Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
241748d5d6561f515af5caa32e701802_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
241748d5d6561f515af5caa32e701802_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
241748d5d6561f515af5caa32e701802_JaffaCakes118.html
-
Size
1KB
-
MD5
241748d5d6561f515af5caa32e701802
-
SHA1
54127b12ee33038417015c8536a6cb730fd7c98d
-
SHA256
1b7fac06e2c360e79b904057577d1159b35df31937004199c3cac2b996b1e918
-
SHA512
cd65d2b6cabfd50c95418882033609f3f2641c171cb259d63b65c55e78b8e32aa3a5ffbd2150b9918858df56f5c5571165b22ca1fee70a5756000b3d5a4ae402
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f4301625a1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41A690D1-0D18-11EF-82B1-CE167E742B8D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421320198" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000f54f8755860cc591a519224d533d837a189c55d6b1cf776b7d7e1d8d18a9786d000000000e80000000020000200000000b8447a39aa7ebdc09c3c43cb54074fbde06962db6969d7a9d8f011f222d28a020000000d3f6abd024508ce90c58b56c548c580e7665e1d0e534fed0ee2fdd1b2a36dfb4400000009705bd7470f21a39cf3be21d9b24527b2c6905237629a08d40ebc0bfef4403ae514a139c65f7bf5dfb810ea317e618c72a26da00848755602b516d354c15d321 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2528 2184 iexplore.exe 28 PID 2184 wrote to memory of 2528 2184 iexplore.exe 28 PID 2184 wrote to memory of 2528 2184 iexplore.exe 28 PID 2184 wrote to memory of 2528 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\241748d5d6561f515af5caa32e701802_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f663c2a1fd8711486cf7b31dee0d62a
SHA19a75a4e993b5a7128a83e948d167ba9c3122badd
SHA2568a1d7bc229bc2f917a982f139c8a4ec44477e31c72cde218d75888e039a8ced3
SHA5123e76e52b67da460c278a5b41b4744363a574b8b15835a0261f5db29d7aa9ff71878cd31ed91710c5829aad8cd37d1722e7e6d49e3aa2aaec23b499bead070007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576d41b76880eec5903227a49670f4ab6
SHA15e5e019ca242cb2731ae2b49841f710c7ff64df9
SHA2562af0d9a55145152cac63694d970373ec6c1308b40cc70c82de396ff6c40acafd
SHA5125a5296e970fadb49642fa45d96ace1969f875b269a05b6e27a0941e4baa1bc3709a3f219aa325415787a3d704d803901acf640eb5ebd8b158431d7e93a4b1e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5b3b01af7084d71caba76b18e0c8c3d
SHA10b88fa247b2821a08080d56d3ecc8db210fe18ac
SHA256c0c03b9cc3377448c98fea9e3a8e4cae9325e9b8efb1085ca5ac00152e0b0744
SHA51210a39a93bdbdf8e222a9aae0e2b411d082263ea6688c763b452c6eff64b565d141c0654095c2e66d3e2ca9e9bc2c01473267b2b585b09719a911c112302e3312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d16ed963e640f1c2793782df8d78dde4
SHA1d0f510b57e6240e9ea6adc1cdea824ca20d06f62
SHA2568973b4c2fd653d201323ba3f70e9be47efef81181cb213dc193f21a32216e2c0
SHA51246482afb74dfcf186c3b3206b1cc4315bcb965b07e9fdc0921245f4c65af8a208d2c09d1fc75de312ba10d2003b7f023e35300e5cc00c42fcb9c0d33b9a3bb35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522bab68b80e30a3e96b291e141d63643
SHA1c14296e89f912ae83e845bd6ca00bb3981d05c69
SHA256874f1abe198571ae4ba91e48a0ccedfbac3b8169be41df21f51e78fdafaf9b6e
SHA512e2b6c7bcdce2456f2ec0207168582d625dd45a716fb08e273c35ac4243ae105c922e361f7a40af931c866c4b4065185210731c6e09d5e2fc7b07c60b83a1d350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abd8acc28ca8dab5b06eacdedad7cb66
SHA1e33b67e04254a48181abc17f74b6844d3dd2dc3d
SHA2564c9897ab7b66f31c9ee4388d0cf0f33cba84ed005c3804f2397805c82495408c
SHA5126bf7900ace7b61689ce5939269081aae3d73b8d5140c3c23f73a3b695b823264f746a0de6e06c506e42df116a298e1924203a334cfd4aff3e6c6836a31de6b91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d672fff2a55d61daf5e9bc949abccb46
SHA1ead7a2909ef12bd4c63109e7d49df4c40cd7b416
SHA256b3b0abf03686977d0f26d81e68991571c78d3dde7fec69f2a646fe2f41f208e5
SHA5128962a1e05cb9728180f3875a36cdf8b1d9662ef4dd679bf31c65ef8237daf693cc69e338eaab5975f9fc4eb8a75f10230ae25b015c400ec193b8e2c69cba4a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56374993a7d6a9d8e764183d7bc64d3ab
SHA10f27161c1d863265f0ec69955ffb7ec10ed4eeb5
SHA25616e949423e561e6f5667957a4dec522dfb46d70f45be6e52940fec6de22e30bf
SHA5129d90c633d1765656ff0405ce76dee8c82707631dd368794cedf6e7baf523fc8572fb9e84ce30a4980c52c43df6c8721a6537b792a1a16ac1d6efdd73d69e1862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567b51401f5b843562341c89a13618ba8
SHA140863b3a42a8791c8c16fc778046b1be0b86ec8e
SHA25642e547576a07b13dae20d9e10876a9d981e2ac385134e72c0dcd321802a52fff
SHA512ae20fc98573a2db95806d1ee95c34024dfa76cea50ba9de2162221a595620c3356620642d3b6fd981879aab0bc44356ca09a14ed323754ccd3f7797f2d37e889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5532e94e6547bcb4bd802c5a961ef9cca
SHA180b92b6c3a0e35cbf54eb3a3091bd49742d30181
SHA256c95d9b42c8c61811f34e1aaac0c954e375a8a4fc49f18250e23e17af883e844e
SHA5126fb78534adfd7375184093fd2588ee5111258fb0846a9c6eb587d8e8d894578b57a749ff8e9eb337115312a2ea39a079cd16410001ab028ff5bbf6a287f95702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5176919b5784144184d13468d31ae13f5
SHA172a1a9cebbef2dc12bfc22ac40d17058d7c7c4b6
SHA25652d3a7b5c3a80645a0394aea1a376fe61e2c0f2b7abe66fb27ae9a07649d0f8d
SHA512ead8b0a36f63642fb2dc7d739785e2463f75d0f6a8e725f7e71cbb93f8dda1520fc4c6da217def6b1df3bb3b152f0d5f57c34af7418f559910baf17074085ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afc7f83990a5f2e62938bf3e7b917466
SHA16f1a3ef73a99fe06a6349b514e21931dbe37899c
SHA256b02cc92b693b137b86aa4ed9bafda3697b88b1bc2c94137b247018fb5d89f988
SHA512e57ad7a1282ea02aec892ba3663afb01fbebb05c5fa65cf837cfd3775348adf958f9197298291e0dee36f83680c53cdac326746ddc52c360400d6ae25664ae9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e0a635afdc6f0adfe437c82b803d3c4
SHA13b3ee1e37473212d8bd9c579a8a14a902ce09133
SHA25644f2705f3d289d58e2291edccaf5ff419974d18fe77197b43fa291230a2ae943
SHA5128400a7aa2746c29ee6fd94832b38f27024f258fa06da23ea242e91779618f9d8607915c439e0e2e5e204c89cf1eb903456446e057ff49fded1e436f14a7936d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51716eaf29de091b18591c8954b1ed142
SHA1412e0e15e578340bc42c504086d224afbc534d9f
SHA256d552dc03d9fbdd92f7d5085c646cdaa48f9f55f514c2f91a4b0931449ceb1369
SHA51269084486c784011b8e54c4566c64f85e2bf82492119622e07e8b7051ed1e576dae9bab27a2ff8217c22ad1c6a1dd6c8c1b6e2f4f2989c2893861b51c6177d852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5689df782e6d2c0db088a057e0fec893c
SHA1c99872358633ad75ce1628685f6007686b137562
SHA2562e7e2d4d87be6c03b9159b02c02a066e9d8194805f1bb45e9f60a74feaffdb71
SHA5121b5411a2e0fb54b6cd0667909ea7bef38a5fc38178ce172a559c9de0c4da454ac534df8ddcfbf9bffdd1ae3537572afd3fec779af9ab6058b32f093c82fad1d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504d926304f5369fec806a51e7b993ae6
SHA1ff28033cbfe576605f51e54b3845a518da38e239
SHA2566cf6683cd0da6d817aad2a787724229103bd62a4552c71fb9187440fc16fff9c
SHA5126e4b0ac93063fe3a81dd4276e26622da7859b014caa7bf33ff4f1c5e53e0a732160bf9953547c7fa51bdabf467c229834a9aba18ada52732d02030e54bf8245a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3b583bacd5a4e49d7accdbd157a9628
SHA19029c5195defe0091db0efa422bbb286ce8740f8
SHA25650db805542ea773e2c01b12f30b06a72e7e67dd95240f7eb2cbe656b2f0ab7b5
SHA51220dcc0119eb93f792ca9dfb1b1e4a447cafeb85e5daaa2b04bd6365f3a2ff8a33393818a9ae0ab031a09141848cd6080ad3fcb24a27dca417ddf9b1f1f47c772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0ef8bbb6bc0d00691cff2da7a7744b9
SHA1199774beb132af5d1b6801a5591016d504167611
SHA2561c8038e73582d65d0fae89e63dc3a18c2d0d708b613914fd96e9897dba470d3f
SHA512d133aedff7b86590a22e16cb87694fc1cc7bfd30f3f3eeebe5dccf178da3897a70c9a1d5628346b450ee46258bf5385b261054d681202307f7bdedb9b7ce5446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5481d74e92cce98f66eecaa00abcfb976
SHA1a695d30e81c4b0cef262c25028255f614cde9c9f
SHA256b3ebaf72e1dca4ccca6747fda9e0a1ca38a8068bb82bf61fc54a93863789d7f2
SHA5123b55ba8780cebb31f65498670eed4e8103891aa3cdb8655cd41ae2492510fcde000d46b1976f6a6d2cd9fa11514c29f15c6580817cd549d7c3802bb9191bb5a0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a