Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
d23646dbd0c315abe0f2dd4261d08c64_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d23646dbd0c315abe0f2dd4261d08c64_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
d23646dbd0c315abe0f2dd4261d08c64_JaffaCakes118.html
-
Size
2KB
-
MD5
d23646dbd0c315abe0f2dd4261d08c64
-
SHA1
bfd9bfc56c5a5c783a0bbc4cb65727c9e042f02d
-
SHA256
c3150c6ffd43ebfe488654ec93cd1a0d281e616fe9925ee6f8688cc34fb8c642
-
SHA512
d04375bfcdb3f18fcc4433630b8ff6918035b946898a29219d53d8b1a344eb1be126932857d66b35853a705aad5dc15f7d07945e8b3cd7318ff4beaefe9633ac
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000ab21d7df364ca14ba432197f16316100693701a1b06486b2bff925718850a81c000000000e800000000200002000000048eb9e19e904bc2b17905b12e3d59c868b36a136877bfbd250a0626df9376671200000006a472db09a2b8fbb0ce9536edb4ef683a4306bfc2ed0e00180a5a715897ae9b1400000008cdfd2d16cb77d86604d603315b1713c23b5d78942b17d8250fea096406042a60c67f3603c553831799c5086d1d66ba121ba779d5b67f928c66e663b50ffe6a7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0ac79834a87da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418477538" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC3BB9B1-F33D-11EE-B937-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2976 1720 iexplore.exe 28 PID 1720 wrote to memory of 2976 1720 iexplore.exe 28 PID 1720 wrote to memory of 2976 1720 iexplore.exe 28 PID 1720 wrote to memory of 2976 1720 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d23646dbd0c315abe0f2dd4261d08c64_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a6ee1fe2f6cca0b6939cdf8f4d7cd6b
SHA1bc95a64319f3f13cc3a1da8a23823bc17f037c0c
SHA2563814291bbb5a24f0455e227deea3291b8d80090094a6326bb2cd65d7622afdaf
SHA512d23d23608b7d3fe4fbd3bcba30b0d729985aa1db4d4284716d5281ebbb64e6b2ae9b5d5535e0964beb891d84156f55bcadbf3526a9ed2b22e7fc2af570ca3bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598d8d144a3f35235e929f637528cc961
SHA10f644ea0652298cfb6817adb4bedccd7fbcca309
SHA2566c47bff7384352e88b7aebce7d1ccd9d654b0e9e322f4c1e393a5a1990c73d2e
SHA51238f31dfe7ec3d38d48eeaae97531eca5b92f9a6e499937c07f14b3b9edd917c87312353e383859423e0c26d7745228cccb4a61ed2d4bd4a7ae1fa8f814be76a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a16af009c920e8d5deecae4f500eb05
SHA1753cad40fd25614a519b10b5476399d693364a9e
SHA2564e71ca673109136ce3ab9ca3d225bc56c39ff9b97bea781c429fa6e84e38d491
SHA512157d544f96516a957ed69da0511adda07140fa288298e122fe2ac514d12a29c453eba8612221dfddcc5baa823ff324dccaec7c35d70011f9ae9b14168fe63150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5842821ade38fa14d3d4c0c7df8073df3
SHA1c18f54b4d12bac7e90836951255d98ad98a7c44c
SHA2561a12816a1ee9114169d9bbdea87fb64b1094ebcd119e277f8c08e4af4e55f970
SHA5123b04ec33919b11d48001dc30547742d3404b48f094fb8c89af0d3f37505163021b8fdce96e51ef01239e5f57c10a0887b489e113c49fc63e6f6b1e000e40e336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0e79cafa3980fab8a04bb5dc1083ca4
SHA19d2ae834c473c67707ed116fc435c4cb01cbc786
SHA2561ca360d3f0b5d1b769700ca390f33fceb6bb91f6f32ad1ca3c9b008a2f8cc4aa
SHA512718ad813be820d262539aaf8002403c6df3737c186c51ccf9beea976fb8c1b361e4f36a787546d53e7e23e9caf5a0f89b0895459689a286712453b68b18ef4a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f1bbeaf35221d000fcb938bd8040e49
SHA1224ed9652fa9fa200083a774977ebdf7ccf4e596
SHA2567e8eccdd4efdaef4c2ff63431feb65ec51628c1ca5f39b57a4c8c179735bde08
SHA51249d2bc77371295429bdb722974831fe41edc78963b04438a377c7f94865d49fe06a5ba7f0dad4cba1d0ae88ef0490fdc52337816a01eb3280d307f534c6874f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58329b95615663de26e14fcb2e4f9ecb8
SHA1945d2ce2adb9674bb2ac0ca4cc6cb8f1bdde4ef4
SHA25642cef409a93789cdbf7ff85169974dbd38a2a7a5df550f90be2af476d9bec6b0
SHA512284795c6691f94a750d400a0855df7a5901e7ea51d6a5f814debca935b88d33e7cc85804a8760db4bbb9a30709d9ab79efc064cffdc61a48c9259452c6c8b4d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bece7c71fcfc11468f4faf9d3a32284
SHA1cd4f8e4f4054ea08aee70f8e4db6af218c033a59
SHA256f9ec7601718d03b98358b56ed96a0fd86e9f7cc6b9fcd179b45265d3b1ad2103
SHA5129176600fd89dba26cbfa312619fada7c8b6e17af48c439061d974c1c21ed8a742ad3b8bbcc84a71ce8699d582c8b72a733236ea5c32eb99b6e1ba38691f9dea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f71f6f2ea18ad54b1cd727e20d095c8
SHA1a94049774765ac0909527fd2f443a8ef9d4451fd
SHA256e36eba3a82a68eac3824493c049e47a72ca37106c59f9c0f2e893e064f8ba215
SHA5128b104c4fe2f9aa41afc335c1627cf4dd51a3f77e7d1fb301cb02f9a991874a769fa4960b23f0abf1c8ed3de312f49e32a9fd7a2ccfc1f3ff2b5dba3a8310c65e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e07cf87de794e8f802a35d6742a6367
SHA11ff56fddb069beef804d15a9a74088a6b34a221a
SHA2561323006f6d52d49f35c1943455772e036ab17567d3832d8db92189f695b202be
SHA512a600714d0751d623a2676ea55040e37d0ffede59954f8f48a843033e5ef999fd4f1550d69d5287fc5d32cd791f9657200aef566d54fe896883ac9dc6b3ae40d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2f8b8a93ea46ecaa9901bb33e4e24f6
SHA1a27af9b31386158ffdce6e3d2c828c53416e1f7a
SHA2565d0e4dd25ddb8ce72c1788d45423198ef5e87427f1a228a5eec0b9996c545dd5
SHA512bbf067a76b6c4ee5b44622b90bed3678b26946856bc1fb49832c179d59f0f703777383253243541937a2ddb54c40e67558f66ac9457fb22a0c66dfa1db2ccb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b2be84d1878dac55a9ed283e65435f6
SHA16c714ca16c1f3ca22050b66950ae1ffbed70f1ed
SHA256107b3b1173b1ad8046ee00116bd8edb85c8b51cec42651c8c53037cf6d64da0a
SHA5121d3824251d706324110d94415df26b69d1ff921008ecccc6b32384a8195a0994c3d460174cabaed7b002bba60b362385b4cc2442384e3e4cbfff1d315a4f62ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2a3cc1cbde2a95fc432f06ea563780c
SHA1d8810abeb0575e2f40d92bd4fae2e649d2e7c2ad
SHA256a00d134ac3d71e9637545a5e7408bf9a90a3fd9fd20d57cf2a057f4f8484b9d3
SHA512a61e44bbe6ac39c2d15d8ab1ca573024fa24d60e9089ad99fbc5fb14fa14cdd2041190395ae798ddf5b7341bd1a041c6bb2778250b046ead794a58a768b76c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599550acab37173c2823cbd4ead5a78b6
SHA14498df43276a9265656f145cd23497fa76008f8f
SHA256396b6cc35cc4e49f6bf75f6ff5a570394ed1980ee6ffb6d1a09ac058abadd349
SHA512df2abe80a1ecea08307a97ddd9d907e032055721b89c4206e627d7e998239d87f92c2c62163999c7e82e6caa2f250e67e3b9f8e1c919fbdfc7e4d0e42a6a2caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2a11b3c10bd75c6207542191c752425
SHA14cb2dd602fef42a05a330d0e73c3e7c6702a3077
SHA256e0835c5e004854eb242a00cccfeb6d6e6a4834af8c431e89d983dfde636659f2
SHA512f290d4c0f5394358576b91794cdc785ce0bcf03a397219bf25052dcd77acb1fcdfab86d576ea1949f8d216e88d4cd57245f3cf456c902121122145180f567ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5514734673ac20126e3b77ce9e130c4ce
SHA1f3e4f7005b88accb74c371c7c62a7436e3efe700
SHA25694e567e651e51c3193241c81cd0082493020e251df6a53e24de607f08f0d7a89
SHA5124f7e52fb818f7ff8a64cd6237419d8350a98b0aa05326e85c46f6231ff5c12ee8306f061e61bc9225e99cbbfd62d6ed560157992486461bbd70dec83c58580e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed64ced6b956482792448ba00b1e085e
SHA18b246ec1470fefa3f53dcc126fadf44a0b646cb7
SHA256144449b95a1ad459d22462c98f67d70a090ee43ad089b062ba25bf7a72831df7
SHA512d2b1c76cee3506b6a392f788380663eab17776dbb4f37575c3a14eb1aa4c171eef18200f558719e81e6e821723646b14c8f2e281f227a082a3002796f5e1999f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a395e3c59eaeaebec2616dc5ccdca7fe
SHA17a8c2f1bff45f3885bec19332bd82ef3f773bd4a
SHA25601228755748e339e2862edc411694c51e4381082159b7668ee28d789e99d0ab1
SHA512217c6e8ccad87cc7a3d3d725306de1ea020463029ab56d550064c2263ef7f51d06305365259955799567b99e8e8f13c97364258385371a8d656d77038c2f5bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581477c85e43bd04ff44dcd1cce1e15bf
SHA14899debd133509bd828326aae004a7d00630aded
SHA256ccc789d6b784fa0d2b6708b7de4d186a61abaa5c96d23c92229bda0f0c5ec4ff
SHA51287aab977d237a48a8ff95f7dc94ef6c92298b9c860088602a5a8e44c54c6a07399a221c2129c5f81b878e0da9313d28327b8ae913821b2a65732b33180dd9fbc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a