Analysis
-
max time kernel
118s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
20c70fea5710ed31d88a643ddde403aa_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
20c70fea5710ed31d88a643ddde403aa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
20c70fea5710ed31d88a643ddde403aa_JaffaCakes118.html
-
Size
59KB
-
MD5
20c70fea5710ed31d88a643ddde403aa
-
SHA1
0448258d9ab0b8044e9bbaa872604c5342cd4e92
-
SHA256
d2c1323c084fea3bed31ece4be005ed8a3ee0a42c992ada515a7249db287de67
-
SHA512
c7c85bcd38bc14bb7037057b0a199ee1947a7f4b48d8ef0cd0e9a738af173931c0b4c3900e6d93689b35a99561b41a5bfab90643fe5c8f765696947230d3e5d8
-
SSDEEP
1536:rjcrdL1V/YdZ4qBmPkdXs0bTt4RflLAQVL2:MJfYdFBKOpbTtGlz2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01f281bf1ccda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4055CAF1-38E4-11EF-B47E-DA79F2D4D836} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000332a367b52528c2b93f93ec16028dd53e3a4b590979743d03efa12dda7729217000000000e8000000002000020000000afca160012e5de782606ebb012cfe33bcffb83938bf0178e44d3eea26308c73020000000b3351547c5eb60e3e72ef3008f6266ae529e64417de56b4bdb83259852d88f5e40000000b53665115ceb39766f17c928fa96501840e96518f43bc89e1007e6c173d91fff547d916916ca35fe65913a736ab063ccfcc741736fca8fd4641e42b68f8e9c39 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426135713" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2872 2420 iexplore.exe 28 PID 2420 wrote to memory of 2872 2420 iexplore.exe 28 PID 2420 wrote to memory of 2872 2420 iexplore.exe 28 PID 2420 wrote to memory of 2872 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\20c70fea5710ed31d88a643ddde403aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508fec5c6a30d09926147360191d36d24
SHA1fcb5b8cad5c2689338d7552145137f511cf3ab03
SHA2567f200b8bbf03b51ca5f6956dbf8e4a757d2c32754cb86d1984e3f4212a82fe32
SHA512cdd268bd949ce2f30ff05449c28a2255c71047a860477f8ca3dc46356503d262f746a052177e9768d254d841932023f2678e89d4dc77a72305bf1949343e53a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57fc65bff9a8e5a5f6dc4d4a611b9d1
SHA1af077cc1404d9f6bd3c248afad3adfa6679c7c20
SHA25631eba32efe43da41c068951eee7f2ecd6ff4ba7936b9365964b238226177265c
SHA5126a2c47d75f17001a1c43c8f8dabe8a88e37a1205bd9f7bfaaaa46da48cfb9b55e8807b949bac9457db3479d66561b4c15b085221e0aced8d36bf1210dc441069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4776cee1d8aedc87ec715c88c0389d4
SHA177c9d4f20f68ab778e7052201d7e182ed51af25d
SHA256b8368a5ab5768cccd9b99f125db69d48b481138cf0c2732207adf231800491c2
SHA5122bec2c12198270cc6bbeaaa8203ed8f735cbb33b13791de1b22ec6d502cc048e8e7a8ec3700c301a8230cf576bff39999ed5968dc294a474d28f40b689b060dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a1c53831c187da62a66d1c838c4892e
SHA1217fbd0f994b57c94e5bd6e302fa8d30472e03dd
SHA2568160d18095d3432ac5b57f95c17692d054a555709103f6bf8391cccb33353160
SHA51201073713a4492f9fb660aff29e39241cd254b5211fad21d9b9e9a265a162ef77c44cd577a176ccee0f4c3976867624d0c99d1ac6b0925150d73a682aa99c389c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9098619dd12cf590de6708edb3d22a7
SHA10fa13e4d5565237108e0c9d2e6c2c56e40d0b7eb
SHA256651b09a9598e4b7df1fef29a21cd8a1b49120d36817655a291d2d5bf737ea28e
SHA5120e469745573746891990dca23edeb83a55e25d5bf3c276b70c39342e05a063a1cc6f30f462f432c3a65984f102784d0cc7e04de648442f29bac7a0e7a7d8879b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5434c5a9136553211f1624bd1c4ed988e
SHA17158e0161d6f5e7b826cbad1741ade29386a5d59
SHA256d96cb1644f9722b0f03757611693aad39b20f2ebce608eafd4f2e3f5aa411e0e
SHA5123fcb61dbe2c90b60107e2fa5f16c5e9236a375a6591f0b4e4d46e9d519ac42646a3c20adc95a792477abca1930695ce7c190d53c30f9f69983368cbd0f63ffc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5353d102ac75ff717a633088140c95f19
SHA1344b36da3eb95024b70fc8b4ddb32e1a1eec000e
SHA256963c86e0cbb68e4c32c1ffda9a5eb422490b9115942eabaca6f23b66a85a3638
SHA512e01f6a90a8d81aa491c1329d9f3f4308abc81ae6136ccb6e7d1dc2610fb9c6700a90bc87bdf5191d780eac7a99f3ebb2b209fb6bff913de2f9750fdcba6fe39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2be9b3d840e0c08d1c77a87a28370f2
SHA190d48291e4e4b6bcc809ad09ccd32660681b9996
SHA256ba7e87881d8511eec25b5b955c5d9d86af4bb1adfff7a41be90e6e6682ee2f00
SHA5129613c342b3a770d4d6d95ec50c2218d1f78b7425b88921dd9ce0c1ff71431f2d43447ecafc18289cfd7dd83a82e2e047873c310f06ef203354b44da9c5dcf023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592984a38d66dc9866474649a4edadc95
SHA1ba373ad438abe2e3ecb016036dcdb4311330dedf
SHA25610d6a5ed109ac32280fb3a76cb22652e73a082cfd2205b2950c25863c71994f4
SHA5124bda031601d7817f1f6585b05678228a4c3cc2278643f6e6b6d296f93361e731e767ec9279b61f5c3a01abf0ae655c21f5723083d0c80325cc9ea7f450dc0b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520965924dde838f4e1bc80af9d94f742
SHA18d34d0a397026194088254b8d766b9c55b3f98c5
SHA2564ffce510d368ba9826eae48e71985d911d5740d2858364f73e9d08ad447cc33f
SHA5125a9a450afbd2203e840e2b79b278f4e95afee8ecbfb0d38124816804ffc2273a04aaa7daae1fd5b18a103a368e2f813c5a9370ad86e51e5bd00375690dc43fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de529ea3bd22cdb09b7684b1c54a9815
SHA188fabc1366f1b194b723baed67289f4bd2827d48
SHA2568031019452b9ea0fd1b74030ae212c954a44bc860457da71d1a315ac7e0ea50d
SHA51291069a44a2467ee7a9a4dceeacb1ff76b665d5d60706b0b41b19ce82799d729922734cf657b1cb353ed232cf74281f555e6a9701a5704176809928afd444fed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d58d8a0b55f9c433ca36b83ccba35147
SHA175d8a46dd34b610cde58bc9d03319cbb70dcc289
SHA2568425782c6bba187ae61b79824585f86633925d4f6a9c066e24524835dc08331c
SHA51280e47418688c1701ba5583293856b39867b5ecaa25b9cc989b651aa5e5abb4f76f9351cb0f38d5bd26d904bff60c91852efa5b757a09a3153f3ad0c0cc148ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e93e87add43f5ad347d526995ab4ecca
SHA17170cd391a633aa52aa4f206241f4f8a16d70a28
SHA2565f67007a31bb3198beb6a888cfaafee5a69745a72851ed357357adcb99eb4197
SHA512811802c59bcb3fe88e2fe9f5f776044cdfe57921858cb4058f52c9bbcfb7435a66944e0cc8ca8f76f3e7f116de3db018a01cb9271f9b5475de70344c41dbf473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584353c9955ef49cb674a6b3f715dc418
SHA14730e99080c30426181b3fb0249196b8c1a8ba41
SHA256565e32fc243e30f679ec8b74572a6046f001488fe53374d18dc0e1374bcf57cd
SHA512acd66a06e837b9fdd43eca640c4edf1457ef2335a276f8eaa634b8a63c7b569663bd90f45c3a56d06abd68382a429e41bc87072bc747c5cd53d8e3104b3f70ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c02f23ca9459f19e395593048e6d11e
SHA10c11832662c88e377985bc6f76a666af0e71b759
SHA256f015ecaf717cd438d7670ddf4099a1cd9fadf447af3d03b0f498a165b158230e
SHA5127d7326677203aa767bee9801eaa85f8777949978907afa1aeff18bca0facb5cb989b676353501d78532ad8baccb124461b06a87eb7ce171ab81fece3968f6b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c0c0da4a980033b89fd373bfceb0ab8
SHA1c86577cd2b38a6c2a2ad86e8f29f9ce91d7b66f0
SHA2563755445ade0af69df3607ce4a1225ea9f302bb7b81281bbdceabc72dc59e1ab4
SHA512b382ae5a2f03b6d02d09c55a44d0156e9960b625b28e3d88b8b87ead4f4671a6a383c830f1e356c52e44f6ad6a4bd30ff9f3d485c516e9aa99c518e433ef9a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f813fadc0980270813047c7a7c7192f6
SHA1556e4941322c9c25f5fc750abf68f6792538bc1c
SHA256ba82264b5e4bce89b6dd9d8b583e82fad4b73a9f7dce1685fe1bc205df1edfe9
SHA51233ea6a314552338683b517d4a0f99a68e3c78b8368346c9dbed1e05f5a9f9927306b7d5f91218e37ad5ccc79a0c028ad2234094c4b528f831b1fd5828c2f156f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a16d8c698d2f26d67cb745113d25306d
SHA1c1b17d6a481719a4d850d93cc8390cd729938b8a
SHA256681ff35a2570781317eb5b10f5bec557cb739fcfc9c30bfad1a5f291a529e350
SHA512bce980b650eb0b414c69bbaca74db99bf82674fbb3037aa3935b37ca3a5efe7dbb9ca13cde13d592f1edf93985af2bbb2dbe06c83f875d0a10b47fbd6beef3f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a41c403f43333e83f6e0e09c0af18a91
SHA1e9c2746d3bfc95441156a4dc5874d52685e714e2
SHA25680913f7281ff0224e1f61bf56195767323b612d8142ba6c9235be7d9b2e92377
SHA512737d765a5b9bfc288ee8247b371e68fb280c6859fffbf2b4849b1a9d53359b34fa726f060a54f88056de55c52c7e26c26c90f071423aee8f0390e034dac7f7b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec116bd50baae4507a02487644827020
SHA103c7e9e053a21018a4e07bcbb5fdc9176740cf5c
SHA25649fe2e865692e919c8eb83a35b41afb1377371f9e3f07462984f68d540f7ed25
SHA5127335d5a780d13830a7cb4c17d0324f62ff0a519c1f90a132c51ddc5abef10d691b4123f731d1f6385e8b820905a827ba244057b5c841bbc049cb0699223cfb38
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b