Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
14ae4d9192efb60589c137b03e01b4ea_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
14ae4d9192efb60589c137b03e01b4ea_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
14ae4d9192efb60589c137b03e01b4ea_JaffaCakes118.html
-
Size
58KB
-
MD5
14ae4d9192efb60589c137b03e01b4ea
-
SHA1
243b513fcaa2357d24da6995dffb96da088cd3be
-
SHA256
98d5e8f64319088e8bb52ec06097009d9f536e4348cd48ace91e59f2e90cb5cd
-
SHA512
27710a9637b05a0a1304174ffb07787707015774b98aae20d04585f9658ac9c6d4957380f935fc2d904a8caeb7944209bd05d9ae0fd1b56d42b34e520d82281b
-
SSDEEP
1536:gQZBCCOdF0IxC+2EAfYftf6fNfCf/fZfMfAf3fkfWfBf+fof8f+f7fRfhfZfifAP:gk2z0IxmAVC1anxE4/cup2g0WzJJh6IP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000007f622c70e885cb932fcb1c5732527afb14c001b946b984ca3679e7a9725978da000000000e8000000002000020000000c028d440911410d9f2c08efb0d2bbcd6dbd4d8a9c17ad6a840f4f6d0f5adba0620000000b3b68debd08e6c2266bfe96e57adfa61a25e5507723ec5cad561e9caad37468e40000000738628b20a2add859a36fe39ee65d5b39ac4098356e652d520c864cda47a60ff58c6aae03760e2ef6392fed8f88045122e5654bddf0091ed38df4227a3f3f204 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 806ea5594ac8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83F99CB1-343D-11EF-81FC-FAD28091DCF5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425624296" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1532 2092 iexplore.exe 28 PID 2092 wrote to memory of 1532 2092 iexplore.exe 28 PID 2092 wrote to memory of 1532 2092 iexplore.exe 28 PID 2092 wrote to memory of 1532 2092 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14ae4d9192efb60589c137b03e01b4ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0292792469bf77a793b46856766bc32
SHA1b92d01a7336591e1900bcc17bceb62a28fb5219f
SHA25664f05ca32e7cf2647353a5e5be6e75038251bb2796910bd1c6dba2e9942c58a6
SHA5120c4c9603a84ca191081063a571fae7d5729ac0530fff3958303394bd7d7b20c0f7a48e7971c9487b96f300aed4fb9e535d5aa251f27e15bdd366c7896a2e7d8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59338c22f4c71f9f04b5f85843a8835cd
SHA124a7c1cb9f4dd2663ff0de61eb65f378fe2b2dcb
SHA256aca1661a42e1502b069a4defdb6493c19e52464d898ce65f01bae9cc8e99ebb2
SHA512c9eb958c5e43ac041917adb8b4d3e34a6c83418b1c26ef362093c67ab06fd101e9d74c9c45f53bc820c59e677abc391d001d2346e0d825ecb1e562fcfd8a4899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51756784a95a179c12fe1bce4ff63432f
SHA1ce0d46f305f5332709b8f2bf9a4e503f1a02b79a
SHA256965f43a98f7968cffffec23dd5fa10ce5fb022cb8887ad50c256a201fb1e0289
SHA512f6770a9baa3c8f0577c3834198c335be564c2d8dc7d319f039181a6cad1874087d877e5b331966652b157636f6feff819ef8d0e30991d9539bd17aa5a8f79111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ed66429dc2b9337ba09f0c5aca56b3a
SHA10f2d36d152d9be084f684517a2b6566f3765c89d
SHA2564c173bf88b4214360acd3f034ac7b0c580c04bbb6871eb494be702596c3b4180
SHA512a434a865041867d39d49b56c1df5576908e551704b34ec8da522e25af77d901024878cbd1a4bb9be14d73698395b448178bd8a46b144e86d03485090606a9ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eedeb1cfc6bc0e3657b6593f3596ffbd
SHA112bfea6a4ddedf7221f0d391fe0ad68d90e459ef
SHA256528217557835d6c78f40bc5502c34fdbf71310809255c4bcf1a67cebfd732550
SHA5122ed29ab29c3139898f572631a2f2e4d23f30e491fe199383106f8d3f4ea04307a4ef5a5437624e69de8e9cb12cb3cb449648ce0e67496cda9f7a5fc738919686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ab74b7beea6594478f80c1dc45b7123
SHA16a78b35184e0317ff6034f0645ac2464d09fe386
SHA25644fc6774201865dfe8226023a3eb1dec9e6e7ae5f32fcb37146b432137b65748
SHA5127e25b21ae36f67e60fe9f6dd42e48d2397fdd70d269f66efe4066117b4a1f95572e64fa34adb3aa2717a364b73f83bacf5e8ce5969e52dbe59d448dd2e764aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dab9a3dbe82b9f1df7ffa020a008b059
SHA1742eee75edf757454ef55ba426519dcc11efecc2
SHA2564304b14f94237ec828f55d5aa3699c37d3f1374177a9181e342f23b773c0baa0
SHA512a2b6e617951102b7e218c3039bd7b59ade3716220370b51055741148a1b205e4205339857808e6548d1e8384ec3c91e0a351f8605830eb8f612f7100f0f65636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a116769d4998aad305b0b708d01218
SHA17bd8359377ae4794bc6c1611e2f418df5f9a71fa
SHA25678f1a368d8f06988abb2481f1936be7eee612fc3891dc3f7e3b7ba17175eae2a
SHA512bbd14e7954d785959acae436d01a61c222372d7351ffbe33fb49b52628245dd9d7efa02f785c0b43dd9149f73c40b2ff3b6483bdacb1ebefa45ffc7cdc0f7bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9203d6cfe87d48ac7b1dcdb713d7462
SHA1e915dc2b9a110284bc9fd862e928f0a3c29a0534
SHA25601856331baa3ecafe74220372f9b2c5a206cb17e7cdac05c03e55fd4fa55b2eb
SHA5128050399fd8760843c775f96424288e8e7b2c26936afe54ba0f9587c1e86e780e244ecdb4c37cc10f4f5aebdb88138767ccf8805adbec9f56fc95431dc059df0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ec36bf6fb69e99ee2dd1a3ac8e093f
SHA108307f30eb3ec71aff087d1f66e87fe809e68a1c
SHA25665c5720cbdd86838aac5654951889a456acfadf7cbe1812058d443fad8828fd7
SHA5129030a0ab1576a1691e1eeb102e7ac80b469c998fc3739083d720bd6da797f073c055d9ce804e627ac2a8bd3065cc57759f58d7dce45b60b8a4bdc4870a01e134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85fba4bdf03eb99145b89fe94411cdc
SHA1378b15b08a4525bf66284bb9e104fcdd76fcbaf4
SHA256bdcd03cf9fb1de4e42b62e281e17b108d5d90ee82f79b43c0dab7dcfbc9c87c2
SHA512044a605c59c7f577307100744a0d26210f73151011b3ad7b7dedbb35ee27fd15a7dd7858556a7f094a6b8639213f44f47788a41c9556f6c0379c1d8693070b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3526a81876b610a38e29a0cb9b10021
SHA18580e4d71abe3665284606a4fab55369dc3f269c
SHA2560a06561b04137d84c8d12152da8c00d4b9bc1566ff97ebc86f446b411ab40389
SHA512764932cf24f64b6ca75baadba0406dc052d6f376d5768bf3f695d05cf8f1ea9db7927aad7cf2c17b3a86d0b0f59b14ce73817630c6bf8769381cb9b80b2f157f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6bb91988be59ce03c8ae3f51e12ff58
SHA131f698fcef1078708f8605f009af0a9e3b6c0391
SHA2569ceaf68386f3ad516d15533e4430bc6fb3d2885fcd28e3af4e158aa591804499
SHA5127a3f0151d967ed5265c79bc4d08dcc9750debccc807522a115a36f8a40f581366d7f4f3fddb379a0cd6df82a141730be53de3fd669968ff387b06e7d7c5242af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519accd8cf62b9e099bdd149fa2f31c03
SHA195c0be65ace9479f46bc51bbf585502935acf907
SHA25607729c785178e1e8755be9d570c6aee86a0374f84e6b6c6c20ec275709854e30
SHA51291a48174c6b8aa6760bad0f38f0fc9406f540369f09c983f9a0cd27184b2adfb708dc160de89e7b4125363a6b837952aff8c07662c8c1507539ee68c44ddd7af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c9e190aaf013fe04f8150196891305a
SHA15d1308e723fef59201599785ba3a5526cdf8524f
SHA2564aaa8a223da47bda31e6757d18a01614ee11ac257048cdaf9ee06443e288221a
SHA51234968a612c96eae5dcd0428a50a243007fa53c267d79f23599fa826d5bb13cb220268c1b4b9ac2dfa5a177f5a085f71a6b6b2c1fd4b7325dfcd5491971e605df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d4758d0dc28b97951d6251ea515506a
SHA1a8e8a2bb903f2252caa5e2bc5b87ad6310680a35
SHA256d9c0b8c0e2c7d86ff1861af506cc5856ea825c0f8ac54596687e22e008882277
SHA5126638d0da44e8968a23a137f947711fb9104902f91a031ca3735724f446f16d6eb71d36151a8b1cb3de75cb66f9d9ff41409991e07130441bee4b77c1b994d9fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b2c5aef07e86b1e7a720eecbb2c4711
SHA15b1582c564b22bdd295397abadc7954995ce9cb7
SHA2561bcdbf44d4ebe05f046598b304b47c48682e67b5c724a5b050d844db1affa83c
SHA5129f2facd949509ecedd8fa97409fa28104932352f9ede2a62aeb270883fb7b128cd7572b67c25df37c49465ca52557b2f1ce180a99b99dfc80d3099a582f95261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f6cc5fa3efb950b063239eab4b337b
SHA187325bfa952aa4958a8696f3723e607a00365909
SHA256c2f5c5abcf76f8c90137126843d923283446bc3e8222979b74b7b3fde5bb44d3
SHA51262a91914edd7f1217118c47936b5d0c6d0f1e72cf9aaca35b72d89a815bcf47a75a48d94a3fb61caf0d662f06834e28a088d8bc2b0fb5541015be1392101b591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf2156044e8b86077b8edfd89e8a37a
SHA19ae7ef6f3f1b7fb2d9146b7ab1cb4f5c7d27b817
SHA2568abf6d913ed6d7e4413177cf0928be50d422787465bd5d253e30ce048dcafef1
SHA51285bd4d116d66d69ce1c99487ed3536337808df32fe11c9fa73f9316477b12b493eaf9750b3857c0fccd0ee67215301247d7386eb6382cece3bb9adf6bc963757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a8fbbcc939b2ebdff271e801e576dc9
SHA111d20e5c2f136908d732424159a9e3ba82c9b5bf
SHA2561a254eb30b32fe0b1cca10388bb311e2690e50a9585a30e26e4b14c448c88c76
SHA5125d6d2be681221a3410f6f1dd62b8d269d234e059143780a1741334f9b8789914023d64b5c9c055217aac19b70d3693601e75de265829bbed3133a141e319e4ad
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b