Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 23:29
Static task
static1
Behavioral task
behavioral1
Sample
03def82678f65edfa383e1f521b8bf45_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
03def82678f65edfa383e1f521b8bf45_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
03def82678f65edfa383e1f521b8bf45_JaffaCakes118.html
-
Size
3KB
-
MD5
03def82678f65edfa383e1f521b8bf45
-
SHA1
eb3c84d775c11881cfafaed077739ae3ee23ca98
-
SHA256
acfdd0f930e0999a963297b0be7061cb3e5324d6f44520d60c332d29632beeb2
-
SHA512
38c65de41dbe49a3412ab0a2affc69ed8704b7d2c35d86f1c87770bff8d04f4d07ccaa9a3944ac4f71b66db6c0db19c6036aa8781b73ddf5fb49bdee1ccf1b61
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107d6cc8fa98da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420422419" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000d94cb88bbc79c831bb9a788fd81c956184ac088ad0e0b94cb5e02389b611d1fa000000000e80000000020000200000006c8ca1029e5bf04be965b7f48feea73419c50ff2e8b3c5d95c4091ac0a9f3a3a20000000794780ac4e2275638231e54b2c2cd64947ac488e557e09ac4d5f37f96fef94a140000000801f63e77495e3ee05df57bf121ad2e68627a94f2af44adf8bb6375bb592603b7d66c4dccfa0f603e186820726c0b5e259d5f95f1ccc8fb91cea520bef8c73f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3A3A8A1-04ED-11EF-B7A6-525094B41941} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1304 iexplore.exe 1304 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2228 1304 iexplore.exe 28 PID 1304 wrote to memory of 2228 1304 iexplore.exe 28 PID 1304 wrote to memory of 2228 1304 iexplore.exe 28 PID 1304 wrote to memory of 2228 1304 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03def82678f65edfa383e1f521b8bf45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1304 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb9335c07c812eda8a26f9b5fe303c99
SHA15acdd6d17c0cef5f3e3db68e02c24b07904ca502
SHA256b048a105200aee462339039cf335b8789b711cf5f4db29d3d5a6034694ce98da
SHA5124be3b5936ef7ada0e9d06de11b8c4caec80cb79087ee4a1aeebba41e8c77fb3376c567597046e8fb24518a7f653e33e734cc32543adf4bd9d227f99a6d75a0c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a460fc1dcab5e4aa4a5a5008fd5ca0f3
SHA1cb2f892179f5055c50b3bdb3aaefb5d05bdc647c
SHA256d3c6c70759f3ca08eb58ca94dd91d9791f92b48f120a777f50b0039746f0da9a
SHA51250f100958c7fce17b8a8904b3bfcd1260e5f8a8289d6ade19626215500ff3fa15b62ff6f4eb3708b0e911d51665735e6ea8a50019d2495629adc8b1eea6d840c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52539cb355d8bfb706e3c8540c617ee71
SHA1fbb5c4f5c13b0c9d55f64ed10f5e9bc942288440
SHA256e0cc75103df567c486b3604872a7360caa987c62525442ec6b7369229f7e046b
SHA5124bf174b4a22364cf1e5b03614c31662716f2e4405e17d4dc44214d8c7826cbf395b34a41765887b08a4b6da312c639c5003162541b8a0fa3d34ac0041a0d9a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5187eec05f411e61563b93af562616a7e
SHA11510bd936f3e56c51e46517ff3fed3e5813c3d6e
SHA2563aeb5c1a23a8f29af804f2b025b0c26f67dd2e8a91b6fdcff1fab8d0c9bedd56
SHA5123cae389dc8e438e6f4c76309338eb3452d14860b05cd9632692fed5afad03dc806ad5698e915121a83f0dd5678a9e3764088644c56f3358c12f09e35851de828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e11e25b76f0f89a3213d69c368d227d
SHA15191880cc064d16abfe0a25383708f10cb3de7b8
SHA256e6c87fd70131a46cd57aac09d18fd170871c7dc819963a7dac5b751e24f1736a
SHA512a07b4765b217993fb31ae38337147b0d8f6e81e92eb2886ab1e9043280d04cbb37cfb3a75c3c73c7beb9ad25f0ee604186e46edc30bfd878fa9b9a989466f32d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578ad0440c00ea4aa64c163bc22096ca3
SHA117f33ef9b8a97443b3549da40cdf08f200752a24
SHA2563e4f2db160a3ba64c177f0b297b1b3075f91599f6269a04c2b3a5561cb451f29
SHA51212ada4559ee9e8bafb71c56897705da90152b39455be6b68ebf8c5293044857a2be45a3121f1cc8a80014bf92f93dcf1bbfb9fb577574f2dde8241bd6b8607f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5831958b55f8d25753f372a20c19a8b85
SHA1e11becc87eabded50f461e200fa3d8f29d6ce3ee
SHA256b2a5679bf78c680f20e28003e0b8b99624578ad8f611750c3e6b0652eee08144
SHA512b8782bd24d2b0cb5b2267cc705c684860de8bddbf592094bad17a70b06019775f446e7f56f185296e4e195bfb542848b0dd7c588f9c11dcaee1a41defc600d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed49ee6412e1be767666e9191880b7b0
SHA18cfdd12b218be0bb3b4bbf2fc3e26602f5faa53e
SHA256fd8eb7ab33a8f703988cef25aad88465cf61fd0ff6a031afe51ca07c7a7328a2
SHA512664ec3f2be57925c847548191334e49cfec3df4492831adb775f13fb9c8ad86fcbddb4961b84942d7a88fdc7e341cee7f82c3d69e0e56cc33dc8f35b76c1bab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cdf1596171602f01ec58e11cb99f98e
SHA1ebd17421e278a1dce1b85e36ec559d1f6c382e64
SHA256c9e1e12682842c24e680ae01df1cdd1be7ef852cf1eee53fa3159792f5b16358
SHA512ec72ce1134d5a3cfc4b9e673cfe4fb37b7a8ca2ef3223a97d687de66e3e2e19d04ddb1cbfc2d4ded4e14abe4bf79fb33f49218b1d0fa3c14fbb23938c9890c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e00f9e3900399653e8e937bad0ac58f7
SHA17179d2a8ba073e0b1ce2e8b4c252c17c59df9d05
SHA256f7502c9e7186f86f057b077c42e975f1ab513f95024b676c6b6bb21206119e3f
SHA5120637bed09fc914df048ec32d11aa888ec6ad6d45357fa4a342ef557feaae52c2e351001e7fb3c4297ffbc9036278d3657a9af61bdd7b7c6ae5de0ce65b35a4dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52944d8fc628ed37b4ecc26fbe49e4c3f
SHA1fc1c719775b756494c214d229bb3d1a78623db27
SHA256812010a9c925bd256ded38569b62b6037dbb66c8f0f385740b45a7304e1201b5
SHA512b236f4d803ee14292d8f184338cbad8464dc1c2681a117c4259361ac352eb0471f7df6179d502de0be8d43bc3eaa2bec9b5b906d82cc2034f8124b8e441cf749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2ff8f430f082675840fc5d18982e7aa
SHA183b5ec5adf09cb472457e0bcfc141eee9ca6244d
SHA256327356c0db68e9af39d92279c3c938005ea4464f7c18b96a7501a450b2c3b89e
SHA512fcb6ace8f70f10ad43b70375d91cea0b54adfc04a2ff0a342ce3ee321c20025995dde87f5a0dac970e464ec2209456b27081d7a70f35bb9c949e25dbce2b7481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7808e7765136796ec9a78b5bb2ebb07
SHA13e33a6f49d77f3d5c6f18ec362f5c23175cefbb3
SHA256c2aaff88a2f3f2dc96f893596425c72b699227333ec7d58d8aa13da9013715a4
SHA5124aee865e6bb3f2fbd1bd5b8a44096423ff16e0630c48760c3681759979736abe8d44301df9d85c6e14e1c792f99c291bdcccfb79de94259db2451490c509762f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56225a227c07f352ed09e6f85c05b0a25
SHA150de5c2233e613ea97cbbb34c088b2df364cd6d0
SHA2564d4e61f98ca10e8c0e0a12b55406933347b09fae1bca4333199b6699b1e5a345
SHA5122b21974e6af3e76e6b61c657f6bac40d629bdb9f8f8c47fdf1b652657d8c13b602537115b63b2bea9179ec5a19f10ce6e07b54b40ae458c4075645b130ea7fc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5329432f78f5b1095518bb956b642c388
SHA169d9dc543c2de6d62412bb846bc93c441c0650bd
SHA256aee68f47f6542dbe1940b8724a9a7732f672b534f5e072a0fcc438d615cd6280
SHA5128143c76ce2a7104fd49bf2c21d6105bddaa37bd74da4023eb448b895db44ae7646741003e2f720dacf1b77ce2148f5fc7a218b0367e5b4eb6a9383f8f5e20106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4bce4f4f6b6ab83d4bc97788e728bb3
SHA1a40e24ddd27a21db60549ec9f297ef161754e245
SHA256ab35fd24789d191ef8b9aa574459cd2d9907c3e437b8c7ca710833d229ce3750
SHA5127257b8e779182889ad213fdbeee175561c71b9f2ef1233b1c956f181e66f8a529373c19dbcf2674216311835b175522494166eb885031f66ab6ddfab94622adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5437bc87d6bb862c36394aa80d241317c
SHA18bd692e2132379a4e65ca3cc412f229d6daad02e
SHA2566a1d54f1493a09c1d9efbeebd3a6e06df2f7c3dcde6d6fc5ab9d206b6027743e
SHA512cb33c3da6d8fbde2fd9def0393c7ec047a4e9f4e3d0f6128c0de5eef825b48e48568538e57ef1a74009751b1e0fd14d664b07384662c9c498889e9460f9a0dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f267e62ef8397994d2b6566011118e33
SHA1ef99932e858b38f60e3f720c40cbbc7f8c503ed5
SHA2566da3738f3055b29f3791fddbe0d90eca1f60bb626f95469bf8dccf797809b1ca
SHA512268b42546b6cce24b86c1b0b10e04a4907b1cfb0da83feb0c382a54211774aab526c3bb1cb3754e5896906dcd6d30e5346d7f1cc8453da4b36144aff8ec0fe08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8e43efc57678caf0cedc95c336ddc8c
SHA138f155785851a62fd30c7161c474827468ea8cfb
SHA256881049af98fb27b9c588bde0a2cc64a933b8d367742525fba6eab00f0aceb34c
SHA512028c98c752fa1a525acd8c7c7e8571e76011589450e041973c29202dbbda6ee837e699ad9251f8aa919e2114ec11b9cc9b5f8b2477d4220132df93f786ad4dee
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a