Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 21:41
Static task
static1
Behavioral task
behavioral1
Sample
f462b44ba22739b2505dc2338a3a08e2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f462b44ba22739b2505dc2338a3a08e2_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f462b44ba22739b2505dc2338a3a08e2_JaffaCakes118.html
-
Size
7KB
-
MD5
f462b44ba22739b2505dc2338a3a08e2
-
SHA1
1560806c9b23e424bac375833bf8dcf7baf07ce4
-
SHA256
1f18775e66c0d5c972fc916f7bbb1d290ca031d80762082ce4761170b8e4cf59
-
SHA512
063b73f57a3ac3857f7fa738f98dc93fd690c3379ecdadc4066c0e73cda7f99cd9dc4cf9f222b1aac0cb69c12fa6adbb83611c5622a646e5fd103a7a6beb57b5
-
SSDEEP
96:SFrLVuWyNy0XtG8hOtCDiBqWQ+xMfy5GQ+xMfy51Q+xMfy5mQ+xMfy5+vrun:SFrL0PWCrd++y5N++y5u++y5t++y5fn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0AB346C1-FC3A-11EE-A40F-5A791E92BC44} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000dfed653f26f93754b56d5235a93ce8826aa6e1d09a6d22d34071faf895f083d4000000000e8000000002000020000000bc1e6143fa9d3a524210997686fdac02f176921830a275e4c187449032eedcc72000000026220faf464c86185a2f92a0585edc7217d1785250bec38fb92ffed071bee3ae400000002873ed9040e37eb7fb5a11d962995b87d3918f71b9e73c8d2fa56b2da37926c976c23b172df2bea0f5b35cf6863eb854c60e8c3589a94ab4604fd10d051c0d83 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 607270cd4690da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419465539" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28 PID 2992 wrote to memory of 2476 2992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f462b44ba22739b2505dc2338a3a08e2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5105561f718bbeb876a1aec0661b333c5
SHA1045276ecf08ba54073b5b0f36ac0db521d5cc5d4
SHA256fefab9d666f5a6fb7f490213f03edde71a8e0889149bc38124a4fb477c614570
SHA512a64c0c899c73312bfed421e49645bd57200cde98f6ba3e3bbe70cdf70d7693c493854bc3e27300d120d3351fd4179b7475efe11d0e7d5b2c2f7030c749e30492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5537f451bf68478650764b6d4eb471541
SHA1af66bb5de5a4f4046c3250f2ad7a91f8bb84850a
SHA2565bedaaa20a8f47a507daf91a9683da91d6ead7ed62de5b01556b65b1409b6599
SHA51220b922939df0c04c0b407a755fe5500776fb463b2cfa2da6787e1a961a3e473f754a3791c5dae3dd4d022642b9781446eba9248786b60fb69d52effcd746d8f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520329b6f84902b8c30f170d5efaf17f7
SHA193e02e57da497d06a1ccedd8935ffe5c3bdfc4a9
SHA25633f0f71a4aa75093947373833001537b1daaea058b1c4f07626915c3423808be
SHA5129987341d7c1ddea0b606a8a45222317be82924da31fecac6cdb4e21d464951b3a158912ca16b93c4c4e8f8055c5f274fba79f1cb99337fad57715565299321c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef5fe89285d6b76f36efd8c87cc5d51a
SHA1bba852c5f3d7f8454deb24ee82af1c7c5dd969ee
SHA2560ef6c48ff94df5a7ccb29eb37e3d541bd876cebcb111fbc82cd3fba7bf9ed1e2
SHA512599bffb9eb7e4a4705fcd27182bfd48ebd142d960f503ca168542fb51aa6cf9242658135fdd4304b79b6e746b6d4f9e41ba35f3447fb9186bcb0c74eb1da098d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b77b2d6471a86158a56aed6e8400925
SHA1c7aaf5c9d769ed7a0f75e02f7a3241c04519d481
SHA256c184ef108ccd2d2de98896025eddaf29c4cf5b37e10864eb9ab4cf57b41ce1d7
SHA512b8319ea03565dfb0ad101f31c69cd0c23ed34c4d4ee70ac82fb21185d90049352f9f636b3eba92d2194d8be13d062ad70c01818494d36dda0f311cd8c771cb86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524df8260cc55ffa96a6052cf1bc0df53
SHA192e34b6891f7f2d30229fa5c1d3912e0b9eb2348
SHA256c3fd53b2c82b8027ede3ec363abe93c0f729622be0fe7068ab416aaf7e324066
SHA51203157826e15c30ecb91f1d2e89a0468b88ca50814640a3c0727ab040b62cf5c8be8b09e5144c5054314b6ea10e4acd7e9d913df290e236be8843d70ac7f84871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b160d38df0accf419e8b7fea969c6c64
SHA16fb94c768780fa70f66e62d9402706d399b36412
SHA2561fe6c88f3f1f16182bc6aa50d9ac5e22532f761289106034d0f30ea0182055b8
SHA512ecf1e632bab88d6d66859e8790f4a618295f41b37fd3c4c0102d16e1822053b699ff00e7a96115674931373b3c0a782436aab222a9ca81adce767f1c7e94afeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f7d89d587e3da195f86990a432d481e
SHA1cca4d5a9bd0cbd20d37bccaa453088933e5627aa
SHA2564e532ec5d35969dd7d451571201fc5b799a2cce90da68c6800c295b093d01700
SHA5126e6b127a8b2ca629330db737307fe916f701476bf1a59fca8578a3cf2d1d91058a2fd41876b8ac1518523698741cc6b0b0b256e96aa3c31c0806249729dacc99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c02b1231d3bd1e7e0efe0e37bf02e6a8
SHA1804db9a8c52a9e3686b9cf8e0530ab360d4b7438
SHA256697482410ae22fb1136182c5c229a5678d5a132158ee615891d33029cdfe7e73
SHA5128aa51f58fa80c15225c704313b275288d8cfb18729ee1c6e6f497390b72d97d53f6948b6cfb1f26a8ea6ca9d7f29f074ad493b924cd5b2fd2c08a688437e75e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9da45b90ef158193766b0550163db34
SHA13a52356cf1f0bd25e75b79e12cf86db3959ec003
SHA2560793492e5d0acac841cce7c5836b369b4a6a4362523ac77734441edd1db828ba
SHA512886665b2ec15f9bdd264a27f0157508c9eb3bc41ec3024d971e017b5b408ab785b7e91320f0f2d672f749b5ae8f73583c10958e77f3eee4f13677fefbfbddd16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0324490b81dfc80010c43ab91600d0e
SHA123fdd705bf35c3703f7af80cd4c7470ab5b036bd
SHA25642769fd83007c37f794bdd2c21f009dad421358873f795ed820309d160604609
SHA512c50d83a078b301df46647bb9f17c2e59864e151cb5fbf8f286303259dc0d24b4fde9284afa836af8ac212714c53d799490f9ee25b2581d7b8bbd1717e16ea4ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542370b3cddafe5023de0c2396f067bc4
SHA194d09ce248f1d10abff1fe3c0848bdae5dd1893a
SHA256add2881ec54f01e2c066c6349c5a45cfe7a5026b4370ca8edcece865c99929c2
SHA512783ad2ea095a1c4d51b738ed6a7e7b0e088886a5b717881ddc3b5ff40deb00fb46972b49de84f77c7cb0579ed7f1f5145b8387341b9ccc65603bf8706f5a2d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c578a79af2f5ca1cf1668579e5b7c61
SHA10187a630c2f1e3932302cfc110b7e9c6fed9c82e
SHA2560072c93d9b81d7edc10979d1c9417c990c4a2f0f5411eb6bcb66c1bea2311e33
SHA512a5f3d8fe6c26f726ebc419511e33b2d4d16779ec8f8796b9a4dd8c2feed007349ff4f5b851c36c3dcca1cff252989b910ce79231c56c7801f5b5047233b7ad54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5b5ee12c11b75cd4f3d261e5393c348
SHA119d320df0ed1f0c640d911379a8344e56161e34d
SHA2568cff7543d6bccdf77f97dc2194743e92848a84c22fc88bd6caf5bf5462285a43
SHA512312d8bed6b13f0063e80548347cc5d1535201b20eca101259103c7828ed9be915c08ba75985b1124dbec405fbc3195bac94414323502f91a117ded258bafdbc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593572ec727b16f5f2a992a4d324f9eba
SHA1d6677f98599ef5a01bc00aa1a1bfe86e896fbc0b
SHA256e9c3b9d4470d61eecc678c3b3e5398e6638d8ceaa367bf65b9949f88e7750b8b
SHA512fe08dd4fa677b22787d43d12fa0d0d8f8663cb00ebc03dae6109eb815b33fd35774887f0c3290ad6b4b629c4b93f11e1b0a98c8518478e8812094735b681c1d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f7b1818c7460cca5d8d3d42da7650bd
SHA1e4eb949e70e8acf3608f0be7d2487896e0aa95a2
SHA25684dc553330de863e0f38d3f745a9b2a5eda1eaa296c665a05ab207d8eaf8104d
SHA512ce816a858508317952298ef97aeca88abf1ff030cc5fc574355ba887871184760a876d0d85c9ab8d60dd20fa3261073d6b2052f8bf98b45e39b4ffac20978987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8411bb8d9118ac3cb3c9c72e80b6720
SHA11d2fd522b044d519a555fd574e6d01518f796803
SHA2560c415cbf7239ad5615d962aafabfe9f9ce98156d6519f31aeb977455df36e524
SHA512ca2be810c3e6fce786b78255318d8cffc432294f0df0922060d97470e7270b915b1d174509533bc49d49e1af2f463fc70a5e4d256a8541913590b9b504cfbdc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d903d1b231b2901b664cbf1019f78c7
SHA11b473d723e4302a4313a307a5b9184602c64e7c9
SHA2566c10f9fac702e60d22740ce9829ccebeb2fa7a5ec4e55366a4ff3dcbb2a95c45
SHA5129127abd9ce30bf504a16f168c2e9385d72b7f3282bde8ae86452aba050605056a3d3545081130e3d0ea2006fe280ccccfb44e276f9cf1c29c71a1ebdb3e94425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ab99283b2c880fa4e1756b29075ef05
SHA19c90ea8a7c2f25baf1cb83907d745ff4d9e9cd0a
SHA2568c427b0aa3c97a924f2f6dc53c5a38d54c4311180d5d8da3deb36c101ae974de
SHA512def1d647426074e8d86eeac1c14fccb5657f13b3fca08c8e13a8206a338b6fb09c0441958c98f1b8007c6a14f28b6ab9dd4d77b409ba73fe19067e1696775185
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a