Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
295cbde70421b55b2485d496fd576a29_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
295cbde70421b55b2485d496fd576a29_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
295cbde70421b55b2485d496fd576a29_JaffaCakes118.html
-
Size
2KB
-
MD5
295cbde70421b55b2485d496fd576a29
-
SHA1
4775fb3d648c839e1c2f5e1dadb9866e0d9e4cd0
-
SHA256
8b9d313b1cf845e3d541e9c6ea3631d86bf351fb78db92b049e12fd0084df784
-
SHA512
4b23497e5dc10e12e01052caa3f3b9287b7aadca4b98074a80b17721549e53457faf7fd7d466e52de912dc849e88a9d54c38f2651588f7b420e0bf3ed8fcdc72
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e005efa8f4a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D459AD21-0DE7-11EF-86DB-FA8378BF1C4A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000004bcc5c2e825637f81b33a5f43bd02e067465fc3ce22b1c09fa4b9ee5c3498a1a000000000e8000000002000020000000bff7835f5b6dd37ad5ea90943d2cd9f37990e801f31fa4294c7d889a49ba4154200000007a27fc99f61b7142a4fac4c681ea2b9943dfdce5c8f2a48e0db2029bfa08de434000000098dd60234a9a95d7c0a030ab7265952743efebf76061a43085b9d43819a1ba337f90b36aca812bcbbc4e1eb5e266e412a1774a1ef4c5bee4824be13c61a77fa8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421409350" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 3064 2388 iexplore.exe 28 PID 2388 wrote to memory of 3064 2388 iexplore.exe 28 PID 2388 wrote to memory of 3064 2388 iexplore.exe 28 PID 2388 wrote to memory of 3064 2388 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\295cbde70421b55b2485d496fd576a29_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebb701bb7c9a8f40d3237f7f2ec9182d
SHA1dd430584f5710318b9e420cc7b9fe14e1fca3c99
SHA2561261ff90a0e30de3012d96ae5d43d8a568fdd5843dc2da5da8ccb54a5dc9e40c
SHA512fa6730d198a54cd31c67ac656679db33e02d77ef9cb765079881f349c894ff0844b4d15d71e4bc58a9c013141685f8285b4c7545eb1046372c16dca63461e3bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573c85fbfb6cfd3da7f193203a1a5ed68
SHA15c68cd5ac4fdc5d12e90bd6c17f01572a1ed3f6b
SHA256d0240e6c3c1add0c74fca29ef71cd3ce577078c3a3575e30b045a7ec2a15ecb3
SHA512030376373db1f098b30b7cf9971ab4e0f7494d1e2d9a40018c8343c9c8fe25559d3a8275444cb71e13b68e027c659ff9dce666175ed4f742501889eb41441a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f348db1342aff2f17158ee0de319fd9
SHA1d4b6dc6931cce3eeebd0057d7926bc3d4e2b461f
SHA256158522408dcd63d00c0cf197c3043e47657a8a626ad978880ba17709841944bd
SHA5124fb751eb017be68dd6d6db42dfc15133c8eb2914f093660d95f66897929f832c6beb80208580d704bb99cefdb7ec8940392ca469dfbf8447cee30b98e2f4de99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596d40ddad4de2c9a280035374e1dbb67
SHA195c52292e235bc5742e1cfd8218dc146b1841758
SHA256f5c0f9eda21514aaede04fdcdc405bce9f948d21397ee213c7dcc1249cc6f6ad
SHA512b008ebb097002742b45e8269a8e4ec8b74d566dee6ff61829b72f1ef7be0ba6bd9ea6886437c9136c408e0fa1b2cf938c37522149d92594adc4fcd063afdaf05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586d1ab31984a1c56dbacd54714649e46
SHA12b3833ff1229d307138925ba51beb11c20903909
SHA2563e913e26e787e1afffc6df6f72fe1ca28b38ab94a26bc6f6c7be8ef467be8387
SHA512614372aeae63988d9f2a134e8f4166894083f56c85f5e3802b7ff72ec7ebb28022fa6e853219d11432b6f5d2791486f34e9c3e737a54155b230ea5f037aace90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a741aa0e2618c0b6e6e653e4f0f6306
SHA174cef9ddf6f47494392dee9d628aa34a4edbf081
SHA2563ddca3cc39f547c62867d5f2610e96e645b16ec411ad959ee3e1ee81f46a2cd5
SHA51236e2abbb4196fefa115c219d7e66af1063ab18d79e2165ab8ddc31f5827d39095cf3040faf6459c92d70c9ab04e12089110a0af1beab790b3a15d527ed7eb37d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520c4648ad311ce8d7426fe22c1c8388c
SHA11dbf91112faa859e40e916f2db70318a22a54c06
SHA25675feff19c3e4cdd58b583131dc875f39974415cf3bb3b25edf7a45799700157c
SHA512d854daa35228e61be647c112e744d896d2a2b1df1a5e63c260dc553bf8e1e215f0b5ec5298838888b5bde3d36f4bc0cc3152bf4aef0ec59b367a1bc92bff68b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58792035bb60f0be2869f8559f0046d23
SHA188c7bc81452a819c8d5a7f90cfce50fadd106922
SHA256ba7f5f39bfeed28cf5f236d4d7e4a2a4ab0734eb3a230c5b888b3fc144b9bdce
SHA512b67c6b471c13af66dde6ffe9a40b6ab99bcf6a0a40c773f1218f433e598a3a9910524918db4d3db3ed090d7463a9bf589153104289eaf63ed6d17b919adaea26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6a6e40f83e0af02c623ed646720ffe0
SHA1b7e19ba2879229fafed876dd246505779a16a2d6
SHA256a1e0340c6f415ca19aca43c1f4d48c19d483430894f006627419cc9c1d33f280
SHA512eee4e61e85ccfae6c89abfa710e180cc02f903d4fd228d558d63f15effc5c8b7684c3d15ab498a67da4a475f9b45895c175d4eded72aadae8e52f75f251e0780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7c56bfc2c457954ec2f9aa9f86c3766
SHA11dc8095b7e5f6b06f9936bfc477fb7fa7cc41fad
SHA2563206e8f99247f3cdfa7ac924e7cf74e8310fa9c70b5c1ecb8117c6b876c6cbb7
SHA512a9fbbf0fc6686ccd66e8e17bab501078dee40a38389bd833f47bac604a77e038668b81db7eaa28f4aae34f07c4f91f3763713b439061f434d37e82fa8a6df195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511d379e426b2072ea4f013b050bf1e7c
SHA10f4a17de13be616d1738e621853e1b6bf2f04785
SHA2563e22bb35eea7085665066d27084b7a68807e9f9af2271b0eaea3848acae3473e
SHA51288979393c71fde5bfc6ae399d1d1fdfe7fcab3740ee75c90540c76285fdc911d58a2700a81e8cce6896de5464bd6d36edf4e09f5ce976d4a86205e258ac31849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f976f03c0f17f23078ec4ba93ba18b2
SHA14225aa3a827cc178b287c50d88a5987f97338181
SHA256d0d5d59078e9d11396a514d2f4fb1e06d0f19e811da5ef7df225be60811f32ea
SHA51270208ca4400c1252a11539b9c8743f1ec62d58207f527116cb2671be9f1db28ca69f1b4b11fadbb1fdcc15c48797116504665e1fdd917cb2913c17760643b242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566fd93dd44969f20b46268f4d7d139da
SHA15b67558ebd3d6ace8704b457303a6152b12095c7
SHA2564c143ec692ebe87e9d0b5effba7cadc7a3426472891de3733d0b31695d720a3b
SHA512e33e06095fa69ca58c2b2554eadb685fdfc2a73dea11b8e8c6e6544f7ed914cea4607931fda7e5fe641822e34f8ca765adcf4b3a470e3503da4d6be1e416c7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59df506e276ef77d34515245ca135994a
SHA1f1b7d2c26034b14df4eb4eb0226cf4e7dc3f7851
SHA2564161287dabd266b500263dca293e4c3bdb72f47e9e11aca8930ac80c4e2cd141
SHA5126bd5d9fc63fabffec512417ae382e753d5b966b9501d0e90e785157e999dbfd6083fc88b3afd8b519d9945dcc54be3a41221fad3c3f6aa6f7648735be1f9633a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51efece7259133d9ca53a591df6381c74
SHA1fdf0b8f39d364a3cc0c0d29d2759172114479068
SHA25632d758ef99ad81aafe639e5d30084442f4a37c4857d8f4d99325f260abaf4900
SHA512b262c1653b04a06084d17f7eb524485b8b203a42f5065ea2aa8f59370636c9aa547abcb03619621937ef7003c2409db5b7e991d751e7cc152ef91f3f24655fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526aa5c94b2a1a88946970b66e29c2831
SHA1e2036e1773dc1b45d7ec35d8c164e382b5047741
SHA256d183a5ef6d83f335be29e1bf54bdc1d18b4677e4caa76a4688cd6a83ecda3de6
SHA5121e256005a492978e039ca4185234b85658f4ea0942ed671937fa25f54fdd39f7c65aa329e5daf0333ab5d0a6773655e4da3bd7cc14c72febc080c6ccbe3d8c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5932924a7b787f73f2ac8443aa9e5b2d9
SHA17faf6dfc85dca1fa9673e7215e069d2ac1779c09
SHA2563887326b062cc1c808d0a9dff8c8dd8703fb30f2d671997bd7619fdd66ca75d0
SHA512ef553729a1998feb4d0b40fecbb1ecfde3557bb38a46a9f58224b515deff678a6e8674e9b69afa67f81c29e64e72617220b158d7435206d1a3523d223268a733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5197d7f76e440f04ba125948d1987866e
SHA13e0f025f68549f70f793e0b39e5f1a42c5a824a6
SHA2568e51cfec20888a2232405216448be84c326e2067712c767197047cf7b0944a72
SHA512f706d34726e9c01925ef6d08ee3f21b002ca266f7a2e2c0afa61adc440dd9a7ca0d8c291243ec37f11bf0bab47323c553f21b4f9e62d34fddc828591025d21b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a568c14c58ed7a14c65097438a5abf8
SHA1f8757f2895eaff4d1b2888f7efac143bd0a5a0be
SHA256d9b5e4763ce373af9161ef880d368e356fa26cfc0594710d98e37d002455ce65
SHA5128f18e49a2d6f010110ba73d0af9483931d9f70411d597a6c232057a5bcc73f9934de1eb45cb43032e11184c85eedadbcf209bb9d58a4a88fddb8473c44370a50
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a