Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
24c54c91e27b57204a04bbbb43b40175_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
24c54c91e27b57204a04bbbb43b40175_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
24c54c91e27b57204a04bbbb43b40175_JaffaCakes118.html
-
Size
3KB
-
MD5
24c54c91e27b57204a04bbbb43b40175
-
SHA1
4773b9418f611048ac380faa3f40f4fde5ebe4f7
-
SHA256
d5df48ee8f305a8260514831d8d14db162f64127c9ee41ed923e0a29b3c25183
-
SHA512
95672a8f1f6aad92b1724c046aa6699a2d7fa2226d022c35c5109d62ba43afce94d224d2d6f6b8e99db5cea3edc9dbecb181a3f208ae98fb69c79923308e10ee
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCD46EF1-0D33-11EF-8B56-EE69C2CE6029} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000e8061c29511e22c2a6c59e5853f02fe43c57452b492fd70dcbc97bcdbbf1390b000000000e8000000002000020000000d836a9d649b86cb4147407879e6d726b6d22e255b406bdbee55736c7bb07c58020000000c4851418edbd1fae412e9a1b65d3776969af484c569d41559957200408d4a9f240000000d583273ab33402b3c956203b47ecfc8fd079ccf8d3a37213672504e8ee8ddfdede1c6000d0de8a1d626f7641709a6ee153bb7aec3203fda2894277b199ab1c69 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421332028" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f497a140a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2472 2336 iexplore.exe 28 PID 2336 wrote to memory of 2472 2336 iexplore.exe 28 PID 2336 wrote to memory of 2472 2336 iexplore.exe 28 PID 2336 wrote to memory of 2472 2336 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\24c54c91e27b57204a04bbbb43b40175_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eecb23d1b6364af8e7c1a1805085165a
SHA1dc8c1c17e265cf083de4cd9eb91dfd3ed571c02f
SHA256e566f582a6a012ebe0e2ea91580d19545e1bedf0c638873c9ad79020fcf66e93
SHA5121594cffa731eb0a0ad1fb55e68d9ee80463b5dc9207f75c515c3054ea07387f109977d642cf622523da8cc0f804646ce0896cefd4a5dd747441d502ccb4b6d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dad9570a0189345bdac31e280a424b67
SHA1587d581b336179e09777f72e250543e99cba16cb
SHA256ad0595f00fd2d6d61d79c800f61bad5d838896a2842f19085776e780d3776ed8
SHA512f62eb0100cb4245b17b836ab7e1975ccfc3659e98f250eb9c4bbae38cc8dcfd30f8943994bc682d4317d899eda39557a16f8bbf9da4c6cdab00059081ac640ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ed5a7859d31d0d911668f8a71724029
SHA1844a631c09d0c6dd9486d91b7cab4e0b4c5b9dab
SHA256a501ecbe182632300c9e9232f710909543efaf8110a33d7088381f3d9bb5013b
SHA512c1ce9820c6bdd5efa6b0b00f391c482635e6c1c882777d30d536727eb6b71f2a6f90059ba652b3da4af0f2ea754c87d87511060b7c2a009ade98e245dbcf35a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591d6095afce20e7b6062bb621b4d905c
SHA13a9e16dab64aac3a9d301df1e2b0ddd4e8bc82f2
SHA25686a952a630e4b04a0e91e4d160a13865607f29d7708e48a030f5b630400c0da7
SHA51277b86c33f17b4948966b565a1858e2932a7ad43fcaf502deff541624b04621d19cb48983678e8c972a901db0e5dcf489c2f4eb180a23b131279f652f47da051b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52aa748c9b90e7c231f0efe8fb877d13e
SHA1f7e024978598aecb8e0e699d2128c0666ac7527d
SHA256612c9dd2d589a744f0cb74f5975e3849d4cbe683faaa6b6389ffba48dfb7b8ed
SHA512ce8638381b61637b77a083d6abab20190f12f72bdcc75002c6774805ac2bfb95446607bde85bbdb17a18d93e12e662a1c4c7f25928ab75425269cf12d6ac943f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a80a82bee069fa50232e9429161e84a
SHA1b05835975c967095c074f4fb5c96190b5ab8d73c
SHA2565cc229dbf41bde893b605408241dd75fbcb8dd05503948301e11eb70636c0d16
SHA5122e9cd403c56cc887a16d53cc7dbc7c61ffa8e2cf8e562164983e02d121ae4c47d80ce2ffa0a048ebb8584f183b8d9589676c5016a65281d0474a567e841b51d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516f5c122103e9207ac5023a27679d99d
SHA11006b5a1e05c44d59b8c49032134844b1b6078eb
SHA256dcd482cca9075f2d3b302e3d3205fc6f6d7859baf425d2f8e926642e84cf53cc
SHA512a020fd76c509406315c47334dc42d068f69009025b6a9a9165fef1cbccc49e30bffe96fcff40a829f8d6a57789c81a9bc7528c7d43bd572abc38c13429ec23c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daf65b5cf8dc9c3875f7c58691ddb28f
SHA1033adcb25ba49b0aaea9538e66b8e4983896568a
SHA25605cf6ceb0189d56cda6a9262308bd6d3467bbfa67ac965632bb2501c8106c610
SHA512d79541f6e331d556579f25599fe5d6c74fdfb7ba5860444a71b473325640cfe0132e9b23511e4ff601b1006b7945e359e925d56dde5748822a6447822c64c087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a8a1c48eccc59781d747500a2fb30f8
SHA1b664dd5de06093309081610fa8e712213d49fb49
SHA256f1036def99a9e0b8297851ecbf62842e8a5fd11ffc218e692d2a2bbfb2143d30
SHA51217cc76388ea3bdf0c83996a4ef47364a42abce9ab6bffdbcd028d0e654422a885940380ab72b75f69f84876b6f79f86dfc1441d9500b14e94506bdf73b84768b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eea566d56dd51e14965b124c6f9629e5
SHA103c07d882ea856ff8139110d1f03668beb1f2496
SHA256d3118c495df378a3b1a1b8c752dc1411667842b6f9c8f3697506bad1f01a7938
SHA51224c1982fdd3b394369dfe737ef682dc1743d327e44d4bbd29f0bae5ca7db80110f5f424d348e9b3ea2ce31f4794fd27e045c4f4505e4ee100d4c8266765f273e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa0b296e48997f3964111e8bb76ee069
SHA1a08f5188e35aa00a46b1f5967ebe09d31b9bea61
SHA256268a6c12a471547d24a7e7e4735838424f08a8459453697f523d8c55829e7b9a
SHA512521c08829d33848a59d21fe74e9e4cbe37bdb76855c7aaee7030041b51f16928e455f2973928bde69b39d7d46c69ace5dae0c8f4b099876d799cb136fcc68c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5582cf322c780303da49dda4f5716bf7d
SHA16d529c92982fdda89f7e6bf13b316a4cc91d4c59
SHA256d5689a19109094e98f684c9a1717eceaadf4900e4c0cabe2e7a7d49c1d6c1caa
SHA51273af0ed2773941ff911ebda3b9dbb2677e060f3fe7f4b70fe35a57ca419544791a4e4a1a03b98fec045bcbbb51015eeb6da7db999da3a853186dcc2feb11fcc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9838cabbaa2b30a0081a1ba7e2ff506
SHA118c5006e12838e45407926a02cc38259d7f6b523
SHA2564b469a0017eca5da3777bf99b04233e62968efe3e582c1d2266316e253fddbb2
SHA5122ec5c8698935fc587c1396813524dee5546ac2fe75d739731a9b165ecb491f10c7bf36dcb739792f20ef00ce881e5bf237768e7f96c06be72607de1de4bc823b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa05a0389e68acf8cb4bfffd268629e7
SHA12ccb9eb663a4ef042682ebbbe64460f4a2a0b7b6
SHA2561f19b2bf054edd45f2eee6f3b8880fe8496b77bc11f4e6e10615822d4b0086bc
SHA5122460aa9e0ef84bb9ee259d28c1a6e5e324e958b7a9d480423c922d7a5c74ee212122f849d692ea1147ceab8629f903a27b124ce8664ec4c55aa07d106da32ac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee2e9325d4b8347c5a0994811db3baf0
SHA11c1db15dd644f2176c226e1984d9bd91518f803f
SHA25604be119222444af707487a5e8f5c33086864535328b9cf8e891bd8fea8196d2e
SHA51278d623f481522cb2fda125d8b78d19290ac985d8b78f9d2c11b3baf2ada799de6694b01f89bb0e9c50349e3b2697a5d100e9186120ba77fca02868ce2a5775ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd247f3de35eb588d8212fb70d87dde4
SHA1c28e61ffa0cbf28a26c8f029c54e869842c072a5
SHA2563108337701805a9db339dda6a86daeaad6cd9fe55cb83da9704faee2ec06adf4
SHA5122e5fd9a892bd60fba9941ede478f8b48ee6f8682f6fbf1c1e50128873598f320aa7254628db3b20cc99fab2cf9409fa27b24d4127fe394c30cf7b5fbb68156dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e389ef39eae3e1db4b9d9dc89c46ab2
SHA149af86a6c2cc94052efd21beb259910170982204
SHA256229cf359b898f68e417ddcf2a9e0df05899726eadee29e0efce775ca024a7fce
SHA51295a5d54e91f3fd84708db98d4838aaa31627c0f820cd4690134c949112d3887aba3c5c8e977a536c8e2b001a156ec1712b4fadaf1d65a670cae76df785bd0d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f940f3fcb2f067a3150fb5e758da27d
SHA1a198d9079214c62e5540f631405040ee6d6d72a5
SHA256f93e49264d3d850d7315f6ded361dce4dcce30043e88616534cb1b979e19d1d3
SHA51266aa31be7d2109be989bb8846f915137886fc9612584386fb37486397c24db0b637c8531d002abec22b1a7d1d15d2af34cbdee3ded640accf8dbb4033ce6745b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a34a5faabb9903de361fa8e65916b70d
SHA129227ea0496daed74f7e991d21e06ce1f6f1b4d6
SHA256812fff785a439d1047b289451fd026d0bc7c064ad83000d213f1169ca3560ea8
SHA512925b64de7b5bb9165208bf5aa1b9fb97779ef5809922e251676ec546a0609cdbbfe027b787801d62e0afb3fae36e7fea5111e239478a501ab66b0db0f47244d7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a