Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 09:54
Static task
static1
Behavioral task
behavioral1
Sample
171e5fa6244e2d38d970b1914a3a2b68_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
171e5fa6244e2d38d970b1914a3a2b68_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
171e5fa6244e2d38d970b1914a3a2b68_JaffaCakes118.html
-
Size
448B
-
MD5
171e5fa6244e2d38d970b1914a3a2b68
-
SHA1
ca0f79448470aa4df1381af039901126d992c624
-
SHA256
f79d122321e3d46f814777d7ced23a70bd0e5ce38ceedf8538fa398a6a46cdea
-
SHA512
6019dbfd31d586ab9b6a9ba9368fcc1b241b3b1db25818d844d1f569f768d14cdf59468ded1f9c89903b1f7fa59e6a0ccf56bee176c45e0a4b0987a5547ca357
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000003b37c69fff5fc4a96944abca5eaa2de6c9087f7bf5cbef15bde0007bdc671754000000000e800000000200002000000020b536a13fa8079fb9e450c307f6a4edeed8a9cdcf3a446fdf0371e19af2527e2000000038f665073d29557d2452821cc10416bfb7f556ce78dff346eb34356735560be240000000af270b576065d6f943bbe5d862fd479fc9eef0bbca8f4fc6827445cf2917f4c9b573b293642b1cebe19c5a06a5cc3b48337b21b4f55974f7bfa8a18c998e3d99 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74955EE1-0AC5-11EF-85B9-4A8427BA3DB8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f83437d29eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421064732" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2628 2360 iexplore.exe 28 PID 2360 wrote to memory of 2628 2360 iexplore.exe 28 PID 2360 wrote to memory of 2628 2360 iexplore.exe 28 PID 2360 wrote to memory of 2628 2360 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\171e5fa6244e2d38d970b1914a3a2b68_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c70e2c1a34f7a0d7637765a3f07eee7
SHA1d7b09809631721771850c859012f98deae5a745d
SHA256e93a6b8d4b4cfcdb05b399a0801e16c0303897d2b1d7bd703fe3dc49e3289a7d
SHA51217be63565c5075ab183a1cf6b793efd305ac4a4705a8475e0616affb6c6a3729bb81c3e11ada1eed082c6cb89b72eb77ab5b76452bf4b022b5e5c32980759405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef18513fa3671bc1065f2325532855cd
SHA185e09d77fc9292d7bb072947b2436e6958a7c5ae
SHA256e828fc6bb4c9860e08cc0d528aae3db3eb3def9cd4996807dfeed27d3144614a
SHA51262fddf5727a0d92723eeaaa5ef0638fc33153cc979dcccce9d473816f2e7f8e8dcf9f08036f0ca1f9d725539603ca3bdcb5041a3bd5e8327465b16d95c4d2940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596ffdd57938fd32da4d428e575930723
SHA1ab3d452b37bf7fffb899ce97f894394cbf5f9512
SHA256a544ff27d4a0f337be1ecb8257f95f3ec12cdbf061f12a66046632ccd227f2db
SHA51286488b686c793f7ed9d1aeef6fb93904a54b029a2a5183f0bb0cac06271727e9e3f596f03d82baff46b25e219c090ba4bf0a434cfcd51e7eba9c28b9b3510492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fa583bc45bf4aa77a95bba6d03b8b34
SHA1549fe04112ce3f38e3320984a9545f3fa20e0e33
SHA256b2ff94d64809acfaec1f3a272af4afb51c333eaae729f15997483c389cbaa6aa
SHA512f150b85e899969d93fcd6ab3f26aadae121ef056b1cc912a564abd69539022710977a6b9fbe61a57de59cc9ac5d2cbbf979a641033503109ba14b6953652f905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57150bc8de9803951c13a8d294bcc0ce4
SHA1673a0eed02b82ad41a156ae6f1128594a98b4c7a
SHA256d0da83659b5cc130a37f7831596c253a296d88a370b98578cd2112d97666e7b1
SHA512bb3429891d0c0929c0dcafa0f63790980db69f71202507b3b78caed4a8e8245d84e618a051df86ac53a279f0390f61a46e6f398546e06302070d899dcad873ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548eb1332dd96b1650482436cb8f1ea29
SHA1a4bac0bcc6a253c8b432db002378f44ba00591a7
SHA2569bb361f5743222d33e7052fa51b00cfaba561e5ffaaacbaea43915ca900b9623
SHA512cbf3dbed5964b11bd22295a748da487ca2911b5ccea8e1af527ce6efbccce0edec32cb48af18785e4a3ea3f4a7979b3be92cca403728deba30e7fd9db1caa8f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5880e79af8d67cee10c1e1fa72bfc23e2
SHA14f591862811e2b146f326086e2ebf7b311cf43eb
SHA2561b25179f27aee585b5360773f57f9bdde2a603c6a6139bb5835204e528120030
SHA512a9ac61f30d62ea66a0b8752e2003eb389a3dea9505fdcc578705e786e0a2617cd6f7483ba8a832525c183290535711f481985b64eee54058b11dfef34a6bb98e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca9cc13e73de65c27b5b5ee17718cd2e
SHA15b77b139bc8d7d8b56030ca0c200aacb3b9721f2
SHA2568690a0e2977f14213ef4e99666b0188027ff7989e7e7683ff3acc90e3e13099f
SHA5120de3f494fed4f37f661300e22443706ec3fb5d69c062a095a21ada9e656acde4fddfd5a5597f13a68cc455d88f7495731fcc54865baad326275a8f191d9e799c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541f1f223746b1a522ae8d92a73fe5ef0
SHA175bbf529d0fbd1756884c77a05ab57878b231abd
SHA2562d62a0b45c0e8bf78d2b551b319a5108ea49e9f3db5deb52cf0920f1489097eb
SHA5120f0d6308bb8a73cec7badf9d6bf4860648d1c0250fd3277232c60019b61a81fedf8437843396d35e46ea3fb8dbc4800245b774f3667411d30d1dd0863dab6bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c22dc1d1360cf58177c8b7c03c9565e8
SHA1a18b9f6139c1d2fc87c254a3820fb91d63790dfe
SHA256873f6abb5402834674afedd49d1c188e029698aa51cff1ccf0fcc4e17eca5be2
SHA512f3af6f3998acf0924a91461386cc74a13dca2fc36b8b92fa0a143f6641c60439b3f120382196498d96063e0f611b1e78e8b65170ad25ab96e9ebf4ce23bef13f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3ead09cf0dfd74ca0a6e7b594e71f80
SHA101e144caf298d144f656a1425202c652da714beb
SHA256dd583d4fea98bd250d5429c33dbc3f7cf61f205b19cda4cfb02e21b04f43dd1c
SHA512a48054a2801f62a5b1f7c225df30048181273db625a848ed7b6ef1dc1f51aad9964febbdfffdd4467811a03db506ec6b990429b28d9485062065c6e2016c6c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b9203ec3eae1f51e8722a9448a760fb
SHA1e5cff72adad4dca4e1d2b19719b18ab0122e0b1a
SHA2561509bbb33d5dcf755d1ede3a682b0073986a5b92b92a4555b96823dd07c07d39
SHA51203e6dac3f2fd092fb8ae13fadf4c645892644ea8cdbcae550dad46a5a689ecec6c0b0d075b399616dc9bcd1f084da5c206245796b4584d352da7a3b1299f0a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512c460432e2eea2175739b1ebd1a333a
SHA1c01af9598cb905ab3da6eb5a42deb4d985afe6e3
SHA2562f08a981875a96ce100d14792ce6b1f63e29520c103ec88f14f43b7f00eadaa4
SHA512cc62b28b6364ac4fa306d9e98f726ca5adb3d0b6dd05c8e4a5ef9f461ece330c4a7d8780ab4b1eef3da84db28d3c0a60699a3794f8d4be1cf472b9acda097969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5861940930111d2ad514049d92310883d
SHA1c2a5bff03f2f61a737f07ee4db282d5a41b6bf8c
SHA25652c144a663a1d644c004a84c2f8c18242ddd273f6bc3bf69cea9afffd75fa7d8
SHA5120d405484cf56318e3ef53f131fb67235886bf50c3437915e16cb9d702e27b2e51c13bd1e94634b10c285574fae544cb6ce196eff248bf95be12bc268adf51e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523c364c1c750da6d81603b9cfb1ca09d
SHA1450baf001046e92dca2e613b7631db99a3add637
SHA256f7a62949549ef9dfbe0eeb2b346db0a7c5c12cd041a31361bb6f5653455129b0
SHA51268e830a7a2ab4bfcb7cf3235848712380c014f0d5c680c040b1f6a38cd1cbfc5236ecc45f0a0cf198ac78f42a6275296bbf874f1361a3f0fb32a296922890293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f461849e54f3992edc9bde7fedd51f7
SHA1b7fb29151e2a61af86ba4eed78819aae67384678
SHA25698bca119217ea26b5bc929071c8e6fcda346866e3230613912b4e7f2a924cd59
SHA512bff26b72e60d85ca6c19227ffd34c4650f2491f725b554026acb9670f2b3ce8f77d0327c0e25a72d8bc0077a39e881125a5c03ccbcaba7f7cbe59f81f8dc9911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd734840102e5bb8185071093196e637
SHA15b7442a8785879a09d3ca7c9aeebb4e65773bb4c
SHA256587977e5411a6689ae0d8582e2b617b5c236d2bf52bbeac8a10565b3e71907c5
SHA5120a73bf5801e6a48aa993b4e74b807f9454d1ba1f71da16ba0c98e83bab2ce1b077afa6ea8f8655457dd9295edd0b3ed0a7291a9d477b8499c152ebaead238d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f16250192217c0f77ccc4e0002f3c14a
SHA1206e4d3d69a2a799a3c35a67ac974412c4382ffc
SHA256fa1e78f59daca9b10e951f9fe7b16818d42f133864c86831af63f73978d45e90
SHA51272c10d8069e4addc8c9d41d82865df8dab63d1072e14f8949f0cdfd1ef3cc626238e2973400ec742009aa0d1568cb07b377840ba406c1a888d570f69a53c40bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545ce1f7bd49e3ad6a1b535d27dfe984f
SHA1a950b80ab6e5239075468fceea89d8b4a939a0d3
SHA256cdd77aa222d593b39431ba41f7013a082a6eaa74c5321d0f50c104fdaea32cc1
SHA512b5b05206aab5f29d952c6186e50a66621637aa8b643d9ddc0b3eea5f0c712d49749b48c369b0b486654d5a806b0f01997dabdb037cacb0bda2e9aeff47de4365
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a