Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
21d22016c6419c7199ce492c6453873b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
21d22016c6419c7199ce492c6453873b_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
21d22016c6419c7199ce492c6453873b_JaffaCakes118.html
-
Size
2KB
-
MD5
21d22016c6419c7199ce492c6453873b
-
SHA1
4bf60b41c5a53738fdc0e9d4a938d2a7456b2da9
-
SHA256
c9429d4cd0a59a0c3397f9db2fe509096fe2634c94a241bc320ee1a49de0039a
-
SHA512
bb6f020f6c4e880877835dc3e909a648a6fb1a91b4ab33b47a911aeb49b26e7509be774ca59eba2457537659e31c536f5dca7d5ae576739794e4171c7cf90510
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000070649a3654fac892cf1e57ea71c141aa9cb1eefac8f79381ef6fe1af2e711904000000000e8000000002000020000000a4e2094f38fd681bdd7340a64dd982d921b0a3de9ad2b7fadd14b2ad9547664c2000000010aa7fb71f8b8f6b1f25b38b7895b6528e8035b39ec4dcf8f9dbb4acd556ede94000000031315f8c5bbbbc220121181b0392bca299f9c043a523fd43d5812a0c24708b4e6bc025492c7287e7828e0d7db56d6ca7de77b01d738a303ebb35f415f4c8981d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2012c2b3c6a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF111B11-0CB9-11EF-AD12-DE87C8C490F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421279659" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 888 IEXPLORE.EXE 888 IEXPLORE.EXE 888 IEXPLORE.EXE 888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 888 2340 iexplore.exe 29 PID 2340 wrote to memory of 888 2340 iexplore.exe 29 PID 2340 wrote to memory of 888 2340 iexplore.exe 29 PID 2340 wrote to memory of 888 2340 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\21d22016c6419c7199ce492c6453873b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526f7fc7ec496f7bfb8f1c52b5ec66546
SHA1be8bc5bd495eda0f7face539d7c1696c129de647
SHA256355c7bd1043f99f17eae8bee4831e5ca5b2f1771830a8883b7c105fec389f585
SHA5129349901b0b57d350ef80ea72a7488b0eea728fbace2362f607f6221526830912541947adce299e7f9d1b6428cb5ea85c2d3dcc350c579ca84d63abd12358be0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc21eec07110f089a4b36515a16bc293
SHA1350cd43b00e08a9e7b8724bca451e0793e3c7a18
SHA256ef92b87db242077b36134491c5b39c0ea81ae39a595ea05028649d703eb55847
SHA512904ab7bd9ff16870c69099330b51214c1e5c53af6f4ea03ee2e631a3e075b78948f7bfb49e46335860e872f6d4b38bcbddd61ea6745502779972f3118b8a397c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8bd34d7a5563f9c0b5de76426a4580a
SHA113d4b6c3ffe8045ab277593dfe48a7e15f84e945
SHA256474f836a13cec56140f2279abd5609bf11bf9e668dc6de95ac84feb0d950d637
SHA512d9e2104a2059219a45c0935247f8eaea39f36015ffa0f3148d430dc4d592e127b8112b530804f394b5f35b7af37426ffce270a2074594404a8e6839a6bc522ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f181a188abd712f9a66489630e98e894
SHA1b2ee8f79b918fd0c8fbf1d1150e0f884e4cecfee
SHA2560b6331a71d7c1c0e6446f9a8b6e3eef6dcadb4d69a64dbb142398a15da812987
SHA51298a9039acfd657a5923b8063fdb63ba7b1745b9c8ed7fedae9a62aff27cd8397eac2bd343012b49795098583088283260b98322bf99a86dd469acf17c46f8ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54504d5511e29a17893190deaf28bd6b4
SHA196f2676a1381130c5237351caf8ef1e9a3e7c316
SHA25635e9d10dfb2db92fe3cafc5cd7effef049bc7cf6de3a281a500f2416658bdaad
SHA512ba3f5abb3850cfccbd3f4bebc5c20503013318ca130e6aef8515bee669634379eaf3ec498015bc4b7259dbb601e482c24d30ba450fe8b7a6f9d2f4266d2f22ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef186f32bde7856c760e0d16a215a190
SHA116eccbc5020bc3ee16331a4bc3ff7d1cc77624e4
SHA2562c560e324ae0d4d77fd6a5ea2555f47eb130183a6eb587e32ba96238c8562aa8
SHA51226d39c52f33b975b8d19331b85b60e1c844fd1bd3768ba5c4d81f874adccf01ea3a2e6ab3b0707f6874ab91931b42d1f7c2ad72de061d68d36953f8c6175cc78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5473022715d6f7e57131c5623dc83a506
SHA1081f0fdc94a4e936e1b9d81c59c5d104d72d6d51
SHA2568f42a528f7aeee0c0596d4db8159613f272434ad2dd84596c69952f56f54e24d
SHA512ece203764d647fbbb5a7914eddc04928616caf26072cac9d76078c80dc6df70ad76e7152a0f282626a65bca442f0d29acf141df37201cecdf4fc59d5b9f0ce06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50434c6be965e772073cf7950c0056b70
SHA19a284c3640718aba96caf76afa80320670fa43ea
SHA2562af4266ff5730d6b8827336c157fd0ab0bd7db74a7b860d92315111d801a9c28
SHA512cf4e657f2efa39f0193bddbffdbc3c0ee8178ae858c51a9f5b884499f5c823f78029e99b6ea76c5825651e4fd6f1deafe03ca92f9018bd435e77f1f1b1973827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581b505f40b500d187500efd5b8ba5595
SHA1746881d1f5b04083e7cb68e95afad5b58e81a811
SHA2566a0853cf32b2504373b94bb67b40b10b444f254671506a1d94f834d93f0adca4
SHA512a7b4165f210d8196a08c8104d96ffdda6d663995a1522aba4300a37083b67d0567f76f6be6709c138da0d5e72086347394d6a703f0b30b6eb4403f3fe8073015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543944c341aa9017d17f17e70b9a82f38
SHA10f2b8b16da6090f5cc60115850bf4a87a7529d95
SHA256f55c6c33124a623f951bc5aa04c918145285fdbb9ed6b9ea762a12a62be24fbf
SHA512d26163f2c1fa002e429dfcb500095004d24e785c13741da303563cfc527a5fd99e61b53361b26d4ae2f255e7e43cae3f9e71d0ad48f831e2331b167105913ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6d8c7cfb92216d67a28266c56457c1a
SHA139556f0d5ccd400d45665e59843fe3238da36353
SHA256e9dc194d19e6dc17d43747d09ece9604e333a787ba65b9b9a9c03cd9b0b8a338
SHA512ed0137f0156f0e653dac0c368de60dea66113a2a766e3a394ef58ea8698d11b3944a3d8b7ee1a2c59ab51e5ec65c029ea7e3b5be2cd7d4f42caf6a1b3a76d300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc696a02b3b22802eeedd671f699e571
SHA1e8d8770dc736d37cc7913087fb7dbbe87f69b71e
SHA256d97dd1978474720f8ecb8b6e86d82c2e0e81b2142ce536cd62a752d2c113232b
SHA512e620e4057682b1214f9dc308fff98fe81317db2b9e36b313b26028131ae5d1a5418a6b0f3e118b5be43503a23ff8a4e2e5f12b2fbce0ea009b7f8134babb6aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5996b17d26b0e61167dcc34350915f2c6
SHA18d92062aef2af74a0f1bef52c1687c839e525ba3
SHA256f969f84fbe9e06044c2a8c60a23f6779e3866a7f2a41cad4d45da030703d693d
SHA5129e32d1c3a945a7b756cc8ee50ef1e8774c06efa91c629f11d7d391aecb22bdbd02fcb6d3ff521c3a003e21803cf4a3fc8211292b483fe22bc6471cffde6498dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4c41c2d17b905cc4155671565e3de4b
SHA1a6192a731f295e6bee5f2359af7ba83b6b31303f
SHA25647514c89fb82de28fd32ddf4b38651a8897c768abb9b68b9f0001a8fe6bc09c2
SHA5124e1aee795e7f0473b8be0d1ae083d04a7427c1252d0db495beb36ed0539ac93e24b42d0e94d8c4d49698b8ab7c9961f8a6139c88f24c1f021842edb6de3b9259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee575651f40943dc0ed78b240ee0b476
SHA1d28bfa07cb4da628fc0d452e0206e54005300aa5
SHA25692558682c2c27602d3235234971daf58c58f0982c8e6a41b5a8a0a3bc0439e30
SHA512c0fb0b14c56255891c875c23540894e3b0a4b4be3cd2835389968d63838cc176407f932efea42af39ca96e9b54a5b3895b2eee14cef5e137b554df653279f267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b47317f01c8e7282158e38f1f5a5acba
SHA164f000a88556880d4c2c1195165cc66f791c8fe0
SHA25661c5640e352e74c223cae69650498aea578622c0f5d844201c88876c092dd96b
SHA5122902124c0b812a99dac52ce4ace4d5ad22fa59c466c70966a3f2f26297122078dae093099513ddad1b092fad77980d3412c29697c104c4e30ad4d82e7ae40da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe848a05b5abd20bdc4d5e828e2030a1
SHA19850b7696e91698e2f877ec71fc659338ce99e65
SHA256d35d3d39e12c57e9bc7652f2ffd6523d82f96e6c7997311670652d63ea26fdf1
SHA5123c15c92b4613f0a35ae0ab7d0474fa269977466deb8bcb59352436d1ffa73096c9773e447e90533a358841fcf13ce68c92b8c275c58a775124a0959f2bc164ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d40a4831758a907332f0d4a0daaa081b
SHA1812b52fa3e8633957682d41b02f8ddf1dd517589
SHA256f311bdb41b0ffc0a01f59eaf91df09395f171aa40b08986016c10651c1f21d18
SHA51265629ff223b3ec6becf7270b64bec014eb34e69a684fcda8037fbe1a7e3569b2ba00c723bd2386ed5566dc5e3203c0a52ca8643fcbb71ff1796af03462099018
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a