Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
053450b2c509060726e7eb06881b9f7f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
053450b2c509060726e7eb06881b9f7f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
053450b2c509060726e7eb06881b9f7f_JaffaCakes118.html
-
Size
2KB
-
MD5
053450b2c509060726e7eb06881b9f7f
-
SHA1
531f8874dd3c3a3ea08085075b4a3fbccbcaad2c
-
SHA256
3e828985d0e88471014c0118e24cd6acea351c4cb9484e122da0595394e3fc39
-
SHA512
e1f5cce7db3c186ea06cb44559a4b98d44d63ff357ca85c9f15028e645bba04ec75b5260d09d4b740ee76627243e42013ffedc34c50a66ae15d9e74c75fcd269
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000004afe73bcde3bffcffe913726fb09cad6d35506f59bf4b2d7de6bbd9414b8a457000000000e8000000002000020000000c8b51defa1b3a8bd42a17618f1c812d62a49ac1134ea9781d7a64a86b14bf93e200000002a60c6cc96e46c8ad647d51d401067298c6b2af0b2c7193644c876da74dc54c140000000dabec9d500b529cfb0e996343f401770a65f228ba9e850aecfed9f9bd2cb42b4e63fb193ece8f4b2b7e18bd8ff0f2ba01f5b062778a08e33c57818c1d0bb36c6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0546bce6899da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F9CA5B71-055B-11EF-A6AA-4E798A8644E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420469674" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1756 iexplore.exe 1756 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2856 1756 iexplore.exe 28 PID 1756 wrote to memory of 2856 1756 iexplore.exe 28 PID 1756 wrote to memory of 2856 1756 iexplore.exe 28 PID 1756 wrote to memory of 2856 1756 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\053450b2c509060726e7eb06881b9f7f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5100eac2cc7efa5d3b4848a408052c47a
SHA1f07cfa2d714fb95d58f1113df26c12f56414e49d
SHA2562c038cb003fdb31454e837eaf0857d63dc6768a94af92b97290bbe6f26d6d8fc
SHA5128057e8f5da44c650220c9a9d70ccfb5ffca3270a5dacb31c8dcad63f705eaadca39c98543b34535328ec0351292b8dca87ad9705ffabd56aad4ad501865d24c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51483bdbb5205978fda0a404a22950338
SHA193ae671a09b007ee19841f868f67a449976ea431
SHA25681fecbe39c3f94a641d991ea5ac6bd8712cfa290492192f48beffae7a2a46483
SHA512baf1c8c0f44af91151587b13bbef36c71509f07c239babcb76c898402728cd3112e7561a7860d38fcb2be996cea03adb9c85733b3a98be765626337c1e2ab85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513b0371a6a6eae6a9bf4771ebec90ed8
SHA100f2e9b28e1db0eb60930d4440d72b164fd43e6a
SHA2562b0619faaa20c992c401d11b185869eba407391d9488c34f4b6b0d82e0d6aa28
SHA5123b38ccbe7c1e609640bd670ea472ce4f72b458df47c9e05bd30b6e47a2b4c234ededbfbedadae88fbbb4579adf2d7467f36c160446e71b31a1b9beab0575af62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d8238bf443bd34b0cb6c007f0120172
SHA1558698c6cbc4a031fcaecb8c0041684f2b13eef7
SHA256fd615019b218794a1a2b9eefe81ba228faef9b65a98edba3c5f9c026bc4a1197
SHA512906f353d95a0cf600756712a3f733a8f05f0708599ab202f950cf431532d15a07386a91a03a151d7c53606d30426b69c8bc35fd01fbdf6438c0debb22a8fd63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5417454a6473bf40604491ab4a82821d1
SHA1df905829538d4f05d34377bdb1ec1c4542a4bfea
SHA2567e87e86013ce803d5f7f88f65773fc93e09bfa03b38a662ae02692a325c6340c
SHA51221b024f360536deb630a2e01241e7dc3a8fb1ef35f9c4844ba7d49cc32fde76ee346c83c72df805663687294f76d77273ac85994749cd8d826fa1fa2565e3ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56938e87300b04b1c7555df012c1ba414
SHA16b6149e81caffde9fb4934409d029908f89830a4
SHA256b50dd354a5122e894a0c095db6a4507d827fdbe9365ef000ce1dbfe43f20b8d8
SHA5120b9827068abd593375c0be858f3ba18b0085ad359e1d36efdf0286cd90b888b00fc95814cbdd151b963e3ebefbfdf6efe888539e32adde41332d53020cffd420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b071a7018b09ed1cd3fe2e081c51a8c7
SHA1488890e67c94197516e7f19f1641924fa570033d
SHA256e9a23c6868154f5b94c17171ae455ee6e36940d473fc8a7b933b455974a21ee6
SHA51280eb54b9f0a8e4c47901443f9b3ba1fb47f5913e1954d0322f231bc72727c8bb8dc118332b50388fd31e85edafc2e1bc89a011ac0fc2e66891a5a90343f778f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff16cfc43f3ba648ab74f4e635019cb9
SHA193d232c3082f3f469a0cd7c9e677ada51f5d3565
SHA2566dbfdbdb1f2921cfd07362a4f97434422d596b12c3a9c75af27ab2355cc8c194
SHA512453cd9426f1976ebf3a977cb68bf2831bacac9d0eb87cd4ad439aa581322805efab2af26da64e87c089044b85ba7b3ad7d2970948c2f08d22428c08f2449921e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598da4828063ff0bbc07696be679314e2
SHA17f9120b4ffac1bc57decc708fc0735fbe1e4095a
SHA256be29bb55304bee23372f6ea1666347a75a2f4391bd0963e12f71e020a4986719
SHA512750ae20f2f37f2e96ed3857b92ea0121defda069ed3834e09751dcaafa2623d84e8b39dd712834cfa30622e8736defeb60ee472523bf50acf005faad5e41ec46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ac00a80b355b376e22110601e1b80e8
SHA143b15b033615cbd0e79eb41a2b0d3db0d8a49685
SHA25612e325dd674014619494b3d10db0620182aeaf485dc2517ba201b15993fa9526
SHA512f834d8710d75f73c688c00eb74da8bd6f216e043392c5dc105f27b2b7b429b9dacbf3e5f7ccf3f2262975f3ca5101b360334842deab55ea0584e02d4dd5b8ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f4ed3f794b20d4ae00cde8f3276407f
SHA1ae99c2ec4f1a37ebcbed26062a8103c070b1a059
SHA256264a60dc7dfc92f4f59f9a6734d603ca0589492c114ca10ac338641dee24feff
SHA5127d22f46838ae4694336ed193a1fe61754edda0e84e1556c8167f36a65e54f2de403c3b6f23588a0387ccea472f33982b34d5d54e9e309875a15131468fb609a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fc93a64bb30e614cde4daa4eb11e429
SHA15d31d7001cdfedaf9b039829786a4ecabf53e6d6
SHA256138d521032c662a94190de9e0d95f487585ecacc09a893254c36f66aa2ece227
SHA5123f46e7f736c147b7c6d17048137fe21d2b01d4c65882e494e3d35199afd605f3381e577698fb13439a6bbad1472ce32185789602be7a2b41bcbc595f3da215e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc46ae36ad486f1c4adefae101d1efdc
SHA15d0907e92fd6e81b9467f9a973336da490835cb1
SHA256913d15308122baa9e7aa23d62069c24db6ec7d5b08c04fa4f33ce7481f199392
SHA512bb2b5f6e5a7b94c7c76988281f6c1b8cb730b277f39820b0ce24e85165e0feb96a013bdafa6732e04228868bdc14a9b40481ce876065803888b8a3796cb60f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd94777dec3e440b71aa35660e401d81
SHA1725d587fd4ac1c982b69c9cdb5bf97b0bd7021cc
SHA2568598c1c0cab34e82a22ba3643c2bafd0caa327b5c93921e04dba8c31b480eec4
SHA512fae2959ed08ffdbcaa2a4c0f89121595d30c6dabcc68b6e7a0ba829ee25087215ebf2817427cea37af707b86eea349f2caeb86927b04f2fdaa16bbce2e8ba441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a742c2b5a19b0b693c19da3544e68640
SHA125ed41735595fa06f82c8a9663341afd8d083574
SHA2563a8943126bc15ea78fc52365eeb433541008b419848fffd2a9ffb8394fa95951
SHA5126ae515160a3d86e37f5273826bed0766637369aacadaa37b6de6e997d6aaf35c9238f78ce61a0d9e9aead2b5ffea9a954c1ac583f690f78d875b3c68fcc84c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590021929a0e1fc7eb969753fe832a8e1
SHA1f9d9a899f459851c66c40172c8113ac7ade3de44
SHA256740a822e777fb56ad8f353484a4a50df119fe109e33846f9c7eb48f38bf69e5b
SHA512708214e2565a40c6761f976178ffa469a39222b25ced5ae1155ef51a2a3d74142d4fbd4f699b0daf6f2b28a5d61bdfd10f096fa707cab333044c864d329ce9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5512fdbef1c1bd18ef545988e2479d19c
SHA11eb90b6a8bbf8674102975907c34696875c21144
SHA2565949c3bbc8aa55dad205e6c09b30e348c004c582e51b89d5c3850b2ead971491
SHA5124859de949b3ab8edb3825a037496e6f4cee241a334b99a31a6e22ae92dbd4fabfd6ce7a7b36171d09f0440a011d4dc01d389dad0cdb7ee1e44fd6535df03f869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdad9482e99a15c3636f9e5e0df30132
SHA129e0054ea464882eafaad39849bd5caa09e35ecf
SHA256b6b3de80a62f9b72189e8d864c5f421c17b56ec35949921d2899354f465c7789
SHA512cbe85fbede8f40dd81998e9e8f52ccc75a294afe99bbe389337a53d5f01db71c037a2aab74a2cf7d98e6ecf9d68babe90f8953976be3d51f8d8c5244a0c433aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd3c8db9b070be6623dc0937ff5c3eef
SHA1732cfcd29ff0da4ee7960d900ca3dd565ddcdc0a
SHA2561a9dca0e3550fe153460a5b054bba62e375bc8e9e0a15095ed7ace4fbd3d3356
SHA512351a758fb65630d80a3c9247b67310380582a6434c4d2c8716030a43aa06d80f07b42c16784222a77b23f4816169acd9763805a0507241a41ea0ee9e7815570d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a