Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/04/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
06a1e7520847121f9a0d1cddc03ef4e7_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
06a1e7520847121f9a0d1cddc03ef4e7_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
06a1e7520847121f9a0d1cddc03ef4e7_JaffaCakes118.html
-
Size
460B
-
MD5
06a1e7520847121f9a0d1cddc03ef4e7
-
SHA1
8c73e30b930af55be549c705b363766f5b69b440
-
SHA256
e2cbca444a36cb80836f8be78c8ba6be21de749c4814147dcff76c6683dd6c18
-
SHA512
174622ff26f19eff5aff8d6a937bc6a2de486dc4febc05f3af209133170791552d529c21f3cfee37a6eefdc909f48638b1f1396e78b265eaf72d50851f60ca0a
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420519898" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA37B2F1-05D0-11EF-8A5C-CE787CD1CA6F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7020eebedd99da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000009b2160a723f0235e6d7375155ba6d4ecce91db6e836c7e79c171ddb304f255d6000000000e80000000020000200000001b2ecac50a282bd11a9663a0388aae931400fe3cd4b0af9043f39d95b46bee8620000000a22bfc07bd49ccfe8611c78c40fd539acd3f9d2fecd60c74c3c0ac934c82568340000000ef0d0db050f1b00938eb9fef5118e14552613d57df18be83cb5990a8c380642e41b38fbaef81c1e4f6e478095c28a192a486ec26de7d51698206b0de58d62d00 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2036 1656 iexplore.exe 28 PID 1656 wrote to memory of 2036 1656 iexplore.exe 28 PID 1656 wrote to memory of 2036 1656 iexplore.exe 28 PID 1656 wrote to memory of 2036 1656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06a1e7520847121f9a0d1cddc03ef4e7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feb6db9ec6f33577af9ba5cb15fc900a
SHA1624b9b75cf7099e06d53f8aad15764ce994a66dc
SHA256c9ee645876cee58660a8d237f185a0c799e327b9edc1eb1c836faf3431e3f2db
SHA512de30b9eefe1bec134f578127cb69a2640b8c5ea12478bfcd5fb6685e8b1e294cf6d8c0e604067a35e4f139e7ce60a04278de3511e056c48cdd520958f475c479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc3f16f580e2b5cb057e56622e284e23
SHA14ef471f3cb8b3148c9f1d33272b78bd1fd78e574
SHA256cf0042f7191d003178c8233deb866272eda2f2cbd61d514fb6073e0ea2318dc8
SHA5128121d5f3591bb15cdf91a3caa8a7bf80224e41087627d0b8d4c97ba4f8de0deeb901de58e7d814a212dc9c621b05606d0cf0b4e197804fda79449b3e04f4e217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6af9cfbd848498222b806ad96280141
SHA1f36e0ef7d8dc0e9571d4a3c4e783dbaec3fd186e
SHA2563cc29978bd7c1f15eee5a97f5400a0b153a34dba055ae0df358cb115b9e5422c
SHA512c529f1f6ec4f1a6741553f44b34a6de6876fc52fe6909879eb610570b1fd11f4e96c9a3c5a1b3a48c142d8b596534a720b13c036211ee50ad5410a6c4a3f775b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eda2d84b6fc3d606cf88256db76ffab0
SHA103c57885204f32181bedd123ae394935d927fda9
SHA256b6fa544b995138406f2a332aaca48b061b641a7d2c8838ffacc40c2ca58f6efe
SHA512d0e710c23d5e148d8e20cb379ea5cec55b4def482d3c3f019eb4236839eb0b11e95dc5c9135bc79b0d871274a434a164d80afbaf1762727ee558a135929450ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fe2e1749bb569d2e1691627cc934452
SHA115d8a066731f600683b56fd53525fe799b1a06e8
SHA256e9c5540f6b68cc4b315ec9c20bfced879104b25003146cb2c75fda8a34ed9b12
SHA51234e2bd60e6ba6877f72d427d6b52ee314f4257fea4d7cbc85b6f24a4ebc042461c654ef3e6e3fa82c6819f956f239e8dc06a20909e3ac1033a63aee41e8bcbc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b4e42b27ef405104896e80df91f7109
SHA10aa802462f43e6bd134b18e47bbe40fc8b5f8319
SHA25636ee65bdf4dd51e4a41ea9cf6bed67a2d24bf20abd2782db445a0b324fece568
SHA5122459dd8e52715b8f5577201552db5999bbf3ceb89ddb48b6eeb3d013a34f34d4217314ea4e774eb6f16332ddcddd028f517fd378305ffdc91c2515c2b74f9a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0cd07c5af8556733b0a15a6636b52c0
SHA1efa06c5474cbb9b581b5d41af4b352e56a8df50d
SHA256b0fb5631cb07feaa9cf308c0fa93ee028a831bfde69c6e109f65fcd9144833ab
SHA5121620582a68e64cb5774f979c7f0e2958dfb18650c5e2aa7f204de998ce086f722c3835bbae0db547022fc781e707cea8fb16b7ddcabb31ad2500a2c576c89059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500f05a82bdb0291f163f6ca4bd96dc18
SHA11cf56e08258467e06a97cfa991757e4ceb93e16d
SHA256b5b522eac149524e96e5ca0b4d67619901cc339a50bbc1d421112522f69a459f
SHA512a2e229dda1be0887456455d95a382e2f5b55dbab7af18f5e2d15f15ce1f2b570ae1c088b712428bf2573a44691a0fb30b8c8a2518347c40ea99ca2351d734692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca694baac9a16ad414d2a54354659b25
SHA191db23515668d6af3fea9cd9c23252482e9123a5
SHA2560310ab8a06b022effaa9729011407d815e7483ed4c9ac7e9a6e6f3b43916f503
SHA5128b654602dd97344f19f6ba689a0de6369f1d744012f6249eb0592227268b06e80681180c48184dbb27bc5366a7d5187a4dced1e7312310ea4938f3fa5bb1b92f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbb2b51c0c5261971474938d06994025
SHA1ed9ba9463fc5b69f1ab6af1fd386efa1c0f0fe7b
SHA2564fe549ddce4ebf9b94a1e173b56c127a05ed3fff89ae8ffb9caf137d4e18ec2b
SHA5127a1cf22f6781a25bd8b2045532de5c67e120ca8690cc4d2c749fb481829a4797be538cddbaba86d48286a257a82599b90ef1582668cd4e70bddf42e26a842f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586123f5f77942c5d10c4997f097e70b5
SHA19b2c67b53e636d285936c5f748df1c3986a802b9
SHA25660ede0ddf26120167725fcb32f08bbc393f617ad036dc6a8c3f75f2db73cbf90
SHA512713aad58f1ce6b2885dab269da4213245266746ec68371279b3b5480856104d5948020201a1767d726432842e93184be922872077f673912d8176c3b39cb2b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a8a34ec2daa52388e4a272651c360a4
SHA1f080067c264b369a115ab6a6a31414d4539cac62
SHA256d8518f6dd0b015c6908849a31920aacf57b28efe240e96a0b6033f696fd59d58
SHA512e6b4e10fa6ee73bcdc02089b6987bea1fca37e0d702fdfebd2779e2cffc9a631f3f1bbc2990680f30740c223f09c2b714abcfbd6c06dafc31dbeae688ed8f848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b48e928f2dba8c8cdf751cf648c26fee
SHA1e22860a3535c98a48ac3d2e22cc3754ff12f8153
SHA2564e820738690c89f53cc0469f559fa5b723245f1d96a9f2b83d6d8f728b7c3bb9
SHA512e641ea1df43f8ebf1feb6ff8249b8ded0dfa5e7b5f68db0aedc8225b4b3bc8c7da2e957810d584db43131a8545b8f815bcf437bb138c57e89c884e70a7f92489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcd685545cc23b22961d00a90e9aa0cf
SHA1554e1225e7f02d3febea70abab6302e9aa1241b7
SHA256d64a6fd38c0ecaa713965df32cb4bc35fda659c6c2db6978304372dd5da3df77
SHA512672f98d1fdae938097e5df003da93dadb5ba6367098d879da1af08cafe5cc04f7a89301eaa55503047c74bb39ff1d4eb590e293d432c8ac83ed92740b0b92e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c912af76e79b1d8fc673dd5698370f36
SHA1ed13b6b41959861d6ea3178b2243eab3668c5a43
SHA2565081e05cf6c9c9c81c8e542dc8ef7c71ac19af297afa54f5187f99f24a54d36c
SHA512d9724a7dc2facf33a4b6174d3ca60500a18bddda9f0cf87fd74fa1b782d14ea569376cca0ecfc026f923fff68519e0fcb0e825dd9bda7ac97c38c2bbee735472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560c3c5f0efce06ed7df496d0f7dc6e8e
SHA1fc847091a77ded64dd0be00d67f5fea9336a6620
SHA2562670ea525e20cba93484449f73924e1291d71e64f2503c14362db81e8816b53e
SHA512c3d07294d547eb1f9dff7f16900eed11be875978f1f5234b402157beda48cda82631203ad0abb65d39fb460461b83f010f7908eddb776bdc04da40d26e6668b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbaba129277ad9214abeada80d7a04a9
SHA198636a97b44b344931752b9b97fae5b0943ebdbd
SHA256cde9591f76dd528e9fd958b0c754c48e1d37f7ab9a32ae25e6d6e12249bc7392
SHA512f08ebb13fe665fad54ee40bb19b3cdec9dda8a218df4ec39fced7c7b0d67f32ee81c4ffbed30b1dca6a81c61dd8e5f7a74e6bd30a8dafd07f017a8f2b0986734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5071260a769a9dd00b131beccef9e1a7e
SHA15a233e8141f44a2b723b493c0baf41ec224b7d24
SHA2560412304dd51afc0536f325a558df1bb922fac5dee232b5ef4e9b9c83e5df585d
SHA5120e75a3fa8e0c2cee287cf36188eed9d2b65a10bf621697f6e44f711e73dbd08cfc0fc0adefe8cd0352c00ee3f18ef03af2dd7162114aa9e13e0cc5c488ec5cfb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a