Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
f67c68d16658da8380a8a74980facafb_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f67c68d16658da8380a8a74980facafb_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f67c68d16658da8380a8a74980facafb_JaffaCakes118.html
-
Size
3KB
-
MD5
f67c68d16658da8380a8a74980facafb
-
SHA1
cc547f274c1abf19959ad4079ce48629665a679f
-
SHA256
4d8173acb47c8ff602453486f66070286c56a9e29cb0369b457061ff8e8c1bb7
-
SHA512
42322af438abd2b70d511298a1bd90190c9e08ab28c3a558ef694bace4fc53c9bc16f9c86178e3f76e3ab943716dc6b2c8de82bab539aad23b47ec8e73d39da0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419543350" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000000e9ae1c304fd649203680ff02d08c3906289d964e761e1a4cf2017911a589d51000000000e80000000020000200000006a3150cb2c56d3bc967b26208e9545ad6c6596e508dbc6d03d0e9899387b7b2c200000007d3a40f42a5d424b432aec9556e1a7c2a350dfcb48e122ce24ae35ff7108323e4000000053783d1dabee3edc8f1b411f758ed7d3fdd3aa4b138f4f82de165bf3efe864ff080997580b7d542dcfb0050e1e04dfa0b977e150cccc660444311a181d12680a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405ad2f7fb90da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35205A01-FCEF-11EE-BC03-E626464F593A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1876 iexplore.exe 1876 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2516 1876 iexplore.exe 28 PID 1876 wrote to memory of 2516 1876 iexplore.exe 28 PID 1876 wrote to memory of 2516 1876 iexplore.exe 28 PID 1876 wrote to memory of 2516 1876 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f67c68d16658da8380a8a74980facafb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfe009a6b93d91dc493924103eeb9b86
SHA1f9c7d5aa23ee8ac1af4a8d37db23e85613573720
SHA256cd3ff5e1ad9396151552b6a09a1c21b97100a01c563af8b930078fe7c0728683
SHA512507e485fb088ff67b2f4226d348326a4be9070f7a4ca4e5ba83dd91e1569de240b691231eb602ed6d167fe565215d5f448792d773d8c09c54fd9302159969036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4a4d179f7b872beae961f97e4c72d6f
SHA12092f5b7321698bc567d3da0e29965d8ae3ae1fd
SHA25684cb82bb0877bd34694933ad35ebb24234c2bb092b02fa4bdef33f476169721f
SHA5120ef02f31173ca6dfb98f03ece960f268f68bea3fe15c39fd0150497109ede24c3043bd7770f41583e4c19c8b9985ba1bb5d3e85c8e3fbe72f58f37b20c964374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaac2293c17cfaabcf1401cb9b98f508
SHA1d8284c991614548024effc76e13c212c6f5fac6a
SHA256726995b360dda51c24e89b4848aff19f5046a13a1964b7bf7923abe2b4d844ca
SHA512fb23c6ec3c38a4eaf80b6d2337214ab897f78d16f7f49ebef80e85587b5901010da21a04a04b32c19d6476b72ee002d2d040d3160a4128d072425cae5661778c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54249c8fc94eea704e1b9428d2aa699d8
SHA1550995464ff0af11233dc0cb88b41d85828f7f63
SHA2566351f290019c839056f4017bd99c41e98c6853c9dc6c03131e561a34b9ea0e49
SHA5121450da40d18ee8aced6b3c9b01f321e88b65f17e0eb451c6c291f1c90778359d9dcf82ce799ad8cae6874aef54ed1061ce10455447ffce3c4c73eb7d15acbb2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faaefe97e8a0ec50c628ffb5b9e36ea8
SHA1cb1015eb6b3fc9af4b8a1117701821ca1e326d8a
SHA256e6fe8d209241e1f6051c9b97440396c55e93cfe6f4c7c57e8f6fc10f853ed1dc
SHA512f98c7d7f509e4425f44d3862be0598b302bfb956809ce6ad51393b3ed9ef0440b2d8bdd2185a8774cd6945764cc7b14ceba3c6129148f533b4810fcde538ae39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d768f38899da0f323dc1819af476f802
SHA14d91ed1927f42d807e18cb343969803edf3b59c3
SHA2565cb35057d6cc02235e2f7d47732d11de9bf730af5fd52cf16ee2904018460af1
SHA5120e936978c84fa35845bd9bccbed1935e734fd89289890e6c2d894665e4efa3100b4604f15aa7d9f87bcba5b8c09606b5ce8ad08ca64a4ae49570607f9ba64fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6f1ed95a42f5f38b2c490f11200f8b3
SHA1de0027dba38c5cb31e766907f453d45ffcb9b013
SHA2568df03861ca02b62ee32acb6cab4a401a4d3f4c33539540da06c615dcfbc4fc43
SHA512bced8f87894c8e92ae1ae85314d425d5c3ee7c280446e0623fa40684099a1ab97c97a6d985943f4461db38ce79d47396963c06d944b4fd22a59917b68df1da27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f842e1f9b047b3aa10acafe4b1b0667d
SHA1fbf4089f6a56e7fb381deb96735c038f369feaaa
SHA2569aa5fe9bb64048a42e4d2b0398c228a912900f7e337e2d7a431d9286e968815d
SHA5125067b1a9eed11954e2fb17196d0821171d11cd4662c13505c9147f296cc0fd3b2f7881379f10d7bf4fd1902a5de0297968e6c5d89c6f3f622f1537a459d95e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59376dc4d52d6fddf0c83ba85d8d2be8f
SHA1abd6fdedb430f72e35920fdfe4aecf9776c61513
SHA2564d6398c253a4618d00c1777c4540cb4109d7e7782fcd429c7337f88b6115d66e
SHA512a573d3a115b259c9e2587df4dbf21176b984cf938f56bb31e91508ff6b0f2726a08e7526ec8483c0ff575e3d1094edee096fddb8519351a20deaed5151b6dd69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe582af21cc058fc75b63b7e3ed18929
SHA185fc586ec7e47d7165a17cf9567cba9bf94e7d3a
SHA256f97863bfd8edb84481213970834b3662527c2cfacbf6813a747cd4726c237894
SHA5129e6a37a534f6d6aa6c2b35cee6c64f3a1f74abd3bcffc7486cac768dec4ba7bf27e9b5298dff7cf60cde1585f20a7fdaf8ad2fea8d094f2ace622e3d519adb87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54805f429586018afb628c16a178c10ec
SHA10b8b3b93d66e1b6502629c6308532f3aa88054cf
SHA256f7182b76f46eb57c72bf47cbb2936bf88043e6f36474c3055420f607829c2d06
SHA512e4a6f4b25504130d9705c347e5be86701b0bce6c65fa26892517d833f2e2c1c4bb30ec8b4ba0b8786d40fc9d241539345e31a31d7276f1e1b16e8ef47fcc0e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfb357d006efdb42f0888cf0b8dab71d
SHA1f7848e2b61bb0c881fdf56deaabae4163969215b
SHA2569d60413f5490f40ca45a700d3c08216d58783bd23e0df392365992b5bf13fd0a
SHA512d5596d1ed74763c40ae1f9dfbfb00ceb520f403f60b332e18102d707b52c6b1644374c39b7fa839e2ee3aeced8a28d18bf718bdd8a61838bbcf901ef5f2dd09d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adb2bf422ec3869f512689d728610995
SHA1e5a83fd14764c5559dc9fbf4793f7474a57eef35
SHA256757379a32fb466d03c898de4123940e92e5c07a078ffcc06b9cb1adeab8fa837
SHA512c17d52798b95c3b34a32133652b024c27ad0f19c49e07e3f42d69933a95fd752637af2b1131bf4118c66cf6baa02a88802348c4daf8019ef0fb43b82d3e39138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5518c64a32c4bb279b67c65e41d4add79
SHA113cf37e93d07d4d214690fe4c3b641974c67dc46
SHA25675e8616bb56c1bd6dd4fef750542916abd323189e4b5b262f384026e508b53ba
SHA512aa21aaaf831c688edbe52d63905b5e499f9fd73bf8c5706816262763fe5b7c73eb8736abf9591a43a1547da9b5951be9e6798d7b8ce3881f4f21ec0a00b022d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526d20dc0029bb3a4dc5d2e3d0c91a6eb
SHA1c15ce0eb33bc53831fae476864aa63df86368a94
SHA25618b2901ba73178ec3e90ec2769e55a4df55d0beaf621ca7e89545d2b66478f32
SHA512f2a2a4c290f4eb07b33978a3035f6cb3fdaf9fab2617ec341474d122f67dfca948062a69e165346cbe44103be852e4fdb7d44e4e3f5e792dee57492d9c0f97e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ed8a082ecfe7ef08af99ed3120a3aad
SHA13093a1eec102fd4f63299843d92c3d31a12b68fc
SHA2564a4cc16878f8f7b2e9f9a4044cd63405180436c6504e03b25151088ba86698e6
SHA512cb0c082346932b133c788cb02c1d5a441f1e8fe78a692def7c69b714d62ad187fdf3e84a8b6efd63615ec0866d8d7af8884d9af48c8371333be62bd3a03862f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9eb45021d7f1211f116a02ebcb648ec
SHA1687174a2ed73efd96eae72bfb44ab9d45600ea05
SHA256fc5599da593f0583453881bbf54e9a3fe41b535190cdcbb868a8db24dc97834e
SHA512fac5e61e765d23b0c328bc74f0fae08344322bd3735e6ef5a02182053cc1eb079a7c7e325f9714c4c88acf6681f76edc8b6a815e106d4811915b83710dc99677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0813f540afa48659b948780980df8b4
SHA1984eaf44a9b69af73285f626b2e7b56e12dd93ae
SHA2564adabebea7e687b2e7f8cbf4254d6e787f8298a263d6aef58334a9cf788fb76c
SHA512cb88d4e695a1f8c606249d57c7d8a29f7528013d98e0a3785672e1e6a8c2ea5f7518926e7a8ccb07ce904f8481afc2eecb4c1221b9cdc343ab5da95028013f05
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a