Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 07:34
Static task
static1
Behavioral task
behavioral1
Sample
0959232ab2c5144e90ccd70b184e9534_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0959232ab2c5144e90ccd70b184e9534_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0959232ab2c5144e90ccd70b184e9534_JaffaCakes118.html
-
Size
1KB
-
MD5
0959232ab2c5144e90ccd70b184e9534
-
SHA1
b1ea28b48e9fc6d246b339460621a80ef675ba00
-
SHA256
7dbf6e5196363185aea144004ac822c491c1023e3252c6331f4675f743d7f7a1
-
SHA512
d5128772eca3cb191ceb3c09168467c8a6839b5172188f4e5f204094c18867963df1b9f7b09d3da64113f97f22a5c65695cf5ac1d163c79245d1aefdeec2e741
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14B9CBA1-06C4-11EF-8004-DAAF2542C58D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000c518538bb303e611de4321c26856268714126d9c00acd24366cb861d12fdea1b000000000e8000000002000020000000240f2556b4e6209e600c8a4634078a8e23df942af96502be0d541130b68f611020000000879f7f37a49d1af41879e634a07d2cb55724f716cea79b7c69bfc174e5763b7540000000a900fc4fe369547c975b9fcac3479267d9bae0ea88c0022712497a5f534cd18a60acf4ef090059b85ba0ded6589661b7bfdb2eefebef8cf5bb4e06f94c8a4216 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420624337" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a00409ecd09ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1148 iexplore.exe 1148 iexplore.exe 632 IEXPLORE.EXE 632 IEXPLORE.EXE 632 IEXPLORE.EXE 632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1148 wrote to memory of 632 1148 iexplore.exe 28 PID 1148 wrote to memory of 632 1148 iexplore.exe 28 PID 1148 wrote to memory of 632 1148 iexplore.exe 28 PID 1148 wrote to memory of 632 1148 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0959232ab2c5144e90ccd70b184e9534_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597ba463c73786a8d9b5ec3fbb1108cbe
SHA156851646c4c5df6ba9702788db0f0faf201fdb35
SHA2566e4beb45f89afaf58d3b5eaf8e51d593459ad87fedfda082e0303e01e3139724
SHA512e5f9d2e072af02c2c57f9876397f3f6432218d8f91d735c2e9e8784b420666fa89a83491f61fb908f240ff905c343950c389f36725a9ea848072a378c109ab72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5729b197d21b9e3f5ea20922c228996a5
SHA1559ce768ff2c778c05bc61fb0679cfeab919a08b
SHA2565f640a5c3d877e315ba68c396ba31e44583f157811b9b1aca4d9fce7de216472
SHA512104a32b5743e10f5a399b3a70b11910753a3ecfe76866b9bd9f4aa902c9519cae09354fd49787296e904824d7488f383eca1d1cae2fd2646e3a61d3c3921b8e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db36d2d223235cbaa22c489934bc74e4
SHA129887401f06ba3e08229b72fac4e41c0a4c1c62d
SHA256c6594af63d6ef0a4f16b8e520abb8e6d387e591702d06fc5b87b1e420455d306
SHA512b01b3caca7d321e7b2d8f5a0f15b028a42680d526b5dc20aa9b511f2cc2d9f194788a4097cc1b634f5e1e14b0c05f05d7141fcff3331c709d641ca95b7b51c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cb19667e8d95bca65c47ca697026903
SHA1f4381baf1004d50dfca50fa62dad7ff1c4235190
SHA25627ce97698e35aeda1cee1f4cfb5e23e90a43b37c7a0dae4073ccc4fe4251dec9
SHA5121780b2b97be65b78bb2d5cb2b07e8640881ed59cc4eb6b970c9fdf904553f4718b624d57fb966d12508a323641d542c7da5d4eb9b38e26a421ba38134f814bec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3b63ce5c02739f426b3773dc068b70c
SHA14bb2ef868aefacff03b40da5cca5f60eb048db3d
SHA2562ab7a74ca38fabebff1ea7a8de2a70974b9528bc89b7454832533793edbcfa76
SHA5125fdf3011827650098acccdcc6e3d8cf339395f459a9dfb8a5b9e52b1adfa855c7fb5373b66be92c462ca888e7073ab92430736f344808bfa0286cfa8806e4eb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be748a497d1b4582aa2f45d87fed3f63
SHA1e1a4eaebfea3844a795cbb809a293cb1956a5dad
SHA256f36fcd5b2c56ecee36c7e78ea45abddfc1183327d13b34a59321f08cb9403b3c
SHA51222436b711b9992083e42e73656815f60f43deb1db0962ac7123a5da439f0908cf878c9e1f27281c5f3c5424258215999340137cb98b616b799ed5e3d61f0ad87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5337843800bd00a4fb2f23ec3e9bb618b
SHA18b57d0b6f0e48c6245b59c034fa4ef38389c8635
SHA256738cde6ca6a5caeff2c92da36b3c5264abfa77bc7eae1f97f53062e024dbf371
SHA512aff7e0344dcf73f1f3b4ffd68935a39da58097668d707c4fc160314207ee6cde21f2506a83a66469e4cdae58fa43d9660e27834ae113ec3996b0f7121aa23235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff89cb8dda631c041c554ac776e3833d
SHA1e7e40610c6c7d3729c091dbda1e639b7ec751cfd
SHA256be2a679b8ebab00643297f8b94de0d65e32f0d96af8f0add2adf1dc8e6de8cca
SHA51256d474d0b9c021498e6744186d68d73b30e7dcd5250b18886553ce85a6c46a9775954aecd7ad5926fb64c730d9c28969e491d1583318006b85d5b5ef7e4dc3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6b84bf358637da3c100fc66b311be4a
SHA1a0f946e9845938c5f56e38bf1c51a80a40677f27
SHA2566ffe5043758b855ab6dfeebe11960db5a6e879b7f47b9fe6c33feceaf336eea6
SHA512ab4a12e3b9603db126535a227253ab5176fead1bf88710082cee0676fb8ee2f5f65a10be88432390c34de745010641a15edbb9f873eb11f592d3665bf0c6111a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593882dc81b1330c86419a8414001869c
SHA1a7e5524230c1db7b53af64b9cd631a693e4828d0
SHA25660555a9fa0515f47943ac959aa715cc33d6e3416d62be1e6f7200113cdd29fe1
SHA5122ca957be306a51c7e7772fe026679556eca59edae4b12f871e2ef1696a6f13ed3cb5d302c4529afd33259e20bc147bfad169f851909aff8292a228fc999ba07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535622f4985aadf996fd10c3487deacd5
SHA1c84f25550bafd65bee9bbb27f662a0063261dd08
SHA256d6439e530de38026b634ce2ba38b93243c67ea8e5d29a6cac8e4f15cdba62b7b
SHA512e86c59028d0f2e7410d7faae0da0b5a9646af405c1320bb7657086663bff5fd1de455ccb80ab682edc871753d307be57a4554354c61fc33d0a6d5d83ff7e16c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53682256bf982e145a3d7e54126a2b34d
SHA19ff29e8adf5204a5f466256e2ffab035eb5c7be8
SHA2561b8522c92cb54c9eaec233126aeb9bf00c7c79beaf105c1cae9e99ebc971b179
SHA5128a73b5780cb5c325872fb443fa3a88d70716fe70afa484393a5f7b07beb6595b723a1fa6093fe9a0b97ac9ed8d080f697819d35a019630d4173bfb4d77ccb640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51114c01890deac7c36c99e980a3fc728
SHA10c2e254c58e1d03a69949fa31d41b5543c17c3f6
SHA256ebb9d6f387f591eb7da53ab14f8dd2beecdb692a585bdb20cc84337f20a149fa
SHA512eece8cb4a452db44944c909a21871834140816730c1e9db36a857bd4ba043aed04790e508277c86186c3ed37350c9cd9621887cb81e4462691078b7832c1cf35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5636aaf1b30cc26d5062288f3b967e09a
SHA1125f74e345aab4bc5f290503fbc4eb48bd91aaaf
SHA25669f26ca5ac9fcaa31b55f00c01789f32399a1abe2295f950463479a89bc41c8e
SHA5128b5a21bd634dc09159bcd602e04765a7787b1cdddd4426d953f9f6e3c56b112827b18ed8200855c3c9c89c68356fe87774192bfddf6e341359cf18a3b4685cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58277943a1d9a3e8fb7a7b90dfc0874b2
SHA1736168e97df405154d2dc1646711bb12be360d50
SHA256765a3bcb392125aeb8580f62e28cf5025507a38682d6292fd1c09223ac95688d
SHA512ec6fcaa3a783f37b8bcc57ccf8224339be0515d45e64dd0d36b508be4f9b63c08de52222de7b4a620bdb23514dffd91ee44f412e73004c11513e47239f79b7bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3214ef5cbc13362860498f8c9674e26
SHA179ad73a34dbad27f23713132fcb362afe50f1fc2
SHA256a34d4e487022b4d4f25d283b685f9ac828469979189cb0b25fb989ba5ddb3189
SHA5129bd7884d0d7b36ea3e6559f6743e36a6ed7f23a40208ab8dea2e2f0dadcfc7a109ff72e72ad63da11a7ec028181720384eb0df3e69efbd0e4ce139ae68c3d1e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdb8225035025315c9a46607f84ae8ba
SHA132815ef94b913f0bc4f8bd00c5eabcfc116eb78e
SHA25699028967cb80af4b5f0bf043dc02c1b7a120622b32d266b143b9e6da1025a934
SHA512382d9266710ad628c33c5cba6f349699c4cdf04bb90d14b2b908db084ab27e65a205ac714d68b4f56f8ed6d414386ad29516728a0aba8a19047c056a9da6fea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5658bc480866d78caf212a999abcf11ed
SHA1c2a28f14314cbdd03e39bfaabee7fc1f9b5bc828
SHA25616b7b795780100eb5eea7e7989d185b0ebdf1fca92de70e5c71e7fe5d0da34b6
SHA5120ff23db719ca2e195e1793e82e07b2b17642ebb3673575c893e4176451a26af127ddc19a5545affc63271acae5a928cb87e3ca4b73bc1763c15421c929264487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c4ae33a92928607e13be113bdd1846e
SHA15e56e60d99d8fb46e1e76449352a532570889aeb
SHA256eb153ff0b0c7e40572a01507bbbc938a5d6a92b1b7f06eac8dc566d5ce523801
SHA5128fcd90092725cb03e6602731f7fd3f7c20dbe3ed4a7fc460767738b9ee4b75ea6e9accfe27d991e4a3ee0a9400e70cee0ae8af505602be9b987c6e60eaaf29cb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a