Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
42dc1cb38cbead6c81b6ee2ecea99246_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
42dc1cb38cbead6c81b6ee2ecea99246_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
42dc1cb38cbead6c81b6ee2ecea99246_JaffaCakes118.html
-
Size
639B
-
MD5
42dc1cb38cbead6c81b6ee2ecea99246
-
SHA1
7f4d47df1a6cfa8385dc158b9e535510c67ca412
-
SHA256
376818550778b3910bdc9099050ad36934819dff0647c6ba983cd48aa23164f2
-
SHA512
2a5363448e36cf05fabcabf2cd355a526076978d6922c1efd04dbb15806315d722903479b04a91ab7a5451a974040622d4081ea4a4b67ae4be83d5703541f138
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d648763aa6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2B1D591-122D-11EF-A1AD-46837A41B3D6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000081b4c8482a0a2a9b4a460ef99500dbaddbc090433f92dd950eaf7b7f75cf55e000000000e80000000020000200000004462dd3e10bd060a9990fd3086dc83573198a67e74fbe43f6fc02baebdac7eea200000001f474a9deb7f5b510d2943df55ecd314765e55cb4fcca31fec9040b0a3f45739400000006987c0547b9af62c9bcfeb5883bbd0ae94f93765a7040afd13883ea2ae54a70bd5a3c9b71acc807db28a3fc5e3f1a42075d79278691af2a2516b35026bc14990 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421879162" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2176 2220 iexplore.exe 28 PID 2220 wrote to memory of 2176 2220 iexplore.exe 28 PID 2220 wrote to memory of 2176 2220 iexplore.exe 28 PID 2220 wrote to memory of 2176 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42dc1cb38cbead6c81b6ee2ecea99246_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc8644df56c49c92926957de951286a7
SHA13f070b10475991c90b58361a1a5604b3f9667d3a
SHA25649d93e622a7e4caaeaa0d261a1c458fba0132040de753ce01ce9a91d548906ed
SHA51262955c965a9ec75fc62ffbb9bad43ea2846e54af5bf809b93c85782dc8d6c5ea86172cda4e6b671407c03f1747c12cb2ed86454f46a9847280bcbb1dca23da33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5badfbbc439a6680323fade469032ecaa
SHA18e96d511547b7c3bfe22cf894e733e605e41b066
SHA256ddaf176dfcddc64b1e5d10e7a24a57c2b03c4651c341957d7c0ea7989dadb2cc
SHA51208e45751de9ceab7275f0e1d004a4391633e2784ac17622ba967d45237972a8dd7084323d906c5c3c86dc53a4d2f1c56c9748ff34358ccd64e39feb4a5b37e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537b0c56625807d615816f88b9db7e258
SHA1a3ac5bf3d90591d957ad8def2c08d25e28961322
SHA256f7428ccfa09f374d2cd57f29295fca921334993decde5ee98561f5f14c003eac
SHA512f491577285afd8b6e350e494a98f7ce820f5418bac7575234207a9c81311739bb2872eebc67b1be1b05ad05635550c334067c4eac05d19ededfa540d755d1c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6db7f4717c7af93cf648144650d6822
SHA15dc572ab01d9abc6c3a3a3c82c65b3da5155fe6b
SHA256a1598f13b13f812b84a9cc1d6cbf003f8ec9e7abd474e99903e369dadd80132b
SHA51297744051495cd8a2962fa6c7ec68dc6ff096f5e48d0c61c2d7caf4156545d8a4085754445b6208e3babd793fabcf6ce4e2d695d8083c7793e6e456ec7e875f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573fc39b09eee0a27a487bddc6c96c5b1
SHA1c800d164292e8254de0f5e0090bbfef2fa8594e0
SHA256c40bbde26e8ac2f4c9af1e271c1d7daa64eab9acc37763fc801e98cc205cd63f
SHA512abaa3990bca542cbf9faf2567dddab6dd9c86c8ed3026bc120e1c2a1ff91df9cc33164c7a327eb6f879b83828cab11ab5f195c763b1b387bd46cddff6837d89f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567b28026210969211f0d39f552a59dc4
SHA18a60baba273ff3d66c514021a533259783b87e94
SHA256f332997edf8b3f7a7cfd56808a0a3f8e30b7581e08be4b85986d55ba54039e77
SHA5123e47113cc87c056dce3b3f5bb7176d3e6770847a1b37412589f2723c64729583f123a614df597de66f8cbcc67b2e39dae17987221aaac27f0a4c84631d0853c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7c408d229b95be80390fec7cd456622
SHA13bf78ae4214bbb6430fa68c2f859e9c1090ac6a4
SHA2562662304c1bb94dd25e452554ea34ef35328f6812a6efab70430735b07fb901aa
SHA5129c96d5db54a53c4ccd3be056de9ad32a7b0aeaacbfab769d1e4f1ce50614656114adbc82ed6f64a40988f71911d7ac0ac0a0bc8ce5c5c61628d25d0a2507c05c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb60c444a3387ceb5bb64e2f051b75ca
SHA1ceab457c82a1ecb0552dc2f577588d719d1f280f
SHA256364f7a5b022c077a2ec34aa466d6d6e16d353f757faf8b479690d65e5a35b2bb
SHA512980fa6d489249c072a175e717bc7536cf0b7a2e2a4e84e245b81404f178d42a733a04d0252afe57716c94fd7fbb5e66ac0802cae9e5a0d196ba5450dc9fcaf63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fcd3a2df35d478cc07ac30c5a96dc39
SHA12de0bd9a68633dcf78b1748121febc4adba175de
SHA256f06d747870ebee42e66122944024876cbc2ca8f744002d58ac9a2807b185c002
SHA512c106ae46678684aa9c427f2cd72f424599ed3aba0e387e1701d6fa95174c07c6e1697f309d5f29235d9a4eb95c49fd4b7a2c03a2d7671a7a80be06eca36358b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cf897d3d7718b215caa06999438e9f9
SHA1816c81190ac8f35346ef12c263b76ba4c16f4ed4
SHA2568824c5b985bc53c3ff0c8328da409e98d120b0c3c124d21828f0bdfafc15f9d2
SHA51290894a80949f91a6bd8ee0a366f5b420eede9c786f6ceab7c60c6685605f6fab58851cb18eee2531a951b65bccee5c05313711ed8e44e3f1b51b5d35ed678173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce9058ae3c352bcc70f943d1189d34a2
SHA1f26d8f16fc3c761cf70bad28c176bc0e4a90d44c
SHA25657dcc5931da1cb5da6a662d2cea3da1c9e25d7324dc7c2c52a49790a5a87c739
SHA512bf67a6f6cdb145d0ec147334bed56eef1586f9664f1328b65c6a15183755210118c36cb8b3000d3f2c7ac67fa3823843f0bb010529e5bd864649d6eefee67e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583a55732d3a17db61b227c8ab84e7199
SHA12f81bfc19e026db8fe7abcfdba20bb33fb55dafa
SHA25630d6037fe1e8dbdd527c636e0c2221d3f616002d0e3e0bbf13f851684adfc271
SHA512a0c7dedfe872d87329e26f5746131e78b92101b3a505449bfc51ab4d148f1c6222c0a4be201c596a0491d6c34997ef5142679139fd4bad6f9183eb3e20aca169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9465d895e3467edff568a5a1bf20f2b
SHA12eaf65df41076822610e131d6ff9d2edf9e87b4b
SHA2563539df2b8e24c2801f56d0e2e39ea11e6994bd54f918ce1c977820efd6a457cf
SHA512c51e42c9a7eda870d2750a894baae5fcd2351951fc6e1a4556cbbd6bbbee27746790e72e1c6794759df7fd94be1983afd5b56ddbf9d5cc82df76f26d9c8f92be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2f34999a61bf5cc7186a9686d3f47db
SHA1fa3c575227c66e56ece0d189997820258084d692
SHA25612ab27274f2ce66ba0a8ede1fee9e8f53bde81eb887c68aa33afce598b12640d
SHA512b6cfdbb660a004fdf60c8266e308439b8ba0b871843660548512da64cdb96b24f7c3bb15a35382346e3f68dcae3ca43507968dfd39b6a6d0220d73e6f5ae2f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5506d906bae577f91330a4810c16cb509
SHA1a9b6de7448ff7e9edc5f99232b1b84e7d2d9af00
SHA2562e077ab731ccc9900869ee2842f2c81aebbaa658afcd18cacd09f87ba2e24886
SHA512b066deefe3a62d3105babea87c15b9670e568c3e86959a49c6efbdf4a1a02785dd747f1aca82a5b0a242ad14a9196912973a5099e103741782edf191b3914587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9c4adf65dd6b0c0ae00343c38eb43d2
SHA10d5bab33644bb73df074e59e95573a40f1b54989
SHA2565f7ad499cf6e7d6b98cd1e2e1f9620d41c5d6f4557cb27c3867059a452886ffc
SHA512e114ed5b6e8d39c9996a2e982afa665d778041529cae76ccf653c153b1af7a6cad55ee570cf46ff1ac9a847bdebc87a16cfb998ffa0606419ed592fc9b9d56e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548ee7c96b6a0df5b7cbedf879280b2a2
SHA19c3c06d7632c0be275e6bfc6099091458e1aad2e
SHA25634454b6b9a3736142144bff0c44df237c33589881d49929f8e1b73882d0c696f
SHA512b37f5d0d1650e7d5797e79ef1a724de9b6847cb0ffe9f8284522af8a4ad02f6d300b7cfa6fd35624c1a53be600c29a16b1220a694e5642c58af92e6c2fe86e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59637c344c1ab9cd63e4f1a8f0021d8e9
SHA10c3d1dfb20a54be3c02b074d6d4a314acd634bea
SHA256d878428d67cdad7f47887aca681c1c73c5bd5fa1b37f30106032fdecae78774c
SHA5125db81142cdaa551ce73c5dcc12f1039ea879d174b866e0addc32bb6bc28f1c0e8cae80e75420f243261fc9669a7a7e89d40bd24624e032db4c1f3976c4bc4681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7956bb58feb73d158ce0bc57efa7522
SHA17186736d6df9afa01a63b4bbae470aab696c7492
SHA256ce1d6a9ea19a5050d5f1be72782685580e91df97fedc584557ac9b7119d17a73
SHA51252a61e24b2cbdf7599a14b0c53532441b2d5aa2c070421eaf87b83b6d4e808986ece03d89e9ee37e19901cf9e3806c347df95c41ff7553ef69e7aac535343e20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8928d4ed12ca33d273fe733e0b30340
SHA100ecee0d9b2a4055a4f7d42f629550709effa318
SHA256ef2dcaabbcb442072a0eec165ac0ae5c7ed056a4750f7044383616c27fc96a18
SHA512bf65cba8420f1ad8e60f6098d637bd59d043127e2d15e6238dbfaf547675eea954a034da9f8f9a668e6caa70e1ab549dbe714b572a2d0cbe6effd137df448602
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a