Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
4314fcd9aeb01447a61bdd4ad823c28b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4314fcd9aeb01447a61bdd4ad823c28b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4314fcd9aeb01447a61bdd4ad823c28b_JaffaCakes118.html
-
Size
332B
-
MD5
4314fcd9aeb01447a61bdd4ad823c28b
-
SHA1
124c76a7b1b98c76d05aea6f305455f5df1a0d36
-
SHA256
60c1451b293fae96fa91b040ac14f339552958047b8053820c8798922835909b
-
SHA512
42402638773518d0a2f1c06f7e56e3ce6234e66031e442d3243220e8de28475f77204e43c9a45beed561832051248b5a7cc1c333d2ad805d8589415a8df33693
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EA27D11-1236-11EF-88AC-F2AB90EC9A26} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421882780" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000eb893163bd13a5ba77ac12387b8ca2a7d7c259dd38b918687a56e2044e0cf435000000000e80000000020000200000009e647db1f7a4314f8b01df9b3d5b76ea67f5883452cfaf9df274b0e57e96d16e200000004976dc1ab437e3031f6fbe8fbdf69eaf6cb44434d8936c22ba5ebc6448db79e140000000c92b26ef48dcce49e4391daffee31898535125824ba6bdb483fb0219950095422d07c71f20f0146996220c573741ac890ca4e8a02fcfc2b380c5aa2e547554c2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08138f342a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 3048 2248 iexplore.exe 28 PID 2248 wrote to memory of 3048 2248 iexplore.exe 28 PID 2248 wrote to memory of 3048 2248 iexplore.exe 28 PID 2248 wrote to memory of 3048 2248 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4314fcd9aeb01447a61bdd4ad823c28b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56de12c9186fe8dbb82f522610c07a4db
SHA1215958972ed50a4a2ef2dfd84a3686db97f92d7b
SHA256f2fcc59cd7076656b9036042c7805fd86f7deef6747c30ffda25919866e1b4ef
SHA5121cf518362de9a34aee00d26cf2c35c3962fb9f4fef6c81a6d2902be18b8bb238dc16ff985bf241af7437e33b7eb09ec776fb3c75b5d3ed633b218bae79874f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5653ec6b375659703e99ae8f126dae41a
SHA1949213c835951d910faf25ce0dbba65391cb7ab8
SHA2560ce3998a60effa277dd3c5f24741a7ccb91a47e62be0c8648725be1773d109e8
SHA512fcb12b3c9373f0e90902ddddceb517558cd26a644127ad86736e6cf2330c834f3dbacc4ac6d3b39d742d9d9a8d0fab349aea64a812e58e4de8fda0e149bc483b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570252ac2c3cde02b634dc0cf9bfb8e3e
SHA1e7e6b5cc5d0d23ad88bc91e418bedbf48224dd62
SHA256073057a83fa60335a3953cded4a1316598bb6cc7e08c0368aeed91f9c41a3d87
SHA512f04b1f33437beaeef2c28ab3b2adc6383e6b55e71e3156a3f9030634af2a30d73777cde748595ed7cebf963b9c74c0dc5d75fe75a225e215b37be16374abf94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b95f82eff8b1a28c6ad0071da6e4c11d
SHA1b314e02a40f6758f82479e4f0cad080f008cfda6
SHA256d13a80df2f0a284649334846483fef9b4a3f1bad120fa536921ba13a4159cc34
SHA512e8ec80c7ae3ececa37f15e0af99fb1e19de85e16f28e426dc846e48f57c8b1334b340f7733c159b8365ae33ab1bc9526f47cc790581e41ea17107ad4a27ba7b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d246a4f4a9ca36060251cd0aad090a56
SHA1cb260c1429cf0f25ba5cd61eff6f350de61bcee5
SHA256337ce60b1ef81868f51c617e90623d9aecd64648247589be24d691c21f438103
SHA51232525f69e864640005cb6fbdcfb747a9ca4372fb9b5dd1883dd8d8ccfffd92e5cdced144493e1ebbe92c32a30baa98038fc832f91c9ef19a3a0bb93c859eeae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522c307ea7803395d9a731ba8d4a7bfde
SHA1615be6c2a859e602d8a87650524d8beb702b283d
SHA25640395c6a07b0864f02d106534cef8f1e22f9c7031245829c7d60b0eeeaa98543
SHA5128e25186ea67e744abe4ab16bfdb14724e3038e95b224940af66ce96c0512e389ffc0d0da53fd0dcf1648ae5f777767d6933999bfe12fdba0a7c9264d3cb90a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d14ce690bbe5f600855e5e79daa5a0af
SHA12dde8b9535a65ea589b465eb7959764f436f5cac
SHA2567586e22698f1df72fcc7af266a171de639ee2c9391e69aed7561daef1d7ce654
SHA5124aa0f40fc13b953c22f0aa141cdaab2dea5fa8f95aea52a070a359d7b68f585df3e0f4906ef7b1f86b023afdc2f6ee78d6cecc1f3907bc0162f55120713a85f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51afaf3af0baa3d2fca41630646bc47d2
SHA1e74533a22d2b83f45c6c18f9694ec40c77a29ae1
SHA2560fdf3b49fae65eb6538fbae9a8b14d9ae21e88d3d00771c977097e89e2b6062b
SHA5124af53b37e80a36873cf9555898dcc29225b92eed7338c9d30161b1ef26c7b412546826f8f820de25ec419a84e43edd91ec0f3ad71933ddcab582dd9713972514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1e32f7f10addcf19fb497d28ff547b8
SHA111bd73458b9eb951992d4d2b126977fc1c9bdd3b
SHA2565ca007902ec9c98de51063810d6d62d4a0246f42dc4d91440495a384a81e39a1
SHA51280546a03d25eaf887875b12ddca88c638eaed6940097450d20dccd5a87bd38d2a5df2d9fa8cfb663336f45ba5d1f735192096dd8414c879fd157cc7c7b1e1de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccf99a921cff4272d6ee14cd49301dc4
SHA14b1b5371c6bd8f3a89d11d95e9a9dc068af46d42
SHA2563d19b0f2d397c2018dc62b31a51823f267c7da3f4482d122a4e6ae51c7c10985
SHA5127786763fd37e4306dff14391e3e4a8ad371253a6e88f37eedcf573f9b8a5c3855220f8aa5a581fd76d7696fb1859a390e905d3a8e0f01490533420fdc1c68794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534769842785ce0f3763c0c282288bb8e
SHA1b3f016e623e6335afc8383b02b2844273fcdda3c
SHA2567254f8e328957c1fc2e8a6ffe53a3d1fd3744d5a0c304cdc2717f995ec9a75b4
SHA5127308594ff7992f9d430a36c3cdb608f0be3f27974ab4e62e619d2951b12f143ef4ebf331aa6f2f470a5779fe97e740241629a7475d7b40082b95b525b2756f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a630a65d7be819f06776bf2529d304d
SHA15789e658aafa0e3cb08476b2e63784c5c7483d5a
SHA256ad95b2504ef0a5716646ed67bcdde8f263f1654620a52f9fa409ddcb7f22239c
SHA5121db28f32b215589d1970b0ed7b824475d62d1ca8a174836931993d00473fa8e8d66cc6ef2895acd7344ca949b345cc0324471dca3f6e97c8cf158360870f0b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4dce2b3d9ef62eb3e2c28842f9bb739
SHA1c9fef4721cddbb7b7e36898eb1497ba6335128ce
SHA2566a35bfc2e7b9166af769423fc3903f7474094ad8cf7f8d2f5fde2515a5f9197d
SHA512032b22ddff825be4aaf1d94176e737e715d0920bd0fcd14ae8f46651a585e126fff1e9f9d230169c2c1d744bf568568d5201a3652cf4446dfaeddd87e8ed7caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f085ae29a4f16641008f7e10a397f16d
SHA1f396b6549bb872d11d46e7fd3e55e1dbf38bcdf5
SHA25697c9bbf0057ecd8ba16b83f770ab30cc26c1db2571749e3def61de9bf39f5baf
SHA512d0662dc9394731e1187fce297a8c1bb3fc4dccb021977c1f1e805322f1370b6aa735cfdab0cbe7e6bbc59990a702ff4433cf92ce5e6e00435e0433345ee4f5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b209cbe440692196d090118ca6140bf0
SHA1deb8c2d4508abc716eac77cdc604ae64412c1f2b
SHA256cd6f61a6bc1e572838f50dffb87c5baff4df6a4aad4c7800ec36f263d2dfbd72
SHA51263cad631ac72915f9c8c72587017ecc772041934403d581dce9c24e07fa573c4ebc776a008e57443e2b4b8c629dac7ad90e144cc37cbf83a235219213a1df7f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0e708d1613759ba466bc9dc5e4e3a18
SHA14dba4a7eed40e9944c4f611babbf89c237eb1576
SHA256d8868b82215fe037cc3bcdd6422e58d1cfe4ab6be257d4381965c7b7ac6ba08f
SHA51277d2b5622d846db9f4c1d1ca944e468a2edc8cb05ed6f7ee9bde03d3ed538e55f77713f803174eecb22e21bf3e76806df8c6faf5b588f2fda7e121ddbaf37d08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fca6124ceee4665655f469d58b627ac6
SHA197613de8b98b796b27e34d0e2ce5dda1cb923933
SHA25651db1e3a4e1568d5bccdf1136fc356dc49bb75899c8570032f60e679edf14538
SHA5122bbb11461873025d06c4e44858e49780d596af66360e6b4e8604d0c2aedfa7b11a3d983054dc49ac88c63cebe3f9c06f1d8ce0b12699bc3891bbd9bf89295165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0035130818086d586259b2e7664e50b
SHA154fbeccc0273a1fb1349284e522e0302bc7c1bd9
SHA256e2d7856a06e4c3e6212f08a38244dc5a1789588c8ddd8f2336220b2e0d94aec5
SHA512e571b8f48ac2c86bfed472875de730b12e13114b119543b3666ed70a562a5c86f4fc7d79c8dd559a96d49a3133deb4591ab99164cbad23b0f284c0f820158071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d4a56e88f7f43c93c8b56903a005430
SHA1ce55e83e207496153c2a930535bc9cdfd6a3be82
SHA256a4fa78a62ec8ffcd8e827839e1dadc972c6c9ccc8716cf92c9afae994fc42db4
SHA512f9a8ddae5f68a80550c34aed4612afadb0eefc04cfc7c26ee08eed6a0fea96ba36ff1f4fb40ae20c9cfa472ea3a830ec1261dc9ffa3978fac9e03b4a2984c6eb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a