Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 09:32
Static task
static1
Behavioral task
behavioral1
Sample
fefa7340107d36c1f3447745009aa375_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fefa7340107d36c1f3447745009aa375_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fefa7340107d36c1f3447745009aa375_JaffaCakes118.html
-
Size
1KB
-
MD5
fefa7340107d36c1f3447745009aa375
-
SHA1
bd2219dffd8dbd5479154790043310be094a1bad
-
SHA256
4401b3a649186d144a1931719eba155369b997ee2ae632d29d67332a4a665208
-
SHA512
8997950a47896fe87a3e17aadf387258a725c4d70f55961215efbb2ea61700f869c148c4faf7e4e33f6f051efb1ac6d9185e912049b82fdecfd6669bdd4d9c1c
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000009ca31ae5f692e9f64b571d3796640d2b7a2c5498fece5e53561ffc36948afe4f000000000e8000000002000020000000db3001768fb17972d79bc08cff4c0e80f4c540d0e8a0398947c0623004af2f6a200000009a9ccfc001b5017fe0cac6ca039d8442addcf11678c310db843a97b89f784f684000000054fecb7f47b4c9ec61aa41c9bf95a391bbc2901ec0167416a7ce72ed82c81cfefb64d9a524a6ae6cbe1bb598fa30d9535881cea8026083553005f1814793d4b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419853819" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ad6ee6ce93da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11E819D1-FFC2-11EE-878B-CAFA5A0A62FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1960 1948 iexplore.exe 28 PID 1948 wrote to memory of 1960 1948 iexplore.exe 28 PID 1948 wrote to memory of 1960 1948 iexplore.exe 28 PID 1948 wrote to memory of 1960 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fefa7340107d36c1f3447745009aa375_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556973c261dcfbe50dc041ac764bc1644
SHA15c59c40d0a711403c71ae8cc2120945e343e1551
SHA25641a6eaea49460510faad36af1a0a11741b36f5ffcda0653fd90c0dc9cccc0a8d
SHA512e06f39fbfd7134abb730af5d12d3a3c44b6ab487d133d62e34e1ab4cbda59f75170bce1eb065ef1e14cec36a936200473b8442cb69e07b3cb3c73756353222fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bbe5e0f8b5ffb73354d6125d9062377
SHA1b339aa067d1e529d649bdfd18239dfed54cb07af
SHA256ad06da1cef18c5064abf3b7e3b06550899b08283646953d8d59408204aa4fd0b
SHA512dc680ebae1357e69d671ae2f8b9fb69386bb569495280ea0d33e550512e2ee6372e507af16b1fa76ec5b2d8eabc69604c6739ce7c735d6e4ac0bfb646d6b4024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a4323e34a9e03ff2fc79aba2dc41e29
SHA19869a89f988048289ce48b86cd051469c9e2c066
SHA2562c9a26de628e79a4cf1db26e96f9b0fa1942d9aab0b3509bc28e858a682af446
SHA51211350a5f7940d0b221f32ac5ea07663d3fb96edc5d07fbfe46ee6a4ef4726760c890d33e75e898835278aa35f10a136366e96331b19d1c955c6e88d03e3570dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af1b04aa5350ab330e29db5acb310b21
SHA1d8891a463c51f89be07c4b9214fcf9f5fc4ac0da
SHA256642831fd6e36589244d16ae165b56ba3e87b6cc046503417f941cc7c68169ef9
SHA512c683651281c95c59194924708af062c7a1eafa9297e227c684c8986deb8d35e07fea0a0867667bf31a0e507683a165bb3037800c8abdddcca164b23388bb05d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a04bf4711cd9afb16536e28e1145529
SHA16073e0d757a05fdfc18933aafbd8e63c0f3db104
SHA2560330ba51f3096e223c1861d29e29d21952cfb49e0714cef615c3e773fc9b5c56
SHA5128df33ee1922612c2fc54b10a5869c916f80734200fb295c7e955a9d214b39c24caf21129354d1b7416bb2c375ecc8a102f854de9421e160c3bf69100bcae1571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559600c90f7c70b8725aadb2a18e9ff41
SHA15597c2201f43be2601547b93e85abc1c1e0283c3
SHA2568d4a55da36c62a83090690b6c578613172c62a60e30a4b57865c78d8f3dc3a7a
SHA512d8ce9a09ccff5f0156d784470dfd801a12b6f0fa41332d2c2b9ab2276b947bad9999af2114ada7556e48ab827406e26a1ee57e7616915053310fa5f2861e3a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6ad9318ac3985d4f3aad4ad24fcf0ae
SHA19ac1f368d9ef8f8fd9cbea7876bc194481016221
SHA2563398dc4ffa320e6d0514b9ced0901e61de0054ca1ab63b6765573097b3d89eac
SHA5125f377b94f50c0cd6bcbfe5058ab515d98ef2aadddb1a0162592d80e386fc14e43ddafacefb0282c8f366ce7834c13a9082500e1e03dbc2a2dc75a299c10ff01a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9de88a0792b47a41f79c2330c7a40ed
SHA1cfcb6e78db3a7dadf3ab39c33f6f7ceb0c724781
SHA2566e9bfa92d915a06db7524f31a734a2929aa98981c5c0f899d767a868c7376bd5
SHA512c89108482deab4c224d269acfbedeb3299abddf9b50687b29461ed23758cf522a2285d89b718164f0f07f5a1c35657b680fbaf279fae3d718ce232958935fac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ea9c93cf5be3cd556789500acd5ae3f
SHA184f54619a1fa1bcf221d25984e462e2a74e02bcd
SHA2569fa7dd9c9d6a41e134401101f0995caa325a885eef3e2ef448d2d69045582b57
SHA5126ba55cc1f7a25f3e284cb7a55d802186943046ed99a51eec76f2aec131af0f43fd69f9717796c4238442bf4638ccadc7e27e4a642dada323c54deb3c29b5ff91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b54db4488ea904685b1b8793128cbc0
SHA12d923cbbbe3a0440f083f9496cbb52239d250f3f
SHA2563674b9aeb8c0b99dda57fa30cfbefea99d530c618167e3d5764a6f5c9df51340
SHA512b6ad05cd38325e94d8a8c7dce84015ddd5d17d03b6c760a03c0dcf7cd777f01574af769dae51f20b68d5cf141b23f3d6dc04f380448a443c931f78ab05af711a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fc8c1e30ccc9740ef34d3ceae6b953e
SHA1bce7ebe88b4c2c667572136e4fed774bf1bcae62
SHA256771b428f3d2360c0894d19087cfb9cd589fbf97e95c6c6370666d099b0327331
SHA512b7645c770d5f5815954104d27f447c8b7e6508420a71f1af80f2b424f586b071a1f22eed6276ae5c0be3f0604ac51d1a6dadd4d6584d481baf7ad7562fdaa128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edd831d778b1d7a7719935e449231bc9
SHA11a0f9da696d75670be09bb4b4b728543e03d15fe
SHA2560d7ae5e3fd5c1cbef792c392f7435319025c4be11554d4adf3e7f865f06cc32d
SHA51282accc79c1b8a2bc029947b26b59cbb378338cb5f6b616ff8b5a0841da9799e2743e389e7eae36891afbf8b1e9d036a218cb44b569fbba445dfac35d02b408bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e3ec62a6a2f4fbab29d8bd2c9f6ea2b
SHA152a8c1fec6b2770c9065ab9b43fedeaac0bd5bf0
SHA2563e5ffcbb5241644baed6a5ac2000980a5253184ad03c124306ce5a1e1745893c
SHA512482b6196fae38f658356ea572460d1d1f91aed286c870f23a5785e49e620b24cd0d70ad31bba056112366f957d4e3f4e0303f0b6ebfe8214d7df9d46747e68b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5600ecd72be03620313d834986799d6ae
SHA1269950c43864941a3933b3e2e1012d965067fb7e
SHA25623bc24cc28e879ea28af3dc8832ab8755de73b1f8cb1f62487d61c7b7f3ce5c9
SHA512182166be12c2e40d0736a3721277a56ba57de19f39398447beb18b324b9bf4338c774a553207f2b95b1e63b4c968e7f558a2d4fc48659c331452978ab8f34461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529284ceb25773861f98dae1557feba2a
SHA104b110098f6f7aa2d23b40159501c55d4bb21b03
SHA2567d74d43880f6ef0caf3f54bc987ac41dcda24b72fdfece07e5e4b3d896beebcf
SHA5127901fdf7dd81c362485cb04dc6b31bc91c80f6a5bfe3e4759810b663458f1937525c7e2d80e138dcb24a5b9c51a5d52245a13018a3e791fee6910cf225f5902f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c9c9d09a5b6286da3658ae7dfaabced
SHA1c92874fbc34e22db31a6c38d6aea0e01e792488e
SHA25654ee8f1ac5c8edadd5168da44f03beb3f42a5d987ccdaf964753177fcef8cc85
SHA512b2120f7680556ec5ca91e923f421afaca4198f46d66b6ef9085309fed20225ee6476c3c55a09b5e148684419220a49da722c0bed321ec96fe4cf076f6532719b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59460b793967817967c68778467b2255f
SHA1ddcede725ca8b29cc922bb2267539064d261335a
SHA256011b71ecd993e5b2679b2b19ccf95ec037af08cb524729c3486c786b0b2cf59b
SHA5125a84d0823b4047b03e4575f49172b39cf55524246c6f3febe184c759c19f7c43154c807150586124b533a5413391708c62298f4de5ce962c58ea73d436529ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57639015f49455f384802bf2130bb76b3
SHA14499fb69ca034b942aded2f1f01dff8141426a16
SHA25665749e640e46c1de60c21a9ef40ee81cf59c71648017737cb4c7b96f6c6c34fc
SHA5126e3fa784df7bb519b150a5127889335ce91a1f1da60c98109444a8e8d533f8eacfa0eaeaa2de48ce0f5ea8bbec33162b8530cfc00be69f173f90208b3d2cc4c2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a