Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
166029812c6fac19984538dbd9937a5f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
166029812c6fac19984538dbd9937a5f_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
166029812c6fac19984538dbd9937a5f_JaffaCakes118.html
-
Size
2KB
-
MD5
166029812c6fac19984538dbd9937a5f
-
SHA1
416bcd8994d21aaf2756907014272d21206e481f
-
SHA256
3147131200c4c93ac906ad7a2f94785788a9a354030014ef896e5dfa07859580
-
SHA512
c286bd2b215e4bc9656cdc853c742e13b25603b493dd313b3b7402f21f65871f15bceea18c1308ff793d04318e6c622eee7f9c26dc3fed98dda3b8bf6cb5102e
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000546adb49eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8AE23D1-0AA7-11EF-8356-E61A8C993A67} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000006cc2ba31bf43de9e7b553dc0064edaa63153429c274d2f228cc2c639f3d4d01a000000000e8000000002000020000000bcbf1290a99064ca083d853221c6863e5e53256607db0d332cb07515dd3794e3200000006ab57fd6f16d4e5b9e095fe1a3a1be622c7cfa089b0ce10d2e4d570a98a962b74000000004e0e070bce04f327dd0325b55412c18aae59ba21b33395fd0cf9bad56d324d27e0489b8c97609b2847ca1526bfc74000ba60d6e3f0098decdeaf61f25391310 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421052015" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 3016 2972 iexplore.exe 28 PID 2972 wrote to memory of 3016 2972 iexplore.exe 28 PID 2972 wrote to memory of 3016 2972 iexplore.exe 28 PID 2972 wrote to memory of 3016 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\166029812c6fac19984538dbd9937a5f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b147fd036df7cf8f536079d629884a9e
SHA1892ca1df324fdfa11a02f9a4b196550df7873c48
SHA256b628cdbca24394c186bcf72afc8dfa6c87dcf86da97b3ac22249fb81987d0f0e
SHA5129a89ee3f0384bd8679b20c1f926baefbdb2ab0967df91e1cb99e0206275c14ef88afd3e96632eefd01901f2e4c434fc1ec9a01aa5451168720326a2caf2d2aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570ff8c603cf9c114bc6ac945994f4983
SHA1c4fe49d921cb388629ee8119fc25f49aca2daae9
SHA256e9ee28bdbedfaf6a6938bcbddc54a65aed393f17ed5ca2a6d77e1a8f16f26d62
SHA512ee85c531e7a136f3508b25e1df1a39a1eae13481ca1b24925674e722b29f66984f901a017052a06f0f3e64e0df38509029b1bdc57d0568c127d8d99f40aed07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a53652b532668be52f6d723cccb61de
SHA14069d494829204d4c8a23951fe0a9cb32b9b3ffc
SHA2567c6534ee7f5310660b2a96a02046d18e781d876a85bc499e9c6c2d3cfdba8108
SHA512a31b92bb8703bb1c675a224d5be1e7686c18226cfc1b5d9d71c5fe7e49dff99aebd5c132aef0d0026da9adbbd342438d635511744fae990150d91ad82c761349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599687324081b38f997c49f9875e2e83e
SHA11dc871aaaaed5b6c1f7f64ba76d51f2fc1e78c92
SHA256fd9d76cbe62099e8d835f9c099f77e2186a95537a8c2f9f7c8e7accda18c17ca
SHA512ae8becf4167ef1ee2ab4a48708f56ea242e268e440d1852104024866eeecdde4f9043278b16f0aadfa087fa2f0161e97fc58d0fbce31673e064238f47faf62ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeec49218adaa9e532f2ed5ffee92743
SHA12b821bde00b21ea2e872ef237faf7b38befe1ad2
SHA256581c84160d7ea52b8d7e5b9c6e63d92abdc9cbdada92459f0af9dd17221b57ff
SHA512a67790ccaf24dcbac0df6bba2dc10f2e0ec1d21b00e3f82a2a51bac7f62edb8cb999404441c4d0d1d7e16fdd9f46bd16296cd723473b3e0fa2114ef8592924ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e02923543a2a091baa4a27bcd8983f57
SHA1296c3af3e4b0824739edffaea50f4882753d6376
SHA256e14adfba7fd67cfba7af69aa5c465f39b7b75ec154eea2bf6c415c0d68199fbd
SHA512d171afe15aaab35d0c8f6f64778a738ec60fd05dcf5cc2301532d8034fda38459eb564b6e7f35a3534e45cfecc79198d12c158a5c9ed53f1d0ec2095eda78a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5760277aae174ed9e634042df19d6165b
SHA11980cc2441d1356e2a2f048177d74bdac863039b
SHA256f123f3facb8284d60802fbfdd26d27546cf814195fd91761ff4c18d2e1f61415
SHA512fff658e818416eaa58340aa41f834345096f38e781d9275da79cf4a9ba878d3ab0dd4eaedb27477a2c1c0d5924d188a5c693f200d4a34abc5b94c419197644aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52139e5cb45a6917b0e712cfc21bd301e
SHA10e4e740e86fc07a1fac53e21d579969da6ecba50
SHA256b101db0b6cdde90d2f411e0ec30a6dac7f11ad5f7601f0596b002e77dc685e18
SHA5129987855cc19f8c9e593db282da628f846249f79348edf44a23b9f4ef1d37fb3c13cb034a6ca6db6824e15ee8b984fafe1462c64e8bb130f6589273f05466bb61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ec5cfd05c74029bceff3c3c3761c249
SHA10375aa8a3d4a8e2a7bda086ce0bceef0b1b46f6f
SHA2566ef7be01069562e92657a41b2a8f05f079f161154fffdcdef32564112eb199e5
SHA512d82d9bae0050a51761fc3880d64e1bc60e139fc8d45630da32130d5d749b0973bbc58201b27b3ae1933beb0396e17abda326f83fedf4702a02f493790b53b82d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54abf478d2c2313a6f979282b67608114
SHA17afdf68d0150002cb2d68269921e7948baba5e7a
SHA2565d6e7f3ead7ef6edcfe2f43152e55ea617c68f585c80905532ba69e9b107cfcc
SHA5120abd46f1a8c91803989e853b542262f4010949578f4986d96a582150f0f5db8dca0552221f6211505e21014041bcbfd8758229e6f67b3acdbcc994056a1df0b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f28ff0375278132011be2b155e694a95
SHA106103e73e08658b888e255a101fbd4ed9c11a9f5
SHA256671d4e561beb6c6ddcefa9f250143b4d5fb118b848947b45e2c508f32f7dd9c9
SHA512f32ff476dbfb1569657ec6ed0a2c04dbae8786e69bf9bd6a9541dfe6e8102d6d6e49a21724ea64abbb2da0f77231dcab4b66a8710ecee715641463c6b91e1b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fb7ace309d365f10c0abde278ef7bff
SHA154f0218aa903d6ebd59166efa94dd0b1c3da3055
SHA2565cea09db7d6834b193285923d1a397f9e6b317826a57489be097fe63af932983
SHA5129f54eb46025e46decc8efb543608a12fcfcb2a0f537549cb3861f2b45405e28f1663375be49a3230e5932669199beb8e60a99b5ad9d68095884abd127d264ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598e4f2d672712a4368497b26a99772ef
SHA15f59fae46599f84eb853a31b657067c81d06e95d
SHA256f86cf02e910b5c280764fba6de3d93d01d1193b71c0edd52d485241392b6973c
SHA512c155a9763985b4271fda73672c7e3cfe2b9e357ee8d7152ff10b447af7ba1cd2c4ad578b873a123f172bdcdc6dd913d083c416eb58adb449db5fb22c7c0c399d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbdcf8810c904103afd1139fda3e0009
SHA10dafef8d7ac25ff545eb733c80d2afd5415e71f1
SHA256194012300cd3ac98ccc3f61d58bf8b2659ad84498007c63afe733ca9471614a0
SHA512363e54511ac9e065796cbc99ebd09f10bfacd9b498864ae17df180240a6f5f81e4e122ce9b3838f12cc529957a44b6f461b5de771aa1f368889ab7f7233557f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a031a517616f12ceae4da12830587ad3
SHA1ff3f042a6775cb388586851e7d84de6e6c10ab15
SHA2568b4d42896886c1416576e3f21df9bb5f64d45c7e852399b23445c71178731967
SHA5121a2752afa60a9593862d1bd5967ecbcaccebedf4f52ddf21af1d0582156220b7efda3acca6fb89ab52c06001c45147ebce787c6dd6c7ce04b5e885d2cc4aceaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5554f70e327e9016ee2da6408daa3ef52
SHA11a7f555174f39d93b14b7bad3afa47f4e48ff21f
SHA256f0b89b9250cc8c4bf63a276bbe1e74b77a51101feca78f1c9601ecc21a9a348a
SHA51251dced6ea888575536b18785d310da0ce9d0cd741efc21dc4f1a6e0f27adb27102473854aee3004ecf3d6f6ebf6da5f6943f5f0164f02f37603b97cd0465762b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b02f8c3115032693501825dead3b0a9
SHA1bc4a5611dcfb5dee48c40150357fe82dd88da59d
SHA256137748550a025e6fb5b4c0257db1f0b7d50d9c6babc47dda8ee612c91e9b0245
SHA512eacbf5d4f0f4b06039124e2efb2438b427acdcb5d0aa3b49720789bbbf7569447f89a8632868d9cb6cc7d7e8ff18d129568b842a65e19368478af88d49df8e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50db8f1e8ebe588c0c34a2974c7473f02
SHA15fad227bb0d8d5347cc6255181ee0be7451436c4
SHA2562cb361d82d4748d19e90fc9d08a2caa024a73d0720b339d55c0b3aac72999de4
SHA51250bced5b5ef8a0b030d837af2423e7c566fd14555a4754d9b4e99b8af782e2d25ecadc440658ac5453a442daf87dda14a32afe15ed81b7dfb000d950cdd80208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50df23b9796814341b519ba024cb627cb
SHA15f7030377e9044c0627cd1640305fb9bb0dad0f6
SHA256baa65e93ec3008a12b702c563f455be910f333ba415e61a0a7fbf8254f741fab
SHA5124a38ea250c2d60db38ce214870491233a429f4e1ea1359b5f4f1801fa36d245d12724fcb010e347734d8b15d2b6ebc24247425fc1a6693d8b042d8a489bdfef9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a