Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 16:57
Static task
static1
Behavioral task
behavioral1
Sample
25d1273222c174940d87000f798e94c9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
25d1273222c174940d87000f798e94c9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
25d1273222c174940d87000f798e94c9_JaffaCakes118.html
-
Size
3KB
-
MD5
25d1273222c174940d87000f798e94c9
-
SHA1
462f81e8f8bbaa156b88845e8d5c0bfdb86be1a4
-
SHA256
c3406a7035d16790887be464bd3222e033200e88df9b27569911acc1889fd0c5
-
SHA512
6062662c177a83de8780aa3d8ed46fd2a58cc6dd1212b66497a6607948d28bff4a9547965f4efc4dba109cebea6c9e9c9cee4dccabf6979fbcc143151e3664bc
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000020d5e8c8b247841f1601036c0cdc54a8c77e22404d270cac295911c98eedd04a000000000e80000000020000200000008729f20c2b7e9f1cec75158871b15a8012fed45222a70551023916fc5d40040920000000400df198327c8d0d517aa8406268f04bc87723364f4a0473f54ecc796417641a4000000063a013c50c988802dcccb497e01af816fe3b59f5308da2f5a5d9d8dcba48f8b22bfd15d3ec7c882dd43635c1ec45de22cfa446055ee2d4bdf1b2b9100b49896d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0bc60ea68a1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421349330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15A2DD11-0D5C-11EF-8AAC-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2500 2340 iexplore.exe 28 PID 2340 wrote to memory of 2500 2340 iexplore.exe 28 PID 2340 wrote to memory of 2500 2340 iexplore.exe 28 PID 2340 wrote to memory of 2500 2340 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25d1273222c174940d87000f798e94c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53628812e9955ad7a3ef0c179538a0505
SHA111b8ab19560ce9e15955abe3ae4b0b5da84b3c30
SHA2567ece885ca52fbd5e96bf54a607d9fdfd0429ffc6be4a220719f8cb105fff8df8
SHA512210bda5d6f1f729d73c0fb86f84ecd8a1680a067b42e0566862ea9893dde73a06826899131de7628a954ac6a1972b0304dec2b5cd8827b087de27918a089426b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1a3f0c84fd024201ec64574596825ce
SHA1535bc8c518cf18c10d2cb54d90b44f528642869a
SHA25620c1f2c6cd479a19e3aa61918f48d160be0d8225fd00c6333e8e540b14751302
SHA512f6e98d0ac5ebd96f45e8f4aa2acb4be48083a8b426c9ed39831bbd38093ea6047cab0cf808f3e80f37177293bd704f4daf8819e9bf260f0b38cf033aa70627fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9620db2a922b3b9e7f469155d5c9353
SHA12931f5684261a2908ca553d71a73071fa018924a
SHA2565d42dd64c7ea590202936a59881bb4e45345774e94e5c9e340729352bc65751c
SHA512bbfac7eccdfcad440252534141484276488a90218a7c2308444c68ee4d7bd5d4b73d9f1f86a2cf5218317db5b7ec5cb62d5ec644182f7976933d2e96e1f25a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3f349de7c97c1f0587c24ce73ccd412
SHA177fa621f8b135f37ecb2fe569461f13672cbdbb2
SHA256a3bdb8ef35d896527685cd844ba99c827df3688b4e31ba7f3316e6b6c1ccc98a
SHA512ce5adad1489eb7fd468300d6f5a38c8e4f48c45be0ac54dfa220086840c00a39027c5a16de50ff1a9d4cbfbffd90917239cbef48fdc02f5b4b6f6558177c94f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5674aaff04b4fd0ce98ba9fa19ed2ec5d
SHA12b58630ab9104f60e14770fad5525f60ff1fdd8f
SHA25679529e1d25d774e0ca028ca8c5a76bbc77d135cdfe23a3764d08a3a456a7385b
SHA5121fbf451668ef4d2942a4cd0effde50b097f4b055a922cc503122f4cb5f306d31c435c178c52845305a61cf4618ea551f16396438e8174f27ec9e1303ce877d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573c138028f95568ce560af8baafa087a
SHA1e43eea5e2caf1794eb5533d0c2f13daee46eba00
SHA2560095bab0d0569543cc4544f98b852e374e664f9576ce1bf3e6408bd3069e9a3f
SHA512b71ba50931cb2d70b733ee27cd92e638f51c06ffdf01e257bd9d6fa08b225c0ccf022bd6e982a0a0d94f482b54c90cf1351a8628ef5f06c8f433036d3ec775c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efc289f600b556d970bdade1dadfcd37
SHA12f00624a267add11087feaa99cf964871bb9b0fd
SHA256cf6035e373766ecde2df8bdeda721adb19d89489b5ab1a9079e72d4978c951c6
SHA512ed3906db448b8779f3bc62aab2e8d5a8118641637fcc6448393b4d0316e43d890f5f39658e34bb20b997b7e3571f2b5d3042a51fec2b0f497d5f2f4b2060cd6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d2685810a2a5321da8e881f7ef104f8
SHA1c8d41ad00981033de5ee89efa3c6a1554f12805b
SHA256ccb31bb08db5c9c3be085884474ed82d9cc4bbd91a2396d2e33de16d24c409f0
SHA51251f075a5189bdeed831e82d0ccc9fb8f1bc32d0f0ab0c457b66f143e37494ef5fd130df2ce4d2d2d57e0d3553534df785c3c6958f44b28ac452ea95c35d6bed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8e46abf087a8dc4bc34ca020cf62469
SHA148b80919b0ac81c693f09743063f32405a0c8ed2
SHA2563c359e3119772d8c8201baed8cd84506553451cefacfab65c03cd9bbf87c7c4c
SHA5124331fe1487136b1db09b2a647f86a6ce2a79b3f608fa49ae7ce1cf56b23c4db496ba1a64b42c81001cc1d933faa66fe0de7aefd1f703e29a98828bde1430887d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5539ce8e6f032ee19d2931fff675a29c0
SHA13d55f52c2efc0d9d1da27934b577092dd6c5fc06
SHA256d35ed69292caa0fc7909638d8e607a60bda6ed0524080a4a5d3116b037dd93b9
SHA5124238c17011f68e85db417878a5e52a8a5ad901fee2a728b174e1f1aec9d78d49b00c8b774672a3bc8b69a23732c7cf60b4f9d9bb28e7434fcc569dcd269039a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5857b8064707df55e3e27b27dfc32cdb3
SHA1c110fafd5a8c24e6675803c47ff2641b6fa22883
SHA256966bbf4c08e6a923eb3d880d3002b7a210a382811ad8e7ffbb90c635eed28f8a
SHA512bc170977cf90963d43ee3daa6a86645726e3e74c6a04288e813fe01998a3c446739b32f483681e783a54c9a98c938453a842722c9c1252b62bc8bf4b1db2dc24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ca0a600d8ed24770317cf6a281fad66
SHA1c6813f56cdc8ff2a6a50f0efa123e43ba650f369
SHA256f32fbf8d6854cd162edd603128412a7d16e301d20e970397865e1b08d91d1883
SHA512ec0c74049dc89c4eb4d4afdb9c906aafac2a8c17da8b46f298864e6fba6da0f5a16c545912d0a1efa8ed38f758ca02fae5d2afd7a5c142447b514814d2d8bbe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ebbb1489054c84dd17eb277215c1f59
SHA1f0115ed0fffb1edbc513300daf3a40f14db5e86e
SHA256f2f0e7d30088358746e62c038cfe86a7754f8c23419c8372047447154646ca26
SHA512b9a095040345b1c7704f60e5000264d3a594acf2b46d770203801d3a91049e7874fe27473e0c6e14310f965c0863846de71d9548592715493e92b29d65b93c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e5a975e3e05adff77070adfffbc8c1a
SHA1c439c7a7d056d0224a7f4171e942260d66f51d92
SHA25699630ab83b0e22b5d4c50cfff593fc2ab1cca10f10a2b14b8c046af772c7fb77
SHA512ce60a9571932253e214bd93131a48158fa24893648b57a77089aaf4f0ace31957493fd4f9fda906ad8f77095867898507706ec25cb3488839043a02b4be55a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5f54620e1047cf682e5f529077f4810
SHA1593a5a01cc5b8f1cece97a9b5cb460c32d8fe5b1
SHA256f46010a215c62318c3692fab39302d961d08fcd682cb0c95b6e4e487b57b04ed
SHA5127fd1e63b97be2e2db8c909cb87b58bb953da0f897ed81c78e970ead82339164d492a288e74617b3f9e339288cf6de0b6ac734e412093f9a267c9af8f09850b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b629c8290fedbe45669d2182d4d9a93
SHA135538b071875eb37d92da5f20c94560b288babc2
SHA256f81caa819fe87f266d97831c289b404c063f57bcfa987a1c292ddda0cad2f51e
SHA512fdae8ba97d1882705b076b158e96a526c93c1032c7c841c0e315000a75b3934f72a3723695b0d9c443959775273b35523d2f0d2dd89b18f1a109c85180dd82e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d6711557952254ef937f8d604c706ef
SHA1573857ef33365e1bb4c08e9ce67a456715749806
SHA256196172391478fc18ce1de117291f3cc205583c0d69f101eb818b9c31f45169a4
SHA512e8c73a76dfb31350b4511934b2e87477798d83590c2caf3495ac11eef86e42af8a1e00bcc26715605559b2f5a3b1d8e74e59a6c0fde62a2e5cb79e2653ea15d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9623ff953ca39d2365c99962ed4b21a
SHA109cb7d64cabfe32b538e655d88f0c502797c0ecb
SHA256a7a959a2f8a1d994b52bc555a68bd9f237e061183e881ef0eeeb2bbfad785a56
SHA512daf36c223ac165db49f54b3efddfb52727b79c7631659f2cc81fad9bafe9cf5c93600995f9aad73d26a0e0fd2e90f3ebad3d0d612b14c706e24b56db75330f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a1408fd7e57145da85490b792305c35
SHA1499674f9bd9fef74dabc06c224ed6a19ddfd95f8
SHA2569dea09b4fa4273b93837ad001e65a1507f9a4047aa4dc969a6e0e1b1ea85d2b9
SHA512261945d086d7ff88266684df61802809b3008803cacdd701a6725c33cc6eeaea6d94da0d37dcfe264638252022f2b4fb2e03782a81196ca86f15444e6ef13b8e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a