Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 15:35
Static task
static1
Behavioral task
behavioral1
Sample
2586923e87ddc1b51a1a73ed1faf99d8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2586923e87ddc1b51a1a73ed1faf99d8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2586923e87ddc1b51a1a73ed1faf99d8_JaffaCakes118.html
-
Size
2KB
-
MD5
2586923e87ddc1b51a1a73ed1faf99d8
-
SHA1
b73a0947663ee55e2afbb39e2947d8431139d94e
-
SHA256
a0681eadba85abb27c3375cacdf2a3cbbcc959317fb55fee23a864743adc4386
-
SHA512
897b7079d85d6fd72adfce062b68c139f74360be13960c94980cc49a5e38602a7b927480b2c8d8ae31370bacd47bc55b5c57a869449e09d63ea00f1f0eb617ac
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000c0a616186ee8cd2b2f91bc23186b13e9fc66bdefc5e039058a3fec4cb673b711000000000e800000000200002000000041802ed49384253fcd6f6d6ed95091459aabf5f404927ab4b8d86ebac57a01a220000000b920af5007ab132d0ea9ff7424fab93e527a2e76428da3eaa32a653bf63963e740000000b7fa30a60d31cbd5ee1cb55d3179cf4d0e49d3026df829803871356e1e790567de3ba44ad55afc71ce1dcf489758f895e7662fac7c07761422a24577cf433d18 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800c93645da1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421344381" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FDB9D31-0D50-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2860 2864 iexplore.exe 28 PID 2864 wrote to memory of 2860 2864 iexplore.exe 28 PID 2864 wrote to memory of 2860 2864 iexplore.exe 28 PID 2864 wrote to memory of 2860 2864 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2586923e87ddc1b51a1a73ed1faf99d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f22c1e9b75bd47cb1ca55d683ce9e7e1
SHA1e4f1e9ca74460ef326296b6194d6d8ea62be41a5
SHA2568d122081340cba64f61d4a4df3c57833f05f42fa0edb5e172aee49e4b500f1d9
SHA512823b6060c71f8b94758ac356b6063bbcbe3674cd639421244e54d5ab753ddd797210baf57df1f403b8a4f6ecf6571c8db6b9beb298c663666ddd0e083a0185c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f69f45e750c009f1898e5bbe83b39cf
SHA11b98a0779b49455cb080de2be71d3fa2a64bcbd7
SHA256edab265f7c1952cd1d67c02bde35c10344f0bb50dee534e99516e264d99fb8c9
SHA512332ee29aa2ea5721fd276a0f7e11e700bd194b1c1c32056b3a220edcc00cfce596adc0fc650bb330e37b920ad3bd122ac7037c03f1dac7a000b7320cf8af7f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b36cd5e31d7aa3fcd1645eddbf8622a
SHA145305c98f15b6ba3c106da6880735d8b84d74292
SHA256a18d961dba1b1d62441afd3f46c9f484bb65e6e5358011afa1a86be4e30cf330
SHA5123ed9aeb6e13caff6cb43f7101d2681ab662eded93a4fb5364b1922475319e8e32077cd775df628f3b746e9307d5d9e9d4d8eab3f0d1a931738158ce27c78d517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1030d3b22fda381d95419e20304776b
SHA1330ca0ab03a84ca1d8bf729e45cf61e3c71ebc20
SHA2562954eb20830eb7b397bcb3a06f06caabab4076ba56f07b4b5ece45f6a4a0f81f
SHA51265297d5f0412cfad94a942f5f944c22d80f395e0fbfb72e7aae96fd7363377c3f35cfc15844dd8e294e77e41856a3908794bbcabd87e9ca3c674a55608c578c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5951e242f739d08b3b6eefed449831a59
SHA11cb87bccf4c36f1ae50a99cab1a8daa41b76ac90
SHA2567d74d9721b093485d842698ba69020ebe6ecc1fbc2424d529bbdd0b77c88c1f4
SHA5121eff6dad62c39e18c5db9e6b045a4defd80eb2b90599f26442ddd9266f4f59ed459dbe6be176b247c3b499478d8c84106c8a6a240c676fcefe53a7e19a05569f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7fe79024400b746b8336ce4affcca9c
SHA1fa34f1ad53cce6af968a3c4f43d76f1c2b7c7d16
SHA2569d87b59867a9ec66b73d615d76eab217b5012a3c5e6f866103e01e7594d2a1e2
SHA512010e0f7ebaa3e365ef02b7a211dd1236917b3f221828d3018446d6e9872f6857f3f8d982fbdeb8a0fd0d99c1bcab5bd6a34b2df1510e59dc0f457990ab3e96a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5654c2e17c627e4eb7bc242cb7ef78e86
SHA1bd26734c434a00520ded313614d5720763d7f8b2
SHA2564fce0cc74a2643d431f58552ef31f1c212a82ea8acf7b0381e3ac0eac703e8f3
SHA51222069445ba67c18297715da3e78eecee9a20074ffebf46633f31e91308c82cf94467fa8001ad8952e364db120a19eb3e3eb4b906439e8366635a1dcac0495742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5368c1a9e348578e91754416949b17325
SHA18b7396b75073b957c74f158c2368b04aab05dfe4
SHA256b911c8c6e2fff04b84beae13dc6630a686001b376d79d418ecb6d1dfaaf33a72
SHA512bfda50cd7c2a458a2d40da164ebefbd25d5beb57b7b0cad445bc1eafad43623d464d98fb0b35c7290c5df60be47bc906b6ec584f46de910ffb1453ff8246be00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5218caea46c74971c8f82a98d88c4e8cb
SHA1c8a4a6d277521c339196276be7e9b9dcbb33d0fb
SHA256bb074aafc9f8ed6a32339e7b426baa3f67b5168677aa025b05a12ac6d6a40908
SHA512cb9adde62fa82cf4aa6ca4e39f240202542306d6af23a0a87e182afa42d1a4005cec38c9d1f8b220a8b26bd1ab6461262f3a05d5b5093d50b73b8729fc35e808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545397d47bbdf0515960de5b524092aa3
SHA19d5679f6e95d0fbee744b936d74d45875377184e
SHA2560d3ec55b5dc2628877e54c48fedc93b9ec033c8f98d7c5682cc2d5586be6807c
SHA512e90805d6bf01296b154c0bbb81bb7f35e44159c25830fc0317b07c001fd4814f08200d8ef4bec7a2a6f67c2641935c593948bd42d51f271656217dd325fde824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c3a19b28e434e650b9208c180bc1468
SHA1799657340581de9e8324dde34aadfd8b3a01a7fd
SHA256c3532756059dbc95fde6d078ca23b9730aa83362fca9598af74cf1dccee7441f
SHA512798d7253eb448f6b172a7f7c2aaf6c5d07ca3dab7126634cce9630ad8fc55889e29e3b8365c87282afaecefbd722279e8121173d48ac3958da406568001a6454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9d409b00112ef2ac85656413721d977
SHA18d9bcb88ff1491ea6957b6e86f3ab42f8749e10b
SHA2569c548d6ef9a45e1625f87e66409af0cabb7ea58b6e34ff638d3d2a4ccd665065
SHA5125b8da4d12ddd92593281a67b94fee0e1d2d3a879bbd5faf98d95cf5f7f3e0fb7a33ded6c00ed3594489b82818d6c7a93c0b583b1d8f068aa045a1cc1f96f9a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5331f525e3cf8ab2b6d391d3aa5b2ce4e
SHA1e6015a15b7edb21351db42dc41fc7433ba7eb42e
SHA2560d914a3e45ff3d8c907bb7f7666468b5b63afa047d002ac174289e04e1fc7a4f
SHA5128c14174579eecf11ba781ccb43e885c5e4dc380cce7d8ed9602baefb6d8c83a930bc84b9132b68cb5773b24247807995d13c01db78d98c8e44f15808c6f38fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e07c70eb388d81c1ea71ffba3bb7eda
SHA133ada605b3fff0af317547abd1ba5fb5b13de7f9
SHA256a47ab5967532d2491616309ce5b1437b27e66d76645e3f6e3c6026182283cec9
SHA512b6d189c8dc091a4ab4e145cf0757e9bda98af3b3c74232179be68a030c5767486c61d88a9db504f15e23ec00eb5d68b5cbf12a66445d2b2c963cb5ba503ba896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582bb2a4bb6c3cd9a212d5be8d50ad43e
SHA1d524d84c384160680d48195b8feed42ca2019d02
SHA256a074516b0eb548ffde52e448c10c0ef1910bc9294ae4aee3afbfa7a7c5e6f328
SHA512ce1a9ef0d7a80180fac611c712ca3b7e7cd7f06183c09ac75f8f389e2543cee03ea805b7a2168966218c8347c53d8198e6aa6ca7179ce84410793fb825db47ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba2e9af8c3bae2b4050bd4defe76214e
SHA121fe671170f648d4b51d7d750b108abc88c9cd25
SHA25669b6b80bccf31c505001643e1de74c5df9b90b4acb61c9a22f484862b9b5fdb2
SHA5128f6f816de414ed0dd125b14acb57e374b59dfbe65c06041d070b1bb2652759690e0fc22b18a0dbde959e110b947836ab6ea05ea09c11d2f2e4756ad00abe9a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cee0dcac8fd71bbb0b7182f0c4a2712
SHA10b10ceee0ab0cf667bf99b58ab36cfb64a6d5421
SHA256d8b0c257f2d66549003ea715bddc7ee73bdd6346789b26c7e42d10c621d285f4
SHA512d962902086688f3e40c24904aa16d7744290276e14e78f7f7694335045fb0332d5bdf9c35878ae65c7cc18b7300d109dd2cd9a7fa20b6e04a6fc2a4600f9b2cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588dc95ec9250fecd25bae50306a5e261
SHA15473fa003d2dd9b973aa91d2ce2d0c53276cabb4
SHA2563e226fc19b8b96c8ee9214bdc8c3d1eeee6bc9597c1d715d499e9441a15b9700
SHA5120ce8852599710ce0670409c8af831dd7a32e4c239fe4f0949ecf93fe9b60d74f8bfd9665ada14d1814b09175109a9a79ae239345959b44ad84a42cb9314a25a6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a