Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 07:08
Static task
static1
Behavioral task
behavioral1
Sample
b247a19acc83efc18613f7e07c3fb722_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b247a19acc83efc18613f7e07c3fb722_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b247a19acc83efc18613f7e07c3fb722_JaffaCakes118.html
-
Size
472B
-
MD5
b247a19acc83efc18613f7e07c3fb722
-
SHA1
b3486a0b3dd76856bf39ed59db2cd867196dd427
-
SHA256
322b2ef2490c89c83076450b02f1349a58c222f16f68c706028ad1c4c3719282
-
SHA512
d3f30719fb46c117eedf965bf9fda3c53063598c1ffbdabe8b2382a6c02bef0f71daddf788d8ddb24aede0700de1b5e0407094f78806d045297374f0c031b147
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d0da1cbcbfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dc61d0af811fef4baea79c05ce837a6f0000000002000000000010660000000100002000000078759d28b8fb442f4ae287461b9e6b5c03312a74bad07fa9eabb72803f9666c6000000000e80000000020000200000002838ec19a1d87301fbb6527d35e891d2de9ef3f1ad0037810bb324ea977a23a4200000006afaf2c930b219aeb5a2595c47501eb1c19a0c7a54ba413157f41ffe27adef5a4000000038823d6b65253c92620a2cd49be57d9674b128298bd1889c8cf958f810be1f9465c4b48938b9ce899d184bddc015916506adbd8157b85696316f9e96b1c5fc38 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{483615F1-2BAF-11EF-AB41-FA5112F1BCBF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424683597" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2472 2240 iexplore.exe 28 PID 2240 wrote to memory of 2472 2240 iexplore.exe 28 PID 2240 wrote to memory of 2472 2240 iexplore.exe 28 PID 2240 wrote to memory of 2472 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b247a19acc83efc18613f7e07c3fb722_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5869b7a7c5373981842736696d8e6621e
SHA1b4778ad18e977e2d4df8ced4d0dabc1b71ad133a
SHA256793198cd4c454530d48561e3433f369df125fbf7178f93a17c0a88af839b14e6
SHA51225f769c178acf2d489d9d95c818ca790524d8d01bcd4e0048ce796c63afd5db1524587a7280209d0522b65b1bdcd3a63f00f48c54c926336f4476fba071c4126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fbaa059c1f698d23ac74d95c27a9f22
SHA14384f20be1fc62841b078990e350f7c587b8eb7d
SHA25671ea84e21cfbbafd0646c2f23e6d74eefb37dd9b34d571e76688b07c44cee069
SHA5123474c182b205bacd7d12e64366854d0ca54108437e0039710419fafec64dc7d34384d4ea4c2e61c670b37ef683a4b5070e70215d6403ec21895a06f5ad444d91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512596f01c53215b7d54ef50e69be88e6
SHA12fad879cd953d8e6c0f138b1f9900065d8b7bd6c
SHA256ce55a1f3694c049ae99cb7eb3dcf34e886d0778d9a43d58e100f8b8a2d06fbec
SHA512d9d2fb1222912573f229477704d184088339a441876d561df436ad6e358ea5c9fe6cc07b410a0ee328b88d22e03bea0ac17ccdba3098e07f72c6fdadabb2ea91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cb3d67ba400c3f8f4313f24947e6a8f
SHA11f00d65cd3284b21967de2c3d8c0e72d5a148d35
SHA25627aca38be73fa68e10a2dbee0f035738083c13cf2898d110f27fc2cf7fcbc71f
SHA5121235abae9da47bfa5d0d0a25e7ca64fc41a1efd85c96d7fed32ad143e2c05f4df0cb85bb38dad5ad3dbbef1633197a64d4883ead93533af6e10d9b6c196dfe7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e5652d9d59bc1e8480887ed5629a3b6
SHA170c7c94843a055526dcf310c64a6656f27ebe59d
SHA2563fda37a0dcacf94ba3dbb733c7ee1336746912da62a95bea2b2e09003b3208c0
SHA5121409bca57c3c904f0ae3e138e911327fd0a705767e1725748651673f1ae6d2ad0c8485870032b8acc0567de946d4076b52078498c12b25aa6ab3f54417f7c357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc1c3a57347241670d313ee036310b73
SHA12835404dfaecc0f1d314e0819da23e434832f938
SHA2562fa6c5a1427629c8f92e473402652009d0a4514881720c020c5cd8591bf67b05
SHA512085018fe2bf4793bebf42dab054b43643aaafe31ebbafb97c499d4580b6431cbb266c8d53a8dd82a89c63e55b848fa9b07a11af04079fc41eb9b51b22d4f6461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b44d243ca36fb7a32dfcb125cb2d669
SHA13ab421a8f5f83328c5598247f22a72b7ec037fda
SHA25608cd2e6bb289d830603a9668afc5d4fa8ef949f132511cf255c5d3714080608e
SHA5127815e257732fd74e4e7dcbb04c1c07f970f2a2e8d2db88d81fe4d853e8d71f7ba84571deb47c3b900fb42f017932faf6a3655e7cf567a1e0a72dbfbcfd25ec42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba2e74f0f3e283bdd06cd3c92e9e97cd
SHA145848aeef61e7f7168d0834e1375a8af576b32db
SHA25617b87e2ba10f03f04824a0acd521c29ccd7f53348b56a59c9255283281b59a9f
SHA5127decd85429dc55a640d831ec7d1ede07068bb802e1c2df0d142d021ae25c0a7621db1ba319da4f7fd50784bd46e4db42be925b741bfb60a9e8c55d96cdf73b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5211b70017af362abbc4238f2c1733022
SHA11c0e6be13d6f745cf9fae8aa7a4b5281eb141066
SHA2567d1a10e6c8737198191f047d8d081d1766baaab7bb7dff879f3ba78ac5222bd6
SHA512cc0d90352a596c48bc2566ceb2a514574695744a2efdf9958e0f21b54feff5c5fa64fe332ebcd8a665a4010c1c3de6f23c204c91a745647262b1543028fc1c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02134fcdba1a369a7c45e525e5e2c3e
SHA1d7a349a543e02d3bdc75c20273eee036a01b3979
SHA25645720ace68dc5606f73f9be8142171f33c4dcda23b3e30759c2e74d9e65655ac
SHA5120cc3f8600b70dc9786e4420898af34bd09916593c7639f2dfe452b5093bce6960719c4deaecfd3721d281e9b3e030e7faa8ac9d9a6874ea856d8b77c50c6a212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d2637b0de164e0cc58ff2e5f70a23d
SHA133eceef9dc27a7ff37dc04eb8d29087f253d5c95
SHA2561597d951a97516c1228039d1afd983fb816827d2d5f791d37b20e40916cb7849
SHA51285a01ddf29b9dc8e6f0be6d5bd409c462a5e5b12b5f53112a4c41e43ce9b13bbb130a1178bb603b6c3c46f92a482d6bb06845360f7c7e7642c9011edd00e4051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba49b62ca36bb3b3a5fd5fccb08beabf
SHA1f76349fecaea4e013a929679a2de7f569abcea29
SHA256daf3cff99db03795b351993f013624219a89ce8ecb55ded7d595ed7772e11f10
SHA51295e89933743f2850d5a61580a2ed7a543138089b12e6f2878aee9571944d729f03a3c2b496c880cb3c25a2de18b09973f1de22395052ede427500166ec0ceb79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bacc20c80eed0d179d04bd81f10f5e25
SHA15adfb6d7cb26f9477034550532cc007bd105d77c
SHA2564aa1791170a80d708688cef3625ce8f2b302ba5b736ff5a8a4fa681c408c3924
SHA512907a20e7e29a41d7600810acaf0ad76f6fd86df81d1d4d634dcd6c42f3884f3f0b508719032176bbf59ed24b48b0a554deebd2526c21111e6fcff03065d65fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136d638171313cc7f621a2d24fc05a3b
SHA1190aaab3811099d9918d8ffa1776ba62fcaf7a65
SHA256a2933a0b33ad2dedab0730054f5e0a06dc3db55705ddf787ebdce2d14c9e7793
SHA5126f63480e1ff0301e8bfe740f3aa6c35d6c2283cf925082a3fd6635ab0145d7f690475bfaebbea30b8d39d4586b4600ff92d554d49772860706c6910b3b4cc91f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5340240ba9cd31ff47f06752771444ed3
SHA1af490bd69080d3a49ad39b72f35df10c5233b848
SHA256ed6bd39c05e205c37649c64ee8aa1114d1f2de7f4edd0fc8bee6acb19e5a1912
SHA512ef7575fb05ca720bb0f11e5fcbd373220b066aa61b7c2f352c91c8963fc475befc2318f126c80a699ada2752c787d685066882009ff4da0c148719f007d00f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473f565d9a36b1ff15a496a00022feeb
SHA1b6325b54f5f9b726ec3431e19b9563f9cba6fd93
SHA256b3f736af3f1ee038b57822c3d1edd41e6324d5056121dc959a09c0e866d8d856
SHA5128d42dce26dede492ac40bd1bfb2fb74599c23b09c2028d671bed7746adea2f078e969710f48e93b68dafbdc81e703163b72e2664a48a7b94bfbd28556f9d5ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2662c8d479d52b1c056253919dde94c
SHA1f27221a9fdc698432b5fac38cd504cc0b922a56d
SHA25678a78dc150d8037d85cc70d956972de2c3045453d50b82ed9400dbbfb1890249
SHA51236718ec25f9ed5096afae658335a4ab857c37316ea59bf4fd7f485e7e9015078e5d00aefe8fe11a09615b09c36343d69849517bced7bd9a4fa05ef2ea04f7d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bca45bdb11bf4c6c42af52f66b02d83
SHA1c9c401fc73194fffbe1ba1ecdd0a76a25e70d900
SHA2563c674d255dc1616a3980375a581f64314f2537ac2a8f9be3371b40cbf4983c96
SHA512bed4f293d1addcb1304be067fb9554dc218cafecc6a1c65b85a436181c5acaf2a45c31076301f96c90116469af65cd93051cb1917edf7d64541b94dbce80a93c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534f183e230d2c02bbffdd0dc6fb7b933
SHA18d1fe01d0daf3b807824ba548c21292e9b6a1bad
SHA2562830f9f098afc988d3e110786bec779f7c3f1b07d487b9e0ca732c595a8c149d
SHA5129f9cfb55cf86573c3fba91d62dcf33d945ce5569fe5a7ed81a6db4c7161d35e7bca9e9f5e53f1026007217740abe0480bcf4b26b357d6dd6bbcd95bc9296f11a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51127908e7f4c6bd92b4d4654e1fe86a7
SHA1ea84eec1306ec3a93136de0c3e22ece0fea03d18
SHA256290dbe8f3ce3f1ea3e21d9716e44ef2928c9dc52426a294292a0a5f647f583a4
SHA512b3660050f617a208f7b49bc1a3f9c6183d973afdcf8f2f8cca43561c7f8f88df1fce973f2eccca8689a009628079bc6dab1e62db1edf4e28f92c89a4faadffd6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b