Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 12:45
Static task
static1
Behavioral task
behavioral1
Sample
03478ace125531ec564e633fd6c91d7a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
03478ace125531ec564e633fd6c91d7a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
03478ace125531ec564e633fd6c91d7a_JaffaCakes118.html
-
Size
2KB
-
MD5
03478ace125531ec564e633fd6c91d7a
-
SHA1
8151223b7868f0fe1a6dc1bae35f26e80295e440
-
SHA256
a907400382c92c75f9d14367f181fb30b51ae816400b6bc16fef9822b56b381d
-
SHA512
36b81f6bf7cdd446920261d217dc8e7b849fff0f88a65a8255e3bf4de8ffb18aa1966788b4bc2429177b5fb42b217aff7d96ae4041945ae3deffc54b95656328
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000cadb36d6328a8619e01cca0dee083363132565e9f1210754a057e19f8b895e6a000000000e80000000020000200000001fa13a9716611b5133db99a3c5005d4ba8ccb1120f87a3d6e8d92f79d97bc96820000000cd652f82709342dc95c5ac17962039fa0a058231d9b1b6a30b79a4bdd3744d8e40000000e037ab4893d4c0a57e3f6b1e7a8b3806fe1deb3d2a85dea84b0c21a92137f7e37e9196012afeba0cf37e3528835d5c4261318089c8d043c9d8ef4995bc6c90d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17C92D91-0494-11EF-A1AD-46837A41B3D6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420383824" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a540eca098da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2316 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2316 2308 iexplore.exe 28 PID 2308 wrote to memory of 2316 2308 iexplore.exe 28 PID 2308 wrote to memory of 2316 2308 iexplore.exe 28 PID 2308 wrote to memory of 2316 2308 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03478ace125531ec564e633fd6c91d7a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8894b4b3a18e68df4be52aed41994a0
SHA1a11d2243443a02dd1efabcebb122907bc0f733d0
SHA256b93a545b5fa68a75b4e53def613f1c3a2f1f81d09d6f0c66f600e65ee2cad099
SHA512cb54dfd4694f8cc4111bf9883978690a450d6040671b3258f61c8416fa508a09a8f2eeb0d8446b7b544dc7561f44d56452e5b6fbb59c4cc7e2d10e5b0b1d1ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59208b525406afbe76557df01000d3835
SHA1bd211e1be0a1721ba7a8116faeb00214aae44439
SHA256ac9e170eb40ef51d9c0a48eaf14bc8982cd4c2ad6789ecbc7c3fba8b6b56af4a
SHA512fef895eb90b4608d6caaf2c7d3b3cf025d3917f26ce761bb9234b9326fea6cdbbc9340af3c76a26f1ec51b6a0e0710b3c378ff0280b784c5c17da1b071862999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593e33d94e2219eac3ec52e9e57ff43cd
SHA1a452034a46ebaf03973057915e97d1c3302ad478
SHA256b8779bb48c58c23e0050b0a07f4d2381aaebeac6d086290935544bdcaf6a3f68
SHA51233409da6479ad92e99447bf0f4a22782bd0a14539ae956d9ae60bd4b2b2f287a842f152c9314c2bd6020e9443b4e7e094a9e63e967539a185886792bd3450a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5740f2371745e5b278e6ae3a0ec55c920
SHA17c91c47a3ca20e00a10a71b10fc8e4fe91d27e87
SHA2566bf80fbe284cfdf481bf8eef6ce4a999c0f5a4c35bea9dc9d09d91a9d29a8825
SHA512fc1a525f27cd94861c32c8dfaf6630cfecdbf7a5ab3cfe515d2a0858aec6d101d69c9684598dd5f5abcf0f5110a4f48c1db829c18b6821a515dff4fe72380145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edb84d7d944e197ab36f553caf118182
SHA1667607e5a2370b99acaf8dffa0b45a99605a48dc
SHA2568d387f8dd165653c38224974b10cc8c72f3f47fa6786be923cf5a93869df66fe
SHA5126b3fbaea11c62f713c2a89868f2cf87834dfa2837ac55c99ac463aaba4691a15a056713132dd57df7b02f3b6e6246dc7128f776cc5898186a3101daccef4023a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b04f34089f5abcec4d4fda6bfcd6d950
SHA1d5ce4e3d085ab2731a7ca28892e8556256083e3f
SHA256e4379f0af23b20df8de0c3d1770e1d974b05680d7db4fc8b58764826a41867c4
SHA512d80e7a45331fa054fafaef438e8546f5199d2d2d622f25fd5fc952b3e4b0f993f8c0065a535b4486f99ad83bffe5debcfcf5402eaefe2425c6d65b99b5314cdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d568862b29c3c75d5298f67358b5e61
SHA178f2d6cd9a157a7e910da4de194c5d846f0162ca
SHA2562d73ed63ec3fa6daffa0b08f3c0018a1cb85bbbf02b0108b015c4386337b376d
SHA51248f42a42f9d5fb174003c9d7cdfaa812105af17ffdc24b67bf67836a095e4eb8794b9571239ba286cf1fb9784a80285f7be443ccb050e2a97bc4e50a87b3d8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e0bc4a1b51e8c3bf48e064b7830ede8
SHA1b638845954cec24753b963e4ecbc41c72ae04385
SHA2561743dbf5fcb3e95209288895d6c767995a217965dc699b50e858b70ec3865848
SHA5127b55a7ba5c29a2a0d84c230b9ed2e0a9800a2b5ef39ba9dce47e8de69bc85d77c5ecb1d2f7a4926cbe6102bfe10b75a288c41b764678e303105729afa43bc7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557e48d68dbd6bc13ba54aebfaa814c5b
SHA1f6e61246f8cb1f0c8c08fc43267b831b79912e99
SHA256b3533f41344187fbd4cf4620de0f4b7d01349ab97760021a5a4671a3e03ff509
SHA5128629640035844848c02d80bd12c7721a7975406f76f038c88fcf7e145e6a656b2e3afb25498a039fa6fbbc4579e1aa50dedf59f8ff07e4460c6e640ab09f75b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5256cd8a112f93b4ab876333e1e93ced2
SHA164dd0d6102b016cead1de32d1077e4dae5d646ac
SHA256555c7c36dab85559283d726f3bd63118764d566c056de785c44d5267c0213c7d
SHA512ac6ce56a773a196360e05297c5094482971631e10baac7eec4e7bc28c9015fe11d02e32fba62e694f246114a1a709c465468de06b73311a54a9b4023fb0d4b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588098c6025a7325bead4f35dbd801cf8
SHA120c51120acdb9e72ba87f89daf76caf67ef6d896
SHA256217b6e2613211e88f5549c250e7e1aa39130be50c7179a3914641a1b6b7d2432
SHA5126ba8f1eaf8816886c95e1aaeec1e0308a068fd38b830e22028b40adb5f31cd7dd9daca2e928ddf88a589f60eb5c8497dde50d51abccf5f2d9d5e8893b227dd2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502e300edcd54ae6e74118adf34314f6c
SHA145c409e5be4e7ba4aaa3ad20f794aa89effa8425
SHA256962d089bb70e7c9a3461dc6d726a9be15aa51d1a454b73269b5cf17318b15bdc
SHA5120a577e86f18af4f1338f94a08a697c2bc492f602daf857d30d1da463de7f84bab8b415354feb7e95148d404dcdce086ecbf30d68ca1776726cb21ca056162ad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d97b6c4af3d0711df191de26f31e461e
SHA153cd7193b2f9927dac147f4facb4e05f2d876a20
SHA256f3edd3bb5be2ba72fab1db9247922a18d198b4e9e79ab4f1e66cd47a0443b5e4
SHA512e359c1abc61c81220529b54c8cc158e640c1402343dec4dd490c2612c93ed7582e8c06d2b4c0977e9137ee8e13f62cc9270b23576c15576152875be775f5e23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5035ac7847a3069d13709cb96a6ec1297
SHA1002ab4ab1b149940feb11117e73d113ad220abc2
SHA256e19bfe0520dc1f04f96dfe6e08e2a586ca780a8fdcaa66725e6a7fb7158279e7
SHA5127c533073daee79b06bc3ae8da471450791f50ee2276ee8875b330660af7c89f52c26ce4a6a2cad0c98c9980604d745b603fe807be21d9818b1fc24724f4afff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf53a78c3ff9e029d5a84be7faa24a9b
SHA18df23d18e6487675cb93d0e849e3d3c8cd225c56
SHA256b1067bafdad4e352fe9253dc1ede422c612656dc50ebd792244520ca1e0b3511
SHA5125dd6ab137d94ebcb371476b383053ee2cb66fe7ff820df431c2bf2c9466e695abdae249ec2e1adce5b6e96b8eba20cb56bc2c3cdd8835979c933ee26e12b44cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526821cf0aad8a514e0dc5c95c4202e3b
SHA1ed8ede816acdc627cd972f90d976881871aec39f
SHA25682129dcbd6a3e423aaf7ea25baf58e04da505b732a2de79d82c1429b229065bc
SHA5121bcf7c111a4cf31c97bb790ddc6c3f37e9b8347a02e7fd9e5b5da0472f5a0aa5389c3708bcf1276258992c25b30a62074882a48efab6ca2cda692df0d14ae4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5548099fa3656c54e63f7e7973e1d37dd
SHA17d856386699e89dc312dfc8ffa2c10155421d676
SHA2560c84adda158b47223e4099fcd84fd70567749217ebf0bbeab7e5b97a159d8ccf
SHA512e5e4828baf4514403caf30a571adca44edca6d99e6d411832e0c4d4366cf99f43aa99f50e0ce38490f0040fdd76a6a8eed1d56b516e8610fbec5913078322f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589b9fec9cf96f5d1d80a5fca74343a27
SHA1186010f665b1705ce46fe760127cb3455d30dece
SHA256073aa89e652f95ab6d8b5e6254e19ef2a9daf028c9c921452d5600edfee988e0
SHA5129519518f481d1a28071abfa51dbcb66e80c2b4a3af9113e2f3b34d5ff41760b351caff600b084b94976d53284e76593e8823a40e5e00e7f2fdfdd67646a3ad21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531b57ad2f7e6cd80352a0cc6eb394981
SHA114c85909c7a02509f19391e4a45688d1a70f4ffe
SHA2569dfd38ddebda7390b76dcca5ea7e15d428b648c33b2d0fe74d188d93293ad791
SHA512ebac1baed22e2c3ca9e2391aa2ced679e718f2812c5cb6f191889437e2e7cecc1c17259cee39fec6857f97b76030d1653e3612b8a9fc06c6c96bc3bd4583fcc8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a