Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 15:18
Static task
static1
Behavioral task
behavioral1
Sample
25751118561c48ee7aae842aff8dd3f0_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
25751118561c48ee7aae842aff8dd3f0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
25751118561c48ee7aae842aff8dd3f0_JaffaCakes118.html
-
Size
652B
-
MD5
25751118561c48ee7aae842aff8dd3f0
-
SHA1
03b80fe228b2d4d9cfa32df044a17cf3b088c660
-
SHA256
03dba55906c4a3438f3d9d2aa16506a600f297fd0e70b0df37ee229c9ad47ac8
-
SHA512
3d9faad9b9e456feb4f608437c16bce2ebc7b215f1cd138058aae04d17aaea7e515141ab08209fa121c5091b11ae8cf82833238d6e10e809687ba16874ad0444
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b2cc0f5ba1da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421343382" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000e7dcef69793292883fbb9abf55aa0f081e1e15ee7d7bbd686e37bd53239e463c000000000e80000000020000200000000b8e930d618fc854aa599daa39449ae9c41e88e5a0197b245f11cbfe58e97b6120000000b6081eb7ab3fa93a10b19b459b34e55c9628b419399046703032c3db8d290ded40000000d45fcf48f725e8ad74f0b9d82a6a56d816cc593ce7460b335f0423bdcb6baff984c8fe032d78d2aff32d16ef60b1cdc5538637c3e04ccdb3e877ecb3765e1ab2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B29AD61-0D4E-11EF-8A5C-CE787CD1CA6F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2508 2080 iexplore.exe 28 PID 2080 wrote to memory of 2508 2080 iexplore.exe 28 PID 2080 wrote to memory of 2508 2080 iexplore.exe 28 PID 2080 wrote to memory of 2508 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25751118561c48ee7aae842aff8dd3f0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f2ef85093c9a51fbba1b09da6f8aef20
SHA1264cb47608e322a0321054d6424d183c7f5c9376
SHA256285ae3d27eb6addee2b65e810d2302d678e8d6ca091a84c676b647f292fb1c84
SHA512c07e8f53aebafac8481ad81bca38d77fbd46d06e6cd814cf5c6cb341c64ac5bc4c6a4582784dda2bb654a98a7cfdaefc928db980d737e93aa3f9577e8448eb3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f4fb873ddc85b29ee1cb18c1bd819c60
SHA190c72d4f05da3d644519d8fa9bb08346d9fcc9a4
SHA2565f7d65fd5b787f0a39805de1cc050b639c01ba312f24abb04d6151389f5fff68
SHA5127d80277c094725f0ab5fcdb1de9e8908743ba636fc8a81faeab627dd0fa5e88745ed637e32f7dfd70fdb65cbea78595c5fa564c5997e29e54e4b52909b77b025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dedf8fe33afe062084eb0a37c2476c3d
SHA173a1b918597debb2e59fce1932db4899b509e946
SHA2563b1ae0fd0b53215d0d905d27a89b7240b209dc504fde52d1c64fe04b6cb69b78
SHA51296f987f0525ca6a2e901057c141d6410ad69895e153565e5066cd87cfc156581768b71b9ef61be169dcd4397585a1c5f39a4f354b2965515595d01579515b42f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD555af5b5d3a422e70466a06e13d0339fd
SHA10a5b04876a58031485167730bec970656a756db7
SHA25683e61306997403efb5ed3fbca6e05a0f0068da8ba8fe5cc79e65b281fb940956
SHA512a67e830250155b9a2851efc2aef973825396ccb3913c70b618f516a95c192ee5e1ef01d53781ed8dca0b633fe7aa47709c19a78fcc3dce8ef0516ae08d8159ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56ef12d0061a5b05ac52223ba77356da9
SHA1383cd7af86cd8ac2879f021e62caf76db4846d46
SHA25641b54e23b4d5cf14dafb8aced9b6be803ec27acead2066600637008de5fdda2e
SHA5127804df8079ceed75f75e70d595db535331bb119d8280d526b2155a684a905422d79027dd2f1a3beb8a9565164d34abd6168721af72663851b17460138d3fc0cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD520199d1a8838b27d398255cf5c6b99df
SHA172e6758e39a64ad3b65c431a7667881df75346f5
SHA256fae3220d0d860077b5d52f80fb370d2a4f4d04146d5ad47ed9f85d8d8575d701
SHA512e78f2780fdea5daa363f5bd0b17d7fd3c9e9565cf6357de1dde9d0e96af1a412e30d56541bbf2e85020896cd60d1aac311871b84606e32fc56dc567dc96055b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55641b4f2ed01f08f0356c8bc17f6aef0
SHA196580043bc405894cec5b37b8ed9f51598b41c4c
SHA256a1d2cfa3ca58d94243bbddf55bf49a20396cece6a8ed6eeb1f18a3a0ffdbd982
SHA5126dde2a6a5ffaa8171c4d9b15bf784a84c1ad8eab23d3a46962ae6054598a7bd340d97548f47367bb6df0221074ab0280073d723c0d92b7b396cc0524b127fc5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d824ffa21063b49dc6979bf7667f95aa
SHA125475769e4230a30c24079a4141466287d4db6e9
SHA2564b55714b1dd94507a97e3982c19fa8babf87144aa7270fe13724de4455b417b0
SHA512f24767137955d4c42a6334d23cd0eec378c160a4930c7164ad66b98ba144ec8cbb9dd4a7325c2851122da9655d65537b74c75adc7fd5e6c9aaec8ca1cb2ea107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55900d7b02be8811dcf2107fefb3e297d
SHA194cc19cbab3b05e67619d11c58f03b92b932cf2d
SHA2568e6baf765824e021a6e01744bcd3cc17ed1172e6cea8911010d361513451565b
SHA512b42b41baba6326aef808d4fd0dd7cfbf2d494013af1794756815976e07efa72ffab2625b3a437988a3427bf4984043507254fdbb25b68023a1499728b34e1357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d9b7b97debae591c9e764ef448e7943
SHA1cde9be76b9d0d404421d1e440190a688cabdc8b9
SHA256e2861d8694634c273a3a4b515e7f7f5eef535e702ed58f87d551fcd4d1b68bb4
SHA512bb0945ffba01a7f4a2c096e30a508b596592f93ed7b86def13d3a883a5d39798ae1b6c4efc9a15f015c7720a7bcf3b31c5b97592f16ab7875ba27cf4eb867c72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d029c19c76d1e3c125de54cc8f65df80
SHA1a796c145564c4ac28ee2f828ee62ba97b8df55f8
SHA256d59f68524db4132aec83f292d87b71ef89f0979d5b49134d91e8439938b51d55
SHA512a9fca85a60150a94f826da1f39f12183a8962587afc3f40ca6ab1e875ecae8908575e9cd89033bf4d329e97b5f6c2539f91959cf9451797d1420688b6af410e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55d2ea1104be22a8bbfc99c3d2477167d
SHA1c833b10bd66995d9b74c16484c3898b4cc6d44bb
SHA25640550bfe0ac59db154108783513defaf7837b92e7ec3096c755b8b9478543d39
SHA5121912603034a41f3be85d53a85a5cedff4641c859d4c539323df4e4c6e0e458f8b2ab0c75831e4a864187b8b8b951c4a6685cb5019e0971ec7b1f315a394ad3f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD505516df1846d1a56525736b959bf5304
SHA1cc8722e812c39de26bd79aba9f27a78f9e83e537
SHA256966f3aa4c84eff46de0732fabce6d5440ab7adf39dc610c82c175cc0827db058
SHA512c2688b01eaf7e8915b54ca774351ab320d90c3edaf75263fa461e38ba8c91993c85a4645d3f8a81273aa0028d85093d2c59b37d55fd92345da2af1fa499a7f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54b12ea91c40b3d519d9bbd729fb4e768
SHA1ccc6b4ff8df0c6e7b51708720f3fa05a6fcec5f0
SHA256a4196d047b0d7296662cee0b787567b84918ce3c6cbefc3e994a7b5c0c447c02
SHA5127f585abd813445b6ebeb9900884ed6666d4399d31c89388e9578fd34d89aa391da756be31e08f4b18ca9bbb4429df41a986c594f1835b4e95e79e9dac627a1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53a8e84c4bea36a399e77e88a689cbcb5
SHA14ab00c1ca8bd4ab046fa7fc11db5d042da13a0cb
SHA25622a64cc551f2d28a55b17bd6c544d6a3335c308f5b64a9c01a928df3fd00905b
SHA512c1d2c9226526cff5842a5621e5e9676954b0f1dddf027d947ffbfe5ad21a72cd79027c29f14c653e4816b0ca4c4e527d73f4e0f7e0ea27ca7415c17820930cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a9f16aa60f215360ee13b0eec01d6b4b
SHA17d6a2b36afa08eabc15c2cb38c252a207c23b334
SHA2562103cef7b8aad3e78d4083d3fbbe3847b92a6dec20b4649444c00515b7e5274e
SHA512658046370ab0141f99a3f3e2d97c958913f4398a38c24c65f689fdeca488f17a8d31705fd2d6528e1e48013dab1b244ec42c935f81176601159b2886429d3287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD524752e95936183a8f0dc3abf9013fcbf
SHA1d406acd6422b6b52db42e244b36d6493962f2625
SHA2568cb14bed77e73003dd102b4428e736be01c3a070637519206616f858da44ba41
SHA5128211ebc9d15caff72e0a2eedda0b2908b0efe6aacbfa7d71ca06e1692871cf099220e67cf596e90749ecb2f4f64677024630f826d4b9a74c1729d27d9b32f18d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59c25ba7ef3ace8b4e94d4bdb7e123b6a
SHA1b77f6b204d9e5c7fb780046b29f9e6a469612f2d
SHA25679f556818b3c801ca7ef455cf1d15466939fd92d5313fb65f860c685bad1aa6c
SHA512cd6a4da45a1e8fe258babb34a0e200c7f525be1c522398a98f634ba2dcd6570732a5a3daf4d6df228f8e083f94e066ee12235abbf33a0d0d9b96bedb16e4afe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD535a6b11d5fad19dd6ef71abb5d1f2967
SHA1d9e9b8ec2396ef12c78478e80d9871ee8e3e9522
SHA25639d12c83e354c6b2c4f8e61fa0c3a18e231ccfc229a8f61b9a3757dfbf241f48
SHA51287b35b82a9bea2d85f5a933e26676708055694c572d49601b2b2005976bfe526e8d9f643fcae391d304e4baf5215c283696589797c68e8258c05c34441f06118
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a