Analysis
-
max time kernel
121s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
ec35383985ba21304942812b31e34d13_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec35383985ba21304942812b31e34d13_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ec35383985ba21304942812b31e34d13_JaffaCakes118.html
-
Size
2KB
-
MD5
ec35383985ba21304942812b31e34d13
-
SHA1
289cd579276758fdfee61b82009529b084e448f4
-
SHA256
2a9694d825621b807162a81459845ddd6750372ede8e931d92399296010486e1
-
SHA512
933ef5d06fb751c7b93a4e00f50e90dfd5782b32532f46e3f7e93c8a463e807397e0193efbc45383c296269def692f6a69ae5a19c70b45a4f60df37d78d7e4e5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffebb09deeb747419e902f1accea58f7000000000200000000001066000000010000200000006a5af6bb8c575dcb766d9cca5ea7dc7ba40472d143d54e2761f2abdb9431b329000000000e80000000020000200000006310b178fb1e82bb6526b178c0ac27d5c79eab090c405fe458221fe05a7420c7200000003b3a5731e0099d0795979c27858671eaf972de2c9602d0b36c01282d8fbe57a74000000049845b980ca39b770e355c85c1e9526bb86eeacadb4e73cf64a4a17d9a28d207fa01d1a7ae1a67b7d9764f86542829563b61a0cdd58b6e5e8235b1b824e9585e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10af04eb9d8bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14E4B6E1-F791-11EE-AC8A-E60682B688C9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418953168" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1728 2340 iexplore.exe 28 PID 2340 wrote to memory of 1728 2340 iexplore.exe 28 PID 2340 wrote to memory of 1728 2340 iexplore.exe 28 PID 2340 wrote to memory of 1728 2340 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ec35383985ba21304942812b31e34d13_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c87047fb6492492d4dd899549a6f040d
SHA11b5467036c03b34b2a247c16a9233048a7126308
SHA256cf1cde96de94f8b01bbdd7d822eec8fa2e514b6d19fcb5a14ca02c2468b25353
SHA5125c316efcc68da3ec4ad8f7f86a19466e40acddd504b0cfe489080a9af6d55ffb7f401ae72d476146583b8e154062c30b96b6393942efb69d69e2ed07d60de48e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba50c1daef0b558e8ce83a655012bd13
SHA1e2bd5e890db5237ba52f5e14bfd13dc12bfae085
SHA256eccc9a141ac9dbe728d6a0b4f6c38a082492ff37b7c46fb8c1a46ff43f1896c5
SHA51257cbdb27c4d994c34f55edce6ff4517b4b4535e15b4190ca96fc48e58cd0579ad9852c508d95d0ccafeec448cb20cb9d39c870117cc7d4b2574402887718d75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD555473fee5ca63b04bae719f72361b93b
SHA1f11f91cb1415d286c66e2136e9388d995015fc3b
SHA256df309c90f6b037988f23038e05f4084a0564b2225afb5bacf016cd2a30b4a0fa
SHA512b1a2f4f933e744d2b9440c5ad1e49dc33ebfbeca2764ab350a7c0a63cd59026b87dc0dc050734e13a14ff2b84ef43a7c6ba04b8d9291597181adc8f5beaa3018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f102792db6f6b66a19c617b52107393f
SHA13d22e1db815020ce7b11d6c3b72d9681028f3971
SHA2560fd3b9a26f9be214d2277c4cef608c1b91fb9b59ccedb32dccce406d85cf879f
SHA5120be1cf13083803ce1b464f80c96cd50829b47320f46f2751ab79fdf8eae82f3517ae9d48b16bf2c943e3c4061bfe290170174951be5f58af55af43d8010bf2c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57efb13172c6dedba5b9145adb1bc75ce
SHA1cabd77ffee9c4690c35c5b8fdbf795cf276621d4
SHA2561556c754bac7cab259a6f6414928702733563c8c90eba6c94bf7af4f8f7ffba7
SHA51230047546637fe2e4a585dbbeacb1d9dc7a68e537e03ac022753358e7f6fd7f8ecb6d4915e317fc058a6ec02c087d2f46f18ae453b0a2a28a594aecb0448a01f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e333d94ef5e0fce6c03a6cc23e4e12d8
SHA104640c44ea50616f3ecceb1aa41e2097269a00a7
SHA2566f830a88cafbe66ea689997418f8ba3a796cb1d7b216abcd0b7efaffd152d0e0
SHA512fe854677611e0af3154ed5cf719f09e6225ae1fbad3c5dc23fee76184241774ba25cc6df55172d40462f0ea4cdc3dad3e670e99fb8db6e21aa96dc162194b10b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59efd449127041c9cb78c73ed3a77d7e9
SHA1ef59e139ca14b5edb2a9b42e6393780228ad4b74
SHA256d4627beba3435e3c15c119ea2dbf0e34e4777d0a5cd25043e3dcb898c5d73fdf
SHA51281d1caab1b81528fa690962df49d46501f9390852948fdd69f993172dac477bd7ea516be3a2f45fb9d4961f6877267eecc15299ecc222d8207fc525cb72dbd12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58c8a9f818d1eb368700c98a28f89112d
SHA1a20e8a5ebe054cedfef8dbf6848fb3aa4285bd56
SHA25668f4bd1a867300be42865590816e6df42c207cca3339f48389721c6b33f5bd6d
SHA5122c7e174edfbe8ea95914cee5541a5e541f7659a352910e7c89f90a4510cc80c0658b7e5776f950a0f7fa2a231532cc94470bbc87c4fe0fc8681c2126e3ef25c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50df618a3d1f79a527ad324142685a422
SHA17b60527700fec48b1bd3a1223ce7e051b0c16bec
SHA25669eda04706f9be9047c998bff166afe86d23ff27471ead88e3df87cd6e429602
SHA51201d7efc4f9337450e4a81e75b52c6361056c05dc3e53fa703037e7ec23fde2e42346a6a03dee5583b5dc9b9305ee62c5b8570ba85dfe247ccc9299ea308816d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD530573190c44ac5e453f620d40cb4b383
SHA12b1cab8a8eb1740d7b39eb5ddc38ba468ba097e7
SHA256401bf39699fc85579c0ec80b9720a89be8e27efa1500a6c7b755d6335f6f56be
SHA5124c0ba5a87bce8e389ac14e251fcb143695472b6caefe0466b4634922e53b9b8a8e4d2cf086da31609aafb210b133d4b976e95502db39064a9f244854570b515d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55fe53d5166db016cc18248a81f097f66
SHA1a8c76df975f67da3702f95b4acb8ba45489db555
SHA25618423c90c5496a777b626d975c2207664200a51868fd5ab1fa07f548fa3d2fe3
SHA512ea2d8327a96f09ccd68560b6a85059a480183f5ecd01a3be0342c0ed341aa9372abe1fcfa1b0931121ea22361ff48087ff3c5253d0c050649c04c4a24a3b4e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD527d55b5842f6309fe2b4f2882426f87d
SHA18826bbabce8a277783da0caae5c82ac96a63f445
SHA25663cd5280f05eeb268b4441ce09f3ccb1946047cf86430216b7ee6d6b9f882117
SHA512cb4f665bcfc26c2a2629b7ca048a9ad23bed49c6ff303d9e80afa7238bccdf26839450d873a64e4edb48baf0f3356ce2132ed1e7be88863137296c6ace650db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57cfb1d25fd966f56a220c8c464a4a719
SHA1a6220e2a68053d72f0ec1d07d60247dabacbc4a5
SHA256f51fb14d5a9a0bb371c5bd868b5486de4d1aa565b1cee1a2069c0edd8cff0897
SHA51213fce5793ff73f3946d7411ff99d9594f655912a0ea47c96f646afb87c2df14494bc9ce60235c61a9784a22200cfd0d80ed49169f8f35bb8509af82e137daf27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5912622b03291a6b0225f198ac5690928
SHA19661123fd5f88bd381d3b2e4cedfc30836eedb9b
SHA256790e5c6e34e43732dd0a1e8ff5f5af95dd69ba0b25fc1281179d4034430bd298
SHA512b40eec81b04adb5182d43bc8791681b22f24b3fac843210c7e466c76c364a17ccd804755683a2fba6ddfcf1a042a37a9a95ce00c332660a617b64ee9c3c2c7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD579ae0aef6a967a1336ef7af67f0a0a97
SHA16bc06f275125c7f71c4c1b9bcdb31241738d6d76
SHA25645cff63f3f2a7ce6769c1870cd9364352f8b7b7db3665ce2b0ca91e0021b676e
SHA51272257fee16d4beb8f0120deb4ecb76d609577fddb21e2684af70e883d186de8eae1ac5c3ffd7124b8616fd0be62deb04b3c957618acdafffc0f5a0da604c1cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD509a5a767899c27165bee8200e75c50c0
SHA13ce9cd8c6e1106b57cb406789af6981f8e559a10
SHA256299ac527389f4f3a0cc74b18fc0a018021218276ef8bc149cf0fac518647460a
SHA5122fd01742e56c744d2a4a694392598c0978fad5a1491a05cdbbfc8b81c050b83df807848b75e17466ff525c87ba93e592c62f730ff13844e38e813361cbfe489c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a0a78bf6e64b17a69c28fef7a93c1cec
SHA1fbb61a1c9da621a172e794f5c1346a9818f08c4c
SHA256bd48747b532fe05379aacc4a1f5a0dce18f56aa3063c7e003083718802e2a61b
SHA5123fe6f7185afa96bd315558afd7d421a18e06faea3c6a280501d4101539c5acd6e1bac51c486ad5fa65f5463657564578f6bb2f8a13a511a2b2576b6e60238e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5912e57ba2de8ae9c5ffb6d3be58b148f
SHA1e3bf5a9ad5f38ff28ef9216c4c345ef3c408e519
SHA256157965a9eae76be5116c5e80d327e0c8505f96b3c8235d572e23ee0b61f7ede3
SHA512bbb49dfe0f616dc39cb16c3fecc01427818ab65c0f3576563f27fd3a8ac84722e6681fce16a18d1146d5df2ecd453a48cb4296b820895091fc8cd916e1e75e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5428b4a96bd7f7414cac364647b549a6a
SHA1c60fa7d7ba3eb903e2ecc8a51d5cba4ddec40f0b
SHA2567f6bafebbf7bef033f5bb810b6d2df4cfeb33696727c96de7ef81e69953237c5
SHA512a3c6fd0cae00cd74de99087fddf069eb21bec829c0ca4b271e086f507cecde0945bcd8ca0f438365cdb44de0219e7252220403836d4b5c6742de0f370a65e732
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a