Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 03:06
Static task
static1
Behavioral task
behavioral1
Sample
f4e68a7e509125bd938497a72e716cf2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f4e68a7e509125bd938497a72e716cf2_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f4e68a7e509125bd938497a72e716cf2_JaffaCakes118.html
-
Size
2KB
-
MD5
f4e68a7e509125bd938497a72e716cf2
-
SHA1
8cab86d15aad1796732f09569357b7c5c9bb7596
-
SHA256
83355d5ad8de45f80cf848839f9aa092e12947f99e2e79821794dd6bcd98a837
-
SHA512
0eac9e89ac2af07601af2e426b4a702c0dc04b411e3461a2b4dc4324e007a63b4b3162155733402af8c79370ba5d4c8f8463e47eb8a09c9e61ffdc383393b23d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e000000000200000000001066000000010000200000001ab412de699186f468ddf10a66e84948f8d03532d7f21577f58d755239ed2cf0000000000e80000000020000200000001614b39c61f8dd32b15c5996c4c081d7f751ce1c3ef09a5b3e55537f333439482000000037b19f431996e16a3ef08e31e852900e8a4e28de43fa12072f221f858c43bd2940000000ff2037601ff9a5216149ff26d6e64890e114e49e6b59c5840d965706add6bd85f232574de2e4c5701d0dd7f3210741900696fbaa9dbf2a67ba919051166d9e2e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7089a6657490da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D81DFD1-FC67-11EE-A2DF-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419485086" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2312 2164 iexplore.exe 28 PID 2164 wrote to memory of 2312 2164 iexplore.exe 28 PID 2164 wrote to memory of 2312 2164 iexplore.exe 28 PID 2164 wrote to memory of 2312 2164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f4e68a7e509125bd938497a72e716cf2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53042d9cc165fde799f1e47200e418d47
SHA15845de183f1b9ba533548df1761c0af8b0f4e8d4
SHA2566e322d7a87e42faeccf520841cfeeb1597e1d0793368280e661a48483c366b43
SHA512421ffaed6a0fa6fa16b9c406048281b9045b05979f42fa6d50c9050ad83474f39e616558f4fc7101fa538cea14c28e0d2e51afec861f9db228429c6ffb7edb43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e6081d5415e707532b7213fa1483966
SHA1bcd27e07207fe94099b7c247c98891a87866ccad
SHA25686ff4e0a7876713a4631bb4b403d72bde485b2c7493022b984c6c9234c38b1eb
SHA512999397e9af9e7e5a4d27e0138f6f3e55c58da775e68a4fe52ca05a7e0bf379dd6789b57e1b431f3849999c89f61bd64684e0330484f8d77ac907ef254b26dc38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52590547291b3688a7fe1d4a8aa96bd7a
SHA1feb941db9adcbf5fc4670ee65814dfe002e68c14
SHA2563562e2796800db03f002f724fc88428b2292a18e58def7777d1b91c9b60dbdd1
SHA512b9a001135f02803444966d5c61e030455a14d0c1e7ffccffbffcfbe59520bcbcccfea3a0e99ec0fefc2b4a8f7c64f5358e9ca3f33b76cfab5ce7cfb132558244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bee4b93bf985d5898fbb011d7d7c5460
SHA1c0b374f5bdc0a799366dcc48f6aaf1444e789c89
SHA2569d1c6eab3295dab3c3d46a093f039878c0bc4c7644c932380ca5dc07aa5da095
SHA512bf0cb0808a0a6e8ae0781d1fbf43569b0af0d93be889b3210d48b9bf2dd3826486a6704ebd40117787b3792660bb5965a61e808be61ebb925672f4c09077efdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f11ac1eab7b100eaace48df3b0233b1
SHA1f6a41f364984a193bacb3f84c5711ab88b5c01b4
SHA2569d61bf32dcb9db2209914abd229950a8cfdc8316dc39f8ea3af6f90661f750b8
SHA512355d772419a188e51eecb28063e80f45807c2c8c9327fcf81c339ff56a5866fe5b0b9421ee3869aa72f59b57bd1fae944a1fc8d900121150446695ab2aa1508a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5770889f9f7235024ca752eca4b44d0f1
SHA1d8c51145221d24184aa3e05ed8b660503446a7bf
SHA25627ce2f32142cbd84d993ef4419fbfcf259877050777ce04405b64dd61b735517
SHA512bacc7fcc80d13c7755fbbc92bad4be80805590dc28625a17783418c8d66f2141defa146f98c93ad36c7e94f7286d4ffdc4e20686e2f5959a98b383630ed92602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588273e8036db41e3de45abe916bb7810
SHA1014fadce76edc9129b4e00db35af3c1d47419ee5
SHA2560cdff3e63bcb6022b9ffce2cd1ffab69cc8627426aea884996b856d80e810cc3
SHA5127efcf286bf0b5d65216a760d6918d85da04b640590ae1820bb0fe6458d84ec3f01b8d091fc5b30bfcca7bc85449ea647fc2b70c55ad2da982652dc3c6ea72d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0260b487b83c78c4aa0450c3c871462
SHA12cdbdc28418e1feb4da84ac34e231c218e4d4760
SHA256cfbbc7b2702d92abdb5fccf0e94d4f20fafb9d9212572b2738d6fdf46e45d002
SHA51250b52451eb06873952604f867d1285853f23c6685332817e80ead3f323e8c004c1e9065934987e7beadd952a5795675b8ac0f2ad6e24dd8d85000b8a6e780514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50db555e749411bd285ec7f29c5f98ba8
SHA1b31c79b8add7186d4631e47af99e518fee3f0699
SHA25684566776a0ce3f71b9828efd47b8acf33d0e446113ec644136708502e4b335fd
SHA51224dff75699ba32ddb11806e56c673dac08cfd4111abce06c4f1dfc8d415198117953b4f8ab0aae340f29dfa7489292fc488238b8a027dd8fde0af4db2a3806bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d58713795f71529cdf9c93d3e47e3e2
SHA18e5001a007c04f57977026ba8f113ac696e48d91
SHA25667182b878a41b678c8b7d3464f8491fbdaa15e30437f44d018c5515673963881
SHA512c6047c8453478f56705fd4b3579ffb90542992c105663662869bec12bb727353d9322551df0241baec477d32e7b920b034ddb53a5529e3d1495f70ea72026cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506bd1a7bc497be92f3910a4970aa5d18
SHA14850efc7d04b789b489c7d60e9ff7dbd6b653f40
SHA256044ab23fd8c866bfdbe3464fc940607c901aef26eb1b2b377b64a7fcaabb1bc6
SHA512e33df1d02b9a03ab161a347c736ee718d2a4952acdb77686a379b74af1f2712903e8028da69177d40cb888ae0ac8de79fc0182f76246863215616536c2a54cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565526e351b4bb45147db9f99cdcd0c8d
SHA1687f359bd702e1ce71cf644c36eda913a0df98a4
SHA25611d90b755980b9fe19e10a092d253676cf9df3ad87d9503435c96515192728cc
SHA512bd7408474b6e51b2b9058db05f1cef5eca3be0caa042593b1bef527d0861f079b6cb5ee750e022558ddaec1b3912533b825f4340b27b7654d14709c41c1af3ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eff6647b772d67858e5d444558a12077
SHA1d27954e675c36c34635a55586a8711cf2a0dae78
SHA2560f88c5f6640fa1ba4cf0af1818ffb34b51f3070db0f8697a031c8d4a454f1993
SHA512704a693abffd077692234cc95a1ef264a997da0cfbc25d77b99401d9de453d24823c909dfb697670aabaa507b1349405049bd97834be801f30e33fe5e9ce0848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ad29102cf765d691647e2171556a538
SHA18e1dbd22a07d1ad01ed9f2c04868ade1ff3e1ec7
SHA25641d2176daa3d4d57814bc8a26baa88a782af3cf8fa32753c26969e70199c4862
SHA5121563b214704e60b79dc3ff5b84d48cd881d9b393cde2ac91e5206cd92f3988f12d75801b63688c2584e7483fad34108d4792141f19e973b8273821ab22f08276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6ae9c3e5b06d4ad0578ac5940079b91
SHA18e5eec540e25427a70ec9e351d53866113f034de
SHA2569feae3c8ab334187759029ddde9a1f2d7c4640a2d0ed270744dd254ca2c95f8b
SHA5124ba2d331d2f02958d3c90ee0c4b5df7051162bca6f8d1f303a45939fd567d71a6efe0cf2f0b2f741ad2bead63a2d819c37f2bc7e2de232ecc45db6555f5c8497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512913031087c56ea071af11c634a37d6
SHA1cc24679500d554a3e6c683ef567f473ab9776db5
SHA2569d6773b52a9d34a6021e1ae0c0bd2fa5ec6a8fa5dba490df9cb529be93a4124b
SHA5126ecddcaf811ab5d8e0b2aaf07900338c548d106ace4d1ab1ef5e34e156fd06c99c3ff3879d09243612da6fc86352030c753ae54dcf2c0f006c0f00ad03894928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bd94c4aa1d367b5c4914c8a8d92561c
SHA1f05bf65cd386327f9fb56f373a9419beb6b7d780
SHA256280e989ce8eb87075558515cd8a12bd16ec7700c396dad855ba8ea124556a493
SHA5128a3c0024172f34041be7e036e575beb45f69714e2c97751fcf310da0c52ac0701352b0d67e58bb54a6d8bea914c195bfeb7e1ac04aa5a7afb7d4d368d6f892f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a28ec1a12cd62fec46faeb8d5450e369
SHA182edbf5dd0b5c4883c17c7a96e972ccf95615836
SHA25659aec77c8855b0a2fce8d3065e59e3c0b56b1a7d595ce8244c8cb55cf85c8f54
SHA5125c944a97c052fbc7e8df207ec3de54453b56fcc0238670150f33d5e0a02f2d199bf9311f86bcd0224795b40dc9349ab3376c38572cf232db98f52a84080df078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560431c36ea81a405cb706786dd59eff8
SHA1204c9dd3a4a879f4e937b9fbca5af86f8e8e5fec
SHA256dd8a4203d658f1b9bb9eccffedd9e9000c66ad870d30314929fca906953625f0
SHA5129149224c3d2655e50fdee3fddc68ea73151cb64b871d91b53a4b5797e100614db96f8e4fcc4667df92263022d996f55e6038580b3c63c4f566b8319adfe41f49
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a