Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 09:55
Static task
static1
Behavioral task
behavioral1
Sample
4114f66d3e8b23d707e593a1d93b55d4_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4114f66d3e8b23d707e593a1d93b55d4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4114f66d3e8b23d707e593a1d93b55d4_JaffaCakes118.html
-
Size
3KB
-
MD5
4114f66d3e8b23d707e593a1d93b55d4
-
SHA1
c37c0d180d5494ea45485adc6e3e6b85c0c2460d
-
SHA256
ce7d28c5a7004ca97841ad3565441ded41495c0a65ce75e9702ce403c24b400a
-
SHA512
a4fc7bd77403d94a223e2daf31db3f8a9132a19e05a51b83ebbf733062628ef823ad66dafe90aca22415e920cb4b1c759eab5c9852a9a33fa05a88a139d34560
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421842415" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000cfe9efb813982b187ccb1d843fd086afdc0f1335c60b545a901a63b827d4a1b5000000000e8000000002000020000000eb69b9bf1c97850b9f3dd3a1b744cab292f735e16f88f76e231fb2892d6b1d5b2000000091addd63fb00d8760d860f1c4ca9bbacafcec38ab2ed8648ad7e503f8357af81400000000dbf8321bca0f2a8059437e566ae0687de900c4885ea6f04bcd8255905e138b7133b8cdf48e696d76d24fa0b0dc967dc9533d3a2a2432aec9d9a11681aa705a4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08cf1f7e4a5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{23329B71-11D8-11EF-82B1-CE167E742B8D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2528 2932 iexplore.exe 28 PID 2932 wrote to memory of 2528 2932 iexplore.exe 28 PID 2932 wrote to memory of 2528 2932 iexplore.exe 28 PID 2932 wrote to memory of 2528 2932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4114f66d3e8b23d707e593a1d93b55d4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9dbeb3638e89445a191af97ae552861
SHA1bc4f41596e602b9ce6895e7b598b746fa82231a5
SHA25643316ca7e040e456f0234053c5c5bc1a8af8d3be23e0480ff9254d3aa9e5b791
SHA512e8bdaaaf48df367fb501919caca536f336f21c09b1b1f998eb8308aa0156335cc8c0a7777cbddf1caf2c2d6624b0ed860b3986e6d6c804bc3ace50f18f6b0237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572cf24344cf53662e989b6884c9ce612
SHA1b9b46581c98c3683e73a9fc6c1249f06af962126
SHA2566824167bf8ee75862d6d8bc0ca207c81baa30b7ec571aab831b8c0e4cc551476
SHA5126a14d234439434894cb6584d6ad1e8af58f0abce302ef4fa46bf8f0811a4069badd0983f489c5de6ef602782689a1896afdb5ffbcba822c7da82d1ffad448f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578820cfba4b3fd5535b63223c6300aa8
SHA1936eec693feef1a59cd88fa2d18fce31a4e34ed5
SHA2561fd010e2231b0cc9c46c942d56fdc81db2d340d45dd36e4dbecb01ecba210d7b
SHA5124ea1a5311f3e5ea87338f2c554c6f168728f9d08d5d2bb3bcb3b9a81448f7a929ac1acaba044ecf3277d6b2b31d14e2d19649d7362edf3b171674e0d2cadf871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550928a94c28c75fc47c3030152189f1a
SHA132b94c1f4015b1b9f61b51dd631777f91f94b16e
SHA256d8adab847f690abc4a9d0abbe267fa3c71501c4d5e6368ac8ec0e2ec152e5d13
SHA512ba4ce613045bd7f3493c4503f593a7f7a02f4b3a3419ae560f3852288d04c4cf10f9462ab973db6c45744c76e8bb837f3f6df4b5b2b0fb760748cbc4c1ae7113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51722eec96cf3bb786847f467f62fffbc
SHA1b34837f2cb1eac6644e5f594874218ef2a55ae8e
SHA25614adeb4a14e80b2bed741eb998a1c18542cd179fa92fed4cf93ddb208c03bbcb
SHA512332da548987faefddf5bda193f5b31a6922799f9037bfdd00d90e76e06f085e606a6a1b5994b0684426c196c0dbc05ec3b10c02a0ff695700cee79372373397f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5691d7c15758f995296bf562bf2b9fcfa
SHA1bdb5c42f7478540eccf4d764757561bf768c3300
SHA2560ebedaebe87973e152b01e89f22edb229eec9e20e3daacd98ee9e2ebc8815bfb
SHA51222edad2a4beeb380515f60802de20daa287a0d8f9216367eaaa7dd7db6171fd9ce0a0f071e438f412699a4f35558a40ab7289136c7c2024e47cb6ea0b45a6655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566fc6e59b957a78f2a528ef5e6c7fbc4
SHA1e7111ada91218f7c1c512fad4ad2e6658e481125
SHA256b306243dd1344f32b1c65d95c046c9fefacffc059084389d74703993977bad7d
SHA512ce0d5d19b24cff106e01fd8666a72607df09caf1b6e6d426320827f7ec7b88795fe13ab2b24f0d959abd3a4a511026b6affb5e029c75442eb5f390524d7aa804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58072d5cedc66b0ef30d5816d1a574e04
SHA13a2df3196cd4b046650f636f9c38baf24d640fe8
SHA256ee7acb01378a8b1edcd966878fea631cdb1b4b3f9ccf532cf9f48de7831f0552
SHA512e349d98430fa64f706fdc3d84d5724f15ba6efd5e5742fce5f6fb9a2a079791c05cfa1b57435f1fa14f66c2dd94938a1eafd1b9dc4e57a7eda59ea8fbe39df96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd0b5ff762dda5b34c78090c13852486
SHA1d19d77a49eaa562e3f6d584d4377a8972a98a891
SHA25649dc103005324d3a9985181084a54e2f22bf2844a2e9769796b847804ba60015
SHA5120d19b6ed46d540cec24add85752ae00d5e2800a6cb2b6d8ccb1711289bef9a77e25436f6ce3c3ac6fc91f99579ca9b38f0375bb94cd27a7612484f17e32de982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a020c64b27d3d2e07ad3b08838ade7f5
SHA15c3b87dfee6927e3abc9f821f8e9cc44245138c6
SHA2563c0f32f29b7725a47e103e7d0fceb321f978b0da4b144b0881671d848dad1bec
SHA5125c00fc02bf51f359eabcedb382175b0e29dfe461333713fba5d2a363c17aabd355f394e1281d9089fcdf93b99ce5ac65db10d40b1c28fa46e9a76183dc36fd1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fffff902a6e2cb8c8e14ef1249671f7
SHA1a3f25ad0c1e2792e9ee17af75dfbff8453514a53
SHA25624069867b50cec46bbf921e7b3174610313f8658c90f58afba852f1e94d91ac1
SHA512224c24616257ffaa9d35b605a626e8e4a0ef9a33c75917162f5309cbe2920804cc69dd1aa74de386468476cde8fb28646d2cedf2ddfbc8e6e2f011150de99013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50614b11bace62f649954db467dba5e08
SHA1f318749ceff9f136978cd430dcb3b702f4e4c34c
SHA25623721d6f259eafe3a0dcf3261d552fa78a13ffc864967c074860f1da776585a1
SHA5122090322e7a60ac83179911132bb910e2239b413c1e192147f6c3a4146bd52ff5713d9db173e2c3e2bb1f0573b2aa3ac8347cdb71faf71ca2483f593e1f08aec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc330912df149844267d85f34b9383a4
SHA127633eba1549f4546e188ab6d79b864af624a5f0
SHA256e05f295a3f0f095004a7c64ca88431fe4c5bb653f7349f18ce59e86586e7963e
SHA512af7f37703b5320c80f7e1abcb254eca910a22adbf2d404671c42a6cb060bf783341f8b643f207a921c65e5eee3a212c94b99f86343667ba61d6db2bf260bd63d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bf21636df00c43c6f49eab28e30ad31
SHA11051ea13f8f980f9003060b812c0ace4dc20c234
SHA256eb4171b2eed468207d4c9e6e8a1074d290cd809519d5e60b053724e6cb782e59
SHA5120f3f5425723d0f4676b474835630114a031c5fb8addd802c51a65ec751ed7c578cc0b5bcb7d4b0a83a8025df8e9190ddb92011048682166e4b4db412a988e34b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585384d93164783acc7e7ae9edfb87a39
SHA1c01e3785a944286792a4f42dd2fdbd69c5d2fbad
SHA2561037f0a5f2f6824391db56caee73203af5cbeef5cb37c8c05714cc5e000a034f
SHA512978c3109b51264613ebc01ca93a92e6237afa246677582210fbe865de75f26655e5c9dea7c8aef4b9ab4d32ce414a05fd80d0591c8f83df03828dd48d3a67560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5370379a2a0c03d092ca4e7bc7282abfe
SHA11376cef646ecf5b44c26dee6979e6b4409eda5c5
SHA2560b2031dabe2ac48190e3f139359dc963214fa7ac6226d518287bc1554067a8ac
SHA51243b18b4e01be8986940b5b38636e488e1baf66ec6444d56b75cf106ad047666074967535dbe05b729445ac8d0e64d6135685ee5cc9fab3094215c38f6d1ee457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b9cdbc93d4a4baea007b3c0a3c80443
SHA1e0c0eaad9e87ffe496dab78490faa6708d3a94bd
SHA2565670436e203fd3ca220ea58bba1b3570d805ced424f8e22d1eecb71a40c15da1
SHA512b8ac49f3ab830d61e472c725df42640421e1b8bce7e9762085674b89c955c4200e69a0a32b07de75ee3197af6a8e02d6e668660260fa5717d38de446d97968e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9b0c8f0b16234d6faaf2cfe1ca9f364
SHA1160e020342087f10088a2aa4ebd06f6f7649df05
SHA256e120aa420bb589d9d6a5dc0817d5897b36cd1de714456cb76567969df6851ebc
SHA5125f2cd634d2203adce66fb090f9d87bb7461e88925471ff63cae39c08be0de5ab70c004e04be85b78bf70b1dcd2e959fff6003d3ea583ad9d670eee2de70c88f7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a