Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 13:49
Static task
static1
Behavioral task
behavioral1
Sample
41b92fe916df58918ecaa748253cb0fa_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
41b92fe916df58918ecaa748253cb0fa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
41b92fe916df58918ecaa748253cb0fa_JaffaCakes118.html
-
Size
2KB
-
MD5
41b92fe916df58918ecaa748253cb0fa
-
SHA1
d69c434b1e669093d2b4101e1cf00988f9e3d72a
-
SHA256
244e76fe2bd9df6d85d48fd6f6ecfde504ff5c19df83d978aab42aff235403e2
-
SHA512
e2ba1c1329b4c34d798cbd809c0dda43e602cac3840d636b897f2adf9ae9512ff1700a031037b7e932a253ce737b0bcbb8ad9a70c214bc18f08254dc0b4ed939
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000fe8c5f65032dea6db1aee76961f92b5a7aa55b71770244243e26adc3aa4923bb000000000e8000000002000020000000c131a8b57dd2f471cb4c2302b364db8a6ba1d634b4c8ea17a1ae1e6af862da93200000003bee13d2333a93f313425c3ab9f908775a9f3ff1e0e31a2e09a77804a07ad20740000000e300ba5344f0e66b3139aa0cde8865e0277ddf9d0e65775fe2bedad0aec58efa960118dc4c2acf5bdeac978921b2e8eda3b802363760e399ce097dc39ff26603 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c8d1a405a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421856448" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0224861-11F8-11EF-9B71-FAB46556C0ED} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2920 2244 iexplore.exe 28 PID 2244 wrote to memory of 2920 2244 iexplore.exe 28 PID 2244 wrote to memory of 2920 2244 iexplore.exe 28 PID 2244 wrote to memory of 2920 2244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\41b92fe916df58918ecaa748253cb0fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5258fc6c07ac178bd9e2ba6ca886ed307
SHA1f3bc0fbbecfc233cad230e2f5e40607113821b53
SHA256e87da85b92f31a4236af092291ee1be4bdc8d2b6470f1b7b7639f723aaa2661e
SHA5123ba14141175ed355317897726840273c3833b7144e2a35f10042d98d4ad9718af65aa9549cc7921fe27e10b803bd62851551ba5acddddb175dcd31bcddfe4617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e94523eee0d1116ffc1d5a0058ef11e5
SHA15afbcfaf3da2138b16e56f5572454f06bbe33c67
SHA256b5807f0c21c1e64eac126a092bb4c7f2f36dd426d95a48d2b7e007677c45a577
SHA512fc16b9f341d1670b5e87c8564cc5263c687dc5b27d69b6c551bbad6ed2faec1deb6e6ebbbffd735748bd35e3e4d1e1f8f813f689b17c93f734477543fdeddf50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1b8ba6d1d53dcad0b5adbb6746f1775
SHA14abe4611ff8e20f2c466184c104e3e3ead0e0a45
SHA256ed93309de4bbb8354761b85608865265d9446f448badd4f32388edb44c5c8c78
SHA512eb53c8c72a2bace41cce472d00222bdae9ba5da7fed05eca0963fd057815b09edede69f1d00632c583d8f1aaf1a4da1e89822334ce076c2ac83f92ff52c98c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50868dab322b40f5e10a0522b16c56e11
SHA1bd0a1b3994df0b00edd6268f0b90d2b1ced106c1
SHA256cdb8c9218c7a7a2187a3c09179de347ba8f515f32844296318b46210f7f49627
SHA5127cf3ba1f42132c40a016e4c02fbe113515f09b63893cc2267ab0fb2ccaa9e01ccc6922d0fae08d27349d9696f993f8b46e3ef23c08fa6b39d3187bd770935d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51605717abccfc930dacd581ecf44e976
SHA15ab51c69cf443743466738a7dbeda8a5bb65477f
SHA2568a558f40d762c584a475e6616a0cc795e123df1de163e64a41622528999bd6c3
SHA5126bc1a9b892b2838cb3f6303399940ada2e8541b50cd883c3247294ce01bca6e276770a23516e101940abda42538ef79da10329394a9c81c7e95d309a59129bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6febe096e2931fe2ab43182a04ddc24
SHA1248afa117c7bc80d235c133004ab96406310b7e8
SHA25624ef49644e1094fab215c3dc269fdd8e34693beaf811d11367ebb6d7f95c92b0
SHA51248ba34774bc6bd23856c298dfc6b37e8fc9dacebc2dac04fee68b64940dbdcf8bcfb503e06dc1987af8db83ca9d38d2a7a463b3a150e2992c291d48d1777bdad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d98928fb95ed403d9f4f99e42d05df64
SHA18d1f07a838052da59be9d6ed9f32fab6374d351b
SHA256da7a1846dbbafecbc94cee2883cb010997dffc9e67c13d5a9bb854443643e882
SHA5121e3efa1825380b39eac014f4f27111581165e34e40074caa96a0095faf1350fb99727755318e179f3ad2d7df07a58bb7be483af4ff6fed26c752adab62055f26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5217f1dd617a9a56d8f76b72404a71442
SHA127b4a4d6ba1f608045b5fe2aa77e96f4e105cbb3
SHA256a95ff04149f7bee0349817bda97fe7b3cad805986f70926c94b5bde2e2ae0c22
SHA512a5600c78408cad5ffe536770a543afeac582d4d3ebfc8c198c1bb61150a510936872ab93b4f59f73b2dc26f4cd6917d311fe31a8fbd88222321aac57354a57ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d85207048b18b645d4f2cc7b6099a9ac
SHA19084d4dc4891fd7ef5ff94f06b16c3bd7773f48f
SHA256144e995b9e6ea03182cf129084fe20cc3f35ea8df431d731e556e7d3c26c4180
SHA512c91601f6f13d05a0ce1d0f0a33bd0428ccfe0a8126dcb161398544611be83a752cfdeccd55961b5a4fd8e508cd8af9dade71b52c1f7fdedd227f438acb6f2a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a31906ab10af94613a7f217c6dc2212
SHA1a35b426d3a9e6d7ea713186650aef4cb34340414
SHA2561ca7b01bb7ae6964aafdd35283dde2b20461160c62606e92617478bb5bd738b0
SHA512032a4d4a1cff5122ba7009443e75e3c573cef008125d5bfd294cf3afa457353a8136572998b5d03cc5b7320bb9bd7ce24eafd4d732d3e1d1d1d16c64224bf2dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53329f4b0b545f5666d6d18dbb06d9990
SHA1e3d5711b5d624713c400e1656854ded6754db97d
SHA25667705ac14ab72e3145ea9ac2b55563a40d34409e7993347cde784b1e672ae1ea
SHA512579d9d625eada51ab0d77ee7ce408dd11f092ecbb488582d297d44a0e5260f0ec5a40aed84f9c363ff8fcdf424b7fd38909a32762f97468c19fbd20420045a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6096fdd1c2e99eea7518cb2db1a681a
SHA10819620609c87f6771e7b17ce38b84d36e3dbf53
SHA256e1f6ca250497e1f3955e8d52f4fa6aacc44a1554f5961224b5527dbce0b7f1a9
SHA5126cb3ca7c80698e13088ff08f66fb8273316c8599bc5568c6b03566de6cd203c995f124ae9faeb147a5537e437a172bc7e3f2633093b7f6d673eb077445d95cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f70bfd5d42cdb06e03a24fc83c76a978
SHA1739152e9e1052bc1a4268ce0da534502105829da
SHA25676e2fd54f8952c1987f843b5db917b8a4c568eff753a4a1ee112230ebc640907
SHA51230eb9afb9c0c888e1a0caa3cadac51a22c1af9a61846d274d1550eb7c361af6aaee77ac494fdb2f08cadfa246615cbc1b29e2aac3d66c086869371aacfa5cd05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd24449ece89ca1dbdda089d0d10deb1
SHA1ef7209f18240baa64165998690db54efbea22a08
SHA2568a75e5e01cd49f1f82caebcb1085d4a33c5e578680e3b5bd6f146cd28a3ff6a1
SHA512129b1bce0d8efeebef8c2ca6b0b8e2093f236ef9a290f95007a001d92db48882b74ad785fb7aba84d56b181b5b7e2308138214ab9b4c215926bfca9fa3bae788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543b9dffcd6aff673a433dddb3fbfe8ba
SHA18b724830b1ff82fee1c56c03a7bf5705c066015f
SHA2568de22b4c2bb6518f0757082e20b4faba0eb54f7194a6dae5ea62ca2be72c92d4
SHA51276bccbac40f7e2fd062d70e462c74edd4acc6614e6f3841aae199afe6156a9194d4b689571ca0243678978dc071185c54d4d4acee06f4fee1baddbdc48ecd004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dbfe06f0ddf0f7aab97669c87d3086c
SHA1a96a8302045c7fcd68c1c8cdc6f92b60b0f8ccb4
SHA256bcaf073e04768d650ed14064773e02605afbd97add2f741d6a59b05150f825dc
SHA512165f5cc99c444a7a98f6eeb3bc6b9beed32e5559f2f31345d9467f4fb4f0af6aa1da065b98d2ea9e7f65943d77fcaf02d5a2bf51f5d04efff05e5024efed3cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c835bcb1f3cd2c3dee60055c4af1a28b
SHA1e6636cbc2c24ebec9183ab2ea02486891866e811
SHA2567876f31f79a18f8351cc102ac667cc989123fb8f5d4549a7d2e910fcc93d531d
SHA5129c007e1a1641655fb42cca4cd47cd8f76c1b211e92090a7ed3959dd9887f35bfa254807682d3a7ff1ccf5dffef9bd1e7f9feaf7013aa0cf278367ed5d5944052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7b9d7196eb0a236bce4535246e7ce7f
SHA12f7be45c69ec5104205d22cecda170ecfec5cd6c
SHA256e2730737fb4e4a982fd918d39249d26fabc4c61ba26d8d86b3da619f2ba4a2a3
SHA5122093a1e2f61ffd4d415944f541a2190dabda45ad82e30b4c4e92a93cb2c7d4191bea7c71b39a34fd6e707c93c1da9eb76d6a1594e1d01e409abe215b950de64b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567a60747d8f9d39e9a928829eb977038
SHA1b87e4d9f1bc9d52fe9f31813ab6faf40a428f2ef
SHA256d5a0c29ff1f46c8ce288ee02ddc7fab8d4e7189e9b856b79b31a3d15c3b9e41f
SHA5122d62b00adbbd82690f17308cb0734b142d09e2d409f3ac1490b4fa5d7589c9bae568296f5b44ea6a35c7d94a7b51be2f006db07329ee5f7e1f175d2833e45992
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a