Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
23278e932e83877f045975f25b1cffbf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23278e932e83877f045975f25b1cffbf_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
23278e932e83877f045975f25b1cffbf_JaffaCakes118.html
-
Size
684B
-
MD5
23278e932e83877f045975f25b1cffbf
-
SHA1
0683d61f2d4328496357055c302524d379b540a8
-
SHA256
62f3c319b2e8dbd95a2e20a41244401d578c2002ba2f0cd0f2b3118a9fc43f4f
-
SHA512
45f3a796e2bbab842dc42c95018839385512206daf56182a22d125c2509e03d1b74aa7eaa234091c3a818ee3993c673dee1bb896778c9b180a63ff216f242b5d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000a8b8b07ca3bad52e6ffc61857fd39f8cff5b16d2d0ef98b04be3ba9b48847996000000000e8000000002000020000000e12ac908871032ec3aa21f9366182a2332c01be8dc7da4c5dba34e0f5a7ecfae200000008c7f335601a9915a822ac45319bdaf2f7419049cc2548f6a57b9adf969117f76400000001507d5798a3462da8b938de8f9fabf729609ac605a283ba83f44ac4b13c892ae95022222b1d4874cf9ce5488731eb3b292a075f899e09c2aca64d99c7d34f51c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10de0aa9fea0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4786B81-0CF1-11EF-BC3A-56D57A935C49} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421303694" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2964 1956 iexplore.exe 28 PID 1956 wrote to memory of 2964 1956 iexplore.exe 28 PID 1956 wrote to memory of 2964 1956 iexplore.exe 28 PID 1956 wrote to memory of 2964 1956 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\23278e932e83877f045975f25b1cffbf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5834eb30b1dcf34592eea9260c37ff3eb
SHA16ccbceac5fc7580714b43f22c4eb8182a1ed318b
SHA2568b6ce1d86203080b04fd7308d21d60955c45e98f286df0724a8f2e5932686525
SHA512a6f9f75a9e08492138d9b0aeedfdb4041d97e25e2fe0ab347b28ae6320ef8ff22b9a8ab392f47bc2201ef39711ee6d9160ada1a2db7faa70f487463cfd857e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f82882c273407849e22425298af6d4d0
SHA1d8510c522a2d4b408b2cc38688683b20f9bbce09
SHA2564ce59f747f21423ce021ff61c3cb2635a48f1c4e59a1ccfa0a0323e877d5987b
SHA5122b5e3f62a373c6f958a5716024943b72d6dd0bffcbb3834f4aa8af341afdf9b725081e734f3a30a9eb8f4a433e853337c1a39297a165b6e165fe0d77aa0bf236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a87e0424257bf560eeeb54329f2f1bfb
SHA131f5f56ea313401bcd572d7f3c4ff45a43dfcb91
SHA256a01b52d2e8dae3d5c1bedd17dfb449c86d1f5b7ac54d8cac410105f6cd4d32bd
SHA512de3e8fd4f71f936a54e99ad7f9a7a9114501e1bfd40c17a823b6f2b5bee8d00ca98ac9ead48336ebcbd9a8cd0a952e23895bb07f8ebdd011922d0364dc127e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3465d2d98147fd2822b7a0969843e52
SHA1625af17553ee46be597e900aafc01131ba8c294b
SHA25659317986c24da104722e49b70ee5fd143cd6bdc1ad0961a6a10383d7b53af7b4
SHA5123585889e5a1ebc818d4f5113460b707fcb817a11d10b0c4a2ef27f9c2f18bb4336846c68b8972aa95179977eaed9e152d263e620eeff6c900215a5c90c3b085c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50860b19012740b066c7accb5bc3f6e3a
SHA184e761a46a539c19549434e72dc5b1d5946051d6
SHA2569c3ed8ea1c533b38aeef2b9d1ae3f4a7d90ba31b4a6e2c61943352007ac70e3c
SHA512dab644910b0d9b9a9d36990420149634144c434a6699b96cf8fe1c6ddc652e97b23a31cb8320fe3a60e428886c517ce60b2c356f94f6e818d1c5583f0772d943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a663f06810ed2962a5e6564ab36e53be
SHA1cd71aede59c40dd127c9a81a26d936847aa916f9
SHA25663218feca0189c38e8a0dc2782821692aceca328184e33a3dcd98ea6aa961d9c
SHA512acedc362d53e5a5b0ff59d97d5a01f13d1860758a049d08b689af9fad90855080cc90af66d70406806bb70b97dbf2532801b6b55f2412b594d51d5d3a994fca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506b369a59c4a4f855645a44d450939bd
SHA16a4cc9fbb3663a8035b0d03609c9d2e724f7cf4b
SHA256f888af61201589967ace4ecdd60b31bff53596253a188dbe23d6c68ee8c69037
SHA512d92c17c4700922d3074f9df4559fbcd2c0f21f3a6fe7cca0d0d12707508d47b39a63e9e42cf5083b1c38ec241fdc9b4f002f7e12e3a795c776fc17522c87ced4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a5709cc4552229f9d1602d8fe1b5954
SHA113d38ff8f8c4db533fe8a367cb9aa7028984224c
SHA2568d4de2f2d508f716e2bae4ff108dbe6fd936da2ac6c7f822b0fcfca61eb76bd6
SHA5125c69a7259834946ada2d089514bf8c6085d223570fe2f926df55a99218f0a4578643285a76232d2391cd10686212ae6126ef022b956e209ef57bfd12d0e2890a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5841dbe3875b5b9deb97708d2d4920aa5
SHA184fc7aacc13b2be312c49224e204e60944db67cb
SHA256bd67aec5a010420137ea54df1e4da5cea9c645a3e087fafb6b4edc3a7f451055
SHA512417ca6b498d7837c4be854af6a64c7eb1feabc6dfaeafc4f24d8758e3c181a7f161566fe0f8ff0ba7398fa390662560d995cabf7b3f0d3c6f65f828e9fb1af6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccd5d1ec91c196100518b5b56753599a
SHA193543ff2e24ef20a060ced3a4f06c087b1892fa6
SHA25653ac1c06e8bc54baf6ac1c4876d6ff2d45c06f124a82d514702d99a85ff1ed0b
SHA51216529073b5636cc46144cef0e0a963122ea36d53ccfccf3e5d22c8cad9ebdf4370ba54e16d70fc945793dcd001c37a8235fffa6badebb4fffd879f6537ea3808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50562facc7999138e7b0c9402485835c2
SHA1a2ce78b4719720ffb3e60e007b1bb6e31fb1a520
SHA2567d3de33e8a991987faf3a1b6db2afd416d11202b09b466e9271c178026729b38
SHA512eb7b0dc19020c8ef6945b9faf36951b3cf7531a7516f7e8c8a7e4cddd810032505afc35417e769226eb0c45e71c6c0546879a209f01920662126f09ca630447c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e43122b96c0f5b57a7114603dd911ec
SHA1c93879571bbd06d6812b95c377681b003acca061
SHA256e8bbe38e8b379937ae2cba188ec9bbd138b66cade0947b0789e0c91fb77d1baf
SHA512033ba8b761d0f6d5faf9f3dfc34d8eb86cbf442727b6206979897ac744a413e6935a9ef5e850c40bdc8435c10310ba231fab60b84922f008d1321494b75632f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5484c236b0030c17beaa320e3bed22913
SHA1e7808f2783de3d9a09cf8c59ca138f691c3fe926
SHA25654973c89c1628ba9ba01884a82baac68f9182f2b75376e386270643b05f729cd
SHA51230803cd391682537d6e941458e789eb4c13a6496e808c1eaa8be7a9365c212b9e6e0f5cae3b7c30494f4299f17de30e5bddfec3b122adb9051560071ce262a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a56af6ccdb1c6c648bc7272964c70564
SHA1dba9b14f8608906a4936e82aaa0d40866256c437
SHA256aa27dd0984d2c2454918f71693ddf52bcb3e7d2e95339dfa320b5534e0e9049e
SHA51246366db7fb941a316ae828da0cd1bd9fafaa43cfa782bd92903f5d4cc2f4194e88c139a3cf7f6fa52da8dec0cda0172659bfa06436658549dc92d50e54c03417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572a5f2309f52d572c7792058d9cdda33
SHA169d20430c93073bf617f69a5b3834e46891cff14
SHA256cdd3e190afc74282ba86345477476b53a420ab8f0a767bf4d9614a3a2dc9c8c1
SHA512237fda7983361f2de7e437c8281310c33871bbb64703ad96abf3b86777d57b6ac88a6c6ccf0d0939629e0f51b1f9edffc60ef7cde0b37ba88a850e22ff0bb2bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fc22c992fa6c046da2adb139486fd6a
SHA1a0e0cd18c7ab92f5b1bbe78f697a1c27624061f7
SHA25600ea43080d90bc159476557d5073c785ef117d763366427c5050666b0acc067c
SHA512e7c16c505005273d6706eee67cdb0a8e2796cef648499928df078f5adee4c6425ff61e3d30b9326c284e5a58a9819211aded9f7c24cc8b64c870dee3fc32e589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50072199db1401266f4dfab691753ade8
SHA1170b5c3f246e90597bb13c17608465e49a665f41
SHA256f51668c3c7744c70803080d0a6885177cfe70c29cfda088e4b7d92176d2d01c8
SHA512a02e26323b93ea89d4f88ca1ad62fe71961487fe18565317b4b6a26602ea8842545386f2bb80b0912ecea344bc8f23df6d8a7624cf29f9ea220bd97d98ae52cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f0f8a08c517a4cb81a509a57bb37a95
SHA12d752bf90d4757e52b5580bee5def90ce135bdc2
SHA256f51f6653d9ea917a83b9a829568c09f16e2fdd2f02a840f59cfef2b1ef33fc27
SHA5129c491e6fb16e7cd6e1c63230cc0b18c237eafbf1f0a98d7caded66d48a3cd1ce7e04c74bfd7fe3e6a8e7ea685d3f21ae1d5dcc66de92ee30fd4c9d8a9d8a622a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6271bef75ffe923f98ebe6af94ac502
SHA1e12b185123d8af72897a5c5b1649395b468edde1
SHA256a7591dfd55b852e7d1ddb98eca764e6c328076ecbf1e089c257a95b6448d5801
SHA51208e60ef09d3c3c16c9448019540bd3ddfec34690b815b578f7859cacb04b691bdab428770f35c3c340e45c68fdad077b1d4e278fccc17c04717be92bd059834c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a