Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 21:53
Static task
static1
Behavioral task
behavioral1
Sample
f46868001447368b626dde0c3e64a75e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f46868001447368b626dde0c3e64a75e_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f46868001447368b626dde0c3e64a75e_JaffaCakes118.html
-
Size
1KB
-
MD5
f46868001447368b626dde0c3e64a75e
-
SHA1
13a84a0f9adf1544fa9c03692db35844995fc0f3
-
SHA256
8c2437c85f39b58a5b185e7395c42239f3ded0083b11210d6812fdc4d707c283
-
SHA512
fc32d91075f1be4b4e6f02792de9aaeb4200dee42ef042e75f8be33b982aca3ffbdf73b5a1866801a09e13db73e414e2d2fb0ee9583be77352212ab767dc13e6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419466250" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000013bfd9a1683e8a82aeaae89d67441b6e4698ae8b63c6aba7cac0871a60e13d17000000000e8000000002000020000000cee890fa4826463125615eba5900420b3b56123f4df33d21f0cf090abd2953262000000039b078c072e32a8fca06759d1e86bc2658361d5c6e7bfef97f644b15e9c2b1f14000000095fcb0a00b2b3908d0250aaa56861af6411e40347df8d7e4231431e313de0823752e8426776dd10eb55b67bead87241c500d82c01689237c5ca307e31bc8c5fb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B31686A1-FC3B-11EE-A965-CAFA5A0A62FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0fae1874890da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2080 2872 iexplore.exe 28 PID 2872 wrote to memory of 2080 2872 iexplore.exe 28 PID 2872 wrote to memory of 2080 2872 iexplore.exe 28 PID 2872 wrote to memory of 2080 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f46868001447368b626dde0c3e64a75e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8accbd2a66a4cbdbfbd194325198c33
SHA1038c639904e35dc6f1ca0d7956cc5c332dab4b53
SHA2562fef2956296c5aa95bcba618a931c3cf3eba5c271e70ddb17ee7bbf9e6bfe76f
SHA512eb4a1cbf2c692ab952c820319790114c4803eb6c9e87d11e8239a7e22fbbba97d0636df2d94856a61e26df990fa3729bc255a728ac6d243544ba197fcd6c1f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598ef340619516b6a289b999db3f0bef3
SHA1a5b01cf3fa7c3fc2ef96b3ff1cdd8b5a26b76763
SHA2567ef527b15dd7ba1c07f85ddfe863aec9e9f0c6353a7ab13b270b605754e9be46
SHA512fd45bed054cd0764cf236d91630b48907e7ece5834e47cc69f8e0a877ac1b1ff1d5b91c75690130817d198dda72d89dde59c0a5767c76b99f5c823f140b85381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bef993d2d27750d60806ad3e9ff7653
SHA156a8c4a951ba97016e9a1a514cff24ef066902f9
SHA2563d8f1a20318d0526ed6ba91b1d69b4b02e8bed379d594624b9b848a0f2ccabfb
SHA5129b14c07ca4bb6f3ac0f0a3a2901f8ff9da468c38df7e049f16f4aa4753a58407859777007f95cc3a2b5873736efbe7b58e28afccf089d42a05d4011f915f87f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ba058eff9829b37ebbf9a5963441227
SHA1f7e967104366689ee07ae7d9826d71c1819bebcb
SHA25675c3f8500dd78b8cf045e1b676188bf41d7ade620c7245ff3b067aa59fdb61a0
SHA5129313889ab1360326b3e9b552a1126a3cce3e7bf4f10cc16ae95664b3696c040bf1382dd5d36a100d2430460f4ca13c679872bd314713aec9beace7e110f0e40b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5936ffe63191bf9f77236ffc82b3d3872
SHA16b68e081d696d44fa19805bb5215015bfc033759
SHA2560f97304b5298c4eb0452efa885033581c0f11a6645083c578c28ca5090b66f09
SHA51229079480b2c4d210c8c340b5f5908d370df4de6dd8d0fd35b6aa88e5d8336626bbb55fcea37e684daf19239845251c603eb6a02353061c16f6d5fcc3a3266556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bc63031a2d97da9c6377f11c34e142d
SHA1c4d3ae4fcc56681e2028cfe39c415f9e3d677850
SHA256aa02424f64c4c0a8eed2e34e41b28d4e3cd65e3f8c2007d7b1a6d4dd65e057bf
SHA5125ae8e2b57c256d5eb70fd480a1f601c37f919d13832f2a9370c03d096a12332b41c269dc017323db8fdd1526dd31d7de7467ead066dba65a01e6c69ba5e4058f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512b62862ebbe50d0aea47ba1282bce45
SHA1db176c7132e33e9faf47df500ac499a629160a0b
SHA256bbec17d0c6ad4e47694fa0fdecfdca2cd6aef8cec9248d3974d7899753164904
SHA51225fb7309dd1d1c07e48280fae4db876a3d6e71830e4e01902d5308c20b0cb58b3219051ea1256b586053bced6d12af420d17590a4ebdb6c7e983b98ccee5e81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5124f1ffa8eadeacbc2fd47722aa0877d
SHA1a5d8596b765cd7a99df94f27957d937f93164240
SHA256820e832785b7aa35b4220645e11a39abecc73ef68c5efcde69ca34747150eac8
SHA51244c0525c07bd4d7f5ef9334ec0057f57b92c59ba0b5c3238ce43ece27835afff6d63c698023abde3e09d4878a3381256f86f8525196ad4963057de20a450140b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e63deae568fd0228980d9f357470351
SHA1af9f46b44d88f2215e023607ea988290aa95baa8
SHA2569cd13775918a5d2a719546c17496c821dab143132c9d7d8dc39946fa022525a1
SHA512e40641ab8608a7535718618afe2078d036aa4e14e063922b8c138a46de281a1bb4fa75ccc1b214502d2831b4798d6da57ef5db71fb6a01b6a74006711e986573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523016d6ecb691e7af362845b4c875b2b
SHA1b4ac06f601040858262a709c769496a782911ce0
SHA25686b69a482e789a565f966af9c1cc353cbdc67dde5c9babb1cc9c3db525ec1cd1
SHA5120226070da48711b22c48163b27a8cf63f7788029bbcc3db94aeadb2193cb93036e9fea3b00d50f4b185115e6c140abd6d282b6ed6e87df92cfe79bceb9ada2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6d55d8cff9d9299dcbd75d4b672384b
SHA1fe0653f53fe4a077566c1ce99af7dd0b22fccbc2
SHA256fae156593cf044f928db4df5d4343d500d266f7c5a184d448a93f52256028e6b
SHA512cd4f4092dd3723b9d0ca69ed2b0ae6859c9ebc2e34997ec30ba013cd45552c88c47f94e829c4f54b8a51adce907258255ffbaf120a09346313f9272206ba696b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6d10958e90e24c4da5b9c193bce3c39
SHA13c65cd538cb967f72db74ac153d52b81e2b13c19
SHA256f21d1b5e55400a9c5ac1f8a4ca022c59cddd56ddd8ff001081f6c21f47b2ec96
SHA51217cda8e4ceb621e81a24168c8786370b2e84db7a7b465c85f001e1689c9376be36d3e2cdadb7d5c2e4962b45aa2d0aa92d1752e541cd78e804ad145fee98d707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f81047ead02564c57c6fa2401698da7
SHA114b871c9751440821a5deba54ab334ffba508430
SHA2566d83311337b6df705085017e965f4cf0e15e6a633bad6690ae0af5d7e9d3dcda
SHA512b547cb7881bd06e65159d239d672741339f6b181b551100e5885001749b9c4c104b5632730400b4786af637e3ecd537e244dd1a445fc94986366dba2c9a61a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4b31c590ec09a1fa19bb985c033ba0e
SHA1c92ac11c9293e7961774872d1b913635ff7104d6
SHA2568a9b6417d24be79a23712d07b19b68e8ec7fad7da5be01acbbcece153f26ec39
SHA5120577992b42c25582c36635726dee2eb110bc5f236be2a381513e39aac91518fd9f411f58593382dbafbab633dd4bee21779918ec40e5e083e996300a2f32bd0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb5189c1f4f71f5bafb545dd414a7b8b
SHA1f37caa3e4db383f14bbc0867f67b826d1d6cdd0a
SHA2562d403f2f05628fa447d256bb6eaea7b3e713dcc19bf43a2c5538a43ff9f95bfc
SHA5125e27f75d247c3a30a3407762e5671f0a238e2d3cda04e6c729878cecb1d342cef74f39e38056284cf1454790785837162b56534230d685909315ca9b7fca2748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57289f485374c1eb963b425ae0ebf6f42
SHA1b6f1e6b526ad2b912c506df82425474ec34216d6
SHA256e68e484a812fd8bcb0a48403bd2ead0d026358455e77c6a2ae41799c11935f95
SHA512d6d406fb0a453aad6ca5755f884f99d71796cf2839d8b870cbffb94d83b2789ffbac6fe575025e5b2009d782033e935c55037e1cf71c543ca3c623405e275a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcab3ba7f964239e3f2ab198d28347d5
SHA19718f5a76d881b47632e7619d1f39a940a7923af
SHA2564597c32c392fb79557e0373fa7f428691eb5bafddac3dea87d62203e39fd16ed
SHA51271f37b27a4c1d739dc7b236d21a02e6ad2780aea02ed2913f437f2047ec3f9f0112722d4500edaeea073cd0a5c3b9492e7e5fb4650c83953897ca8519fd9de76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5987bde9ab2b5e4b8eb7bc5d188ffa4c5
SHA1167ca6678bd42c7066e54ff862fc60edd6e940f1
SHA256cf4257fb367b832c93702f7e40f1857972296af02ef72a9c9e2e4c94cc432420
SHA512011d17fdd1283194ff867a7e8986ec3501a473b174f79ef8c8232d4efdfe304731cb480424f105a0faf4266d20cf8af53208ffdf093dd16ebcda36cb9c80db54
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a