Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 20:41
Static task
static1
Behavioral task
behavioral1
Sample
b51af738fd008daf909292160491e898_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b51af738fd008daf909292160491e898_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b51af738fd008daf909292160491e898_JaffaCakes118.html
-
Size
26KB
-
MD5
b51af738fd008daf909292160491e898
-
SHA1
7ddc30740021d741a188a9c5fcd1efaa48859dbc
-
SHA256
9c4f2cd8f4f87e3fb1b6bdd5214729625ae05bab4e0a9e7b8862cb5170a04500
-
SHA512
ba21ebc23f2051c9a3b83e80cdd98ed8907218a59478c78beb4980e9e8cdc0fc979e899a5f4d424c9c87212a29265e92693c6265b002ecd7f984247bc561403f
-
SSDEEP
768:U68wS6ON/TxLnzA1MMGJJmBnHuLeHGZHeWOZKa8Eeiq/:b+6ON/TxLnzA1MPJJmBnOJ/Bic
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503fbaf02dc0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DCA0DC41-2C20-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424732380" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b2e884cdba669b47b5106a3a1f03248400000000020000000000106600000001000020000000e4441e84fb1d80d58a0dfec70758917f4a03a3b9eaeb6747685fd97090639213000000000e800000000200002000000043e7ace46384584216358a2e57e71e004630ec287a7b6100aa9a750f678957ce20000000fb4dcfa707db571477ab45ae2953c2aa94774e1694eb004c1009b63e1726d59c40000000773225012868accde20d2fc1426a84af33a51aae662f2927268ed03f36ac00aaeda181c52f9376f8f356e480e354266c8eaf91e8a8284b591e5359f60bec38a8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3036 2188 iexplore.exe 28 PID 2188 wrote to memory of 3036 2188 iexplore.exe 28 PID 2188 wrote to memory of 3036 2188 iexplore.exe 28 PID 2188 wrote to memory of 3036 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b51af738fd008daf909292160491e898_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52290ebaf7288750191f65b7f54053002
SHA16e033d60dadd58482492fc0bd3b9734f8146250b
SHA256a10f9d2481ee8386692561b7d637c585427d0914081dc75f3c09dabe7d813b8c
SHA512547bd405b1fb50c93186a799e7094b6bf1ec1c19705b35e119c53373809b5aeba9c7f988ece33db6ff10aba5920f45ff87ffcd8e659aac580838f9d6365ec1b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43b1c625b6c623a80caf1f67b684412
SHA13f7ab0c22746c7602eb0d5da8172661d4f49acdb
SHA2567542ef51f82d9ad7339b643fcbe2c4919d6f3d10c506f700f1bc891bac34cbba
SHA512649b16b3c0ed9c917201cf1778c7e7c25318937ef4d92444c67624510e3a86a2de8718a609219fe006d2c2adf43ac27529b3e54c70cd39b6988173595d054efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63d9e98a22062ca641ce1a09b933ebf
SHA184d95fc4b84821b0253968cb67273b2aad3ffca7
SHA2563730e3ed0bedc919494a52640bda8522c834ccca889a47066cced307366bb639
SHA5127b77caf2faed8c403c1f042d484d5910f831685efb65390ddae3932a770c31013d81364bf5fba2dea61b7bbfd92bee672df36c3b966d6b7405b71ae4390b4c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53faf8c7045895e67f4e958cd3ef64120
SHA178b6bac0f5ced289bd43ebeff2f1a36ce8941ab9
SHA256ef7e6ece4c44f47a2678902ad98903a1645fdbf41d08028db62c4b5a1e6d56ee
SHA512e7931ce87d30e22f7aa214dc573190bed3b79bc92c7c746e1de54b20b9b95e7809ee1997c8bf10bbdbc71e3f79004abbcf49b328141c6672c432475c73228c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d653145a86a23e6eb1193703ea7894
SHA170b03326cae2646f61008485800f4bc0e993ef5f
SHA256961dc5c4821b26649596ff1ce127a16ff643ff1752c7b5890aeb32572beaf7fb
SHA512f13e4ff73a9bf5b4320c42dc2c151848f83c9572cc8c622a4a6c83debdc829b5613631394f205a67e48de8a63f67f987a2a7a379cfc5daaec3033ff3dca8901a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5482b36131136e7eeed3ebf4de9c852ba
SHA146656902024a4241bb13b4dbceeafbfb6dbdb8e1
SHA256765e024aa4ee308841e6b4f3a321148317cf2c635216a974c0256d8a762a6c1f
SHA5126bc8828e948e7ceced19b0560401e075f2463aa4aaec9e82d6e377ffbb68fd0e715a8b00e1fcdf2fe62654062b2e81743c9e261f809006ca4ceebac191a11f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2537b6c858b5c36ecdd75d77b489113
SHA1bc73b9b542a1f5d2e22d8d6109b6c6a786d918b9
SHA256d1db28f4865a7cdeead7956cebbdfcf2300cca5cc8a6b1ade8201c557dc8dfd3
SHA5128c6fa1ca8db0b6f7467dc3632f7b995edfd55feafeb5752d931263c8511923396fa3b06d52d3f794f26536f48256ac249acbbaacac05c6b0f9b7eee78f58315f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5828da8784965594c34a723d3ba311050
SHA1277b6758a695f67b4a91a1eec4408bb96695ce59
SHA256315189342e09cc344486d6f11c679bc304e61d6612e1835924bce118becc0ca9
SHA512b9a0c35a243353df331151eb2b33c57f2ac7967188f815eeb102d7693231931860c0f772b8748978ae9e30bb0dc627f6213b53853968cb8c1dfc1098258ccdd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546f81f7c5bfced09d58b326aa65b1d92
SHA17d36fc2b2cfd1e5ede3406b6bc876b2f5806a20c
SHA2564f9f5e2da684bdc63cd8a1d5405e6a3d9b2530a25dbee2ef64b0800228873cb4
SHA512f805a015608d95ddb4e239ee6c370becdf111281ff1418679d805107ec7ea9accbe92fa36c714697c3e054c661dfecd5cf237160344b326ceddbc24b63a02e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d16258e1608ad455dbe6f73cd8b7442
SHA1940ad8fa7cb01f2340ea745f710f6fcf5f39c957
SHA256e95044512f5908acceba5ec534162342b952a76b8f301a577a4260eafe066abb
SHA512d67d3cae3dc7558b4b6274adbe9db0e0217a23a93daa218664164cda3b02da0b25ecfe1df73804672f29ec4d43e3ced3f4b3b99b8b8ddb686f9be116f42bc1ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d706a18e26addf02cd65b2418fdeff9
SHA14542f65a70238214843acac7b34ded44fa35ff20
SHA256455603b35a7b0161c1bab31c9a07784b6348905aa00ef70f863525ffc8ae3798
SHA5128b4e1bb07606b8fd0ed73dfd3671ab406627c4983ce4100afd80aac668f17d58acf6f403eba4ef6e3e48f7c40d2ec7dc917b4bc2821558abf4eb866fd34a8390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b1323cc7e1d1902667b79dc227cbfe
SHA15ce008bf992ddda99cd39b10a37d77a9d811f68e
SHA2567af80f06626d5bf2143bcf6744a03ff5a792665ae91f0f3782cb704ba8549812
SHA512ce98caacd34a897d0d29f9f94e775f05c72fe829cd2d3e51cbd5da33a49b1440487ca8983b772af9e30a9aad24502423869063bfbb2ece9173e6d292a8fbcaea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4e1cfdbee517aed214d00da79b2da4c
SHA15765cf2919c69a4dd63ea54c526430a5f34a5049
SHA2560457ced85cfbccbd5b73af402c0227e478294af34aafe634ce5b080fbbd4eb3e
SHA5121f17fed25bf52ffc2bed42f412da2a018e151de9dc5b12ca665df3b804eaa08ca1784405e0bc820f4847a2038e67788798f4d45459dc64bec50f79cebcbdf88e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254897fd04213b6a10f9d3e709aeb896
SHA18540e1da2f1834b80e651e624ecd5f030a2bb92d
SHA25603feeda624ad1f4cd0fa14555e195b5c92327da9175bae6bee387822b3a37e6c
SHA51211d77c0a26cf3e1df86a77e202ca3c64e0be4438d35f0811427709e1b4b1974517e2b3d4f36039b3b06e9dfd980663776ff0cbfb484117d9c0b527dca6d3a20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560989b0e9dd6c52dcf30694919a3c29d
SHA13576e707e63aff5bdebbce7ecb0b850cd1610538
SHA2563ba892e204b98f26044eeab4b24a5990f0262bfbc4c7147dc1d5471bf81b09d2
SHA51212b140aad95354dce2e1493c48f5f50996672b56585a7b81a2f35d394954bb8ff08f2ea20d9bf7bbec97342e96fe2a689a0e10cd98dcbc8d792cf35bbafe5c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a277b112c3ce682479c6a7801766064
SHA1d137a1fb97ac9637c37d20b1c8fc52ca2db934c6
SHA256c46a42640072b739db84c8903974502d67765446dc9ca531e0b3c37f9cd925d9
SHA512ed20acf383f0425b28a2679a9b8daefe1f91f73353e161e05b3ece2a9e71911b2667dcda9b5c4443351cd0b4e3336d796d68150479648ed84b2b81e60f3d7167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a150f41b630957f99755f19d323e1ac8
SHA1eb5b86da759f2affb87b175a0b94d24a678f7c36
SHA256e362ddf35ce8687916ae750895cbe0227653c289f909762eeb6a042bcff68a2a
SHA512151fa14344960f67890e1f4751efc0a53e5e3dcb761166b96ae1968a67bdc44d39904b53827bb61a3c7455891f54fbba0836aa3173b08f4d50e699ebfc959dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d6de2a4bb9247d12bf2ab0449de48f9
SHA1c1079bd560c407f25267574b677f668acff15919
SHA256fba0b098976a12c4fe04c89dbd32fab7ec3c9caee2a1fb18195fb374e42ce247
SHA512cf4d7c5c3eb4a61a18ee603bacc05ecbb20d81c226472888c0054d80ab9c5b52709d1d6223cb990161d8a239e2dd5ab1fe71f0402dddf5d979e2b16242e973d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506e8be7886751e1ed0118e99e1a78cac
SHA16d95de1afa2e8147490f5c25452d8368b68b2f48
SHA256b9102e6b127f2236744f49f8c52fa5e5a291ceba6685fc1f74439fecac28fc52
SHA512c2774fb55d6943d0d09b6095ed6d3c765828313dd94e93d443f2e98da971707271b1cab93f28556fe9c44351f6f907717c7545d9f84fe78252c5489a01622a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ea39a6bd9b007999807b992d5de43b
SHA1eea194aea5b9aab93231e8586a0594b6a881c737
SHA2564c50409fc2117f767d3a50128a102c909322146ffa10c61a673bb49f102b20a6
SHA51255449d06f3ca9acccdda7191d5c6d01c2c87f38718597843663826e781a2f065e2286861b39f40351049e516043f3266494d755d961ae9ac86bf22bc43a97145
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b