Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
096f20e95571e57d55cce3d7429387c1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
096f20e95571e57d55cce3d7429387c1_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
096f20e95571e57d55cce3d7429387c1_JaffaCakes118.html
-
Size
3KB
-
MD5
096f20e95571e57d55cce3d7429387c1
-
SHA1
2f862b77a089b0459e5f668ed17a6b1f1ae8789e
-
SHA256
b99a42761a0a18f056bffb4db9430dfb80ddae8b493c6d35397710753764ddd3
-
SHA512
10e5cd1b5b769e2cb32423091f3a1f1c72bf76244d5edee9f00c717604ce21b31da1b4b6f7e743f7a7f85bd942e65ce1c5dab1aebab501fccc43ff5db7e9ac33
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8E09911-06CB-11EF-92E0-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000c2a8e7aec19eaeb9957a550d7a7a23a70bd94aaffc5ff48583de5edf223beae5000000000e800000000200002000000058f7f53ec987427535366f71a32e4601b4874ccc8bc5233592abd4840ffb294520000000f9f3a4f1c1143104f6929ddf936805e8d166795d901669d62d7d4a5c4c2a6c7e4000000003ea841c6a5b8b09eca493007bf74f75b39067e68d65d746b5a4ec7b186f49918948739b68bdbd66c7d17b0402cdcb1b9241c31033e8ea32082783f069b21a13 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420627593" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9013807dd89ada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2576 1740 iexplore.exe 28 PID 1740 wrote to memory of 2576 1740 iexplore.exe 28 PID 1740 wrote to memory of 2576 1740 iexplore.exe 28 PID 1740 wrote to memory of 2576 1740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\096f20e95571e57d55cce3d7429387c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50305fe3d6c771d247de7374283a33907
SHA122616a552a59eacbfb0c2c5b60f8eb6c12f09439
SHA256246f657abe0ecb4c6f68d3b59dc609ac5ef8bbe8954c677c097c63fa5c2eef55
SHA51214591e2410660366a2588fd92feb3bad8e8a27d79044336a7ba9e632381e5696402173f83efcc64488a36ff30885c9182ccbeae7334a9de44c0ebe26e6a0aef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d86cec5194fbc9ccd6bc849c1d4977e
SHA1139eae055f6f6011c5bc65cf7c4900e52e9a978b
SHA256ccf14d5524a088d2828f2643b717bb9d9350e660c3de32de65144375e8dbb189
SHA512f6932825ea570442c6e29eacc44c111c09e296870e1b271dd513e1903213a7e7191a7eaefcb88bb8dbf0459058800a24a2097269dcba966bfce197697b32d410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5222c4f92c26d2d2e6643e1c5a794c57b
SHA17b3060765c7f5fcb31e833301d1f2a0dfed597cb
SHA2560547c2b1a860aa0b0d3607d84a4907439f33a64509aa48c3862ad5a21e71b233
SHA5120c0ec32cff6a2541ce2fc1daa24887a1961ee7b62f9c4229897b3cd7f2e64c425016cfd8c112fd76546f91f19613876b5fb1efe8feefdb6d43eb16d4f9338104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595e742686bac9dbce9cf7d6ab5262044
SHA187181e6bd151333aa638951a3a08965c83f1d7b1
SHA25679108a2f5195d77402cbf0756ef792e8447c6feff5a4f37f2f255b10eeead5f8
SHA51222d776e1c6d90d3dda858eee2612362825914f3f4bc992d5005658c724599dc70193841359a4a9e5b10ea7eff13dc8eb5f97d30fd71cf2a9b705bc36771e9fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c30990180330d2026d40157a176b3f6
SHA15b1511f16adc1f441302794b174bee53d8dabbed
SHA256ed541ecb39158099a5961e533d621e0a311af73d6b875ac571985fd4abe140e4
SHA5125e295d422d867ff78c8605ce116f8d695c073ddb5b195aad590080adc557e3e22a08a77fbad6af7e4c5a429344004954189f6393de48a7733f58bec75a5d79a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dda152242012afc9c6f47e9a2a590ef
SHA14be83ff17542421966641184bba77aa11ddcad1f
SHA256995680a886cdfcdc57ad5d18dcd4d940033928cb33aa6ed629d22e7bf518870f
SHA512d69e55874aedec4d668e8c3ed95f33d0571652967abf6124fd7c4b92c54d309d81136da62b857e289f1309997d05cf2364a8e5acf888194bedb64a478fab31ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d59d8d0bb9650fc92645153b2b93c63d
SHA1f8d976e6912a690a45466a76ae11558829b1d9a7
SHA256d265a5953524daf12c561f118c00d5d706c2d10aa443d01dad54349039e0cb85
SHA512f3a10fd4bf9cfd0c6f77f3757a4e7db369d82b03a72f0c8c13a27461477da936716d2f2a7bcdbc8fb21eb0784e98554b83ec00772032515b9b83683e47e71c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573919e2625404a6ecb11f92d9390e1bb
SHA108a7d75ec73a43e361e6ed5704ba08739c70922a
SHA256796690a82aa459b203f4a55497c4db01743ec251b985bb96f23cb3847e401bc4
SHA512c890533f082d2cc9e4b6d3f5646c22e71bdc104974567b89bd0cb83718e1e81ff343e8dd3dd8c725e3a76500b3117c7b1ca9dff4b692bfe95527925e50392fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3d39c5bbd9f55931497c8da61b92f49
SHA126702f550302174d535151cb1aa07f4bc66dc504
SHA256f6f83ae5264efcb428c8f2b9fcbe26088492c653fe9d66d23dbd25c60f488802
SHA512f259ab6f720f55e46abeebcefb7b29b2de1773b766f72793ad291be79b1681eb7deaa76a8e3dd1cbe524cb885c984e35e62337b9eb57e2fb527564301d58d5a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559c6ad7ff17646ab821b48a0374e8d63
SHA1c0ec788602cb11641d5b2d873d37816125fa0a87
SHA2569b8e73029143852d3093a0b619212330f5f85440eea2ec41692a120f0dc2d96b
SHA512727e243b2164bc6dfb6a1c06aebf63cc45935a23937c2c897750c71f0814decca10fbbb8fdd012df073e2db15015782059186cc47d6000d16c7372fd27a08884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50962545d92515b8724daa39abd9cab16
SHA17849125290689045ab1af1a73fe5600ee2aa0ad6
SHA256a433ffe493f315e75b672908100296c9aaeaf09174dfde542c9aed308aaab55d
SHA512b0a1a8cdc34a7a5639b4235dea86581b28b4f5e96a3d58834add565cf69f754826300652b53be02a21a456272d3946298f735838a9322b5057113c5d7a361a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53849f489a2d56ca22252be2d11671f57
SHA137c9fe0337c8b3dc6322e1ffc9b706094ac74702
SHA256e82020c1db4a9e76e14dbe3cbb4374f7eb827b2304465ccdb2947559b6ba49ed
SHA5128a05921c8dc36f8884c31f6a55659da404da00ec0e50846493195bd9f952914c506d76482a115588f39182aaeed9bb2f2cc7f1f552ff3dc00df4b15f4f90dcae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de1797d607d77000d400d09849c4f0cd
SHA1183a978f4bfe711f0703b2dc60fc875d3c072d5f
SHA2564ac44619de7631116dab14f7e6ed23d1b20e8b8fc36a8ba86074c6e68c858c46
SHA5129e2709c02d9e109095063f688a454e3b0daf41e1d13e56c6ff3cb01da1dfe32de071a5c6ed10ad62fb3c7128ee56f5a039d0a4748b27b67a0a47c9bf07b4c78f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3cbff6c720b23ca8650a0f066c53272
SHA149b9ef534146a89cc72eb93f1062a96936a6a07a
SHA256e9e9b96b18d47e42dbd668fe62ae9f238e5b6d00474d818b4b7435cc5e80f914
SHA5128a8e67627a3c4c10910ec789bc468bc95b21ee67cd4dc32af0b9d9d91b6dbe1e677f191ed21b45c1993915b609f933ac8c3d6695024d94af8758e2eb73c26058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b17b2163a270e4203b2956b3df4e4c67
SHA17bfaac3a5d16899c74a89e7fb213675694bb45bb
SHA2564b1965e9a47e71cebbd810c70a59b03e272be4ee93074ae559efe37b78067006
SHA5120e8db0e7c6ef56b4a98deb07a745e09506e586174d42bb8ba52723562453251cf0cbf7b08bd1b4b52496a01811455cf3f17e917e27a3dc15e0fc8840acd81ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c1836837f57784871cbdfa198b4fe3d
SHA1fd1e1400a9fb042be849f1643e21048358098daa
SHA256c8433e65b11d4f10123ba8c3f63394b0ca960b3a849861f451349c30559cc088
SHA5123c4f7c52357b952f539bcd26a46711034ffd2125be59b9a533fba10ddfb856650e4189f18351309e1eafc346db7839bf736d363cf1ac784aa69837af0a016898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515fa066b543bbb5fa4797fff15077787
SHA110b24447a76bb2d0e20baef943def1bf0d321d23
SHA256949955b2e4e879beb8dc3ccc75d20fdf2d08d49baca5cd551f2a9d6f3ea1444b
SHA512f98319f7889ed52ae9baa557a1c2bec38da563a927f71578bf38c21e5321d351d57198f881191662508720c53e943c3456d670f5f9d4cd36eec8f3be0c1b2199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cea2d5723394bd9fa28541e532a7aeb9
SHA1ad920ae49915ddf7339dd4ec3540f4e9b8af12a1
SHA256dee4c4971cfc6136eddc07ac4424a3816ba45783e9b89779c8aca5694f83a151
SHA512b6306210447f65a1ee4da159dab5a4d359dc466c863a74fc1dd70498130c72ed0eaa6380d8500bd2ea580b96e77fddf9a4fb5342a71368a3330d29da9c8f3cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578e674a0e909bf5cd90d52d3f258fbba
SHA1b39405e824f52afa0f0d17ea025ed6d8422e1f3c
SHA256052eaa93d1253c3973e9c7f3e4d40bc7b27bd58b085249f99a4adc9d1358e095
SHA512a4900fed1d3e571c82abe0b064c23628771691e85afab840fe7eae6645ee25ace5afe3cec7b352c88a2c15aa921eca6363f183e70b296b70a968fb01c2ee304e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a