Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 11:11
Static task
static1
Behavioral task
behavioral1
Sample
031f2b35305d5bf4e639a839a2795d2d_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
031f2b35305d5bf4e639a839a2795d2d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
031f2b35305d5bf4e639a839a2795d2d_JaffaCakes118.html
-
Size
332B
-
MD5
031f2b35305d5bf4e639a839a2795d2d
-
SHA1
0ec0238013eda76516ad3f1a6efd6c5a95a4f028
-
SHA256
26d243c384b3f47577c0690822ddeaf52a33dad98fa3a24a9e0541c71b8fa6bb
-
SHA512
862d1193d32e665fb46ef1d3cc911be7dbd43f3cd4aa43744184e76a14fecc2f6edf3b0b630380447a4b5775171d67bd44fd9fa5d23e56931d73ae902b16e49e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4BC0F71-0486-11EF-9AB8-560090747152} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000007c8eda6d9a51cd57312773c8b846c8a1c7f6227ba6d3102c59c98178c38b6819000000000e80000000020000200000002e577ae6d6170127c4f7401ebe27a83eb83a2041b49674da277815630576485220000000634ea818e309dfebfb4dd58538336e6ede14b942fe0d7d7e6b282c9b122b8e3140000000a980c7ee63890ea4aa7f5a36b2a8691e70ccf6cad75370a09f08c42d18e8deaad8c305baa2c40281e7003e1b0a1172ed14fedf496d5a71a4463d3d8414dcbecc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f53ca99398da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420378129" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2816 iexplore.exe 2816 iexplore.exe 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2816 wrote to memory of 1336 2816 iexplore.exe 28 PID 2816 wrote to memory of 1336 2816 iexplore.exe 28 PID 2816 wrote to memory of 1336 2816 iexplore.exe 28 PID 2816 wrote to memory of 1336 2816 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\031f2b35305d5bf4e639a839a2795d2d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aba2ae25ebf6763d3a61895467e48071
SHA1d38c43112b3f634edae7f09b04cabdc5463c1128
SHA2566e893777e624ddf145e7cc91d5d6c9605ef5b54979da553674dfc93b41d9717a
SHA512f7f59f50c66467e9fcb0e05c43ee6d3ff1e3a2b00f5f106ee5263fdceca62f1c26dfe920e7f317a4070ed4600b071001c2724cf949724bd3c32caef7b217d00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f4ff1f46cceda340b2030203db72d36
SHA147fa59b7de931c15cb152d40ea9c1ad670166919
SHA25683bf18b553fa05b77792710074c25807b639121f09490876ae75409674b83ee7
SHA5124def0b9ec93791ce514573182cc895b4c205d0c54e864c2f8bfb65a4884650c4591574b388e4d1c0eedcfc81a4614ae53629786e3074cbf6b8d78413fcc039e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5128ef6f884885587d5d232d9b088b247
SHA19401c7f43b92244706902e586d7d425633df4c64
SHA25688a071d7dd65d76e4a8a542b667828d7cdd218a67e99cac4720afb4fda9fc664
SHA51212cfeb086515fcbc1763e647e104059fce6d941d23fe0f0c770359ce263555d97fe205c7541f934af9a7c6916cb1bf4f17960b73df6560d8acfe79c72490a754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53164a155ef630543a3c53866d6ba51c4
SHA1e661b9b88ed6d61b9d1604309b06f0327f0c657c
SHA2560345f0ec90429528d6b4ef98dd0b88d223f1e73d732fb6e5daa004286f7735a5
SHA5122daf42d23fe5045473cc9902dc940d4d4bcc61e0322e86c257c4bdad6b877b0dc790c8d27fe17c9908d6ce5600c4f3a64b9a19f8573c8ffa9303a661484eb652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0d64a7e5b0c91aedb90511781bb8e34
SHA17543c0ba291b0bba245001f05ad0b2cf722b65bf
SHA256da78393305da49831d32a47ceae36c53cd4ae8e319dd6a56399bbb8be0a15121
SHA51269598d5a76ad77662dfcc72cead302c72217439b627205f4be8bbb9c9a6575fbc5f2d2409f11fd91bf1692ed476769bcbbb088abcd61b6e10ebbf5f2c3a6aa98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a3ec84acc324fe73de3b652c4c4e1f8
SHA15be5c922ef59a643e20a644234f43c0f7a095a4b
SHA256248db873dd37106d10fe017a18e5d93af47f51ecfca79f8770d2a9c57adb73f1
SHA51227b1aab6fc8308bdf64dee3d1eb17334bb4c86ee4d10333d4eddeb3152781e0ea0021a03f808e5b3896d29bde9a4c939046822cefe4692ba7c44f3cc9586c6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a549898423c3286b9018e78cb1f85a2f
SHA1d3a2e89ff70439e8bd168d43b9faa7beb62ccc51
SHA256e2c1d574b375d6e90ab1ca9bc2713564aee6e54fbf3932a55a95203dddf99811
SHA5120c4ae57369eb54e046089412e0bce75c0e81e30615aeda4cf9ef9b7c3b6f85ee78e959a8b86887d6461ed5160ee4b54a631f0691d1d074406aa43d2e944a038b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c681ac87de228539b567eb5b17c5b5a
SHA1649f841f41950d8b2cf4bac508dc33c22a08d52f
SHA256907da2d4a3eb3546fee6bca6ab7eb75103d2f6a9d4618b46ad8ab33bd79068f5
SHA512d135263010c94f2a462c2887cecc52de57d07775ed88a569fbdec3f81cb836638b5b754c9ac63547e07e4997bfb5f3146ed5c36a613d87b54a2ed0f1545fd722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d22ef7e000d33f75b138a828c14fa20b
SHA18e70ffad0b59fc55fd441789903e7f79b69bb284
SHA256ea7d22c21ce6f1dd9b4164e39b69687f91e99b3b51b4529d54fe859b9db28db5
SHA5121ef8f886b8620506bb290d7306c1fb4b52afc24651680428fb8bed4671c247b23687cff69cc4a940026efce5dea060370515208eec2a16a5af2a45f86894050e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c4dd5aa7b467d2b23e94c28833cc652
SHA1ed27e8a01c5ceadce6ecce6adf92d231af4c044c
SHA256c2cc9291d55986e62c54230a14635cb7c93087e0084a71bcc2e3a48d0150ead5
SHA5122ac5a3687c6a8663659a1c78deebea75ceb1cf0befb82fb1c67b1e68db1a592daac73de81a1478ab5c7dd01b8dfc8057421f271d7993050e75d581180bb794ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f61a88f52848177a9129de87195263a
SHA10bc37d4bf5341946dc5d0512ef67b9e65960d3a6
SHA256b7034075e80b32bdc8bb8b0d93d0d11022f0126cc679b83d75a3c749ea7c4f5e
SHA512b0772a1520204a6b7458b7d5d264d1b17408ae1a20ea7ad1191111759fc036da2ae74787ee5a5feb2f269e007c44a200233b3feacca124bea13ebcca05e208ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd02fc12d73de9c5403924c46f801d77
SHA10cb7f78b1bc91f65033bb2290a21f73ae8cc5a29
SHA256d99fca8b01ad935e2ec5e76d02d746cbe2f4adebc9edc228f2651c75626cf863
SHA512f9d06b7ad98a0661d62d91abf9e806a196ccf5bd45b783b5f2269d726b2ffd98cf7d24deb92f4ec94e203564fa70e44370f87132d699ff250b33656c062fc319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc914f4762062f699e4d5981be281a4a
SHA122cc5be1f03d39c43b647926f0f3731db4d7bdb4
SHA2562d181f616ee29576fa1f29c63102acf6fb99b5af45cb798f53a0108cf8a028ca
SHA5127a79744474f3a67ee2856d6d4aeaa1d05fd4d5721ade94965202a73c528b4c1f0b0f89ba81f23f1ffe6b5c5cde6166d5f61b24573f5d81fbf3816cb3f3bc1ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5357e27ae08bd81a2dc33f3b59a5f466b
SHA14dd73be044da245b81f601927c4a8a20b17e13ca
SHA25629de8dac899b286d7f713fa93725e581053074f10e929ada95e615dcb9bd21c7
SHA51281aeb500a6c74ce4da0bff4c466ee46ab5aeec2795e3c078aa5aed93f1f7dc62ee7cc29775418c02e495df6344bcaaf807b4e3638029432945c97ee9c2100a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5476ffc22691f2627e6458237a0269a13
SHA14e86cc23180468276715811579b6c9f6a8b0d4b5
SHA2566c5092572dff80f00671381ff3e359562ccdeffa7199a62c64cb80f3f95227f5
SHA512130d510ebc73f9667554d7ef3770425daf2a46245af35538835acca388fd8d795acef4fb0c5797106c3bc5ee9a5eed0ffca6625f7ae299c15218fc51f1a53a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b621cf5b716c40520229bfa35850bb02
SHA10322ef31459ae07c668188dbfd5404e6dfce01f3
SHA256830d1d1559b63fe8449c8e885c24e12c2d34e952abedfb2d1ef46bad5b021d73
SHA51284fc9a3d54ed9dc466e3fa84ab3209341d8508584eca5020221fe98d28f5f551282e6d53de76579d8d96de186ae64b691a16e06fe370639eb5f6ed38dd337fde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa8b8d979f5a3a67cc7c7eee61bf441f
SHA18ac410bbbb8a9d6ba6b41028577edbe05c0500d9
SHA256cf583504496bb822f8273fe2f59c1182931b64b3272e17dd54098f6532f17c32
SHA51229d710f806e562194d4f59b695d39f70f60f0e8e3ff7d42a4fb4fef6ae31d2b287cbfa551e17687dfb350d810ada1986046a44f12230c7c498dc7dce193468fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5445ad2242dc50d4f0f66bf0707d4cf5e
SHA1e2e663a12c1065214ff5175cc6d6089b4f674f45
SHA256d2335c8ef594732444a3339da83d44617ad98d305152078f4680b720440f7502
SHA5120d1ef7c87756d976d9d44262e1b2db98ab8ac104668314677aa27e6ccd9f6b3fd0817d5eb8c88d3439334b3047a1c8d1c38f59ef9cfa174e9097e5e3b1605e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f80356fc8c054cb3e0f95c6367917b7
SHA18f434971c3bf72b28c8f95c685f440efedf0f832
SHA2566c082e4f70423bb0b86006cf17b97a6245d4bfd3e8f56d7ec60bddfb444078c5
SHA512b2e893faa2b83d7b605f5461284efb39d47675ae187d36d5670a90f619bbf11c558bbfe245c7fff32d3fecc1b582898cf09fd2631fc9b39701476531dfe1e658
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a