Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
13c2b12b2df23435eb5db869089189aa_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13c2b12b2df23435eb5db869089189aa_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
13c2b12b2df23435eb5db869089189aa_JaffaCakes118.html
-
Size
3KB
-
MD5
13c2b12b2df23435eb5db869089189aa
-
SHA1
0431a3f27b625d84a59a8469a19100cf8c7d9561
-
SHA256
e1af2c58f28ca84f51debbf2921193f809ffd18af7ff2ab45ead15754b15c337
-
SHA512
b74a0615e3d223abb2b77ae23e0cc84a366085afb3e261babcaaf4eaa02386c127b12ff237acd418b8bbe5da790c62c6cd806cc22a55b6841b93070164791bac
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000467fb408145146fba4a6a56200745db7ffdc28850bff94298c51d44989d34ac9000000000e80000000020000200000004d5ef3339282cbab367b41d8ea7c6e70ab8cf6b7797bf255fe8c886340a46aa82000000098738111fadd6b068becd8eb3cc3911263a59155102a1a3e6bf71e69fca6b41740000000476e6c85ab5bb384daeeb589e8139d624210382aec552aff7faf4eeb20b50017c68f2b03c5948630db1252d8902e05cd62aa3d2eb3ab673aad49c3ae24fe3a54 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f075ac10499eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421005796" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C075621-0A3C-11EF-922B-6E6327E9C5D7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 3064 2220 iexplore.exe 28 PID 2220 wrote to memory of 3064 2220 iexplore.exe 28 PID 2220 wrote to memory of 3064 2220 iexplore.exe 28 PID 2220 wrote to memory of 3064 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13c2b12b2df23435eb5db869089189aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edf7b41cd21246569a4b51542ce72198
SHA1b9c6503bcfefdff93d842053f2bc37fff4f191bc
SHA256ea596ddd3fc4448f981d07b3ace0e9420f35f5aed27316d1424c9d2c758ee6e3
SHA512e19d6d40f919592a6c52751ab7a78011d714b8ed1d1b665601fa8f2e3fefc624379430bf3bc9d1a39765f1ae339f17e1ea40fd15956f8dce8864ddcee984cb24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5804c3c77cd5cf060e6a717cf49f23b51
SHA126016990e157e976a28fa15f0178f899841e0e95
SHA256db4cd0ba86ff360ecb3ab9851da7731eb8b1ba0779107589062b180fbe44b1de
SHA5125523171888024e9ef7ca19f7e10fb50d025235a4c4330efbbb0b8c8f4eea9f377b3c64084cb08e9aed827617d40150f1af473ad8ac87e74e29d13745b3fc42af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dd3dc32bc18a69672cd9546d72a4667
SHA1377c53499f80d4d0e39ad9c0ca8c9db426acf9f4
SHA25640d6eb9c6f9280cdedf0b26e1347c3b274994799fe26bb02f9cac2fc3aa666eb
SHA512feeff555894abb604cf3b8c8f65cd112089967ade88adea3c2175f127989824a9c03834e5381838e75c104cf965b1b16e010d0ebbc83cf3071d8d7604ae20f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c8eab25c85a97e0c009f0d28c12279a
SHA14e3893069730e6185be6c2022bd80a884f2edfe3
SHA256a49eba6e2f248bbe0c30e51bf1375e6560f299f031686c49709e1916627e54e3
SHA51256651f89536560f1e3fc191c2974e84d3f8288911ba41af565133a44328c647545d322d0bf637a95009da754f1acc6e65e18117e89f955fea9252c31f2a31a5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7fbc0f4f3086b5fe09e7cd3ceb90caf
SHA176a0366f73a991c897916252465c4719a76bd0a2
SHA256ab16ea51fde6a69112380e6aad3c39fb8eb672fc5791225e9b312d99ca733620
SHA51249a29c33f06af63205176b1125b87f93a6ebf075d471a5960a9ce0845e77ad9e109adfc057da641eab9c10e17ec3af9884c2da842eeca333606c63a8ae1aaa5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f98841ce5d261bdc75583b6298e66433
SHA1654a7a9dcdc68e42e53ef44038c791024225adab
SHA256cc7f8c93cff514a492713d50a16b7fc093dea53b6c22dc8f8934a4f968a0f2af
SHA5126d43715db586103bab885af51330c2f465ee4763928059cf3a914f6678fb2a5834dd38dfd52ce202a934b0086b8bc53c9b2bc91a31ab25ce763e03cba45a1afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5268a2fb0b4ae5bafc123f31668fe940f
SHA17974c561b80ffa8128f45849579f10785535850f
SHA2564f75b7e9d3760301b44c0953c7db48b98a2d7e696ba834e73cc0fd93593f39ff
SHA512e4f80119423c63a63eb800106ea2143b9b4b81226efd0108ddc7472aeea1a8a8d9425875badb41059db13525101c3613a145a973ba263d1f138ac5c6ff534077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dd11b5c75e82796a9931cb0d71d1df7
SHA1dbc8c762b63c7cf2a70fcf1abef9e17fd48cbea0
SHA2565f3ef7658b468f1fc84281982dd8a028127df079fc1f93c77995d447579c5074
SHA51294f9470a0932bd30080055760a3cb683d6da9a280e36bc27cd6291dc47e596fba1154268984ef71521cad93e906dbbd992678d72fd7356f5a5fc06b4b34096c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53eb846d55cf16e8772827c3ae0bc3b82
SHA14cf1fc6b12561ab71e9b6f25079f6d444288d412
SHA2569edb8d3b51bf0ab49b3ae84c91c8cf2c7a359a91e34d7378bdcbb1f4fde3ebb0
SHA51243acc90897daed60dab24df7ef30bdd9284410b8ee12f41f6310818e554da6b697c8894c9007d6efd12ba7aba630bc1db6488893e68103b04658279af5eaa893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b930677cf0c03d7aa6d1a2d609235c6
SHA171cfb6ce8ae24b1bf0e2c611433b9a085cfdb1df
SHA256005559b86eaee8119c63c334ace49e978bdc53043965c8e435720b8616a2c9dc
SHA512192390f480e4f444515bdd68b8a8507d60b9197845c9af6667059ff95e0cfdf4fb55fbb51b3346f0ca6b02e13b975dc3097f544f2641416a897c19f4a6ef2395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b01e6b79ee44e14c2867e9c8feebb78
SHA150d0d120c9533307c978f845634ac16c2469cd44
SHA25619083436765ea0c9df65d837d77ab8a62b95937fa15f37c3f0343d5b124c5c08
SHA512923bfa8519b92f633e2f996be3c858e21a64920a3c33da5a465614434ee78a64dcb1d8409ece4d79d2d7527d8f6be1ed0d6d002c1370f01f88c5f501691437ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527740d95ea94af457224096b99d510ee
SHA110500adcb40fc762dc29d535d8782399a2a3474d
SHA256d1f93173373d13715465acdc06b015570cf57415deac808b93be366bed1a8967
SHA512077c59ad2d0ad5c5d9d9e598d4f990177c866cb7753a06b1a63b8911e45be1606a6226f1fc1a4cce41951f003a61c7d4220f92205f54c2d3deb7f22a3f1646c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572301d52ab2bc37a3fdf56893d428266
SHA1a3cc9758478d1bf4fe7c0d3783608f47c5a68f59
SHA2565546e980ded7e22ba1cf79c30d024a463510960a20af1da0b7228f3793375abb
SHA5125eeaf654e62134ec942bbc24b4832166d664b83307ac168c14d121c37461fc6a4d3c207e70f61c152ea1e57420c04c56ea98a8feac178ba5fa947ecd4d60dd9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d3aa1cf29aab7088791bbe94821db82
SHA1b4aba16a7a8f49bd219ba20975420ff4da2e5da6
SHA2568dbcb51dcb5ad260bba4a4f03bdbd8533e3b33b1ef46cec872ce098940f94d3a
SHA5122cecb4a4c357e35cc6ceb277915dcfa27c37c1b8d4ffff87fea6e6625fb09125bbc8389a8b22a21cb8a2ad4b140357503223842397e267a42d8572db7575ef65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed205cc3a41fa6e1b49a2cfba004e92f
SHA12cb57821ad28040c4de3965a784c0b0006b6dbfc
SHA2560774fab43bb631c68f7f8e44b171c658035f8df183411c6dea48365238addfab
SHA5125090bc8cd1699cefce7e1c7faa5f76d3f9545023705085054c5c27723222d8bb9c66d066c2cd2496c4eadd83158e7dcaa4f1b3d5db86aa3b861fe4d120133439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ab0f52dfe633f40984cc8adad38ae86
SHA1d72017c4e00400c3bfec5a72359ece07fb2431cf
SHA2565256f690bd3271a1d49c445314a154c0129125f094f213d787652ae8ee33c598
SHA512ce4bdfb3f23cb10c0881252cf762400391cf56e5771df850b5ef1447905e55910dd45862464397d865622f4b8a2e579f4d6ff796e04d66716d3712a2a1666041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ae544f0d5f63a53d57e1adee508ec15
SHA175512e7997c5676c57e39203688acb2bbc8a68c9
SHA256dcf8b2d49322df75a35bbb526093790e4bb79edaf55af36eba1fb4ca28ab759c
SHA512a671e86883c6fe457b3c14e281be1f93fd5ee961866944df3977cf70e22544145a722c2c0f78c9bbeea1d0302ef7140f43da617327236cd0be0880ab2af75fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee6f481f2bad705857217eac33d34aea
SHA1fd8f124918fcc6da048c996f695caad3a4749b67
SHA256f41ef26c49228f3fca2b0e2f48863581be0597a9c922778a29350c15636d8984
SHA512741a1537f1af25758b0bbe9fe87d760cd98b8bb05fdcea49b5904463d7febbd840d380dea8df7a873660a40e68fb686ed5b3cba9598eece0ea9e7177bf096f18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50373a7bfdf111e2fc759f612490e47b9
SHA147a895041efdac01049aaaa81c8cfb8e7f82fe48
SHA25621a3d45106ff7ae17dbaec7d1471ecdd7186469aaccfb82e72cd4ed3c5a6b2d6
SHA512b0badbea8bf3aa82890512f5272f1dfd3060ea97bb9f31eae9c3a80c5290aa39d2493a451ee780263cf87f18c394ce96c8671cf5c03ca890186ab44bac76f425
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a