Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 00:46
Static task
static1
Behavioral task
behavioral1
Sample
1023e36971d490e24b0516e728ccc0df_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1023e36971d490e24b0516e728ccc0df_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
1023e36971d490e24b0516e728ccc0df_JaffaCakes118.html
-
Size
9KB
-
MD5
1023e36971d490e24b0516e728ccc0df
-
SHA1
6159c14dcdc448b061a1f8ac94699c3b88996af5
-
SHA256
d7b60489a73e57a0c90ff7f7f72b9d3d8cb0c337fd1728a0184f7a90cb78879a
-
SHA512
fe99f070ca2f6f0e62c9118603ffb18e3fa222fdcf9c062e964a0a7791e3d4e5e260f24ffee78ae5e2d398751213444662212351682593ba033aa7a96d647513
-
SSDEEP
96:uzVs+ux7yWLLY1k9o84d12ef7CSTU5zfm1zMM1oo3/GCWtBy4ph35OQp9Rm3zG8I:csz7yWAYS/DP63gb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425524646" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3061e15462c7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FEF0BC1-3355-11EF-9680-DA96D1126947} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e7eeb5ecec87b54cb6517dbdee06ee61000000000200000000001066000000010000200000006737a569e61f41a4f5dd9e6ab2a1f2d8a53ede76f37fcddaa13bef0397695d6c000000000e8000000002000020000000543495be7e0fb0e0111c3b3494cf6a75406879a2db01dc2e64210bc236fc300a2000000080bc0f88a59445332c59f38330560904de7c24c6048551dda386e6fd9dba5f4c4000000073f8dadba7dc9d1b436ee9610ae4832611b52d1e7865905d1536e4b961669b7f92af777bd6f0cb54b7ac713e69a644fded1ad349c2b574a19a443a27798f3ff3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2836 iexplore.exe 2836 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2748 2836 iexplore.exe 28 PID 2836 wrote to memory of 2748 2836 iexplore.exe 28 PID 2836 wrote to memory of 2748 2836 iexplore.exe 28 PID 2836 wrote to memory of 2748 2836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1023e36971d490e24b0516e728ccc0df_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ced73a6d66fcff60029844080b7b748
SHA147f79fb4b92531b09150684dca5b4fa022cff0a6
SHA256ddd70c1c8690ad16ddf3e38fe4e10ae33a85b9e652020beafa1f8acd2fff29f0
SHA512a0e207ceba23afad6d93b8be45da19538b82bd72db70c78412f088132eecd152473f1da360605d26220ecb169aa0a91463722273799232471c7ab776fc833733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2c12a87f5c3cc416cc8e59fac78ecb
SHA12f4169b21243a0f6372ac58751cd07bb7bc27827
SHA256f3b4dec267b4c4e52f1d9532662018391ee830bb8e2a9c17fca36a9f97b6d5e4
SHA512e33432bd3fbafb0d321d5df78d8c5c864d4ff9618fd5179becd5d33360e97091308e7b94ebd6ba842738f370f7c2d7da6410bec0fa1cfe8ee88c3749c5d2a6ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f6cc19e09ee57f8782b570744db244
SHA13c217e9969b588a59cb4b4161d608698a0fd7a41
SHA256e119da41b516320701d37d9a29e252d91ede0d999f651ae9046f515fa4e70b26
SHA5121801dcb90423cac114dae34875816a45d47dcfc7507188efd05560623253390d6cfad697f70dfc624cda412b61d95ca9102f52037a317d68f3a207d4ae2b4144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fac1cb2a708b770ceedfc6af0d07d23a
SHA17fd9fce10c28c949b102cbe39e56cc437e186705
SHA25655acd50fbadb8ef191c8a65ee7464a6c0f87f53956b4374ccd21cce1fdc5993d
SHA5120b68330be5f7a93cd14071a549dd4ab42a6f7ce80e18951bc180c4659bf0c0880ecf5e60b6cf67562150e5df4d21043df476fe74143d4ff4e91b44e3628f02ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5361388a90539d17a6080db56a5f0a81b
SHA100b638e46911b34e83f9be109c238399237becbf
SHA256fe4d105734c803ab0871e0f15f052ca795866e668e36515f72576c5e98472163
SHA5124be6e38952f0ad93110f15f9c149bebd471fba5a21b780759a5d53487b6a7dcd81091e45289ac5422c5ee2386f43568f40647a245b3a2ed9f7de94b1ee3b7459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba55c01a5fee121d19979c5e1122e536
SHA1425f757f643f363d717290487991ee20524095a6
SHA256700098d3a0bbc653c4a6117f877fecdfe559b86a4cf658db1b3afe45b1c7bfba
SHA512c6828342445663a902530f3f9d69a9d45b622d0ff39f1d3923fa4aa1c0500292b8b2037956da8959a207ef0c5c36a1c34cd3e275cfca2d730b81d28f3eec37eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e0f09bf58e439a598f62249a820577
SHA139e481876d60cc34560d15fc6947b93a8693ba0d
SHA2568a2a917f0e183e5bcee65b0f118e6916201bbbe132e6672e287a93c50236740a
SHA5125a47ab6eb077afe94cfb197429703fa2c728c8d0d06d3e4f8444048fafc94c87cd249417d984234486be7021af40f69a97fc15d9cbadea72ca0f46244d1f071a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596362dfd0e09a80654c7edd397833ba5
SHA1191ce207dc288d47d078e9e8b6b1f19f77846f7d
SHA256aefdfb021afe26a4ebddfec41c6c5f664854efda94c4e2a0c8ce6efbb0869c67
SHA512fc5746f3b432f3c42302963e172d00e4273d853a08bdfdc694dd3150ab7b3070e46b2fadc2f64f9e479d6fbd9ebf22c65c0986693790862841cc887c079190a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a32ee77a683c7f72a3504e9367611b
SHA13df39867322312c0a7cbba5f3b92c139870dee88
SHA25666638527a084e6afc30015d21faa865cc80cd57fb22c9c8981aff1c25e22ab9f
SHA512a3f3d4df7a94359280cb208036d403df263e2af0ff69b09bae917fc1be7cd2e78f4ea62c82bb42fc753d5f75bbf6cda98286e1232ab55ca3cc54f7c2e8f36ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5205c759a797e028033b85e9ae8437c5f
SHA15b606f166569206ff7d6acef75cfedf8ff4fabdf
SHA256e0453afc8a9bdb2cce252643822839c9a770e66946cabe65107553389a580931
SHA5121b97357620cfc9d69c999458ff643327fe4b918ca1ce3969aac7e611719b583c253147ca435d23b64ec9dc7ebcd2fdfb61d2f7b42de89038a4883798a5c80782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc129eadb7c7e85158e98c9b510f4022
SHA1670a2bb049e9692ebabef88ff2a416fc587a5983
SHA25680e354618919939c85ae02f87eae0a45082ecadd75e15c145eb826d2a9e56bde
SHA512c396d84657889a253b9cb246139df73e17d279593dd418eadb2d40481c4236e9a952cc4b632c8b95413b6cf7362e585dcd19dee7ee8f8409a3db5989c5f9e4b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5992b7747a8128e2d2e9976fcb0869236
SHA186be3fafc5309447500a486a25cbc3187bf66441
SHA25681943abc1b6986edff9cd8741d3b6c5d56b4c42917ea211b7191e0490bbf4a32
SHA51218821b90cea2fb5f6b718a8e430b385766bf4082c835e12b66614d51c5cc7eab59a8dfe2ae5e71790d3f5df565285597a285cd5bf005f159fe2756b378c56753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce3694c5c8543be24d5d1ccc0e6f3fe3
SHA1bee97dec72b62bf966c1d19aee2e815a6cd640bf
SHA256983d81f9836dda96ca18eb2a9393c46f18bbb52e6ed8db594d0c89069ce6a808
SHA51221816ef1a8a7cb6e5f2154fe2e6411b68fb620e752401b0bbf08e72f1fb57f1cedfe90de8ba7b4b5b04be290c4a57757804ea620356fca24937b2aabd89d92a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1c208dd7825163e9756e14948cdcd6f
SHA1a29685e42e6a6312d28909201eacf2abb5ce2f3f
SHA256fce3abd16b07bcedf0cc8272d9f8062006c31fb15fbd8a5ba397d2d97382f510
SHA5121cb24cd1a4ee4298579b530aecd69c77dd157b73dfd3fa901834e862ea4d5cd9229197029e82e82fba3f6ad602136bd18196485dbd524dc6cff496bbf29aba71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f2bab4114e99914054462cc029f24c7
SHA173a6e67ae98fde8c8527736bcb5815207d55855f
SHA256a23337bbc1e266002769cfbd3284a6e4f80210762b692c9aa4f472d0c8b98e4b
SHA512994d1d618e5385f73292cbcc2b723cc839558384b5f63cfd9526544ba9ef96e1bf522faeb936819dd3e0323f1c156809488ffc15a1eb883f429f22060317754c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585484f825187624e7727706df6b90ea5
SHA11bde51fa5aa375ab776cfeb72931bdfc6caa1a31
SHA2561163bfb5cd90c5d81135dc2d2011129e18d8953e686bf222dde3da17f52f5faf
SHA512bfe127fbfb51e28f71d6d7fae00973262948d3c081ef8ca203f214b65db602f5c91a56660627ae8298e453843c8070fa42f3b13db4072ea7f393064c985b8191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0bee83141726422d2b376ed2ff23199
SHA12015ccab6fbca092680c7a96f77ee284d136ea4e
SHA256be9208ca79db059e8a495e59cd64840cff83a51b32a6a7fb3a0320690202a544
SHA512427799f03657c638ed686c5f664def192676494c1b70fd4a2224ee5c3e2b4abf74adab3ae5fa3d9787dbac16ab72f80cd8cd9edfad80302ae4d96b385ba90c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f36db0673f454308884ce22c11f5bf
SHA18a037d994eb384c5d719fb30ed8f52e125976715
SHA2562fd55c08dfb4b44cc766e6596c630f4c5f46c8145ca1d91ba0c9192136902476
SHA51263d4fee2ebf2143594cf71697aea14c42aac436bab0d67049df45f6394c1c5476d42aa270db8615fd81b76a30af8fac6fcab4db9c9f60059723df9dc7db0123c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de1ecd07e142b5c38ae8d4c2977c6d4
SHA1b2c75954be96411c8e1b9abd9e9eed1351fe3106
SHA25693391dea69469a06f56b0bc2149e0ee445386827c5dd92d8dff2079f891de6d6
SHA512da4143e35c67c5e622a9d62ff240b6e5cf0c14b9f78801a267290f9b54811ac6cb639f97fac8de05b83e46e22f464a17586bcf5f7575d6cd7dff55fc50e50306
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b