Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
20884b8cdd9e484c40c31b74e22ff369_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20884b8cdd9e484c40c31b74e22ff369_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
20884b8cdd9e484c40c31b74e22ff369_JaffaCakes118.html
-
Size
818B
-
MD5
20884b8cdd9e484c40c31b74e22ff369
-
SHA1
a5b26975626ad2153448cb8c1239b3cdfd1e3fc3
-
SHA256
b0414072d5edd2a7d8ebf8a25e3c3128bb36f6ddac377b1726de8f9f23214e9e
-
SHA512
d0ee95065efdf893235810af0e0d2c64eb807bac4f01e2c92ee461ae7acf8654285a94215d2d4a060f6e0d9a4781ec14d5dd3193ad49d46e316c86cea4e29afb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421245956" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000b2a3588c2989567963e948aa0cd5a76f0c8d0761b10b42b1f6c182e2d4c8b555000000000e80000000020000200000000600d326a86e6e54eecef965fbb7f7b56efe3c651cbe2c59bfd1c60e7d801f8f2000000065bf87a627d65a63cb0845ea51df4cf75fe7e52a6bdbfe8f036710cfdff0029e400000003a3fe0332cd42f28f1d6d12c28f715c5aff5076702cd53af0f22afeab9363e2c7b75c82817373fe101223f4ed12da5a8bfd9aab68a958835a76213f8b1374905 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7005cc2878a0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65583401-0C6B-11EF-93E2-EEF45767FDFF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2440 2664 iexplore.exe 28 PID 2664 wrote to memory of 2440 2664 iexplore.exe 28 PID 2664 wrote to memory of 2440 2664 iexplore.exe 28 PID 2664 wrote to memory of 2440 2664 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\20884b8cdd9e484c40c31b74e22ff369_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511a613c4a66598b6b60b20b8d8fd96a5
SHA1820b120b57354f4f28615cfcfd224af67ed1c1b3
SHA256a1edbb0524fce1d941268ca4d0771d13bbc0eaa633f070ecb3206e9b05af1bc7
SHA512e4f5fbf9f6a21183077941d8c71bcc736e577893970c6e417ab42af36181ce3bad5c3a634c229a4c8e43d040d1c9ede8f878acccf6cea6e0071fa8f4b3ba545a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557451c25547f96c425804bd4916fa74b
SHA1f19e3a24748977bd0eaffd70428682d7a45265c3
SHA256c038d2d8482c6bb2b1d5ab19792d69b7f96e7adff3233d90cb95869f89706237
SHA512ea5c5567b655d164972dfd9b8994ce038ebb2dd46b28dc801122933ec42b366f30da75db56de32858736b369f0cdf2a64954a67a4bf61928c729672005a986a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ed7582b5a5b7362ea7b07521cc74164
SHA1bc22d46e92c01f7f1e30b575685808510ea3066c
SHA256e085d166d0a67483cc79753fe40f5a6e362ecf9d83a5268d65b5fdf812e9227f
SHA5123a5cb95c616129eba62cba9db72efe485dbad07e3f8787d6c90af890ec9a8642021ef5010c70d3e2c3ad21ccbe39125a98fdeb861406851d04f1bf8b451e62fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53553a5f926f19e3f402e49df54ed5dde
SHA1a0f6cc841f39069d5ac5f89fee4b1e5a09debf79
SHA25617e2a6360ff46386180f530dcc2ff9fea5aee102b34ef87574136814742d158a
SHA5123af86c9392b3c14183080df4fcc4638c8d1c0dd498a1ad6ae0781e2c829041c2d1e085dacd57ce239d451afe9efddfa7d8525632bdea71bd9cd9859288211240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b425e83116b4a7324f0d0c1890f26ea
SHA1585cc751e48da8cda7199e21468ece968e243e0b
SHA2568ca83e7f488bb39103a7bf7f9fdc72e5c463223fad4610bb8db4103210eb3d3d
SHA512a32551587c344bf81007913568a1caf7932f59c63d38a8af851ea254f34ea91d886b587459d8c07a31767f9d4bfbd81c85cadf64b21a173445bdc40a8452217a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546ad5fc1983fafb1912b718f0c7ca13b
SHA15eb10125a9960c59af0d9bf8c2e7b2f11a60bbef
SHA2567185749125383341e82a2d08f2b7e63d400b4f1e630510ff91cefe49535adf1e
SHA512038687f5384a21f32a3c601b73173fb9f0c56837dc403975d44aadfd4a25f2824e233509fce9b43f837406580314ae214cc608edbe491b93868e5b007478484e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5366b04e2af7f91b8a40c0fcf2b278b52
SHA13c3b0fd5f980d49bc64ad683387d429fdea722d0
SHA2561e1ad52bc67d9d2aa70c0308d2c437baa6452b0b071d50f6e6ded05f969d1757
SHA5125ed8a881ba18ec2bcebff1d4c65985b29a4e72c22e765ae299cb2180cfc9f68e98ffbb76638338db9d9eab21ce13523c332277d7aec803849ddb2d6abe15e684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50be499dc7fd4c9eec6a6cd328849830f
SHA13ae5532e0201b9c6c38551572ef90e0258158b1f
SHA2569d8803ea2b2dbb89df6b1e79a143a0e53ca5c35b3bf2dfd0763075b8a2a8a675
SHA5129879de3ee5dae2902ec0e48a775e5563fb9df880093787447259bddf43679600b7b92a044bc29ad58bae2c9b7b7b9d9feedfe525d0d54ddced43108911af75fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58240bcfb15b0edaf4f2527c36c247a1c
SHA1c153f7fb9fc5fe50f22baa7cc8c2e715a3f59624
SHA2564615a206b04638fbe2cb2fcf21739b86788bc1f32737bf185bde5dc40192e0f2
SHA5125c6910dfbd0499b20be37eb14faa4d2fe1aaf0abeea5b1e1be5837ccbee1110230d798cd03cdfdba19f95d17c8879e6e0e99063686ec7a4a0cf862985c9dde26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8f5d5b3dde31a6f7730ea6eb553ecb4
SHA150e65b33e21320eb712a8f4727adba7a8a245c95
SHA2568072650f119f5e6cf89c4605db4110b8a1f46ef98cd3f2126599f33f8a6d84eb
SHA512eedf92406ae4743c2dd268ab3f71933854db1ee88de06c07b6ba80087cea618f5d13a972e15ac69ccc562eb8609ada266051e5fd7d79811bb3e81584e282f51a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570a8ac525b745985a361d11a283f5540
SHA18c323c39796794659a3b0f715bea9cee4e92b1f4
SHA2569d7b7eae2dd7cf9a8484acc4b4351465cfa7636bea399dd00315b17f468abd4f
SHA5128dd4287572b5c0e408f21ca4389845a4ea2de3e5925887f2cde7fc10d19697af0194db8b3970f572191972ef17526c3b2bf15f91d3577235f554dd991cb06bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d15bb66c1054744195d59df932b4e42c
SHA1d2c515e980f74b173a2aba203b910d4b863ea642
SHA256da5be0971a31059df9aeb55845f76f914f4477bb6e9797e3ff549f0f94faea24
SHA512b9a952f21f9cf07f6afaf30c9dd2b7ca8568cf9c38e3ec6391c16ab0eda1d4b3b748d5430cc3aa666cdd625ebc3399a2f76a327cfc93fbfc7a3c288c59bc02f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f3996b2c95f73cd23bc0b11938ccdda
SHA1c566e8700ec6c2dafe220551a6ae3547cdbc0b1b
SHA256c37ae07ec0a156f97116d95a549c806ae185f6233729976d8d0b48c12f9aa9cd
SHA512104ba4f6de5c7d03466b56e3dd74f2f145db619c6374bd6ac6094fe1a687b123a4839636f85e97685d6c690a7659f27168dfee177566afd9782536afe67b5f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7273dc0d43cb431c8c236753b6d7b68
SHA18578b33b87d1eeeeb953d0e05f2c6efd1208326c
SHA2560cbd64d36cd1657f7abf2e63dd1b97084701de32bfa0106e09b47aa46b3a85f8
SHA5127b6ef0599e3dbcd96fb296464d0aa79981c2f1a69899fb39aaea3e11df1e430c3a4687d3d20aff956aa5fdb62d92d9242d1a9b5cc4804eb480d3e775812e106e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54928fbd846fd0ae89fcf2734b4bed54a
SHA13910abb23c9854ca007b496b871e6e1797a08a50
SHA25683577b71ecd8e94da9a65a3995b51bd6ba2fb68f597068fffa5d6a0c0e1735d6
SHA51284fcd476551969f220f8ad2c7258c934a7a9c2ab1cc68441dfd4e716da67656e9e8d9c05ba71f306b683ba7710086f80b4b525b0091eed96c834744817314a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edaaab5b19123110e7d6f5569e97ceb6
SHA1630728425102bdd3140909cd249a9e7b09a631bd
SHA256ce4735f27e0805885e31d3b0d170978f3738dd258c869cfecb8ef251083aece4
SHA512d58763cd53d5f611d18733d5637fe2cac4b43f868c8e90e5d0bad527bce54461dd39239fda72b0f4d21ca323596b99fddb558832efa1cd0b20cefc1c10047200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c139d11aa86e4a003188cbd2ff40cd2
SHA175eb573a2b74e5eef9387e05670a94f324f75693
SHA256c55c4c0bf1f223d5e477e8bd38ae8e6aa1520f4ae96a18927f5a44143feee9db
SHA512ab42e80f89557be7bf9e53887352b11c64ae7eac501c8724459fdf534a466093d52dc5c43e17d834ba5325f046a42340b5183c94f47fe7f5be660a40bdf0eacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c049cd478423e8753a0f09f61fb147dd
SHA1725018fe36e4bb2784f05f2eb31034a5bf341446
SHA256da79eda75360b0252ab79dd4dbf5a34a2732b201e50d86e779963d74c31a4f20
SHA512e0f47e15bddd0ec591e79391324a9922c964d134acfda36e61fa4614ee370bd23a124a622f523fd25d9e87036b3aea01d000347b29962c126a6cbc7dd12a617c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb6d56882eaa0334d917f7c9873d0266
SHA1bb8b6cd6a34c626760320a4a686dd1dc8bb71996
SHA256e032334a90456bcc051d0792fe8bc167c3158fb2ba45672fa335546ce848b2f0
SHA512e268954ed21cf252c4b55be6d01a5486192f84267e01eb1063082cadbd8830fa94404cac70c4380d74194c911da6a40afa007a734b8a83e45e7f1323036b9044
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a