Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
008543d0f118bb074015c9c9d6cae8ea_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
008543d0f118bb074015c9c9d6cae8ea_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
008543d0f118bb074015c9c9d6cae8ea_JaffaCakes118.html
-
Size
3KB
-
MD5
008543d0f118bb074015c9c9d6cae8ea
-
SHA1
e641f8d48a8ee2aed517663ed83677dd7db1e2a8
-
SHA256
c94c5c9554323050b691d49041e99dc28b165ff8e88971251e856c1966a9ce94
-
SHA512
7d6c728a39114ce4ac234aaa7339293475cc1b7225648bea8f0366a306fafc66e29c608083acc1d321cc5da1d921f34ad69a1c07e43027246c09f03df4869393
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000097838432bf97127ae28ed749a5dbe6b8b1bef90ccdb39959f8a710a478493083000000000e80000000020000200000000a9d6d9c459d9dd776e9290c6011cb903b3957fe8b5673cd1b2963dd942d84462000000054c7b510b2eb5b6572a7116143ff2dcdf634f1f625d240b0722fd16d2922213d400000005736107677997b8c44f3984075104a3e85b753ab1f42506e62faa43caa26b8573971cef1b87db552090f752924297d65f2d87af55f18d47f44b85ddaf8d216ed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420287538" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E849F8F1-03B3-11EF-A635-D2EFD46A7D0E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ae01bdc097da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2304 iexplore.exe 2304 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2172 2304 iexplore.exe 28 PID 2304 wrote to memory of 2172 2304 iexplore.exe 28 PID 2304 wrote to memory of 2172 2304 iexplore.exe 28 PID 2304 wrote to memory of 2172 2304 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\008543d0f118bb074015c9c9d6cae8ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e60c6e7cf7ba8cb9c28270521601dbcc
SHA156a84747e7b2ddac3756e43efb0eb46d69766151
SHA2566298edefc4e4e2aa3a1a4138600d9cde4321735a4fd68c4275e62b01d75914d3
SHA5124550f422c712d3bd5d9eba2c9b2d6abf425f9af9b79a634275dd0ddc43f230d354c8fcf1edccef41488f18a2492676e9b0a0067438a8ed293aa7dabd24a04cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db17a0cde5614f195e1f0cdc8c5928f9
SHA144df36509d3b5a3b96a7abdf43737dfdec5e59ff
SHA256cf3eb3c14bf825addcb18b1c85430261f3f62c18af5c354a071239a56f29ed65
SHA5124441c8a35ae0cfea3d4693fc5da55aadd01f923d1b3267c3f85c692114417f19e687c8c36008dc5668b545e9065303265f9146f161d1be2ba3ec4e72d45ea6c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e10d154bbe1f69cedef0f70bfb1fc5e
SHA1d962fd451b49279c6aa03c8097461960ea5d37ad
SHA25694506a2e2db8e1bc3de8c689105b68d117a43fe61223d5ed3610c23c58239854
SHA51270d8645a190d80ae5ad31e1154468490dceaa0e85587f755f1f5cbdca7fadcf558a42d4fe3301c2dcfa9d0884f3285468ed231d5f9a6a84a5d477e727f82b26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5682ab3ef5d5313f16c5e4e0c762b5de1
SHA1f222c6a8ca167f3318db8314d4682e32eca90630
SHA2560d49f6a87b0b87417ffa25c40bb64c54e574ef38ed3e3b6546d4a9ae13ca5964
SHA512ec8273dbf52234cf47be6494f856bb04ea53541463274eafe3bb6a27349eabcc330b6f7f568f6c3d229fad9440ca19440b93f10b5ead7a7a7b5445917d21b452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d88bbc4d8469af5ca882c3f8ae97c8d
SHA1116ecbcdc3b3056f980daffb9a91c1b480729f82
SHA256f19abad874dbe3096906f846051b361039d8cad9118feccc209b2c1ddd0650ed
SHA5121dc65ae801fc172713ad99a8631f1da51af058b5445fd98b1553b37f82b9eed9ea8c734e53ba143db06875df1b1e7c79f77e49c3aad23de1c170c56753913661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a09d78e0b5ffd87392c2d2c693e4a31
SHA11c3a2002fdf50de2f1e13a820dc09d396ee2a2a8
SHA256866826e3dbe72c73f5747a5e2e567036b532d364976f7e1c10e4d02f650fc0a5
SHA51204ce8781f91a51ac120324eac8cebba68fe2c0cd8d0c1363637db4e3103d9f50f9911ad651cce4c7ae832a83745e0521d05e052fbbca4237e595d40789f951e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5449e2134264f6556f006001a73a4c346
SHA13cdec4c60206c1eddea37a15c27aed809621eceb
SHA2566df7c4b664891cb9837755fbf017af00bb38296089eeeb0deb9c33bd72078e5a
SHA51275188d57824d7dd33b8e722bd469347894e303ee1e3a41894443093332842a972cccd6fb7ae14b683b1a4b9016214660ea36e862c4d2ee0bba5f682e79b82b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52608f46d3206aba78c5c24f0924862c0
SHA1a616156b85d08bf22bf4e020faa84f5f6b567b5e
SHA2569e0a35fc0f94c5b6946bdbebce015f936e75926bbe95f8e554e27d70c7b321f2
SHA5125534ddcdd775a945432039d3eded7e932ee6a3820b3693b18454c7ee7834fcc1e4e20a74b60d0c4fa7db22937cb19832e6af324684505cc4ff2a413745a96f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5874f32940c2203c620d5578e8f40b5cd
SHA1fb75433a570add32c086602f7b21df30114c26be
SHA25623b1833d27b0a12947d637705b731ae5d59b16cd075402239fe3f8fd4f6fe814
SHA512047bd502e80de8f381fd9eaa754ff3f6c1b09f0307488ac3e865a672c032428dee405aab29e2f1ad9668abc7b10be97d451008b33523bd2023b2f226737f4fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536f7670f80aba426c897aabd379c8205
SHA1a861ba4f96b8e38746f8c367fa36de329b15acb4
SHA256d51f0184fdb23c8dc0b1d9f8bdcfbe057060940572f45ab2109921a0c7d246ba
SHA512eaee768f03fc703679caa5a321e770ffcaccc1bec4bcb1e6318db5ec1ea8fee425126e9e1086481740982700001432121da6e819134142ffd61c24d03fc567fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb38fde241e60fc1d99ced648c38c3c4
SHA14621d810d8eaad482aaab2546189352487bd3efb
SHA256c9b0bbeea08d5949346948cc6bb9ee859e1b73936e16fecfdf7f0bae57ccd47b
SHA512b59eda350c565bb94689c549fa6b45248e057133de6bda7d276737fc1d9dfca492271313f09e130eeacc24301cd04fdd2a7dc85982707ebd24fcbb3058efcd6d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a