Analysis
-
max time kernel
117s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 16:23
Static task
static1
Behavioral task
behavioral1
Sample
fd23f93beebc5e53294f2b3ea5f5d577_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd23f93beebc5e53294f2b3ea5f5d577_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
fd23f93beebc5e53294f2b3ea5f5d577_JaffaCakes118.html
-
Size
432B
-
MD5
fd23f93beebc5e53294f2b3ea5f5d577
-
SHA1
e161ded67b65e416cdd552586a0378e29a294a8d
-
SHA256
c0daf77b5ed8daed805fe3b931389a4d32d16cd35283e3bc864e8fdaf0daea87
-
SHA512
ceff86d8f1eaea49b2ac423a831c894cba2216c0bd63c07fc5c27342583afaec0d80eb7c37c72ba8282e285757908d3f72b99ef12ef622cfb75d9ef78afd6c76
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b5a6203f93da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419792099" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000b6b736dcf010fb3511141639bae5d46a1ea9f4842c98f5cfc340b2f843f41b9e000000000e8000000002000020000000203fb4d779fd83997cb4186c451be5eeb3d4052daa6cc4e43dd6d4e3f7e7dc20900000007617a447269a673c56b911122809f4368c71397f67a9c7d7af188413756c99a23cf67369db6a829b49c7efcadf26626ee42efd67c3c175194c670066197bf11ad30a18c9df0338497db19afe336f1c4765cf2bcce31a4139c52d272e3090692a53d93c575c697a68f0a51f6a17794d83f8e7ef1a5e3c32bc1eb83cd29aede29abc8ceb4519136d9861741fb3457daff040000000f616909a626faa64f347d9b5c0221b4e8517f3193c50481837a1eb3c517bd14a01a563929e5b30e62ab7a4f17ced77067d9ca4c486678e28cbf73cdaf46f095b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000dd26c921baa04baf7f665199ae5a5c064bd2aba70fb9df809cf80baf68290203000000000e8000000002000020000000341ebc771dd1b0830b65c5d15f5bb8941b175670e33f64497387b4b264cdb84c200000005f904b9ff8fd13939bca0f644613730516bfb62aa075b2e1b646b7afbbe6546640000000b9c00165495ca3ece671d08e581608f765180e8502ea4f6bbfcbfd82822ea40a69ed071dc7bf04c2ac2d992dd040378e40d7cecb3b573c70969cacc32500a041 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5988EED1-FF32-11EE-8C27-FA5112F1BCBF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2548 3000 iexplore.exe 28 PID 3000 wrote to memory of 2548 3000 iexplore.exe 28 PID 3000 wrote to memory of 2548 3000 iexplore.exe 28 PID 3000 wrote to memory of 2548 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd23f93beebc5e53294f2b3ea5f5d577_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD531b737addf316f0fc1630c2819753421
SHA192a86aa432a80fdca48fb6173ec251b184706ff1
SHA256586e0b8cab9260dc786ed288b68ecca3c9970c46dae0bcc467db6829e38f53fc
SHA51201460bc980e8bed918015087a2f8e1b5bdf2ff6feaa514f1aeeb533598e3eedda322beb41e5fd2a92abf72f0ed58ab720612f5043544ca5ed2f261910eec335f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d14d0b7237573f28540a86f35c34cf8
SHA12878407a669ca5fe6eadf19d4de023ef46965585
SHA256685d1dfd8bd92e515b3075ab75e13d16e800f459cd757ec460700fce0393ba35
SHA5128b875d799a3fb9813a1fb3f03a7c3b0d99aefc67537b820ee1e9b47d2cfa75376f2156f82fe604654018ad49dec89f99aa765d1d64b7b6b312295ed34e269978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5816fcfa45d35c845d6460bd4a2544168
SHA1740de5d86071b03769d93a5d23aa2eb3776f0d2d
SHA2568eabde3812af5ecf1bec5222b97d6c9ca449813c63adf2e6b17d12314f6bb4df
SHA512bf5d99263503d963455a3892e91a9eb608f02a30bb652fe69eb0890bee93b90e67d5b5fbd4c61194fa607c055fe4348924d04a447dc80d317bb4a03ea78fddb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7a7cce4ce17d53acc0ebc0abb104a44
SHA1b0714aedaa3e204846ee1d4f1eaaa629c75b43e5
SHA2569b8eb75fd2615ba89bef20b8c3c8c4bcb33976511105462aa76da1704a0916ff
SHA51244fd1f7073ce6225bd65d3b5566b629daed8b2ca4274d766a3302105edd3f2040589f0f7debbba0f97365fceaf2aa3ce0f00b5bf7284e3e5888a46b426cafd9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cd71e8e4fd5deebb40d2a44d9788a45
SHA1a75aec451d1cca7be7416868dc3c40619e9ff004
SHA256475271c6e9bf198bb8439899e1ba3b84b58333887b957422f5f08a3e05bd53f5
SHA512fe432fdb5b95833404d9c6fea275eeefa9106566560dc96d06df6f94d3a0d718d2d3c659790ec444c19031faf609add7273d9de212a36f90962b01ee2c0a849b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c4222ab244a1a2531e0ed451e2c9f784
SHA1d66f69eb834ce7f635cfd06b4b6b7dccb165ee1e
SHA256fd03b9d299526a9f7e81787030ce49cfdbaf3814dc9e67e95434409601202279
SHA512fb8bcb98954cc27e2ac4f7ccf1e75a6e77746c4a5e82a1c6a56ff2b53a887de631199ee7ab3a5bc73043d7e5bd9d581ef9bcaa24a0585c1acd2c0e456aa0ae1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD515dadb77b1c7dbd4bf75d22af86cdbd3
SHA19e177a8d5d24f3482282ea3fa8c9f7f907a55518
SHA2562786aa7ea04d8bc17dd572fb3d4ca53298cc5ff0ae78eb5305524d38bee5e4ac
SHA512ff71f55e6c7e039d81f1754d74a20e24fc3af35dc5e2abca378b8a45b1bfadd16538b3adad7fc80fdeb1c6168aacbb1b5b19e53ee484668653692b3b68e0b17a
-
Filesize
1KB
MD5aa42c963b4d27b247211f39602a943a9
SHA185e5c63eaca5599ae8ab2f19371630b4ef7288fd
SHA2569471b8c31d354625a6d34d7da5b9a2d44c4332d10fee183c02dc8d6eff044fcc
SHA512d50221eb3e0780eb34bb5349cb8fa9a41023b1f8620be3794b88ad68a5c89fd0e1210be9d42608046ee836ef501412cbf65a6bdc1b535e1da2ad39e493d700c8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\favicon[1].ico
Filesize1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a