Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
4141c7af4a0c3ce14f9ebf78f49ae982_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4141c7af4a0c3ce14f9ebf78f49ae982_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
4141c7af4a0c3ce14f9ebf78f49ae982_JaffaCakes118.html
-
Size
3KB
-
MD5
4141c7af4a0c3ce14f9ebf78f49ae982
-
SHA1
06802be55b457ed579ea005e5004069300bd3fee
-
SHA256
a92e7ed36ced21caa85be699d40bb8d12cfba1dad9ebdbc09e6e921340b99609
-
SHA512
ecb16fea24932822009e67a08ebb26b83072778747961a374f466f10f2eeba2532114c80ffa7caf15311f9b71cedb9ff504992af75d8c99492358c974e544ff5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421846413" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72389F91-11E1-11EF-B54F-5EB6CE0B107A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000002b1ab43dfb070e6383b8e7779f5e32ac5c454d6009c4ef22488e44a6a4ffb88f000000000e80000000020000200000008683b4f649dc18c5c1844e8a3ab043610787b01174ece7b1e41834a2be81fceb2000000033ff11e8d981d9f3796de0cc1519afc37c75c9858da893a26841f90b1d42c43340000000c5c6f6bcb98aba926c423f6cb831bbdab9d565e32c25337114ea95bcd4f747fcf8529ddb35f247a9b4fabbc810e9bf00cd468341d1e8e2396e3bc0e297952c87 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a5ed46eea5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2924 3056 iexplore.exe 28 PID 3056 wrote to memory of 2924 3056 iexplore.exe 28 PID 3056 wrote to memory of 2924 3056 iexplore.exe 28 PID 3056 wrote to memory of 2924 3056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4141c7af4a0c3ce14f9ebf78f49ae982_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c78e98b552cf692e10e883ea5d9e60e
SHA153a9dc81ee239efa15a2c7b754b84955eabd7542
SHA2562e30b6b6151a869080d7b02f076dd99f3c0b75c9f2248a45e0e9e91eb4fb8bff
SHA5127c35044a313d548617f8b6529f2328d0c279fa6b939b55fb42553199e9de3f0cbedeba79700863d94175bdfb99d1445445c8ebfced2bf3add5c880774833bf02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56acbc916f6c4e2d380323d80490e2a8e
SHA145cc18f8b268fc09751f5af89f33a4e0a137a62f
SHA256d32edc69ba76a2c809cc905ce64430ef2f90240db258b8a102941e3584496617
SHA51222bf523e7adb8eb52bd2a79d1bfc12bea749121f6d3b454aea1f4613650c8f55361b42e4caab04fee399a3da5545ad9ffaf2dea392e783b3723206256b0526f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c119ef7b1c88421e789802b8fa54cb8
SHA1fa3823a7adbe2beb543234289baf5fca157ccf00
SHA256d110c16faed5fdf70b85b9b380e6401e13e754b6b5b1d5c016e559db4365c5fe
SHA512b29b887560afe3e4a372f2577ac1bc9e2a0b91f0953d10d60edb349ebd8f6c32e2572ef33512c1fa75eb37ce2742aae08de7c5e910273cdac22ac11412d1498d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf6d5951fb4ce6292030233299d809a0
SHA14353380eef70dc3a8399b6b6ecb038a9271dbc4c
SHA2568a7f4ca4ebd8eb699972849d9bdd245d38e3c14cd61a5436d0f86c15994a5b6b
SHA512aa74f893ad46d22f41fc7563a1f6ba0087a0e105cb075499a2a50dd1d40850810fea725c8abb1aad4f31d1bad1600049df1a93e1d74321ff2ffbdb87bd20ebfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de638874b6c92f612e021c2258e3fd2d
SHA1cd21b0c56265490229444b70ff4bd8bf1224509e
SHA2565c097f963e4e1c7744e74ba74f3e457b14f81c0701a8ad30450cb923eac7a266
SHA512927bcd52d11f0252664598c5e29c0a5815daf650b190850cf320f074ed536f744ad09a3c472e38b0bc1e4f2840f33f5a6cd62bb46384e0e2af1510c0c994ea95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588f88eaa2f58216cee309d82e3724ff8
SHA164db3a8c83545c76a405bfbb0b0f8e4b35649433
SHA256e9df2291af9276dc6aec634251444871586babef8e3c820d38d6acb34c8acb70
SHA512e2a71cab24fa8abb502809ea3ce59d75b8c6a4f93a326f1ef6f4323ccbc3cde713d2d2f4fa1805a8f381f692b4a014bf28bdcf9e0cbb2d343974a48650229528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509e8604d1a46a2bc9f42ff09507b9973
SHA1cde2b6b3f281c151f20be11926ff5465dfaedda4
SHA25690b6f8d9fcc86647029dd4f88f8c0f66d702fce3a67902b9e2d168848a7c2793
SHA512a1543d80c39e8780fa9fdca563f0cb8f8ae2945b1fe0c943d63fb8c39928083ddd50689d69166315c13f81b1a6184cafc6a8d35c240537dae111220021b99391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510413a7c029e4589533e158975ae3e05
SHA19e2d2d596688cbabc2e56a2b13e54414d7cce229
SHA256d73484f45130b68ee75fc7a1f63faef084d3fd0df4c1da739afa344490d34255
SHA512c28d9c837ced411378e160678a5f7414f7efe85965f3810e42e09fdb86d1a4852a9c4889fd5eb874094351622ad67aaff0578ad2d9aed93d9441c6e0b6c8e4f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8d4066f48db4717cf6e9e4eeefaa59f
SHA1aa0e3a1277ceb3764af090557617c74dba7a0499
SHA256646f792f135b6a1744f72f562bfe0991a57646b03cefbd156dd728eea67357db
SHA512e251c31988013fe3ae380a4f444d75699e9d80d5c6f75efd9e3c47aa476e0801dd001310ff5fe058503fae7c93f138d84ebfd7f5829090370aa90fb9a0855ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c8aabbd3204103418030351bd47880e
SHA1355e0a3877529aaaf9daa0f64a5a0a1a749d2930
SHA25615d38b37363cace710f75c795a26ce131e694d552cda9431b8d474788d711ac5
SHA5122ba6f3fd9317161bbfd282b7a8bff7a20585185b12b400382e63bd182fafd43cc1c10d14da8649e952851b2755897efb062cfe73f13742937bb3e88ec4f76413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb16f330917c6a8b4232a1eeda6d1e1b
SHA1b53c70aaf9090987d774175218e51867da22d05b
SHA25625c57bad6d5ec3d343aa1007234467af0a6a6ade67d4b1896ce744ab31cb2776
SHA5122cf04e04c7decdafda53271885698627dae6ef55240a8ed60eaf907f90ee9c57c1aa16a4f769522693562015e062a7746e176d567f14f5a6ef7dbd76fa9355d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a867fbd18c558077242da680d0b6c0e7
SHA1419d0108d4bb0dc8faff09243bd7fff2c6e44198
SHA2564e928a90f85e063b8d7d16f8e7afe0c8bf5dc469b803ddc882f6fd2c243b2f03
SHA51255d870046e52d50b44b6afae1087f76f2a1a29e3d9079f0f3e7fbad7f2b6cca2f5800470e27255ca214fbc5925a2c5cf1d3a47120cbead40448e021105b31209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a437294a684db3ddb26558d3e06ca6f
SHA1f5cabae251cec7fbae28d5f296b6036ca9c927b4
SHA256c60cf71b3cf6f49758a016d5bafb8ff1b5d3ad19eccf5e47a496f11c4020f0a9
SHA512a93d58f74f43758708e04e972faa52accd2ad3d410add9c0a31135ecc649410e89dc81ddbf9a62ac0d0393aa7a229ed0502a6e67a53fd9cd2d3644e4213c6e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc9305f2c381725930fc7dc51bcd8b06
SHA15ba5afb1e682bb6b4a226e676cca8f07d7c981d1
SHA256516bff8b8c9199f5e52852b3ed70075492aae7fe23cc632101b2503f6a2cffe7
SHA512309793c9569728b90eadb992463ebde1e8fe326aac255830da79aa24260b43c8e2a186702792b092140cc9f30615055cc625ca2ec266fe5c84779fc27386e576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d7edee4548dbd695406b5905d858ef6
SHA153b56412bd85628491ec62061aa7c843ec2e1249
SHA2567d0891ba5d81dcded09224d35150ae2e941714c2568025d3f0360e3ebcdf019c
SHA5121c304c99d0435c4ecd98fb506733e2c6d5875d3f2278cf71351adae77c13594b9b7df070a3c44968284d3529ac352d088276e1b3faa7a142622102c019d2bf7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a4dcbb39b3bed541b06df6b3a2c88d8
SHA1408ae4da1d9cf8e504d8af8221edec8f5e0c6d77
SHA2565c3dd62828ced7aeefa474b25f1202923c46124fd764cd0fa1b90d8d862f768f
SHA512a23723eaab61079d4d7de060b9da0583ce444a6f05fecea65df54daef0de9e9a4140fbf7f34726a85736e333317e43e7af6e6a7ef27de31d84b61b5e1d7d6042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2f6e4614290979a6c1f807fd712067e
SHA15a053ca24353a87022eb06d52922b11e9c31ca23
SHA2567e7d3c8f2b882b24e98043e000c6173dfc1aecb7855cee11c4fc85e2437816ca
SHA512acb18a1b406c5abb8b86a3de3505504f7d3f11df6f688ca0125bac4b0ad2f24b6521426d4722d9f36fd0f03e64001dfbb717f6470be4aa2b8e52642878dd50b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a10b49799e95064f658c5c5bd413a239
SHA1a43c40542a8744b4f1e20819cbf69a66aa01f6db
SHA2561667d499993a7f5285eee3899064d85d478646ce5889b1d8d9ab59a8d1007899
SHA512d42c7ee9b14d9fc8f05b6fe1ea575a29ba160298a45efbc1f55962605445be455c0efeb944e83c4f8d9171cd70377798b27eb6cd6c4fa7ff8849bc04c9719c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8cbfca0c6ce8fdc017f5edec63d7999
SHA1e1683fa99f1faf68a83dbcbd43743966ee6de715
SHA256bab4ea89a79c035465a2c0fb7ed3bfbbc759d18191235a50226d01679c0f3ee4
SHA512a54c3573ad0a1f9d9dc7bf10767373572f31dbecbb5dccfb99e2d9164e3cb623b776d7be6720a9b18816505feaa2e36a130938e47616ca45c3fb9dd93d9443c1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a