Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 15:59
Static task
static1
Behavioral task
behavioral1
Sample
f6257461b47670ab6e8fc298414ad242_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f6257461b47670ab6e8fc298414ad242_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f6257461b47670ab6e8fc298414ad242_JaffaCakes118.html
-
Size
2KB
-
MD5
f6257461b47670ab6e8fc298414ad242
-
SHA1
5696a4d09f0ee6f936e615fb725d2a8506ab7327
-
SHA256
33433830e38547386d9a29c8982e617744c303877abfdf46deb4daaebafbb814
-
SHA512
cd8c127bb4651802d183572ec6703e543c7a75ff15f30455a29bbb9d505075636cc609992224e7d42d335b63217868fa9bae474268ac33f37850c8af9f259205
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000628c0b4a3d56109ec4feafb02ec5051571bc56eebe9413bf5c064dcb826f0567000000000e8000000002000020000000bf073b16cf0972b06b64224cef176e67af4686f6e42ae07a9a69038ab59847e72000000070e3553ff738945160994093261463fc23c1053d52da198997ab60b18cbba9714000000035d4e6001dc1d5581aa6cf92c6fb8987aca25871df3a3b39ed8f4891dc83efbc62b6b05247c2f931a3fcd03a7edeef39cae1c1e17c107b2bded1d3611fa3f5a6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000627d3edd54b2443a26eadcf7a32469e3b0c69bdb0787a8688f6a31b1dfccc2fa000000000e8000000002000020000000bab5c33347cc0ecfd1aa80dba0039a401077dc7f5e353efd59ca7f7d72e713a9900000008481a768ce1e90dad8b81d5f64025f7cdbce64553b6d45b162b4af7dee1d490319d1451447adc00eef45258f37b532de840aa2ce64863839d8d452fbb445cfc84a67c3eeb9a3a6b4bfea354e63837f2f53d1f10b5d182fde07e0261ab3a4d48289c40f1a5a13f315d67306f4b23e12541b11a556e74dc7bed868212986bf1fb4e8a36976e4ae95a97468acfcd314b07240000000f928eb407eb399fcabba38da4b024b9bc41a46e7a36e2c2c2d7ded679d9a7b02f3ce23900ccc0bfee2cd9d45c2b5e0ce998f43294338e69c604fe69167ab024e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208c6e3de090da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68E2E7C1-FCD3-11EE-8178-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419531410" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2920 2904 iexplore.exe 28 PID 2904 wrote to memory of 2920 2904 iexplore.exe 28 PID 2904 wrote to memory of 2920 2904 iexplore.exe 28 PID 2904 wrote to memory of 2920 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6257461b47670ab6e8fc298414ad242_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51da01ab5cf4f73d106f7d26d7966805a
SHA13d2de05113fcc50a71286c9f60aca26dc7fa2099
SHA25657fddafe1d0be53c1941aa6194f53e9e0d6592408f0623d8f999cf5677b0f8cd
SHA512fdc48d1d83cc8fe73fe70077fb7ee913ee3f20a7b4ff7377e03fbdde365acfd3c37a779c95b51f5ae6b4dad71c75e6fac413d2bb209b2b9d613a79b373843609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52838356ed137e927d0d0d268c1e7d952
SHA1ef0c55fb837ce4f4dc344fe2a3c2c51ae63898f2
SHA256e41e3584fb387c0ea10234b4390d7f53bf6166ff5eef1b146893d507e2059802
SHA512d604ded9229b7f89cc3cc05d7ff37ae00ce68126e9008a4c8be37093b2fa5132a328c4216a599211799a6b4b6081f04b67e2dadfeaa51ffe7f4a4ab2714cf8df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f10080ebdeb890231ee59fb174db0a67
SHA1bffbb955458be6e95eba3b9fa75ab805a22a8829
SHA256f452df6f8e5748e14204ec8e98f6977f83a9bd8638d1fedfda79410479e2ba3e
SHA51295c37842bea762f676587c72820886d91353b7818dba18835a4ebd07745218920e5885fe5e0c74f8c4b5b5b9d402da94a9fe69d2f9a123c3bc8c7845fb562087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d6bcd6b9a33792229e8819bf3682edf
SHA164cb942e5afbb241ab20e76440f3e301484a7c08
SHA256d6ba47efa27902f11d238cfc7b2cf4646a32b5e2d2186c48a686c19db11b31f6
SHA512266083b84f57cfb1c9ac965658300462b5171a9baaef274aac646dd396633e8ae5723d9ef4630e33f752e0e61b3c91d8d8b59a8ec84d01ad1c7e30230dae1a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c1242d8ee2b328543c69739473bb7eb
SHA1bccfad2fb5996f97c71f76c2b029cf639390107d
SHA256c14c55edc88dfc513d277420607cf69be01cea004abcda612e6087fa57650ad4
SHA512b1cb91c69ce6531d13907d484ae08455c9d99cef31bd7e327c549cc30e83fc9bbd285a9c072fdac660c6ae6fab2675827f368cb2d1487a4300e54c0e65348e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cb040360fa601dc745e2367beed9c16
SHA187c294f126747506711435351e30818739cd4678
SHA2561a3789d653d87fd6f06d30ecead74cb577d576756d1dba0fb3a87a9e1fc7ced3
SHA5128ea0e0a37135472935844e481d27bb677e5339fdc22a1317c23bb4d8784738030c7dc91ce51ee025e0ec985129d4d08c7721094ad43cdcebca95257ad78559ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57285a360eb738ac82736a4fc5d513036
SHA1fdab67b98c67053377541ad7ccf5e8d681956f9c
SHA256bdc2e0400cda0c1a268d1281247d2b9bf70a3c130ff5562dc0b0018133679a80
SHA512dfe6942971da80372bfecf3b65d8f08c344bc77bb13aab4f827b960a19e7a6f66a18c5c6d2754e246a6b98700d97a3f24b2c013cf40a19b0f6935542e5adabaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8133f8a3679324249d43ec1de68ba17
SHA19a4a21255c75a9f74ed93e977ef8a6af6f0e011b
SHA256630e1593265d5d03134ed266d3d0415108d6a05fe3c209f024c5a3a6e3238220
SHA512f101d84bc30cdbd680350e0a9b1d0b6bdf94cd086f321acdeb8ceccb1f23940c32909dabfcca6f4f5117943fe669e7e3c8acc9705d1e758252ee71cb01e90a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eca048d776c502381cd26fb4fab6a564
SHA10b5719528027b74a9ae984f746ecb04c06b2df11
SHA256ee3d0f4d83bc8da32899e3940d767807edfc545b13740ca84937d7363b20da23
SHA5129c6d1c5bb7cf79763d24dcc9d7e476186f6c976124ddb7bb46b92be744245482089e0fb2be57c6666dd7e909727143f307ce9b35120107b7fa4ad147793f08fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e502f73b620d7bc8e0d42549a2de85d6
SHA1123105fd3bea93aee66d3933e6ba2869c946b46f
SHA2560b3d4b87a4a11d6a4cf6437177e87a25743e3d0a51454596f355a77ab9cf16d0
SHA512dcedba14669d9cd523fb82e1a8ead1c4ec522f96edffdae6dd5a7360e393b87688320aae901b69161975ab78fe19d7cf965bfdeefbf9d3133648ba69da53c964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c8e3ebbdd86f5fe8e3c92a64ee871ee
SHA106417853237187680809d7b5479d337335562fdf
SHA256022d3072eed29b94ecd908233eff962695c3e8d966b273bf44aa065ce254ff48
SHA5129451bfbe41daaadb254a9779b6a890a30681dfd668a8aa2b6aaa86e38298309ba917259444a78935ca273d07cd9a17e33a479cea1637d145271be58c1455109e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50050cf844ee9761715b395cfde9e501f
SHA10b85df54ce4a56bfd081374e986cb3adb89ddebe
SHA25659dee7f0ba643142c60adff6eec29e3fc542159555ad7f9d154c926818ffaf50
SHA512e47fb1bda2637f4d22f3e455e7e28ee2ee8ef02c52d96c843e28adb9e8d9432f1412db7cf2612d5dc7153ba39d3bec7dbb890a85d26d8afab5e8e2c096e3e7ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51291840a10776842de726dc13e403e72
SHA1d7bd99624761668d3f6f274ca775b4409e824e55
SHA2563f80d72ae3ad18089ea1343770343f4cbb0f7d988791efd4ae56df4e9eacd6fc
SHA512c8b94023387c8a1ccb662923268ce6922c9f1486d2fe66d732a6dd76bdce3d139a8d7bc30ec9b5390aae71c50cbf5af5c567d34e6750a53c75c3a30db3828adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b156049e963687caa2f63d68870a1647
SHA14191b80017df7ed03239424cead80f000acd6ee2
SHA2563447e6fa14dd97841f13e50c2d408a11ccbc69f0f4b756028241a97339ec29a5
SHA51268b37fb9ea5534a35c77f45967083ef373964b5f37b5937df1566ec5c988421a7820d8460d6fc46a3923f638564b62abea3d9f7b26806285f012312c8e8c8701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565b34aef40e0f10e495dba2a2717ce1f
SHA14840cfa051a561ed4c9702d1abf9f2c6ca045d53
SHA256b3cb921defb2d9df35c5a9f36dca1943b2a76de3c16f0e6f5e117daa11a7dfed
SHA5120aa5857335b42ef03416d9c5c95e33f2787c2f9f4d4aa52a26133af8d36aa9ee1974698da696e2d856ba8e8755c9c35e2ce26e2f6f106d2545709728c32a5f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595b8b84ff1f417d6f76d2a9ea1b087f8
SHA12bc43ebbcf7b302789c38c8b5944e6a687bfca8e
SHA2567e75f22343ec70b022f1d278cb38386373923e5bcd7ef40f4cfbf2338c742458
SHA512123dbd6679f56b70e34486f7c9cffe12bd67b5c28bd9c1366017c55e4d9df2a65857792b50de8ec9a2521750f8367bf2d467491c2ce1013e1db764193b7420e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af22db37a902cf4fb45165ce97fffba5
SHA13b3411f64b0da718a9610a56529c307e2f96087e
SHA256004299a4c910838c4dddc0766ce766262f2d09fddd09b5fa0308cd9b2efa05ee
SHA5122f1b074a19f232328bb409c021e55fe920310ac06157bfa4d585a847b7f6670eec138815841ed178aa2686e77c29bc1d6707d6f4654911c1cd78331662a959fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4981f638f137a316a09b98d6900d501
SHA19495eb9ddc40966cabe6835054005051609a90d3
SHA256d0006070c4572495cc90cb502667d2789c3fa4035475625cc75a2e156b51f996
SHA512a2b1e176000ec9acea5f89b6b65007ebf774d443c6cb8a8318417b8603be52a436c7a4bdc5f375e2c7d0b36b292de6eb2bdbce112c035b9dca6bc6adc6b81482
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a