Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 17:47
Static task
static1
Behavioral task
behavioral1
Sample
13cfecdfbc602082937759de75e00e3f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13cfecdfbc602082937759de75e00e3f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
13cfecdfbc602082937759de75e00e3f_JaffaCakes118.html
-
Size
618B
-
MD5
13cfecdfbc602082937759de75e00e3f
-
SHA1
f4ea164396dab8100f710ab10af5c1c2a4d82e61
-
SHA256
b1251abba64816ae1991f62c3737a3ae51da28ac5ad8a65cde1d9d5e9ad7fe08
-
SHA512
35ece8f9693f111a72e8a6ffa6f5a73c3cf7e4ac299302f4dae8688ce21dab66660f6fdded33c57cf13bdd677ee14a94d23214fa6748a06b6c0fef8aee9219c9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000002af9c7d1f3b8024415aaa998e7b7a9f3cf4a8e0ed17ef06dc5e368150dcbcbb000000000e800000000200002000000000c6a644792075ec3c3f5da0a4bd63f3dfc3e51ff501b9ae013430d111f6084a200000004a3795302b4b8cba08815bbfa6aae51c33c17c3f1b1dc83c8776bd144aca40e7400000007274fd8e15243a9f32f67d30169eadba249b6c207637859c893fbe4bdbcb7501ab4675482073029d0edeb00c7acb711d9895e9256c1dd285c6ae974759ffb205 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421006746" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{711D1461-0A3E-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0878f374b9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2328 2012 iexplore.exe 28 PID 2012 wrote to memory of 2328 2012 iexplore.exe 28 PID 2012 wrote to memory of 2328 2012 iexplore.exe 28 PID 2012 wrote to memory of 2328 2012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13cfecdfbc602082937759de75e00e3f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558cd8801540875e740abe648d4a0adbd
SHA112d026943015585a2c47d9d48d2281a017e77154
SHA2560291c4702fffd5a98225390db311094337b34f0d855699496a50f52f840933da
SHA51237a023b6af84e2cd6c025cae58241c9e8afe1012634171987329299f4ce59a983440cab5affd50c4e1a8c7a58b532a60fa9a3a9bb806f9c19010822927197ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50803b1bedb948c0dc0c2a0b06848fb29
SHA1c4202c36f3eefe13a80a21519f62996b37692005
SHA256b07b73c2cb5714f99f8a90eb18c896ebe99504487ece79ecd9fe2848630c8a80
SHA5122d014c8c5ec94d1e1596598e5a4a67a33055dcaac0539ef0492913cf30437014b4ef4f0cba8fb8fad7173f3930e7ee98cc8c471dea6d2ac3ba8a29601f09f1df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5055eeeed0c305cf854e50a1bbbb624b5
SHA1bc318c1bcbcfea402556b2881f11356a777f8049
SHA2562d0362d8b85d29566085726aaa5f7e1df0232668f77a7d3674980b76994e3bb4
SHA5121eeb09276585dbcb6d4abf4c933f1904ac25e42a1f29aa317494cabf011555b87aaea6fd6147610e33a62b94dfb678bcb57e6274f4bb80cc48d45ae96be13221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed3837269a9a140af1dd82dbfff9157a
SHA19b144635f67844f62315153f944f267151a65f22
SHA2561212b0fd6d42ace6f85c6a9f371912568408c9a6c0acc09ce8a5365997fd28af
SHA512785a21ede41950829ef72d79892e53c076f11a6d282d8dea833e102684b2d646c8f1a845cd647f0ecc4da6fd0dafb4128ced1547496704d884ce87a84725e63f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b649c90576f610f6ed395668b45012c
SHA1d1efd6c350b03fb4a5383eccd94ace4b13b0c211
SHA256485c2e3318711122a8c5a2b74435bae6124deb3d461014e743687eb005cfa671
SHA512f9e3a1d2ad438a9b581d227bd9b51ae714ab7df33ebc4582f327a3ebd51b4964d441b675bf8a0e1a76011ad8bd7895aef8664ded6d1eacb2d62335d098c02c1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfb985fd86861f67833a9215fb75763d
SHA1dc1ab28bfcfbe239883f174e2f94b5cf9d01beb7
SHA25644ca6dcc0c61207f407de43d92c1cbee5766d2ba0a47f7d16592e5811dc0238c
SHA512ab8c50281b86d814ea68614702d0626ae76be68e2673560ef700eb03513020d16e2f94782b6d543360a7f0486c03b10c1cd4da8f3522c362913910867cb66b62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cda260b9cf8a6e47b08ffbd4dc64302b
SHA15cc438ea8bddbfa670371fae92d79fa8ab5cf420
SHA256d9f86463d72a4144d3bda940ef82e6697de52e2d8a4991fb553572b3b686bd99
SHA512bfd2dc2d01d0720e1488b374b1baa6c0cf449ee98935441bef01091a74582241ae46a92d22d8893ec65021e97eb60102748bbc831f54f9ea929159ab2e89c757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d23957798ba1746229051098537b3bb8
SHA17ebf3aa4e2fd038c7c862a32227d3608660ba8fb
SHA25619e62017a4c27f75775dc13401b2cfff54c6da9e681882ea649e2b0fd6d6b883
SHA512fb8077b59bc3f1eee7951e62551d8253a4c18e817610e34208167fd860f44310fc789f3f531f5b6719c83ee9bb84c9b5a9f7874755886aa7198f11e70069b804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8a5848f32a446bfd01018a7c971988c
SHA1a95895789e31e375903035d51eb53bac5852528b
SHA256285af9423756de451e2715dcad93205f222967c9f8ebe358c27829cf19e09bb1
SHA51271ddfa6f03904594f3500987b2255a9032367ae65a8bf5968975332b14567b052d38ea4cb07d1c9f5cbc8240be71913d5518e73d73bc63147b6c2a3a8ef3d3a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2bb5de4c13b2a5c6eaddf9edc971224
SHA17042a5cf2f5409ab74351b7cc27ac68521bca7a8
SHA2566d6979d1ddbbd0a4fe1e038d86f259b228ac5aa5d6bc7189ff23635eeea66890
SHA512e2c50b45e8db17b38fe32463bb26b3f2dd3bbf4e8c4b9f2d03d718ef8418440b6d73a2a5a47e8e0640d4e2356408b0ad76bfa20c2e5bab55d994bb8570524222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc993a46cc75c6bda00b8541c741667d
SHA147865033eeebde6ad221df6ac40d01a70647a8bf
SHA256b1c189545f65a1fda56fe2c4d401b2e1b36cb04261e848829669229c5af8b461
SHA512841b7cedb901aca9e3c95889ae6731ea11f95d640bce18d1bc9743d4d58c8af4d46bc40cb986589cbc8330ec4e180ca9b46f9f100f4b946058fad1c05b8650e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4e96112ee880476464d287497615210
SHA1a197bdc68d2a3edea0795d321f77fcecad7c1739
SHA256c6d8be6cb53779ab12ba7ac7ea305747956678ad6d3bbcd5ea06a84eea3efadb
SHA5122749c184672fb09ea5f3f43bf4e5109bcd7838b7a3ad23089be2f765b88bb520e26e0cfd88f1ddf1ff973ff360b9b97f83f6095087615fc5e59a62032b0dfe6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5977f6eaf938d4ea91d176e2af8e7d8e0
SHA1bf0bca0317ab9f71ab7d502052af14d183c1f5ee
SHA256f3ac021aaddfd75428dbbc26b5c4d876d1215d3070fecf16183610695b50ace0
SHA512f77bb0fa2192cd1ecb6d9f1ea840eb37f8ea9a7c6ebc156668422990abf5aa8f49461b148d03822740f85997844ff06f9d1285b36b3fec64da293f7c4eb40cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551f45b6b5f88287eeb3e4c4ca71c36a6
SHA1440346b8e4ca0785c1be99e94db350f735e98b3b
SHA256b6d6f76d24b1ca18836e5956f51041bbcaef710233cbd785ea43e90ac7b1b932
SHA51260bbbedc978c8215b0f32f0afa619e5bb1eb675a10ebdf29a6c839d3c801e8c0aa3dc5abdc469f8eecc77e45d2b0ce674b6ad8aaa1736761a0204c9835aac1ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527cb5223e3c62a0a78f4e564bb518454
SHA129a4d3bd07d4cd180cc39bbcda59164ebbef5306
SHA25679c35389571305206de21ec229a80851ae5c7e143b318369f36c9fd1415f222d
SHA512f154d49aaeafd47f1ef75480766a25a8b56ea4855a620bf07363cf20c76fc0a46677a803d97b048df11901e72781bf5ad50f9419832d31a5010ae2ffa2e27e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564abce07e091bcbdc2d2fe545a269013
SHA114ab21aed3ba59a84aba0d25d2bd9704c51ae487
SHA256285048c6f3849353777b57b037a18feed21a11455d487187d831df3d0c80f371
SHA5128ef2d6a7e01fd1b0c9e2e8f511784ecefd531f5a0e5e3c3d3c1cbb6aace75855a33ab547186da77b3db54ccbeb9a59213ac3ac380a3703c476acf4b4017608b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5367315791c01594a3aa8660aec54df38
SHA19f273c242956a6b16abea2af7dcfdb3f2ad7ec7b
SHA25618296433532d9fab5dbb53b21482127f256c400f334bcaf2da461a79342fc3e3
SHA5128821bad70ab463844aa1d3e8b87ff1ee5a95764d27979b95ef7966ff515df78f200f190d27b878ca5e975962dc4312739ddfaa28f61b19f130ae954a34592d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581594faa00508719da0537a065ca8dad
SHA15772449cab67f1bf6b389e6d26bfc444780f4ab9
SHA256f2e7daa31b66deca95829da9acbb34c2967b772668506ac6a30333d3a451d845
SHA5123cc6a35e96ba24ee60035fcc60ce49e8236a09fe04392de792ea9cb2ac328678287159ce1d0d504ebe86caffd87c0267d54b897c2be05309d2e1608f8ff11f0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d66a7c771d06b330dd4932623b78a90f
SHA19bd8fab62a701075cf7aba1c0527fdeda2896ae6
SHA2561d28fdf27755e21e61d4d4f6e77f0e809e96ef5bac311b0fe5196eea5c14efe3
SHA512b02d6953b2c9e3dcfe9e490f8f1c9338de979e85d91c43770401fba9989d92bb8418325e841a6a43a8aff5bcf00c6cd34dc1daec173268a9ed62d868cc19fad4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a