Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 08:44
Static task
static1
Behavioral task
behavioral1
Sample
25518e30de01fecff0b18c632724b8fc_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
25518e30de01fecff0b18c632724b8fc_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
25518e30de01fecff0b18c632724b8fc_JaffaCakes118.html
-
Size
4KB
-
MD5
25518e30de01fecff0b18c632724b8fc
-
SHA1
f5b0edf3011a27e462e996245c45ad5deb7df99a
-
SHA256
07daa29fce2a68e417bb7ac6582361b450cab20ad4787abe5afbcfc96dfadde4
-
SHA512
5203f8e9f98bdad68cc846c1411014d6a2a68cf5c6711943eba170dc7872a3899c4eb77ca17b39f8e2b7816ac50b33e16f6642e5bf63049fea466dcc9fb2c778
-
SSDEEP
96:TBBO1aglSNfyaQP3PJqQtPHvtP/4G3ivPwBYw00WxFLIHIQ5ewhi:FYak/aQP/JqCPPB/4Gqtw5Booi
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426244560" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b89885eecdda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000058ac07fd54920677a5a4cb81d864289330b9cfc2000abdcd06cb6467beebb634000000000e8000000002000020000000dfc8e23de43239248b9d96e13395c0fff2a56bb2fb80a719d2b36beef1655eac20000000ab00fd779a850b5eef46729b217561b1ae441285a4c71845988663c47b19622a4000000038aef7223bdfdec855f9b649b74cca6d88070dc7206c57610306d868af78ceae8e21020ed9ec07c645e08594262f77cba6cb61032292bd1aab03ff98dfdd174d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE200E81-39E1-11EF-8E44-4635F953E0C8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1932 1700 iexplore.exe 28 PID 1700 wrote to memory of 1932 1700 iexplore.exe 28 PID 1700 wrote to memory of 1932 1700 iexplore.exe 28 PID 1700 wrote to memory of 1932 1700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25518e30de01fecff0b18c632724b8fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f0b431e9d1452f4c8bc0bd3aad7aae41
SHA159cf1d284d0b872ff3f7ce5571ee30aa8e9c3a10
SHA256fdaf4c240d0316be4dd56b02020919112e7ed2572b6ebd3f69b22b42cb95d539
SHA512aa6237fb310885e33993e998454554c68ff1f57ae3d9cc3ac4790c6340b5ccf8f4a1614a91c40476792604d2392ee8dedaee47e0fabeb78fe6c20b0a66894826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a9d1eeef9b7a26a4fb63c07f080f14
SHA1f987a0ac04cd5fdcd260bd36f366265c72d1ed1e
SHA25687e5a4862484938f90de54bdf5a0e1b55410e27c0c4b6e9a8c344052f6c6225e
SHA512912defdd4ad797c7ed20fa6a17872f36830bdea683990eb56ad06e579beeba90b90977952143bcd6ce21e8b5b2ab36ee9ede55e6fbc685d1f04754f695798589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c439731c6921df5a43469c5846658ba2
SHA10aa900e5e66b666adb38b7bf8f86d214ea25fcf2
SHA256b24a883ce503b381aa47aa45bad2b57e60d41cad8c466ab058c03da5145df23b
SHA51269a8f82777d5ec0b6c7ac583c58f17b675dcb117b23c3a2f42d994f60df3b3cdd2d8f18220e85f914820626701c7eb41efd739f18e99ad5c63ebf35cac93141c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594f39eb6fe610074adc22ecd4cf12e28
SHA1c4e268c9c545902e88470a670b568ea6613ba409
SHA256f6fed0a5fce1bc314e381b5843f13459960bbc994a26af7d5d73df4578afe46c
SHA51283c51abf616465e838eb834484bc2122dd6a31c06532321aad473e193c01da7863e128a66bc60e32026b2dba586a085560e948a36c3ba392bcbac64aeef89189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b249e7b3425c8051b8936562e822fa7
SHA11a837eb7355a0063f50657a104863c5e68820e7b
SHA2561f5820a13b5ee2e8b8e242e53d2288c610aaf4d57f42d950140adb6c9c721cc6
SHA512999fc85183c1e9c558178d238174ea29eeb80396422c8819054248ccaa1a996600a65a2be715919093ab025897102867d02ba7be3cb4f6a052d216c2e26a7668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e86417360635cdb15e98384aed586126
SHA174262d8456c4c8a33efab03cd59aa8c6d11aa631
SHA256aee61c7142ffbb413bccb2505bb652c7e2388d728fc6400993f56744dc8c618d
SHA5123a4b415907cc358fcf7be20e7c16888276d5829e770db1e1b3242c50e61ad30cd79988cab6867530cf55d44589d9226bf72493c9a82f7f84e905d6ad31c4069b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db7f8e2a90087f027188e96eeff7b5b4
SHA13992ee751720ed77816be21f9cb928f62c9dfec2
SHA25603fbb4e680aae9cfc89f932aa3b9c299ae9cc4321cbf9d6d308d055e17d5e531
SHA512e368888de39624ab948714bd22868b1207677484c2487aac603091b1a31c6232b82e69f450ae0af8e3e4979f2af563451b7c5403187786558445ef3af8074ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576d08900dfd62de1f619292e0da80ce9
SHA1d2517547f741700860062acb29f0abba5a733c3e
SHA2564103fea669e5dc96e6e393b89c0d98b5418f57a50e1340f69447ce9de2e9e395
SHA5126b53c5a7546dfe44a727da6d36892a347536e4bbf19c7c5115268c9f3e20e5b6e0c4a6da5973759e6010d71193e024ce3320fd0197edf93fea096b158fc75525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510504dd1cc35c5ce19478ed03799620e
SHA1a72a736a812d489b41f46a156bd7fd74cab78590
SHA256ad29c7d49885cac27b71c1c32680c29d22b076b52533f339e9cbb768b0b0427c
SHA5122f242e4927bff18cde5c849f979095c40b81bbf92a6550dbd7388e92c509b8b9ce31c5fb1382faca6658f19e644102c077620022e3f9e6672e4702204e949045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da00036380ee2462573da6a9a336c601
SHA1c646958d96641bb09f7a207d4ba646d92023156b
SHA256b96b02aed0c6702237042079ad8723fef24896327ed63a9109dacc962a82ded4
SHA5123446edc6710528e8235a7adf569b56a1f9b41a1eeb75c96d085811e20d8161f7f7ef51dee6dd09ea81b93faf65617c6286f2d777ac120cf2dc01d27ebe1baab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5111b63dc7a89749297b35b9c9ef30ecf
SHA19a5c2cc95f0a43b90133ceda2e0c035321d81446
SHA256eab08964fbe5cd4cbde9e73741b91d20f83ea42f41060ebe7c00d1af10032807
SHA5129e4ee717c5c7269e3a4932741cced27783a7022942330fc866d0311b046e4550ff4984ee672dad01351cbc0745a6a4b8f072582f83fc35a76c23190d03a15fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e17e3031dfff11e179a2028770f3730
SHA11704af958694991293f09e9075ee31aaed08b893
SHA2568ef66b5d24f6a6a4db2c83dc8d84dd0672d4bd792f310cd0c283d5c03e9875e9
SHA512a91b36462e8a6fa8817ce16d25dc59ec5ac32ce26d2a23540e1ab9d754c19e7f621df83e8b3c98b18b76a34248287338c17884608dd7c7bd9ca4182c88862770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ba2939dd334416a06a9eab32daf9d20
SHA1fe8a23342028284a6f36326ea487f1b207b8c6ac
SHA256e1ff06d1e5a7e1739c2e55b3d41ad4eddbe50963a96c1ef950f1bc0ab7c96456
SHA512a692a143681458ecffde7d9cf799d5a9a8e7d27b80c273905c4e5c12f1ad76c7673f62b9793609ccb4e17199f9743fa64b8724691476f16da539d24f330c4104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57160db497cce9d3212726ebbb49301b2
SHA1bed64d097a059dc708b2f036b6ac9a84ac5f42ef
SHA2560809c1fd89620030e5095b0e2f6869d12fd73428780b81b1755d9a9f0d500067
SHA5129f98952422d625649568753c8b3a8fe8fee6e9ad4d4af134ad24157d416c48b0b32b062e0feaa51ef0ee56d7b31d7bae943ad9deb07b024f3dcabe9e4ce46f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f4982d77d4769ae8da3c790e723d6ba
SHA1543cf35d533605370e3e0778b53b543450f16023
SHA25695c64cf770f0a2ae2e15c7953a205f78e7c49cdfa65aa23f9260180045bf6cf7
SHA5127c5455bae4188f0b61dca76598f5f4a1d869715cdd19ff56e0f5d78146a59d32fe3e29d0006803ceb78c14893570649c61f933130bed3d0071c2c742da5d0517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef575436d51afa6b3afd9932e196c129
SHA1490ae5dcf7a992f9c9d8a85adf1942e5b8694cb6
SHA2568d87c9e3dedd273870e56deaceef7b3a9bc26f6d60d9d229cf284961bb618617
SHA5124e2354b704a03939ee9a49bccc1f0432935ee24297a82a692106856c752d979f77f59871da626883b517828df02ef84b17bc8b5b6c7b5b63c334861777bc73d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd1783e53934528da720a8bcb90a963a
SHA150b17f1c46b715bc0ed2162cffe0714160d90311
SHA25659fc5cb89d95b09c45c6c031978e4e0b21ea9f893ba3d037daccc838933433dd
SHA512d5ce2e07895c7d4daa236d6ffe1839d5644c9ba103c9b4ac90f7e39b2ea8ad9e438bd1bd92d2ff7ea784ed8f30ae6cfc0e948ba6b84cbc730b197d7d636d4f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5bf58a45f5e9a778604d573b6b9d8277f
SHA1933e00de2309f3f2bcee5a33e387d4bf6beaf216
SHA256787ee8f8651fe296b6271c7ea69b3cb61d6bfe7f0cd2e16742e89efd928b2cb5
SHA512c342d7d446ed4bb101bdc5ae57079fc972e2550007c277e1543e847df76223faa656ba36834fcd8ec47726556e7ea2a3ced0b57c1894678be31ba55d551fb7ce
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b