Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
15b81ce243107adb6d3758e5caf25aef_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
15b81ce243107adb6d3758e5caf25aef_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
15b81ce243107adb6d3758e5caf25aef_JaffaCakes118.html
-
Size
1KB
-
MD5
15b81ce243107adb6d3758e5caf25aef
-
SHA1
d0fa5597b1bcf732b3634225b1ac1ca5584ff6e1
-
SHA256
f6db4063be3ed0af16183336ec030071ced80e5f8e84e36893644db23b4b3ac5
-
SHA512
691a73272a7a35fe1d11b26fc05e771f71b73641acccca5228a97d62e452cdfeaec9ee47d17e3226e893fee979fd0b6a07f12497aa9c731559786372f88092bf
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000b4156809d5d1176ece453530c5f9c92e24ca11d70efe949d150104fe76386e32000000000e80000000020000200000003e876e5241aade56d45470d1d2ebe4d7cc4cfe4d20efb2673d308ea7f5b71e882000000098a7e2a0c0b0ce07bfe746b11567bb754aa788de0bcf7a06face14da6b757b074000000062c0ef4b73ae76c84d2f7d5d055b38ebf312f5033363f82b38ef7dcf3d7923e932360314086af81bf7a0206aefd6fc44b75bfb84d6fa6c886d3122975c264d38 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ff41c59a9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421040889" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F084F2F1-0A8D-11EF-A1A5-568B85A61596} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1560 2072 iexplore.exe 28 PID 2072 wrote to memory of 1560 2072 iexplore.exe 28 PID 2072 wrote to memory of 1560 2072 iexplore.exe 28 PID 2072 wrote to memory of 1560 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15b81ce243107adb6d3758e5caf25aef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50959c300abdf08ab16e05809e51a926f
SHA132b3e2ef7f2a90d4d364d9e7dc6fae250f956221
SHA2563590e79e0dd781b9abb618e4016b5675056845a09348579aaf12e8d7587c8f57
SHA5129af5683e20b57e6df4530262cb07246740886fe5329ee71ddaa0b80aa7a97042992e9c0dd1106ebf8a0cf98486113f93ef6639f9368cf2f51c11f01bb25da001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eb8e2b8b876526ade14b5be053c138c
SHA10b16f36bd2ca50d4dab6fc97baeb8cf9e40016b6
SHA2566718ae719fefc990211d752f8eb5ba03039fe0d662475fe5e7d66a4d675d16d8
SHA512054ef597eb7a3c0c62c00ff7c3be50370945529649d7f26a4ad832f1fedbb0abd51f3eb214e154b0dd7340d65ecbb300ef9bfc853accf036af02ff6dcbada1cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5032328b69d27f65b2944429f95dca6ea
SHA1c89ee59ecef10479b7f6c0a7d4afd4aad007da23
SHA2562df9e144556a10a659412833a20a72597fa623e741b73dc77b9a6a101a8b6ac1
SHA51232b6d881c2be6961f54ebbebbe6a93425f1b9dda3b182556329bb9dd7d429e43f353994f7287723f432311de11d2ac0b4b4a9771919f507ff72cbdea80ffc924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a83b801fe86bc8a0a4c0c85d08e32e92
SHA18f0fb54c18a5205a0c39de82216f8d39601f6720
SHA2568ae5a292b7c7d62a3347f5a5e4a4821198f9587f4acfb482a8f1e86f87416edf
SHA51262eff2546edb3df66fabb19878c82d10e3724ebdc0df6c1877e06001ebcb2597c00921c854d6bd34476e1aaf7141c3f5a25fe9664ddc044a9c31ce8c7861ca40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e3b9bb8397570d5833399b513d8baa1
SHA1f019d59e9cd20d6a9e8d9d43115cd976fd7418dc
SHA256fe0bc8d7a31c81f21f7bca9f50de49a4f66408980e652d600a9bbbe9254dc327
SHA5129d09e34b44307cdfdb948d231deffcfda5591f8f5908f570dba70300dceb63388d664994ff3ccc89a2578c28e7ce3d1085fc395202ce04c28e01d7bad2353549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5effe1b8f1d04677602b8ad6555892928
SHA154b4a7c66897b415c50f5eb62ac558d781853132
SHA256b6eeeb781f5b9d692ce79afc0d696bfb08446ea60afaf1023db5c6cb1d55ce5a
SHA512b0849ef85e4273d9a78bd1b1cd6adec615e0749b87bfb440e541f9b1eae15f7540b35e2bbcaf1efad094f9f6c6b50e8cf593b31e13f0ff4143d0684a6d4c70da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58541e8aed0c5477885117eb8620d46b2
SHA108d91392c1db8024bc256294ed7f4c6acf56064c
SHA256df8ce95e5eb7d0d3adfda529ac745837a5032967486340add3f3146139d02831
SHA512832cb1b1f2f812b3a2bd244b5c3c4bf00b26a0751c702b413f833f47255a937aae408aea5c5db94221766202c9b1155e94415e78ab7edb6e5f75d35db4cd99f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b11de92cd06bdc54022ebcca8302dd1
SHA14097770bb1e04e0a5477d56b81f3e409395ed929
SHA2567eeb9744e1b5148019a01e10cad1846a5b1498d44516f606d16329f00a166bc1
SHA51209e47be850319db29d07e368b80becc18b06d7cca2447fd1320f99268264f570220089d4531088d657e01d8dc7003981a85667048bc5780b8a5fb1ccc1444f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f86b9dfea5d180bc106d1ed320c0c9e4
SHA1e2689a8b7c5dc56197458a50d2b21cd3b2e95545
SHA2563b7d15968f0f79288185e6143761262c96375d742b00d31434d53748672f02df
SHA512b28bfd490bfe17d4ef9a82023d50c4ec67a86b92c4597507e58c8885028e13bf1177740142615dbe7e6832df25f4b8c06a176f0f3c1dd8cbb63501768a7f441f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57405669b0d6756324b8d60fd4508ba1c
SHA1aa8a3c0b23c47bc14f890083e8883323768c81ea
SHA25685490eb006b79420cb39de1276f8808a0d0e469565ef512734dede5f07e97817
SHA512d4f666c7f6682e549c7fce1e2433e5bfc62aa92c44774a70add7d1dc646801c5d4fb0bd7eca74fd8c18c6eaab97ceaec46a615e512dea0efc33f780e5a97a7f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56436946aa2f1f84c45470c88d3293fb8
SHA1cf5db05eb355715a8954a405de7bb3a71d7d1949
SHA256934ad8886fb2c75dadeffa84f9b7909161d700e757eeb44c17487cc24b42539a
SHA512a4699241502def997f8f22e5d315174f4a9586460615c430795e4e045203a12454965f348709f29d39f7c9843f5b6e3592d0e45ec59d0dd8ebab6fa3b924132c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a491957acb4e0354387f2f65775a180
SHA17ad71bfae742f9df6251d5cd7c7929ddde18dfb0
SHA256402cd84dc88948be81de1cb68f6d3d87de117bdb8a2c6c43b509cf67160c26ad
SHA512d765eb382dc0bd4752d8c88fbdc0e1d4101a1012a7c6869ab97f3222d4959af1d15d0571048f3b43a27860cfddad7fdd603698b0406dee039fc9fd0dc5f739ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1620066045dcb89b48f6263557a839d
SHA1fba26e9e83e4377e7254c0b024a5b22b97bd6eae
SHA256d8e82d339ca839edaf22b5862cc203ea07cfb168d232f80c90210bbdf900a4bb
SHA5125b489426e67b8ac79e5f45d2936b3b25bbf33945b26f454dba5d1c7be93142c580d98044ef8f4145604e71c7b050c48b3a12816e2ad477f1379d9a21c1fc45c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579bf6bd87f61501a3458a99fffd7a163
SHA1151fbfcd4b7a1adc285eca112736fd1b909d64b9
SHA256e0fdfadb8c17d8586f582390f7f96512180d0069679ada51fc89bb2d7a947df7
SHA51267214a929cfb66cb59074da6bc4c587014aedd92f98c52061264a525303368f7b9df09a3117d7653e977b62625b56284855940796c20519593f25c6c1fdca153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d7a80b7fdaf88af863b5ffbfee2fc02
SHA156aef91b65e8b039781e7d54b9bc761f9c7c9be4
SHA25623f70cd8b786c42722b22c755a7e7e46bc8f15a76a4e9979f97884f659127d68
SHA5126a6c802584caaff879e3e428866138e3ba2a75e7fc085fd900dfecf830a9af2f6638478378549f09d4cd141658bcb487056a8a55e5c7d0f791e828210bdc2387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f8ac14c032455e047691cb1e7fd6e63
SHA18b82ab672960f1fa673c29ce60f156622d4f8b97
SHA2567b310551a875b81591d089fdb00b519b6f52545fde825ede3d7ec4b827ad88fc
SHA5121dd1c52a3d7f96a5d1a8a69f8f705b6f5c35bf6106df6dc10dbf6dc28312b3a3a1ddafe39c677f3f81b487046036977a92abba453abd97989710da3f7beac26f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531ff196cafc5676a5fe00c0b28f952ad
SHA15790967311ea7288b546b50810f83fceffba810b
SHA256d798afd2294b6f98288b7670f6843252ea0eac9d2531bd8bbfca5b346746d42c
SHA51206d60183bba5bc5e8d09aa55669b4058c4944bea9fa6a60f21b8838981e6dd6d6e881dc17d191864d7b96d5a1698c7932a60132cbf8431e70a2f55f63c91858f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ff2669d7ef95c2d6ee3fd4ccad1ea4a
SHA17cf57b67ec18aefad0b9c64abead129b7840b1e5
SHA2562ab2bfe3e345c6d39dd12baad87893cba1154dd1f2994ea140473259f7397d5d
SHA51251acf4fcdd929a75ba951e7aee917db0c9b92015534191f2ca076223e9ce59daf2f8a6476e08942174506c87f97f27bc6c4567532ca53d4d5932e8b214c09e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5760d9ae7cdf2060b8598c2de9e4573c0
SHA149f2e6dc304a4007832e27653dc8ca1cddc7aea2
SHA2567e844dae470cfd14cec214e11e83637f1a8d696770b193f278a902079f53bff7
SHA512a04fcd735fcb768acab3b82db60da1b779a7e3c904cc339dc1d55ad7f6710b9aaab5efab0386594a6474c368affbbacc6663777ef696bb99e7503c21fe0dd8fb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a