Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
b751b354dda90c6e61ed6b1d62d9b862_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b751b354dda90c6e61ed6b1d62d9b862_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b751b354dda90c6e61ed6b1d62d9b862_JaffaCakes118.html
-
Size
461KB
-
MD5
b751b354dda90c6e61ed6b1d62d9b862
-
SHA1
435c308c2d22fc4959add254d67138095a1b167f
-
SHA256
58778e34b0a9cd38912dc5215bb6aa8ff06ac287169b52856bf749b70c167422
-
SHA512
2c7c547f8324d372530497d4f1228c604a9a87670ca0f246dfccc246b0ed1822eda396e90db73497f9bc7b841572201b8fbacbcf0ef614abf712c07b02ba51aa
-
SSDEEP
6144:SSsMYod+X3oI+YhsMYod+X3oI+Y/sMYod+X3oI+YLsMYod+X3oI+YQ:t5d+X3P5d+X3h5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424770098" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE434AB1-2C78-11EF-8A5C-CE787CD1CA6F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ec8b4a7a19e63545b5d0558588a28225000000000200000000001066000000010000200000001e7d4e363d2e6755a837ef9de3cb3b1eb8e6030b1e93a3c1121565bcba520458000000000e800000000200002000000022f5b87986280c4c73281dabba2295cad237c405ccd9314b55b6613ea40c0b2b200000006b0f0df74c81dbd3195e77a90ddead0ac7b307de8fb328c725ff0a47714f808540000000cc55b5bedfc8c92bb4264b0437c2c3c87a11fa0e313729dc5551898d1a8e7815b3d11f26bbff194aec16632fa37670f3546be7625aa4f265de7630c90c8ac165 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c5d38685c0da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2508 2084 iexplore.exe 28 PID 2084 wrote to memory of 2508 2084 iexplore.exe 28 PID 2084 wrote to memory of 2508 2084 iexplore.exe 28 PID 2084 wrote to memory of 2508 2084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b751b354dda90c6e61ed6b1d62d9b862_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59841d10e5432444f315e55c1876d936e
SHA1119c4a6dae3b0fd3730b1c2e87cebeb4b0a01940
SHA256baf95929e6bcbcebddd6b745a678c1e018999740d8002bcbd4d105b83e334e1c
SHA512d649c7dc48ddc753550a2b2f15368a27ac6f983c1336f68ce3de86db79d3382c3d6e27be5276c9d7cac92a18c36cf2589bfbf0d429e53580765c6b11cbc09513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e8a08842704be064fe3d8efdcee6c7
SHA1a8d535b624fe0d759d10a9e4f6421d31242b141a
SHA256ff2d0a01e5048d821a02261c30c03e3eccc86f808a86dfee99879738a1ebff2a
SHA51247f371f4f86d4490eabb9465d97799bae7b0247f0190cdd3bf75a5dcba732fd2da37b4114ccaf083ae808a47970aeaa9ec4614e5596c21279f8caccad99699f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515f404ca4342c21aff888ddb05e26781
SHA1066ebf9d6e5e0d9fafcbaf7201d59bd4242e7d7a
SHA25676a2180c76ba32c35db9ecf5a72859d19938704ebcab16ab0618d7e7d3b61d7d
SHA512568dcb0bba815b0a080484eecb391ee9ded0bd80988f6d8f7cfa303c58c86cd81ee34acabd14b13179b42ca72a24c3ff57e139cd7c8336d16fd49709a3fec9bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556b15c0256b7e1130e7f2c7c35053b9c
SHA1e6c0904d5a31d703b7c8fe01323181b2218ca555
SHA256da9b0beac9ad1ed6585f94882df61893f7b725934dbbe7d79c289d6e8aa276ed
SHA5121c86e106ef5b557c4a8fc62c850734f9d86124ace1461ec41a5781c77e5988a433b2faf3650593611c33dfca19219a1fe0b51b1dbb97e90d29a256f95c42be79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575038b196fddbec27aa9f986e9abcddf
SHA12051872c7ed6e41ed891be6f87af9caef842725f
SHA256a590124bd07cdcd3755111e47857cc70585eb2ac90991ecf3e7beab1ee3ca746
SHA512093b2933685dbd3fa14262f23898e380dc6ad5f97a7bd2f0b2c6c775338d04458c64f50f31cb8693a6116b47813aac4df12f1008a3e7230f84afdaeb5d3be00f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb40c85d067d9e41cd5ac8c484754e14
SHA16fef1dc20fcc11d8ca520e4dc272aa5cabc912e8
SHA256fb261858ef578f362d705a6e474e7c8e094f1c3a75f3aaf381e3fa25500ef631
SHA512f8f23d19534144feccb30039769b95e2010534e2bbd84c006cfd3a72c823c991bc2b1d54e1cdae27b7eb6dd96705e68efabf04d82778d0fafaa18a8489097f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549212d14968b89c56782af72f35c1f71
SHA149c3914199c008a539fa4edbd9814b9bc9cc67f1
SHA2563c6d1313d733ec3c21fada06f71c020637bee0653e0688294d32b263fa9aa0ee
SHA512e50aac2e7db21f1a065382a14427dbb5772574c455ed1aa15f14646bbf8a07d6b846483c1b9a6c048324ed300486b1abba4ec6e42f5431e9e1bae4d64e5cd911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef6681145d6b3a9de85238b384e8cc6
SHA1af29c0d62a9207a4055f280cea538ad9097e17e4
SHA2565e5bc7439471a6d7d81b0ba1e6a8e1b7655c45f0d0b01b53bff52eb244776152
SHA5121b310df5b7448aa950465be3b2ab18c659c09e4418994d7cf7a31ec4e5931198acd3f73649ed8cfc4564901fe5f433dd342e8899fcc27eff7814fcc64d30288b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e26acc74bcf806a43ba6aae81f365a0
SHA1eef8740350650ff00dcd580e07d03848811b982f
SHA256a938d29f2028def4c090ae1f99ba90d50286f01d123af3ad337c8e5852d5134d
SHA512260152cc1b6a97c8b566f3df59d5195d13264cc5077d35d493057aab8f01c600132db6b2ed130456bceddedc9e58940166ef4029c5b42ce76fd066c94b689774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516ba9fbbea3defd78146966c823b8e6
SHA127b58c2b0b2b2e010e9d9eb6e77b24c48bf825db
SHA25612895ac1e72ba88268edc86fbb555026669e724f129afa3d133edf72171750c8
SHA5123763a2ef2907a246165ab7cc645a88d579cc01f61aa624cdab2b0e80808a6cb6b3cd9bc29c8b9e06c2c9f10035b4065a1b9eb4734c88e613ad07f0790acca43c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541311536e8ea070bbd812bda1fe69923
SHA16a3d05cd6ebf694c1c872bdfeb420ffa98e2a825
SHA256dfd54094391edac28868b994f2c6f40b0a8e817111704d655a26ecd57e4f0d3c
SHA512e182edd327cd77eae1ea349e7942c1fa6e6e1158877ae3e50f7dcea69b7df67b9fde1961b188beb388e447f7c5f98de28062b3ff252f28c0786cdfa705e57fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58478b257d2615fc0f007925b6d6a3bf0
SHA12f56679f013797a1d2b151bc3c57e1bcc8c2ee78
SHA2568c82adc0193f51d3bba73c76743a3df8a0a4962b971b7d512ded366a932ece34
SHA51271198774ddbe71a3a43d5cc0dbfa80e07ed1b73608b3156d5e5e9ad9f1a497cf1a83e9b8c9c9f5bffe22cc1747cae2daafb9888e3bb4367eb2ca5b5817e28fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3d91f7cae5d05093847ddccd3ebea8e
SHA14d9b7a40c95a41d5cdc52b06a78c948cd3185d54
SHA256fba2083a751a5bfdcd0120615e8b25936225234658d2a41322c2efd409359c06
SHA5125835557f1a9abf6a16c52d13c680859377e343b14463326349edc8d460cbb62fce1ac701e8b5b457e19356ee8af03c299ad34ad5dbe2512a7b95aaaab67326ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50658706513f7c837271107c52c523f42
SHA17b44cfdc1a166d3a49573a9543c81511bf0fa1f9
SHA256152776158a88cb6bce1bcaa871d0635eab83e0428049b0bd3a8303a4d2857915
SHA51254eb3a25691dae385275e55de6157c718eca7cb28f8bedbe264fafeb73c92a4c2b02620518b5ad3e63adb1d32001e9e006e2a36cbe90bbcdbda2b6b9db0c0f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301c92c4097fa3c5f88826ce9884b3c6
SHA1c1cdf95e7686592aecfbe5b33a59f28d120e07b8
SHA256f8741a5431df84ed2fd6646d606995bb449df29ec0da7a4c86a5da92c449d9fb
SHA51221ea8f1c3f464501432ec656bfba88bc1893edd429bfb25e5c0fd10ce4a3dd6047d54491c621da2920581841996307e15a02f9f5774d0be9344664872eea98d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd557be32f6573d4bc7c531d57035d3f
SHA1aa52a2b41f6015a457c0a4bb2a19479a7b86f9ef
SHA25663ddcb33673e085e6593d62798d065ac62ead718b0921dddd350180e05e080ab
SHA512522cb5ca2d6b34091182b2ea4095be032ab2072c1c6e4a60223c00cb2d42fa12e33f7ad5ad51c99fa2eb162f28c0633c7c1e701a3a8f467d5b4dac88428dbe1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc22dbe65b2d4d879eca331903391e0e
SHA1b31fb2c41a567edaa0495621cfda82c87b8b84c7
SHA256e6b2a08c2b11fe43b34fc7b1f8bdbf0c7976aab2c0a44df13f6e137ec356f612
SHA5127785d29fb8c1ed0526b384c30e8f945fa85b69e755beae70e6e8ae35d2fc6e739dc077a44eeb6e5e11e91461d75cd89315dc55ce2ff15e4959ee222211d956c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7f4ec5c7b1a46facce96f2215496132
SHA1a00a8102e050f97f8360918b7387e6273d8df27b
SHA256d0454585d7c38e6dec7eb1619fbcf67e3e4bc7e4dd59c40b5ef45eaff041bac7
SHA5123730c37d2129e4066d25ce225da16ed145995af11f75097f9288c603b899e1f455612f4c959d710fd9ec4b48b361db0e1aba49ad53dbd2f5c3b25811e987037c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccf7bd6243b36d844251e016f14f3b6a
SHA11a4c20d09a962d28f1e783fbe80f1d43f8dbaf62
SHA256a5f7ed1f600ed4552d1595939db3308010329cafab7ed6c7ba3b9d19e56357bb
SHA512e7a7b4812cc48f348439ba8aad22eb455ddcdd63e0fea92dbe234d0ec9943ae499dff864456501788776b4545454985582033c76c989636a6732ec76ec09ca71
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b