Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
161e3b06f63944864cd7023484d9ffe8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
161e3b06f63944864cd7023484d9ffe8_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
161e3b06f63944864cd7023484d9ffe8_JaffaCakes118.html
-
Size
3KB
-
MD5
161e3b06f63944864cd7023484d9ffe8
-
SHA1
9a92d3c821649660726b2ea6d5ca2d3a8ecffd0a
-
SHA256
8ea12f4a7682a8caa5865f32445264a3edc2081c03beb3bcf70ab3d277de9f32
-
SHA512
f62d576c3a4ef6c3bc0b20139a9da4fea509cc4540ca4d754551834a5f2581d36d740ebb07ee2d76529aac319bb36b0fbb7950959dff3850273f94e09146e568
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b004bd72aa9eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9E464011-0A9D-11EF-9988-CEEE273A2359} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421047623" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000003d3316174776e52d4a2ed4e57d5eee033f4835cb2e29a02cd68e73180060a4f1000000000e8000000002000020000000ef206ca4b9fc252e7a2517e4a575fcd440ff42dfeaf5e160a12adcc7814dbf3f200000007f9b3ef5adf9a478e7af2af130810e2979bc4c0425b6c6369e6847920743965340000000c7ef4d2190c5edc6c0ebf4a02ad9797ea4ecb3f08674b6d3a820873458443cbdcf2a982ef4ef22fff3b8d9facf97041b2e692031325e7031853e07c8535744dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1888 iexplore.exe 1888 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2496 1888 iexplore.exe 28 PID 1888 wrote to memory of 2496 1888 iexplore.exe 28 PID 1888 wrote to memory of 2496 1888 iexplore.exe 28 PID 1888 wrote to memory of 2496 1888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\161e3b06f63944864cd7023484d9ffe8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d81a9bc8876950bf9abd2cace3f2f081
SHA1d319680a6965ce9a07a6b13fa92bb8c7b37b9254
SHA2560f033823b1054e6e8caf6e64ed20eb2f00f45cd632dc17dc9560ffb961052506
SHA5128f1be7fe4d5ae44d7da62a86b44d224c8e0f9cc5617e9a1c2b47e7db68e88257542d744055fbd12c77fb9c01bf1c33979c72b9c6bc9462fac28cff9485515a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b67515707adc65588f0956f83148bf35
SHA1959989105ca82608112109aed575f14f6fedc43a
SHA256a0678f066698eb9a4619ff470042fd7807bbda309390e04b5e82c843634396e7
SHA5122bbaec249eb02c51796e726f72f25f2b5c40b34e4e0d466d4c48ed3cf44d3f30eaf11052ac3cfb8987bb7332da31298768c907a8df1cad0211e42af3227e0bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a211ee0d4e767ed7918a28059a0c92af
SHA1a365ef1e7d51f345b39bb35a286a5b95ef6b5677
SHA256d3050e3b7adf48b91342893fea67d31b2fda2d6e91407c73e918a29fe142bd05
SHA512a16a2e41689fe56c71c57b7cf95249742f2be7b02b79305ff4bc4cff1b37f3849ab66cde3159081a3b259e1750ec50e4ef2f6209669d25e8412ea26d09453fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0caccf1239f4098d04cc418055cfe3a
SHA148e7f227db2a6755f4ec222f015864798bf7b3cd
SHA256dad832131fc197a2ae89c7b84b8699aa70f436f40b6a93e897441f45069fc1c0
SHA5122c3233e7eb4e76681d050fd6ecaa0f34626251b8b74f701952ffc1b311cb454e7049b971220c0be2148e49fdfc9b16fb3063de15e9460067f8ea9fba3ec1a817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592122cce6e7a85d544e5fc11a5472386
SHA146626b696507d509616fd8fe78a13eea9a508e1d
SHA256cf82df26c4960350370c2e9ce567d6c0c5921cb12944d278791f28d336223d46
SHA512787754964ab5c05b0d1c87b25168634423f245ed973dda5425ac3ee59b295ad5d86b3f2aba5592e493c3a5702d0e89215fdb436caf2c3d2b31aaf3d54169f250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5820360c4725f255bd2ba9c6009cf77be
SHA12acf8b8da2a09e5d8d727345d344c02dca629cd7
SHA256da891736107d30ee789c70a5b820fde92f9bb3b101776941159451e18cdc962f
SHA512b8637667c3e2da82865d67e9ff6562a35236d87a8e83951ea257859edeab79df86a1e58b78f8915af1843f744383df5e28ae5fd3442dd8998083b6bea43c221a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dce2c6a09ef4156fbdde9814c79d531
SHA114ed6ad2f1e90418df7ba687793a17d3c5819bc5
SHA256aa4c05634e13eb5d56142236bd6dab7c69ac9566fe12e08089e4033c2e5beeb8
SHA5126618fe83f410890796102826ce6c3c985ffdc4de78f19f256e0e4fc2b0651a5198cd7cbc244669ad210525e39cbd7eddd9a997f1c0f4dfa20c62e2e3c5cff1e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fc410f19e5468bb71c2074a4775ab0b
SHA11e18ec2bed9293f895e25259fc5343822ad5dfeb
SHA2568f3782ffd6df0aad05467c89bc95850e488c9d2e7fe622645f1160c76a280a9b
SHA51274b30745641677b0fe810fcb5c98ab5d03836af068e9a37422e5a575b720d7fe5a774976eccedb2163615e58afe0f8913aa4a0c1d7d84e0a3a9c26b7ec5ebbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53580f40ef62db92f2b9f7a945ff5f842
SHA16ed51d0f5d79c3191a209eaa0402138626afd992
SHA256d59315c34cb4c8c26a72170fd9e505181f2fe904fa56bee92b21547847bf41ee
SHA51225b220681c6c38aa537061eaf170ce6ed09c5acd59a20e647c80dd2375b39923b68442cda55deb47dd430c0b0b8f27e9164f4d4ae0b75547cacffd5c31a4b6cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f283c5206356b5f6e0214d28f19a612
SHA18f599e8d9dd6aff77a0eb8c582ec9cdd1c2513c5
SHA256e6a3a1d1a6682d26fea62e7d46d6f461bfec74e3cb1313b78c9c1bf40c45283c
SHA5127f591b3c0f798a5038fe05a1f70b7da4bf531922c8c6b0696a1773c5c15b6a7bd35c5c87aeed5c0dc60095689ebd3a1e3eabf48cf6cace1b35713e23c1a421f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51266eaf950a8671b510d0648ca29ab05
SHA155aaf9e3e5be5439f5713388e55ee3548ad30ab5
SHA25611aa3942b695274c83e6cdb997a2cd55d999edcb646b9dda5a9ef473555af81d
SHA512eab4cc3e204b5f78831a9ca344f68efa3d9b7701d4ab27fedc6d398f1d2ee8d0bae53865122f562e33b2af19d87478f32ccebd386d8f318415761f2623171411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d329f0ab5a250929db4d9119acf8190e
SHA17ea59af2158bd1dcfe9a67de8445a419cf317062
SHA2569037a72d744ac7a19b132ea6ab9bff05418f1e63f73808ea9321ec4604658f73
SHA512090aad6a19b84dcb6dfb96098e34778a5b1674a699ffa9d618f4b03a90801be26fe0cd4782957a3da85e4605722ac23a89d3973dacb4d662f0a3d6d77b258b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544f8cc33b141aa4f43ebc31d5105a1e4
SHA10fbb9474c8017bdbe41db55a883b60bd32ddc245
SHA25690f152382d6ac6ab3ddb28a98d150ef5f64391687ea45926ac3c04cc6dcf2fee
SHA512714766f9832cedd4c5c4cc8c2a06e8a10c1661fbc495720c48653126fa2d18510622b2a15c8a4e8482f8e06ab1b877b7c3b1d2e08302146db2723ac8f8317b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f98cf5fd9e4439c0a38a14c7833e7580
SHA1f731ef2a814480cff85136af5541eb68880c3c90
SHA2565a8619ed07d6a962b67fcf9e4844d6787ce8f791afef863f2f71e5ae55ec92f9
SHA51217334782ab24b948b295b78b3de0ae5911b642bc8ebbd88d810c895cf28f5d268eb16c457bd37b0bdb788251786fa8e63e3dc0a0e1cf573101ee90b24837e533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5533704622701ef1770a68f1f4ce725cf
SHA10763d5a7bc0f729ac00acb32e9df971d721651cd
SHA25634e396a48bdfcd667197cd79343a0f0f8aa9df8fdd01f9ebf63021d9d9a22a1d
SHA512f4a5c2a30a7911226074f8a0bbca65728bb186af331e1bb2abcec2e16f2661f0b6b00630b54b31589f3aa712c42493ac58619ec35387da170e120134138ba0dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597c1529fcb6f63744a50c2f24bcf4af3
SHA1eaca315e9ae9b764186344bc84405f49390bc414
SHA256cac34a5e876fc0c4845ba2c52fd01a5691a440454b522185837c5d2aa74c3ec5
SHA512f70d804d0770f240b912a65a60d98f86cddbafff415959f736cb446728529ab9b41e88d59c4fbee0c4ce0398a978abc37b5ecc3f6bf5fb6e1a23f0f9f01f7171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf240e222bd50866c54a9847e3abef8d
SHA1b0e9e21a90fe6004b0e28d35f03828d8e4d220b7
SHA2566d671a048b7362956b514df24a586029bfe0c97c544860bdf391217c95fb50e5
SHA512d0710652da7c591c4076bab5183eb14c089d4419db5bf1e130bcee0873c83c1bee3dfddea75371ea827cad435fced790922355c7771f1630802d4c29a2193104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ffcb21f40bb4fc11c19dbe514acdf96
SHA1ebc5a21fa2e7662599cefc90f15b25eac216b0be
SHA2564b8f8f46de60cb50684297d6cbf51426656aa135136c6524fab0d17de2e39311
SHA512116e37f238a9dcf8e8548e7a19d6e2d948279613c88602402c83fd860d5c4b5554717a7f9446c51deca5fc114a912db2348950e286b54cce4de73519aae9a503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b9757466f4dad33796b270eb11a0e33
SHA15e486d476bc4bd2bf0fb03486a5611409bcd45da
SHA256f8f44069136e0c27962d2ae4dc0d46ad55d5d1f21be9d02c1de258065c908943
SHA512398d61a81ac4d038476c1ff60bc062c2a3972c9cba08c1352c4f87cf753559fef18370ff8add8de6c400982d38de477a536d80135f7b00751a463b6f31dbe38b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a