526f5a1cc5c8
SHA256ead86fd7fbdef26b3fb868ebf042e4a111ea9d39d58a985790578306b452e23f
SHA51211970b89b363e2872b8883a7d69d9ed72de70850241433d04c74f93b8a4dd4c230a22060069846b84c3d8fadd9767da80d7e39154b5d69306a959f998fd6db5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a881336d8c9a0a46b89627bb4011308d
SHA10c736af66066ab991b30ebeb5f67d1cc8429ad55
SHA256f70d0aba9409b19993259da4c0931f77a490974852849970cd883e34517f0cf1
SHA51238ff8a5605ccde0304c1d0260a3901b3566529d9079c0682fe8853403a01323c26739551e21a216eb9a5a5d0ba5af0e3de5e2f15b8b6e922c7d815d7fe4d2c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554280fcfa652c7b7da19ab646289d847
SHA1c0cea1ccc14dcc208e1ce1ba41ee7f0ab98b26ce
SHA2564ea2a1f0699aa67c54f95d40a4404c0fc0fa618254649bd638eab8606fdf2d2d
SHA51293f937c79bdb785734b3be505d4e8c4b24cf8b0e3e249db6fac1463f6f7c835d3b06201a961b83f71c268ea6ff9920c53a743c487ae1a7f06fe359ca69ce79fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5bf3243e20d9b6bf705164ffbb11b3e
SHA1f7eec232f6e63bc1bb9fd466d2e3a2640e4085cc
SHA25688c207ef68440b2f204f5753c295ad1705b7fbdc55ecc787c3a8008717aeffdc
SHA512858b0e46ce9f3ecf2941efd09f269724e08ac55d9dfda297cab7ed2957b54347c9a3269a5f0e95dcca4ed91aac404e9b73a13ac4e2b1ae8159cf2e40e35c4508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf4d46377042ce38e8a12c2aa41f316f
SHA17f14ee7f7825c48aae0da38884b444a8d107f305
SHA256e6a4fa11dad33d5eeca1df4e8656d0cad284cc02900a6977c0083450eaff703e
SHA512f1e8d90527231b545e70154336d98368fa2633490583cd93a0135802e71d3b7c5482ce67a9c279316d7c8f7c6a3730d5dd7406764cdec52a12f155a2154fe655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5497d1737c677c3a627c435c78390975c
SHA1978b3d0ad3ab8ac7ee575bd0e6a34ddd5faf42fc
SHA25671fc5b11a069993a5ed802525008d411ed7ad03456bbc6df45a507190db870d5
SHA5123b74a52671269d1b964c6b5e696795b073ad03cf8c9e988b09658365076a6824e935da6a053c07c03ab4dfcd70a8b0e890dc07ba1b6943bf2a16e1e97db29eb0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b