Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
0f9c47416d91937de17f1d3a238326a8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f9c47416d91937de17f1d3a238326a8_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0f9c47416d91937de17f1d3a238326a8_JaffaCakes118.html
-
Size
2KB
-
MD5
0f9c47416d91937de17f1d3a238326a8
-
SHA1
f9d1d84c48917feadcf93fa262f9ed5bbd1e563f
-
SHA256
029b434720be0e117f7cb6aa2da1f996ed3cb59004bfc3fe47530ccdc9b1ddb7
-
SHA512
30eb6ca1d0e812122102c36bd7e6e84566645c30d0d851482e976246b052d3f3221155e413eb4fb63f34b194fe5390288f09a321ca7a390b7960bca99de02502
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000004af701004a63b1cea1443104f1597541ff471a91ddb279d25d79208fd470e8a8000000000e8000000002000020000000a7108a6e624c60394729f8dc13fed0baba6f29c19eaab97ee7f4ba7b844d1acb20000000f9912f8517fb9f878585fe0278b04205b1378fad35ab198233838c4fa49b4aaa40000000bbd1d1911178910854da6f0c0398e303fd8d53753821d71698ff63a1bf7e592c4ae66a370c70bec87952b873742b7207a6b4dc7eab61f266fa5fc054753356eb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B164EC31-0900-11EF-B5E8-DE62917EBCA6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e9fa850d9dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420870272" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2804 2940 iexplore.exe 28 PID 2940 wrote to memory of 2804 2940 iexplore.exe 28 PID 2940 wrote to memory of 2804 2940 iexplore.exe 28 PID 2940 wrote to memory of 2804 2940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f9c47416d91937de17f1d3a238326a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba35549ed32e36d036759526e9502248
SHA1a1aeead48ddfd924c304fabd7684bf1a5d62a3ba
SHA25602e437e267b10e7d72584781d58b69d802db1849faf7d6c6cbfb1085475a128c
SHA512248cde5aaca2b4e1b72086155e04865e2e04b57ce8ac51d86a7d1d61d06ea04740fe7b6d690821526859cf084ee7cbc323041717997466a54f4cb99c350b1872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525d97e20ff69043af2e0d2fde1177939
SHA1c1d5738b3b3bc0964aa833f5772d8eb1c617422e
SHA25684c23a0767a1f5bc75a675ed91591ac600d5a09c413af0153cdea45973e70c0a
SHA512d12897302c57044220e982f28f642816517cc9f392002d2865a1cbd81db3b78539fb58f0e440cff25157417c519d8d50e7fd4f774d1d940ad539c927b143b8c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5102e6a0008a44ecdea84472072915f64
SHA11d037393116c2d82d789b01ca022c134ce1926ee
SHA256b44239693d9503f2f6ae52dc493ef6d95711b3b77e1e8a98d12b3d44bb2e9d91
SHA51230d4b51addbd971d03093ac53c80435c6c090c55caa8d1267a171283ac8e9642c29743406029007fa05f4c47351b3b9dc976355333880f203bf49b8b0bafba22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbc3e5a29602d068060f97878cba09a2
SHA1dc5db77e24eb14f4a2a81fec333489050715861e
SHA256f0f071f33092d5329802f4011971af0cef7f5d680bf5a1ae54f8bf48ed136120
SHA512238295615418428e7997ede3d75fb564d636a5a522e1f43756c83a3d4e6f0bc657ac390c4f16943041f60d78b2c741cc20de606cd755d75d72a24ca00de9c384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52130c52a3f816bb3138903a31283f79c
SHA1495dceb6183cf8c36a4a87e306e3566adfe50e6a
SHA2565cf23b55c75b644971198f58a7e0ca1c928cafbbeab8cbe30fc7e41e9db08697
SHA5121337a84e70966e62e8c2b18a13868c573ae5fdb78dbfbcd6592da85a7f451d80b9caf82212debd1224cad16f3043132d9dd88d88d99c0522611f4acb7c146df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51df71270601c557a334f3235efbd41e1
SHA10a20e5df6a7ef553c50ff2840ae4e400d63ef511
SHA25669f190107324b284b1451e962a9d9b585f3e138bd533c02a83c561111b5b60b6
SHA512bcbe09f1208e739ce8b9c8c05baed9830fe8ec4182b422c3963f10ac2c9e04bf9952e90ab172411cee51e9294521e6d4f964d13e2ec7a68551ec9c3fe9d12a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdc6667747b5e24ca5a8da70e3478c96
SHA16ada8bf7715ebb2b2ba7b0f3649da01b3fa75a58
SHA25662e0bf61399c2aef408e55dbcc3b60e1fc0c8ee6aba0e572cb71970bd06676c5
SHA5129dd3554ddfbe0a8ba2590cb36700ddd9ab3b11c1223000075c0954e451ae3505dc5aef8f6fd9d338cc456602ee6cef9a302a992357bf9c21b415a41cbd636c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3ade8d1ae1a7685fe9c5f7d625f5b78
SHA190259a5941081e4092cd9ca7a6404a938d2c2404
SHA25632ffdd6955d40d683c14ba741d21a31e5f619da4d5e9b759770f76ffff73a04f
SHA5125a4acd4d21c56b3b8a018854fe5c63f8231d29fb0ca5cde312f787084b78f4adeee4ae0cfdd30bbb8225a40fa5074fe1cf56557d096b0d5b63d758440303ceaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef524dfae31352dea9bbabeb494a634a
SHA1a6dfcc93878382cb07e72fbe4bebfd7e049a4d10
SHA256d8b4db9a52c1bb2836385eacb87e7a6a496b5f30b4c5c1ac4e0607805fcc73bc
SHA512b754777c8aa566a734c2cfa28038cb9ba55b8a3c9669dfb1215b8b7d31f034e22b6efc6b06170af962c1650a15afc241ca4249f32e0de3a940576bfbef9e1f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb66acffd2837bc0df17f0e3b415cc5b
SHA168fef2888372977033eef99dfed0411979f17b6a
SHA25680bbbd244b9aaa55007af2268e5c1d686858f53e4ae060a59e9759e67651de57
SHA512699118c3d481cbf00b1a5bbab1fb1339291e46439d293f5cb46e12cab02d91b5b9367e15a637a8f35dc5471617f78599b8fc96180039a3d476941782ff0d5805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b73e6e3800e6b3dda8dee96acf49c17
SHA146a94fcf1b5fb9adfd5ef1c77d4e56aa1d3b122b
SHA256f4a208583ea082689aa1ba9ed9c708b6513e1df6c9068b6589f63ed5b922d7e6
SHA5121837bbd9257d1e67d1f5f5f73bdebb57caef64de1ed2aa108828f20b8c81efdb15e35259f9dccf541dbd33764bb659f28b55c6daabee3bc7b4118098879b9d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3852ad6e0fdb360d0fcf58c509356b4
SHA14e2e5a49525a3a9f7edc4945700277e67f287374
SHA2567bd59f5d022ed7ae50ad2dca9703a50b339f2a027c44f6a41b3580f15d0b377e
SHA5121b033eb5e1753f365c0bea521dfc5247c52cc9d46c9bc2e89c14291afcaeb9cecdebd4223444b237035d4cf92ef4b30b88980712c16bce3e54a319f1ac25ebb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c3f9b83545b4cda55d86352d74e6ef5
SHA198ba41a5d98b1cedf2588390ca7d45f9471f3d4f
SHA2567f112e0ea4d8cc2744da6fcb16b4cc013251421daba3ed57587ae8c529151960
SHA512c6efae0647aae067ba63508e38f0749ee3ff599ed0cc56deaebd3ad2356ac8f8cae33594bc0888969fa725d048ba2d5a1ac7d3338151142d740c0aa9b8e15f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf4e6172cc27a1a28b06b3146e1f4fa5
SHA1102c94ac6913518dd67832dfbc18bb66f37d0a0c
SHA256c900cabc4b154c81bbd8bc8650562ee6a318cb75c51b8a55180c80ecf83a3e4a
SHA5129b64915ebbd2146178c00291716189dbc90d7ab522a4f8deb059154bf527b86b6a32e50002b1a646e9b82a7f28b8b90b1fb2f40a6af89c7639bbc29a673803bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d1ceded59c8629d3f014d21fbab284d
SHA19a8aa60c1db4928f8b793b080679120153708263
SHA2566294c174ae5a4a4bac5ceb0786af6e535806e1da4cefd8a686590222577df674
SHA5124c89e23012901811cc5e0552c7a6a3910e4d762279e5b902e2f195e7d5dc16062331e02847a12d665b4510089c8f64afa017be51346c573a6a3427c32774a2cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5641cb587acd72c6e0036706fe52cbabf
SHA1c7820334724ff2d73f5117d4721170729ed76329
SHA256ebab67ec20ad6ae49b3867e7e1745f64ea2dae5fd99ed02b36c5f9a26f8be650
SHA512d6b22e8d275244f4043bbca1d5c18a568c2bf901eaf6417b5c5dfbf14ae7b932ad22a8d1fc181aa873a48c34ebd84889979fc4f153d1b0a7462148a5235234ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4789da09079ea150092255b5027c402
SHA12e82a034946b22bd1355aee7d04c66f0ba27e9a3
SHA256e077e66a9731db64b4154ae2843f349e7579637b136aedad67f092fa05ed13af
SHA512d4450552bfdcb3f2b82441c31194a3acb53c02fb787fd7a9d0d562840abacf7e519069c823eb7b391a2aba1b049c4dc1c6230b07078677d7ce5c808e8b4ef066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f0fd952cf0501a77052400c6c34bc3a
SHA120287f90afdf2d428868776e9e3c043f77cdf7e9
SHA25612211415643f507790765b207c75b574b79e67dd61726a40213bdc3c7fea21ad
SHA512ddd74c95ec8cb19a35f94e92e44f875f51d068059918327f5767d0f55e81d1aa056ef90da94eeab3c311db9ac0bf12b3678408f06c2f5f0812c62da400ed9230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510978fb56a942fbc27f6479adfdeb551
SHA15f90cbd5e71d7fd5ee7dbca7c9b96e321e547fb6
SHA2564eabd306b8c92321e9eccff35e02917d30fd7f74c7551e8de1fcadcdd754fb59
SHA51211eaa5e7734791d5f9e62f699786fcc10085c79165e560d1df339597c7283fc5693ef023062b7acb6dc1da116238b1a0d1df5ebe4181cf83fb090060f7fc0c42
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a