Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
3264e9d1255da2837b168db2a39b830c_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3264e9d1255da2837b168db2a39b830c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3264e9d1255da2837b168db2a39b830c_JaffaCakes118.html
-
Size
1KB
-
MD5
3264e9d1255da2837b168db2a39b830c
-
SHA1
0e16b1d8920e671d773933fdae4568b5bc074783
-
SHA256
59a6bb207c10c31f90a79c79fecb381d032cb79e982069d58053fa0642e7e813
-
SHA512
3ad6ed8cdd6a3e3b4d1041a139619e59dec0a5cce8823d8bb442f9270766514124497a5595a8db6e82cb2d6a2f371c1747cabf66f7d48e8f9744b45c44ae617f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705cde3450a3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000048813389622697f46338581cc7a86019c4341e455ef48e79ce343ce9f43baec1000000000e8000000002000020000000f911ccdb242a357b309bbee2349592411eead73bceb48bef48db526fbcca2d2b90000000a3aa37a48beb059dd579a19de03fc64425230cd8dd79787b57f32704b58986c149d028b0aaf3bd616da15ba7440086e6c73154eb7ec80215f202543cbf5e503efffd4abf45366a48f73e2d953044d524cac6f51b61520349174454236e87a20a96531988829c0c76441b49b0c21e67390da458845e50a438f081563c1b614bb454b2770a655ef0f72b2e372bc679b87140000000081bedbe58fb818e55f0620dbc4d0a235e1d895b4413fc5df89c4d5922df48341c53c9fe6da13dfcf17a57d7f03196462beff14b024ae9e0bd8dc3f86aeee4b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421558620" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000012e2f1549d5de9317c71e28cec8386a342997929395d0426fd9a3a68a64c895f000000000e8000000002000020000000f596baaba25f96fa705541a1503001d71704d13ebdb8dd22e802ae7b9080b89f20000000e361fc879641d2c351cad8f4d8cfec76785b9b5367ca81467e12a164f9c702df40000000c8dbfaab13d1fb5917dc8356a9cf51131cf64ad7268012bde22c4834efcd40d6da4cd1f27d50c7c1838bb0821b67e21a7e337dfef4c9c74cd77f715e80538030 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{603E64F1-0F43-11EF-8B6F-CA05972DBE1D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2488 1956 iexplore.exe 28 PID 1956 wrote to memory of 2488 1956 iexplore.exe 28 PID 1956 wrote to memory of 2488 1956 iexplore.exe 28 PID 1956 wrote to memory of 2488 1956 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3264e9d1255da2837b168db2a39b830c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56408ae68299c6a2b8abef32ec59ff3e9
SHA1d356ccfa64bb446dd8fae9b024cb9257c4134bae
SHA2567a0cdd10cfde56075e0924dab73cd1ab056afc5c09c6033800ca344a18a2e452
SHA512b36aba0eea7dca554868b3b44c5f78063b20c9126becd9407d2c3c28cba33b7694904b3e99494016006fb89d81bd4af2bab58e4f06633b89b57f791294b4ef78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59081427cd06403ba61505c4eed415dc7
SHA1ceb66224169b9c4014a6c877f7d0fc58b7b426b3
SHA256db4a95222d62faba551d9019d197d22b1de3bd7b7b1dafde37c59aa06784edf2
SHA51274f04b036f1ff55b126e7ad62b23020a7f64283f6fbc3852a886fcce28d75bb81139e9522f84141b9b147269ca0e29f05d7faa71eede4ae5ea875bdf2ffa6eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eee27b27627798042a3fb2abe3dcd894
SHA1096ca7c099b9f587fd5183e0a52730c77661668a
SHA256ef0e8529577d27d48ff2d9d6abe40acfe79fa593e45f975cfd42f605ac3f8b1f
SHA512b553c1c514f525fd02ea6b82aa851fd8ec88f9eb93d2f2eb9bebda66428d5e2badbb6563f9a03bdb2fa9e08f7c9be912ccc61be142464cb6173db42047fa89c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1d23dbc9879dc4762f2cd46a187df05
SHA116f311c8757ad9dfa2bed039f79b4d831518312f
SHA25626735183871be40e285d86714a196549fcf8702d87cfc5e310460ee9cd6fda18
SHA51229efb1394255f87b017963b6232b761633a7c6d40371b441b9017309a3dcd06e2ebec6b457eee8f9948031dfdf8025eb39f054b811686e78b26bdf6311edfdcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c087a81894a46e69c5c4a83d112e88ff
SHA1394dfed6fe7679ff934ee2e1639b4ab8aa86da04
SHA2568fbf89012bac75c332d53675519a9b398b7fa6446e0d3b75079d3d22a2ef96b6
SHA5129ff3f3b8a3343d79934bc494bbcaef5770a806c992021b922725199462f27710a094ad547b4f4cfda6f4948122bf18c6b78b7cac74470bf59e01b1d6dac1afd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e16bbb983ecaa6eaccce2b9c4dbdede0
SHA1644144afd4a4da80113df8ba9ac3009a4b941071
SHA256df51b6d58e83ffc921ee1913d419debc2ef3b3773cad0375e4bf7ec2dd993893
SHA512a3502af880e482eb2cf860d8626b018c3d839a3aec092d53a65a25609c32410ace4c1cf5684db3a3cb5c274f6878a7f0bed9f4486590fe3e507242ae621f5cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591612da02fadcc4326c2a085312b1f29
SHA16838142d02b29b73541da9611e3b857ec10bb4b2
SHA256a6814aafe50af50d71e603bd65ce4d3995129ef0527f3a31ac7b34f8cb7afe18
SHA5124096579d41f6559c0a174f38681dd2f065655390abc7bf759c76e2fb4307ae8efad15d76a35e307ba5028fd1e8a335b4b4fc496765f37ab286b761012a8570a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552b5fa66cb2524af40c2dbd9ffa8bac4
SHA113b71e22600289ee93788efb560914bee5e52e2e
SHA256120e6415bca0646a2f2d77c806d35cbcd9b5af3b4334a56703b3d25e94c273fb
SHA512a7efcd3a41335b70f941aa217736e77b33ed58ace8dc615716cb3c5ed497a2ea96378b245e54ece883ad5561a13c235aba0f3f6f9df6a7b984395abb6f803ee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5693a69c5f336e925050a1b8b3d4e8707
SHA18f8910431301932da0a42154e95aa80380090538
SHA256802d96a9e76bfb7bd3a6b011d554c7386b7045189d99333b739b71f11607547e
SHA51220fc017d18b0d7b07cd4deb2fc919e53e43a5c9214de9cb1711d1c167c9cad80ca29b4b4c2a34a418afea838cd68a8cdaab71e0686c9f84bad97d4df108949b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5775ae5f53bc9c7ff17b7b7b6c322a122
SHA10d1d1328806b34ed2f4bc9f7e8419f1a177d0fad
SHA256faa1f6ea0ae4cb2e0eede2c6dd0284b26b177483cadf700c8eb72d88e5a06874
SHA512c673851caf40bdf5e70e7f9e50ec3a40b3806c499391531c138603c9746e4a6030f7fbf1749feef7c4201812ed9672480f89640b6b92256c40755d2f5405bfac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe1e099d80635c6c77f3cfa65810150c
SHA111e5fe5356d2103d0271d5919fde77f04dc6ab78
SHA2568447bfbe56559494c266c5735b138377fe66bda530248a3fc7dad2322de667fd
SHA512a2f5cc7f497b9545ce6468931a7a4a95dfb7afeb76b50228b2790bdd95b972a9864a7adf301e5691d34be59a165bc7ef7a08bd0d884db3fd5a271fd5a6e22940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1d5f4267fea7437829e4c95792b5853
SHA14b4d532252af71b42624bc907c10d5f93d1149fc
SHA256a7dca391fc33ed39d4db7345ce93ae872f8e563471dd2b37d9234ea8f7d1e28b
SHA512cafc23ed7a38646190b71dacd72142f03a9bfa9ac9f89c4d9c76bb3839e1f7a9a8513fee8453970541e19d24b3157453a06f12b667200c0f347ada9683d0d704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7d8084a4fe27a810e5d78406f134ae8
SHA1cf969efe0ec3beb9299f587a55edb784aec16354
SHA25611cbee5a6b5fda361a5901da55341eaf5bb13f8934d1d550894c9e870fc506b1
SHA512db0d2b1080ddc44ed307a760e7fc4fa035ca7eaa0bdf342a9b36fe0b1e145e486a7744dd97d27f1999eb613bdc19dc308a3398abc230256b25e388f3fea81d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5678934b72c2b5231f5e8f636f0d78923
SHA1eec1edd3fd05cb7fc1369f28536b5bad178990a1
SHA2562967f0bfa577a08f7eb4cbe5bc15c8262c9b2378a890ab7dbbf0fc161cf82b5d
SHA5124c9d45d82e70217f4f4c527c5b9afa94e3e358cf45c1379fe64edc03c7e480efdeeb7fac2f180b5ea6c68b4f2aae3bb18f91da2331f5904723278a5902a72b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0338cdcfe303523a1adb4d9b8ea6063
SHA1fc170724758d6d2825afab4a7ed5349e6994ab73
SHA2563d131af8722e0e80586eb68a8f7083f97742977ddd7b0e2b9ca842a7a4712995
SHA512f4fd8040767e664b6363ed5a99a68cf8af71a5ff5a013ee1645a3bf3c356f87bff285ac3c03e9d8491c355de6de83f5255c4f5177dcb1405d4033fd5fd1d86b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d9cbc8c31253aa16d5d5f6368032303
SHA134e84fe5aead89c9aa1d84d12d51988a6ea2a1c3
SHA256c03b672f98e0cd0a3419d6b94292b08bc7d416d29beba451ca62f94a05e34199
SHA512de652c477c6cdc6fd8b16ce91cd5d2a9172eb7c53074374e414259b4c3d60fad3eacc4e172b64496c8dda8f8a8b045cd0b26d8a6737cc8b0215b0f23b3b56e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569a89b017208c238c7ecd1f17db8e525
SHA19ad8cb6feaad84a5b3369467963135db8ccb0a02
SHA25669ad55ed3bfea87b4c55afc04a74dabe03349712ae2fd9693cf874f4acdd76ce
SHA512f30c380b07c3e0173baff9bb742df98d6965c549ba3856d0db084e2129c352a2646b9abf9f711853105556c2c90dcc6448c097d306bc7f4d4ba74740b3631cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ed177226495ed750b6db4650121f20a
SHA181c7a3357d9ec031f9c05314bf6233667a79cf96
SHA2563c21247625bc2d85f07c9cca6be47f10d0bf08c56aa1fd2e191536208f0c52ac
SHA51257f73ff3aba292882746d1023961ff566edc50f1f19d93136151f3c1e5bfe33e5ed8f41d8a28768d1be464198e6c61d2881b1990544ae205448173dd84a2eb6b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a