Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
b7716541cb0df50e0b692b524762337d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7716541cb0df50e0b692b524762337d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b7716541cb0df50e0b692b524762337d_JaffaCakes118.html
-
Size
461KB
-
MD5
b7716541cb0df50e0b692b524762337d
-
SHA1
5997e1b78946d79ea808b7d1e1242efce77208aa
-
SHA256
1a66e43d0933ee8cfb9ec68ab5b086747f0d226e5e5a3eb461f19434f90a2d36
-
SHA512
b9bb991322fb45e6c37335f96fff646080b166e55d38bf1763c47049fc6ee1de027b414404862b91bc2f422bdf75e1ae71ba62efbd78deae47aacae1e6cda9c5
-
SSDEEP
6144:SlsMYod+X3oI+YusMYod+X3oI+YEsMYod+X3oI+YLsMYod+X3oI+YQ:o5d+X3W5d+X3E5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000efb6473b65ebd241b671861e2ca19a86000000000200000000001066000000010000200000000a7bf6ed712586bebaaff00b6e360f59e8483ff0bc612c0c6b60bba646369e53000000000e800000000200002000000043945aa384504fcddf9d35d5bcd2878aaa936f3ac2555c32f538ef761579282520000000b9e887c8c6000fa80e2510aee467a0cde2fdd84a06b6786f82cf527a89c7336f400000001c3d2eadfb9d1c762b6404197e8a831fdef6432d6da8d63fd2edae3f84eab916dc97d81233470a43a3e0a0440b231d87d9664a13d641b0b60424dfc83da3e013 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e336cd89c0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424771934" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4A67FF1-2C7C-11EF-93CC-729E5AF85804} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1632 iexplore.exe 1632 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1720 1632 iexplore.exe 28 PID 1632 wrote to memory of 1720 1632 iexplore.exe 28 PID 1632 wrote to memory of 1720 1632 iexplore.exe 28 PID 1632 wrote to memory of 1720 1632 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b7716541cb0df50e0b692b524762337d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c32d4dcbb7060d1662f62c6d0891dc9a
SHA1150f2e264ba32e8a69b40c13415a629648f15f17
SHA2568c9c57b375fc1991c87690f4b4f8bb222b2bae1abdd9331b9753a7e919837da9
SHA512069dbb46ee4a2649792a94407f4328131e00d65c4fd0495f950dbf90bdda76fb1c3c5ced6dec446fd8611450b944d3835d7db0d6c1a99108cb1b572328b34e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef734736100dad1610c27f0ff3b8db0d
SHA10964b9d8bf198fe3893288476740c7311b6a50e4
SHA2563e9330ca2a34dae97136f1d17849f9e30a098ed845b6d21fba3e5e414271dc5c
SHA512ba965bb637c5fd8b23e0a650c77e508501da0882905d6aa6e20222e3614fd5abfbc16817490f80881a4e494bcd5fa96d8973d3abc89969b5907acbf0755e03d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a20a748d8116ae69c41eac776a28c82
SHA1ba558a363792987bf4b75981d7e50d87497a4379
SHA256eb66cc5803581b969c953c50e9206d5932c0733f2446f3f76a4dfbc3db87604f
SHA512ffefa4eeba7ef6c0d6393a6a57f1a6696a73ad0cb710740170c6495193b26493bf925f12ddb333c52d21ad41ca1826336323063f160dcfc76a3a595b12cc288e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be0b2dfd084a8f71cecb49fe862130ce
SHA147f29f8fc466a6a9c0a800bba76605bb57b73b4b
SHA256de089086980270f573947324af4c70fc689270e2e67db2e0c5550419dbc902f3
SHA51205af88d90c00109302aa5eb9dae9cf8c9222a6173849815a3e5480667af31d605b41237517f77dd9d6e2f33cfa600f4eaa2ce4a2b027a38f215144efad2459ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c46a9000c66b71ef022dea5fe65e15
SHA163f2847bc263e77970046b3f7b259016c001339b
SHA25630e7fb32ebf6d11d2df9a2d2a891730ff623ef87c7c5026ec1c375d6efbcebda
SHA512ddedc9989ef41cd0588ac540880ffcea489e298414d1f762bbd1823d4f184cb004a73c2f1b7eb0b0dba96c45c96179e0012d6a5a2928347b1701f352bbd72b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56117d7176406c20793c3040c10d22366
SHA1d941489317e3e981bbede5ec07492eac39488196
SHA256f6e54fcd413ac761a3a5863f93a14ef5f54ef942c6a62366c2526b21cb2dc57b
SHA512a424f030078bd18d82f1d7988196672a31bdc73273c7776f221db5786d0fc47c5d96a44553b1560a09bc179a3834ea4e75dfb1cfe3d85bbe5ff30f89773ba644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7812d78fedc0579e353c525a2c1d477
SHA132cf4ea109a3dfcce85e2362c61dcd59aebb4342
SHA256eeb88c4ff80e8224a4ca5ee56e40128ce4d6ab57288767a1161fd9ac4fe83a86
SHA5129098e6875156ef6f1dfab24973bfb11236d211d73857bde0c686604efac23dd945adb46e43f7e88f5ee3b9d1434409fc7c0cbea7917e8afa1398ebc15f913a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7809ac7bbcc2bb1c105a0c353f49e90
SHA1ab4dc8bdb20c7d755f2c684ddf66cafe16d19df7
SHA2566e45c3adda342ad85a055206727d9889f13bf897681cb5d43cfd79e8aabc9832
SHA512e38ab48d795b5da39c25321ff1c8527b8e36851eaac107a965d5c88de208828ab7022a88cffb27937a1573b5cb296909ae658bf300e3c7c9626de06691630b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53066efd0da1b3c630a503c4e825d6283
SHA15611dc541221b57d858da91e7d37a96501168947
SHA25618ec08216d76905ade89325f16a45d48fbd176dd6926fda6b5d2bbb753370383
SHA5126dceca479a8979d3b552af0542223f5e23528f33ee36c4f2d3dbf128c9adc5ef82c05be7726bff29b1b9b7b8fedee5a0f4c4b49f9b4e84a1a1bacd2a33aa4d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c219e49f89ea89406f5f8bacc09c3cc7
SHA1728c1181e0835cbfa084cc3ac7d20c0f672e4bf4
SHA256622d7d5d72bb02cddce36ff72844d838b0e77df214e0556e06a7bc20188977c5
SHA5128f70dc4e5dc5e584a15c244d5a9341f19cb602c8ac86b66beaa68d9f2f45a661c6fc5f2cacbab4375f83e5d25a241ed39a7af5c014947c6eda6cedc917fe9210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c20235e7bd1744f89388f71f7ee86ee5
SHA1c4710dd92120c41947351b77ebb7e0111c2aa395
SHA2566787d744920e124ff25c14b9d5053aecb6d5da929ce61bbf2614f03553f40f01
SHA512791327366a28f81b0c52a42b74a26c4a979b3a6a9a80043cac77ee986af5661521e24295843e7e21ab9416e2cad3ec299d74e6ce5a5bb8a3805538f0beae27ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b31d108a90e703ecb06d3ca623fe2a
SHA19ae421cc4c98a816f774107592f95f988dc4d207
SHA256e25c6204b62f087282c933710e8acc43c6d7c815d49a653f6d377500254c405a
SHA51272d71766696017c446c302d1ce6ad396b97dff649dcfa813cdfa233ae86f7fe0ba18eb4ff8e2679b3a5bacdd7bb263c8529f7cbd146477e1f12ae8f712caeedb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d414595abed37ae019311cd583dac111
SHA1493ef18771b40eb7985a72fc1f251dc0164143e1
SHA2560b5212099ff177b391213c1db4d5a4ce6682ad744edf696c8a2088a6062781fa
SHA51232744007e696c0aac3c33669f72f86663223fc81fe40b4cdc5536a8370d10414de6b786b8ab330d0e20386424a41ea1526c41253d2d578a2f8851184e43f6251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf938e066f1c68161d4b1e50c0ebc7de
SHA1677ee9e5da0cf5e7e7a6e5e3dd29bfe154c208ea
SHA2569b43cdcdfb9d2092df90d9866346f41818d7ac1819f68c4284e853be17b5815d
SHA512c8670edc3bbd3fa4a410516c65fbef2f08d48f891f2ece03384d843cd4248ff56ee1f6ed4e563a70687de3d2054575fff063b19d46402b39d8d1fe119baab7a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be8043ef37656defa7f9bc59a08e307
SHA158e19ed1f9e74adb40e0f123b01b2a8037028179
SHA256f67c96128131aae94712ad434a00a297236262f5c93e7ebb065819f1d5989456
SHA5125f8e28217d5403b2973d4e77be4f77b196961e8a16d2b52beb1dca90e569ebfa195ad099b030403ef4e20843cb23ad4bff0e0a60a78d689fe9970559ce6f7719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e521698d5f562ba274a22cf2b74d01
SHA1c1bfbe3513ed38d13a9a412c14b2cb90c9a661bc
SHA256ecc88f90c49aa1bdf088aa16ceaa5cfb01471b29abf4b7f39fc2ebd7d16dcc03
SHA512091b02e961d082eb4dad283f44d72b6cc06d7f56c609358b3be8539a8b3ded10baaedb27cb08705c4c1c7d4d059f4f14a4fe636cf2ed6c5e77a62c59cb1023d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587d1577732a9c0efd19b0b3ab1c7d65d
SHA1f8eb0a2acc1057380bad28a21c47262fa7dbab89
SHA256a40602325de3c68144324922be80fd44ff393b7898b919354cfd580a0362787d
SHA5126a20a113f5368ba4e0279397a3de18d1cf8f487744daaba38ea6de6a3512792fb33ece5697af45b69bdc3cfa067fcfde749ac8cf1f6ebdfa1e5ea224282ee727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5593b4f2f5db8709a5664a72754a11dd3
SHA18ccde15a0145da46d96f2932e5115a8f958c83c5
SHA256a719742d08c5e049131a1f880617cf6ec841462138a8484e3dc6fe7025b9a09d
SHA5124609d441ba6b20f0802b4c812cdda5503c97ed52bbb109bfa22ed5164c16ac526cbe1348034ba5b929ce86618cee38a5e7858f8d679d7d16c2fe8e18828a14b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5233828bd4f5eaf31dea3a4fb162ff7c2
SHA1b06a76d58475d37908a7b9ed9da78287f572a1e8
SHA2561219cb16e9e09e66a1d6ca777f19fc1a49daec85a6e91a3cfcd223b97deb1ad0
SHA512c856c6637b5079310d72d831594dcfd7e5c41ff81c459bfba87ec632247112796ef1288dc13349e10583043a8fe1f88db4a4fca55d6f9914bbe4fd24f1af4782
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b