Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 22:20
Static task
static1
Behavioral task
behavioral1
Sample
e88e104ac5fa2e10bf200a8189ccbe60_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e88e104ac5fa2e10bf200a8189ccbe60_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e88e104ac5fa2e10bf200a8189ccbe60_JaffaCakes118.html
-
Size
1KB
-
MD5
e88e104ac5fa2e10bf200a8189ccbe60
-
SHA1
7850edfb1abe633b84d64a47820f9054d3f0e769
-
SHA256
cabc193129e71659b1ecdc9a31e36b7c614935fdbc13047c6873660b5ea12bdd
-
SHA512
e7616d91408ae966e567748989e4a51468690553e51a340f08b49ffdbcd8802039fe9cbc538e4adaab60c77066a0525e573282086138b72d9a66390cec3f62b4
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{39A395B1-F5F6-11EE-B7A6-525094B41941} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000db055a96c0d49b376197accf3a0c5cbab3bec816ca8a0d705e124d5bbcef04a5000000000e80000000020000200000007f9a7862aca0e760e0f4360af4c9174e0231d678de61ddd9436815023c333e1a2000000022c2d0f6429e1629feb837beae9507d6155e01de5ae73650205fee2e95dc154e40000000297f4caabc788aa06425ef28d692eb23b10a6c659f5625542178c0fd7b8a8f1cc72be71c96095feeebf5a92ec622e6b044ca5e28858ac241ecdcbef915a7c388 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5095250e038ada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418776705" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1244 iexplore.exe 1244 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2228 1244 iexplore.exe 28 PID 1244 wrote to memory of 2228 1244 iexplore.exe 28 PID 1244 wrote to memory of 2228 1244 iexplore.exe 28 PID 1244 wrote to memory of 2228 1244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e88e104ac5fa2e10bf200a8189ccbe60_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec76a22894e977cb3db3f9592c218041
SHA1883ac29ce640d6a751d520c11287a690573b0c76
SHA256c49c874ee85407f622239669cf3363670de84c73becdbccefeb2e1784a39e818
SHA512630db4b789c5980f7809662f3b72a78f65e5610ee652294d8d146d30eeeae744c490c497cfa2227aaab5e058ffb0503ffa46bf64114c70c4d245d41fbe46e824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fa413a930853b76aacda7e3dc0be7d7
SHA198b8c4d017a7d46430cac8998b9f13d447e28d51
SHA256422405254eb9ac94080ba4bba64566970eb487b59d25363f2ce4a91f55bbda06
SHA51239aa8726fa4e29d2f1cfd4a3e96892f61271e99fb761711f3e58b3895807e3509ee91e89b45599f6817b55b8d5da5b15e78567d351a4d53096b8618798355053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569213b0c9e369d2c02206faeb2f8dd65
SHA1b426d52055ddbbac06f9377cc89481ad164b770b
SHA25689f50e6edb5d403a2949e51be90376ef0a73c2caacf9a2b99d9a944cf42ed15c
SHA5124a2e4ebf9952856ad9a2dfa41324bcfc18bfa7433e1af079425b81b66a3a6efa9068d272b58d5732f30f6ab27b88fc0c2226dbbc3e2adfb94e41f7c26a1b97ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecb23c185db9b72818408107a01f43e3
SHA12fbe1a71ec8358f3877df3c92d7aec3590a50413
SHA25655f83ffa1011507f828fbb3ef381dba693a46c8f678c6c4f26f415d74f3fd6ba
SHA5120311891e1a429eb28dc15b967a29ba71f1fa289b97dde1c43a45b4d4d8756d45b3b9b4b236db6221b51c4985209f1d8c07dfe015cc0e11c1f232b04f56477dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e731220cc3c942e0e35d2397e8877547
SHA160f8a12ceb7f56983eb4772b26ee949486ee14ed
SHA256845dae9304fb932b6be4f65c79e387d0a986f71f39a8cdb9cb87cf1cb848f43e
SHA512a5249776b5852e72a32b77df1a6ce58c0aa99590da601d71419ed78ee9fd397121b94ebe44c5c352b85e421f540a9b8b3589b18b7e69b3631ab568f2f7ee637b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c2adba7e12542db65351f491abfcb4c
SHA1fc6163694e7a9c4f63734d5fff090c422d2ff99b
SHA256f001e3811cfcb122519e5c626f6f2a067e5aac32c2993b7e69d5f4a022a557ec
SHA512b71341dca72985418dc68cfccbfdf83014d2267d52323b3601327bf8ec08ed9ec33c9ec0c0f4ea61c36d0191eba4d0c27ac5ab94699f5f7de43c7fd43eecf874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58491b4d54511a4446ce115405ac34a79
SHA10613bd0ef0a560ece03c0b7a9169420b066d9773
SHA256d75734de3723840c3d41a794864684469989dedd1852b5dc879be4a6a54a6a61
SHA512ff99126e274e673eb862092db88ae097ca539cdf84bf9fd5f16e87de11a3c91d8672f1f9db64d41634c98155fd6c6ad7670eb11cc371338ae680631819a64ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503a933e70c71d4d37efc1cab3589652e
SHA1b19344064d1e57782803d55deb988fb017b1bc86
SHA256b1ecdbf8a820837a7bc7ffa6f410acdf99981a0c3339b323d1c03024bc606f50
SHA512a2371432e1e9f2d803515604957c4425622ff11bd85b0b20b81600550ae079b97db2b402a6f3dba4303ab77abe98047da67a57a5d6404ea51e9077c8d18f4767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583bc63b3fbbce5354576761e6abd2ff6
SHA1720eea07599a8f0e186d1ffcaba41244e0fcb0c7
SHA2565b82f2e4d2bfe1125e48587699c7065b38e9f93cd8471ffbcce3ff465ed4fb26
SHA512fc511c51e44521efaa96e4bea1504a8b705731e65e2015c4b2c4291f379f29f01974ea8b30310b2151bc2784fec3435e8584b1b112dfb175c9bdf8f1f248ae88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef064b999c36758410319afd767aeded
SHA1739cd3c5380b62f853649040c86e7fdb885930d0
SHA256aa6a14cfc8add1329394630f125eddb0975e89614053167457e37dcd02aa5d20
SHA512fbb457b6ba973fe6ebdfe0751f0effcbc128063c38259ccd2cdfa3f5536f194e2e3fb645050ceac96f83e1291df00eac5b8d0aa3f2843804e9b701189c89695f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4a1e23806b3aaf1dff1d0cc8ade5c2e
SHA190a0d35077a0129c6c859fc0a169461574c6309e
SHA256e7be6355c6645f638fb41f144f4594f47fdfbedc450f48e0e9e9da4ee8aaa6fe
SHA51200aa0d15378715699c3136c59c62a34ec1ea1ded2b731ed33e8bdab8206236c578263f7b3eac50003021c64b7a9b065434c7faca2705a5de84553fc7c4666d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dc065e3ee1892b71430c056a47b91de
SHA1ddd70e284f737154a1ced36f090c5a34feff6da5
SHA2567f2a269c48af8937951da270e86a7cb5c52f4fe3885027c2b76b070752d61387
SHA512bac3102046a10bc8a7c9a16bcba16fc31dd4fe93dd8fabb16a95ec51e948f63035b4a30abff9a2a80ca2d5e43f11c7fb873366ba07b17f49abc24868ff20e716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a03a69218524ccf286158af7de6df6cb
SHA1068c2e6fafeeb50884c91959921a5369536a6410
SHA2562d67ec171a871ab7344aa521d7d9a3b33360aed586d43766f39619576ac59b71
SHA512d9ef0f032439b3231efa02b984dbe1015d847d03b6610365d5c832d5405e0445864b410da99ba69c6faf8c120dca567b0e2cb64d93d00d662852ac452ee0a08f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b2d5b6a51c21bd7376dbb1f8bd72f10
SHA1bdc3873699db89afc5d1797f5fc2ddc777e06a4a
SHA256e3808b55a8aa2e40cb4cdb98348d2574b82a3fd08bfda4349ad0d5e8297d422f
SHA51294b0c66b2629be91fcdd860ef5ca5715b453951c42ccbe808628b1eed5b56311851e031a164fa4440a1b359c9463c57355f2a0042274630721b03d2e86e78b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ee34058edca9f56c25b98aef1ccd637
SHA14b89a0dffc1a95d10c494e9d45294840639362ed
SHA25674e3c7fc0b89513259f795fe473d37d76dae19c1e806844684655124be9185e0
SHA5125cd370dc07899044806204794426af95c971073fed684335700f1d50dfb0a4b3433fcdbf07b67391e641887956c6c1d5fd32b464f643e17d9a54649c64aa0417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5435f07db2489b2c60688664fd6f89066
SHA1553bd4d0fce4ab7f30050767343e83bd3dc00918
SHA2566bd661c26dec9b27e437e357ab1323ad88a4cb6347f65a60109fbd036ecc14b6
SHA512feea31c256d9c027588fbdc7f092094a13b1131bd92400a1c1fe4d6449f02722b827d56a1765fcc118abf66a2b10f8ac0008cfeb84aba9509b375873f82e0282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ed71a8418e9d9b57aa76db01c363356
SHA1ff6859e464d0634101a71854f3e5ff1a3faeb795
SHA25678790df163e9078f2085bdf367d8119094cdb9e2124982b21434de2bb202f3b3
SHA512218a5a5bf184c8b1a49bb71e9722be19a13cd0772a049a192ef3e39ada25d86fd959ad84f54ad1e8923cb52c87238330a4dfe4c8b1538d15d3ca9c292c8a4321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6451d3637e663563d46242970ddc7f1
SHA131341bc8469d1e4eeb01396d4692420444dcec9e
SHA256b25940b2c3a732a477b2e64f698cb50b5c599cea7e610961cf3b4bd35ad3cb2f
SHA512934b8992f64cf2a937d6b60791931ea4608ac97f1777ebbab352f47403a0f5e8760f14a411db801b6e3ae9701494aaefe8633a8fc3569b68477d23944aee2aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55418365dcd1bcf75026432d2e1f94350
SHA1f1ed89ae94b1a7eb6ac73ba0638aa2be0b9668c4
SHA2563b49182e08a9b4bff0b8d59c8a489632dfe68a8548fd269033aeff6ed8332df2
SHA512dd20efd8b2736ee210c052b8e57688c0cbf72a6a2f0475689e83be93c3a4662c9c3829c1a953be4070aba4ebcc6a24ae7821b8b7fa205528b40fbffe00a2c321
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a