Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
23cecb26a530fcc3737aa27f3ab5d2b1_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
23cecb26a530fcc3737aa27f3ab5d2b1_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
23cecb26a530fcc3737aa27f3ab5d2b1_JaffaCakes118.html
-
Size
1KB
-
MD5
23cecb26a530fcc3737aa27f3ab5d2b1
-
SHA1
632b9afa08065aea823bb53c4d7df5cbeebfe033
-
SHA256
85304288843457aecf0bb553331bbcdf42da59973ea933855a78adaa8906c7e1
-
SHA512
5083c73794361b8235d17b24f66cf047ba8df676da220cd77ac4128d8e2cf727d682384805aee7d954218183bccc3f2b503501adc97238b10645ca7a1c5bfc67
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58C383D1-EDD4-11EE-8A5C-CE787CD1CA6F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000fda341764fd2d97e04820eca8aad83d00f6b96602ae099cdb5849467a21e9314000000000e80000000020000200000000e930935a2fb6d74058eb7cc0914896b7b8109aacbfaa34e187fc9a236976c3a2000000012551226572a07e9fb2ae2636d7ab4ddd43d70c448771207e0ccb990a7eb0e0740000000cbeb4a9d37d578a9aa9c35985a7bfdf046374f38e19975e361ad481bc50bdb0ef2c0ee57cb84964b2532c99df5de8921e12551984175ff66bfe482d1ad89b9d5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417882545" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a032e32de181da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2036 2080 iexplore.exe 28 PID 2080 wrote to memory of 2036 2080 iexplore.exe 28 PID 2080 wrote to memory of 2036 2080 iexplore.exe 28 PID 2080 wrote to memory of 2036 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\23cecb26a530fcc3737aa27f3ab5d2b1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3b19c1793c6f582df5e944a4e9de862
SHA113ceb2184da4fb10c35864af48f5201928cc2cc9
SHA256e91c2e7a7db4200c94bdd3e53f9c7b8f8a5fc556136c24bf5237b01f34c4da66
SHA512b761d8d95cbdc1be664eb053c850ecb5091fb047c72c305379aca1be8b11d16445736b4ade6d3591398a38de8cd92de9755ecf9519ff19ea94a924d8f40dfd0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f642937e697543fb93143a953ee2d0db
SHA1fdad6296ac9066727a48e8a1f5bcc43f2a554e46
SHA2560f45490e510684d328c3082270e43e6223d8d71dd50484f502f5d17c8d2d3dc0
SHA51297cbcd14bea33be6fc540e891935e79756c0c3a267f6cb252db642216848f06ae0676d6ce9fe9d35f478064e66c6eb6e712f43ef3438cf22bb10ca706e4a0901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a591a3c0bcd5181c8439ee6ab8ef3a69
SHA14666d5fc3202afaa908271001dbace31e0872702
SHA2564f80462af524a783449fa5c20c951e2dbc594a5581f4c8e250a0e57471d9af01
SHA5125b652039baf2fa9f7547c808253e99aa6055e48d4a4bf8a9d11f476d799e0aa93c09a12949caca2ab88af57fd6456aa63a9ff1a24766d1639731b58d30c90774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5553e9de574ca36be9bfd30815ecacfd0
SHA15de24784a9faebd4586ab75006510be09199ae56
SHA25673b932f5acdf74132ea2992af69e056e9766a3ceb1517128a71c24fafc392e23
SHA5126e6b99e76bf9c92f8317ab076819fc03b36970fc871e9c9f3f6b12627b64820235192c0aa888cd03749c80fb20672d115f0efb0ec60242e6c98eba35c5e83342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cacac52b0560874a59d1cf72b68d78c
SHA1bad60021994099361d8f9d2195cc360ba8e840b1
SHA256ef0f9bb3e429c5c1bdf55e2197af8af653ceab1c9f3883c069a1c51b9ac3a377
SHA5129a8a3c5a8c4d0e9cb5c500fd482ab1438848affc22cf20b56ed161718727300ddfba4006640cc07160b4966a23166e69836fa8e0009557283a3e08e4f4366fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512cc67b15d5debc86637599335b1d125
SHA1d83f6ad7570b034a3ac3a378643a3e2aa696502d
SHA256daef33b7c869e54265f44a7a1883d28f15fb7dbda45d9ceb86f5fbcb9a284e51
SHA512ad30fdf610e51733c73c33998acefd659017f6df795de88983bda984c4a8ed2cc3886ad0ca6314969b825274e72ccac66671e0dbf8c4d5e20f943631f576db5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf8a5e07ca7bec4b6826fef2278b84f3
SHA19d59059077f744d905c55aa55d62087bfe2b06fb
SHA2560607bd36df723ce7d85023381da3c618f81b7e33ad19f6daa55947651c44a5d1
SHA512d7e5abd79ee88ed1b09d8510b503bc8aa4ea5e0a4c83c04bfc5a63acefe7914eee621fc6e441a414a27d0c98474876d4b2788fffe3e73dacf3b638d8802de187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0f39fbfa15f2fc999858e6f499a7015
SHA17d56077eeb90b77104ef457fab95d1ca6db3d957
SHA256941eeed8180681798083569a28029ed4325569ef00b13b32ca074868425c1f71
SHA51209bd61ac839a2f81d8e5a3d94a5ae50deb90739843e37c928052ec83b973b821e3cdbe830bcd348f9e075402af28ee0ab8a27f59cdc1afb5b2b2b22940fda532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5803e88d776048066123deada5da8863e
SHA1e9fda2e902c0102d9492bfa96cf7437724ed3cf0
SHA256f39aee11b608d4f4275976fc6d164f7872c2b7a77179c6e73a49acb9bc5232de
SHA512e830c0529d67a6fc1e728db1f0b3cb646225e56a996c63921d01de4398c7da6bfa0f18732b12400a4d57c8db490f8f57550f558a22c34959ed7f0e8b80962933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c9c0f93151d720236fabbe6de7094a3
SHA1d50d25da079ad5af30b41e62971dce9edbdd4168
SHA2560f21d3577e40fcdb53b4b75b50d0481279af6d3654d8eecba08c08e8d1a735f5
SHA51213f36bfc97ed9ae35016e759c475445be7c99542af2f8062f41b119f4605d166a0d9f620f5578b08e3374f30103c5b68d2beb467410cf520c1c0cebd798ba9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf5b0f001bfd4a31dd41d033d14e651a
SHA137d852b2b8c00c3355fe6e8e6caf3fde99b20aba
SHA25663164251dbab8d7cbdf23e83cac3657ee4f88706fbe669e9212ae84a175715a6
SHA51269892230ddf1ab5a23f1230946b8ce73333d7b7ed93da1a560790929cb1c619c0a37493e039230e4d98026eab345f1577e29a0162db37f543aacc6c635d353dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524350c7e8fe7a3232f2dc9ba304de4d0
SHA181d9a96a362c37de8b69a9a8bcfc96bee36bf0fa
SHA25604d7029931980e066349e1d71d067911596ca0f3f44f3081d12ed4e6a0c76c9c
SHA512f50fe0b5cacf0a7130d8ffd174ed8043bea0fb5e25890b79da47ef24f201b5c8c4827a26209d88c8fd83dfb405c3a7f6c12067448949ee94215e777fa93da08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a36d5c7ee77e769b512cb16bae2198b
SHA1bd40e3256c544f22fbe6f1cdf086540acdfa941b
SHA2567351bede9e9bebaeb642f35b799649f679bd4e46c987e8c3ab256823fa861468
SHA51241c0fcf975eb9c8aa88856eee374873bab31ad25752adaf9b0a22482ac3ee3d04872876800a5ec74d33c88e145fb475955162ed3d5e65b2d572d821e373a5bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a74fb5d866664bdfd0fe9c9f29f663bf
SHA1ad5059b632664b5846f40dbc0aca3a1e901dc124
SHA25698944cdfae725b2464438f2d07fdeb75915182679e5d13cd9967878f0806e12a
SHA512d53281e0ee44e0eabc8d889644af13610bfdc50f41b3556dd774f7bc49d727f0e9bf7812339e49a6dea00f9a3710f34187d8f54a9da61cefed4a7fe34bd90ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7ad2ccc5c3f1f396a90205211475d07
SHA1a41d74c0155a2ad6509a0cc7a155b419cf30615b
SHA256e4a7a781d69c64e1e79d924bd3b53da40b0f668e2229438ca8aab552bcd093e5
SHA512bcf8ad7722fe6f9473af8550b2023e990ee324587264c7c6e117750a12b41eb79b0aa3bec0f2735608b0dd2768de923261e059703a344baa98d1a04d27f24cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4d61ec17e76e492ff0e10eaf4cc95c6
SHA187059a784a3bf4583919c6c2166eb76a39ff7931
SHA2562f433de25295d65f81fb6c7119c226677cca7415bcd3e579f20664658ba16255
SHA5122058b8769e95f70e2dd873ce51d0a99776c8f16b96892646acd45939d94ac4731939c88417d4496b307a0093dacf0664af4c5859417b9a89925daf26e2cdbfcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56484f2d83a866429e5fa39799a740094
SHA1afd23c013bba8453f5081d304d95a92b30e7e2eb
SHA256d5c59eb951f212ab5490b74fbe87b7b3bff136eedb4dcbb59063ac7f5fb1a39e
SHA51285f12fc0b4c832d49a916a56c3658923f2d21264c817c20a28b30d7af41761f22aa3c573ee435ac3743b5c63a8493e2174614f0bbb7ba0975f71faec27c56f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8db4a04f2ab2223605d006d9b292d1d
SHA108ad8eeddf800b456d5a99cda1cb23ce1e27a183
SHA256ba3f052f4db6e257c52f99ba794b8ac4bb435d6475ff009b772a737469731868
SHA5128d27874a9e9aae5739f438b7d307f3ace299f4118f1a51b8e615ea148614e1b18ab9edb6c84fe0b45042c99e3493a7650b6eea6158de06dceed8d29fd628dec7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a