Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
b491e5987a0da78c2edb1f505c552a0a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b491e5987a0da78c2edb1f505c552a0a_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b491e5987a0da78c2edb1f505c552a0a_JaffaCakes118.html
-
Size
46KB
-
MD5
b491e5987a0da78c2edb1f505c552a0a
-
SHA1
fe1f132762f14da2ce8a31216b039f35b8997d6d
-
SHA256
b798a8ae6754e19d20e4095d650f19fcbc6977708f6a7c14599a7a5ddc4905df
-
SHA512
fcd21d52881bb9d92489619ed22725210bf2b22a70b5b8a58e6f4f8b5eb9920688e969ef164f0c8e3ec481ffdf7d1edb494f57c17e4ef4d106c52eeab70bd575
-
SSDEEP
768:NJS6S7B8ROZOrggBbvFICSCfC1C1C+C+CQCQC+C+CtCtCECECQCQC+oY3o+11IpE:u62BkOZOrggBbvFIzCAA99xxllAAppxh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fd06d572ca1d72479ffd6fd08f6b3ef000000000020000000000106600000001000020000000f19e138d63d906ce062de368839e88ba6270be648caddd38a7defd75ad150fba000000000e8000000002000020000000a39b0393d275f426d688137f0164504ed4b79d074d0f5aaef7cdc9d03ef65f4220000000a8e6803c5b9c129cda4ca6c990a5100e3eb8ada2ab5c9b07ff4ad2243eae664640000000f8d3db38bde4232998dba716bbff67ef33ffa77379d451e876984721f60d8fdfb57f9939a4f2cd1b9ac1c0ff7cbcc7afe95794fbea86a06dcbbb617ef5d08731 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424724397" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6025d71d1bc0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{466178A1-2C0E-11EF-9387-E25BC60B6402} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1248 iexplore.exe 1248 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1248 wrote to memory of 2204 1248 iexplore.exe 28 PID 1248 wrote to memory of 2204 1248 iexplore.exe 28 PID 1248 wrote to memory of 2204 1248 iexplore.exe 28 PID 1248 wrote to memory of 2204 1248 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b491e5987a0da78c2edb1f505c552a0a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5392497c75644ee343c044e0b1e5f3d06
SHA13bc3dc87b5002ffda83f7191f80875158110a6c3
SHA2565827aab385bbf645f82cc2d941f5b748100f0df1f2cf1680728a28eca5f5adb9
SHA5124ab2f7a4b50327d57e67877465e190903d2c8f38a670a93a56d7d2ec2aecd6c0a0ab703a6c533ddfc431c280f5ccaa430e5c291d9b698c0e8fd972b51df65e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b54d0fb4f748efb48746677aa722fb3c
SHA1a829e04adf6cb1d9a16016565d09500f862725d2
SHA256e28783c4d11cfee0e3029df9a77228978410e10a9925f87d1827f51f1de44d45
SHA512bceaca6394f3209ae440681f7386f68c336dde8f851bcec011e4f6bc045b2548a83e9ea42dfffdedba44dde8c39ed7c0506afaad09ee8eb5d8828ec460d9227b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD552b731f0452617e21d5a17ea29bbefbf
SHA186213e5fbcff38307bec253628ac7f40600bf3c0
SHA25626fc8f350853514b3d2e64969748b5319da11d949bdf095808cd55965994570b
SHA512fb2c446b15d3813a4354140585af9e42867526788574af6c9cc5026b393336d326b9f9a71692316437871586deff233b84ff6123853da4197e9d6403e306e15f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD593f7c46675dd7660e87543d31c064a5e
SHA17c0d18b46ae8928b4463597c3215bc3188a8bbdf
SHA256bdcfde72191c4090c2e14ef2cd7e2ef0c15a03a710c5e0c51b38774506d31bd4
SHA5129239d007939ba87c200d150cba01def14406ebf8272aab0a422ac40eaad29854bdbed95d0870978d69daf32db0bd8ac2795d4275645834eb5faca9161c0ec220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b00b7a6d351a300cec84b5ae1d4cead5
SHA187acbe6f3aa028595ac710c9c74632cab0e5f8cb
SHA256712556d42fa7df2711490a4ac0bf027a9cc5aea5e84686ed3eb6d10ee2e477d7
SHA512bbd541f9e3cccc86ffb22a7b62360b5b9c6e279ec10782507038d5cf0e3c929407909c357c2b2e518aac13ac42317e939140192712211ad17017c02024ba7ee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d2dbfa612a9b1c97ea784cb3f80bd49d
SHA192d257a35f1d650d257c25dde99525c8e2a65a64
SHA256e6ff8da1f40e3580c12ef36fdceca007e1c16dbc2f7979ef8dc96b91291b36b3
SHA51267453cf4ae21132c23263b48085ca5eb6d22493d78c11fe041c8a63de6be7158dd0859efc4531d2b2a1087530b4300c6fb026919dd4450f5037159b512c4e357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50ee60495e95b86fb697dcd9708c13fe4
SHA1f6bdaf6757495260613ac5f76aab2af89cb337b0
SHA256b37914d43acca6c355533734b45644416326bcddd5cd89e8a3e1817bd94d6321
SHA512e399bc7c7be5b65228b894fcf4946bb33bee813c56a733ddec9aae56bcaff78e7413920dfe1c2e874ab2dde693823ac9defe522aeb51c7d07f89f0b0b785d49d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba8a7c47e68e5d6af04ae8007821cbd8
SHA19f2b13ea0162cb0ba40a305a6bd6e10581bd743e
SHA2565c26a840a66f5fb93a528c817eace8f02607dc1784d5367b40fddb6423735f54
SHA5121ede4aec09a7a3c2e19d53728a119e63e73dd24e3e38079f28c67b503f97458bde4904ea60b3740bb2d4f4fdf69ed4d939c0a2a821b3129629bfb88ca32b141e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57d60795d2f08fa3956a86cfe2b28d843
SHA184a6782bfda0239d78695904be177c9008095f50
SHA25606e3a48449779f16876ff2384d3e43c84aad1892e80ee070fc08ffb0046def64
SHA512941d013bca25a01682bfdf2305236c38d8db13674b3203adf3c3f13ddfa97052ac7ff18af8b58ea33aa9e9aaad9e0f23c80e37461a14ea2102fe4bd28f477391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD534ff29e3c201ec219b59829516a4b6b5
SHA1271acdca09411f4089651dded22f9aff0aebabbc
SHA2569a9ec1c6b106ccda2e0a0cbe4eb259a7a6d4ea8d1efe7094afe7195b267c12c1
SHA5128fcf6816478678585c4c9282ab7395a0b1cf542d0f1011cc7f7a65410b0a2b50c9f76bb0e3aea9c2fbb52783305033559de02af94d6c727164df490a6d3b364d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f2e8aae7e321027dd62a2b23e1d419a1
SHA1c3369b29f319b9ea99fcc267395552f6f93163e9
SHA256dd0f8976258a27448f92c2be137a1a59a9cd5f62a046ee45d0a6c410ac932cd6
SHA5129033871a4613a563bf4851c731555b8d345fee758ce7c02d4911c7268050db731e4d56b002ecf69302c3291e2db65e89c79c7acca42c6220420212f6925834db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5864e45027d543fb8ebcae82463fac0e3
SHA181fd83a31af71a00faa77f4621317f253f9e61cd
SHA25602edba5576f66a7a66ffaff8904144aaeee6d1daaab05ff31d01f9244c90c306
SHA512b7ae6822d4b593ee786446212e8333006308c9f303f5785e01324c8227838fb71128174dcaacf070cf0a39b54296bc91987b6a764736400e8cffac29c8ec1e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5200551e3be552bb7d0a074aef3579316
SHA1dc9e7a566a4a0fa2348fa8f3d62550fef3a79149
SHA2560ddba7eb2f7c224877b344fe420f8cb1739e04449a7b1d5e3778a9e5f4ad38aa
SHA512af9b9d4988a52c2113fb45cced241efb109c6b6f71aa21a0e15753438e7a9f7217b146976e356988606b5604fc2e51bb85126f4f490d7625e0369041684f39d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55c901565aa50b5f7cc20235cd54eed9a
SHA1958e8d5a2ddf04847f56636770f9db4d4d9257c6
SHA256d1731303798439baad5912f919a1a5355b402a2dca8df67cae8a9b45e3d18e93
SHA51280492272193dd325c3905f41f60ed8ffac650f9b4b165f8759c06e9de8419f3be26f7832386ec23ab94df8f4efe2f02b578ad7a0f3fe38403084b00273ef6c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59fb9f3fdb3d8d582cf28ddb4974eaa34
SHA1b3df4a56138b570e80a4ce78b2b58161ae0d4d3e
SHA2561054e03f11044d26041c99b567dd7fa83597cdaa4031bac29150118665a1121f
SHA512710f8d1129c59b17d08bf22651c24fd17a40dc1312d79511f0f7d56f0ab288a15f1e989dc195ee21d5131855fc233cb9632b90251f78964700c83238ac1c4f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a7a693921cf3ef75bf9356b22232effe
SHA1208f684bfafdea06655e7189e3ae193b2566f224
SHA256a70828312feb0bed630ab900182aabb3b77958986cc2b294b6ad161d6d188fb9
SHA512e1a1874c6677da34638c65590554b76969f0a43e2fc00e567465dc9fa5bc8949b464618ba1c0fdf28680e1136c7e6fb2cc67d5ac967d0104463dea53f056b355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5839b0688d591f3e176141c73b0d76c27
SHA1909ad9a283e02c0f3aece8ae2c5ff5ae9f1692ab
SHA25628728eada7a46bb410a8dc08c4ef822b9e535226f65d35de99400d4312118d26
SHA51259f758fa2286ca83be185edc67b619223eb5b239f37f1523e755688bac5a28176a5ef3326c62ddcc7764a92525417e29fdc3443fae3339f455c3ef1149f68072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD579d9426218953e15fcf68a0350802a86
SHA1b2c6c6a2437c75d55e8ac2379a480d00eb291ea8
SHA256cb8850e704e7ec3e0a0d4195ee565afbaff7dc9ed0c49e843559c64ffc62eac5
SHA5126f3c5e799e46eaaed78acb4a42a885b2c46ef9cc5c9529241e7979db97ba87fed6be35e90bf241356ca19ed939d0a36cd30ed53567fdd992f198af944add3464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56e62cdaab0d0a43f3f57bbdc182a7bb4
SHA142a51cd18532f85ac032341d526010b5844b1ee5
SHA256c6ff11d4758e06ac538c8ca10d84cd105097aedac0ba9f05afae663b4135d437
SHA51206f66b71dcb3e643f1a747532bd77c18f7b76d461ffb99400570e489b2cdd3a0764aec03580ae2eaa3b8e361da137f6ab3d1396ba768ac159340493b792d140a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b