Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 22:13
Static task
static1
Behavioral task
behavioral1
Sample
48462613e4d53f2ef2cc247bb743da6e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
48462613e4d53f2ef2cc247bb743da6e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
48462613e4d53f2ef2cc247bb743da6e_JaffaCakes118.html
-
Size
2KB
-
MD5
48462613e4d53f2ef2cc247bb743da6e
-
SHA1
34ea5ebaebc0592167270317fd0e0ec13e4cab5d
-
SHA256
eef4e5c212c6718af2464751f68b8c9ddaa445a12f4c34c7b72b209ed6dc52df
-
SHA512
2cc0ec7b72ee6453a89d984f91b5b27c2962653575cac2eacc0f1d1a363275e20b0662ae577cd413e813f29cac8d65f9604d95ed775ec1194d22257ae3ef9ae5
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000afaeed1ad85c017a5671d894a3d2ee1e3f03e9e3bc2baadf6a343c8391ef00a8000000000e8000000002000020000000ff0ce1100b5e61fd48b17ebca9798ddf889a005f8b23323396ca80da5360f6e420000000e350de12c2383fd6e5c33902491389a2f78686fe92dd2df2621958ee5b1b862f40000000cd636d6193c4a11c5777480ebfc37485456b56e16ad06a35b278cadfb36974f382ab320dbba8d3a635f77aec99617cfd7cbff207cc4b93f2f7223829ae90efd5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4012133e15a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{698819C1-1308-11EF-9FEE-EA42E82B8F01} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421973100" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2904 iexplore.exe 2904 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2904 wrote to memory of 2484 2904 iexplore.exe IEXPLORE.EXE PID 2904 wrote to memory of 2484 2904 iexplore.exe IEXPLORE.EXE PID 2904 wrote to memory of 2484 2904 iexplore.exe IEXPLORE.EXE PID 2904 wrote to memory of 2484 2904 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\48462613e4d53f2ef2cc247bb743da6e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53b64c530d798169f38e1faa7ee39e60a
SHA1a1213a23b59eea4376e286aba32ea3ac1f8018ab
SHA25616f535767d0682ebae0ec83b531f435249dcfd4dadfd38480b3ee2f347f54410
SHA5121b99c693fa730c1086f9ed5007de74dfca47205c65f9aadde71a41a2c1822465ea6d9b55bf94df7f4546793a0683af297ee53536b35267bb4c68e552332c484f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c8a562ee664f5ecaa1f9276e5f69981f
SHA128d6dc8a7b9e8a1cefc311f520c35814c9fee5d0
SHA2569040fb54e26e7dfc07c8f09d1c928427887b8c691285464d2d929332b3ee2ddb
SHA512699faa38765d8c3109bad9c9455efd8331f45db6538e49ed114cb07e5ff33e092500d9eebfa7bc8c55f05dcb69db5cf07eaeb1934f0f51f5ace27b0d8dbb8bb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58bb9f488152dbb0ccb2ef25e0c089b18
SHA11a913bb9050fcd6c549f29fd831c016da9e9ada1
SHA2561632442150c9b1a8fde9a581cb680368ed8fd79d27a74175d93308ebf75297ae
SHA5124080b7abb842cb14b062d0299c285647f27085366db87a43737b8323b69739f426f5f50fc45eaedbce2a1a455506d56d8fa38cce62b82548bb82a02ddd9a479c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e26dc6e84ae592916e2cd1432d741c16
SHA1875331b4150d269d6df21aa68b1854ed12323e1c
SHA2569a75ffd3be3063c670cd89e090beb11f995b604a3fd491bc0dc2637a47e0a913
SHA512264bfe7a5ee31695c94448a5c5954abf353039b36a5ea8722fae1db54f63b2985976af9fc369e39d54b1fbdf98e2f23fb60f48361c43a42a6c1a15667e6b1d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59c9f8dced58da1b6260725789e34b910
SHA1741807f3b82062909621fcd8b2ff51c578afbca7
SHA256fba97ee8b23412d7269a96f4ca88b120d4c35ec208dd4944eb85dce8168aaa59
SHA512d020cc98915c9e941c48b3a4a7ee5bd6fa1d410c066a130f45e4c27f79e42fea5d88a9b9e7a324050fd9ca6a1de04d180af1db9680beeba45e5ddaa5424bdf24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD535a7e5f9a877c9611c44370b81995502
SHA1a6fb64dcb536444289cc6a7870c32593bc9c37ef
SHA25656c957b638853ec40971835b09e0be7ca8ca070a9b8a4a25ddad41045f0dc200
SHA512bd2a32b3e45b5fed337244190ad117d9ec376eeda6ee79e056ee21ab4207ce114968fb61c9be4ec4948b671efc92aa311bb2a43529582561df426bebc29514b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD576b5b7fb5560f503cb29f6f8d5c7908e
SHA18a1ccc68dfc53243ad398366d1bef6bd94199165
SHA2568ff4884d9f0b5cdfc0350eb81050c2eabe351a8b8680f217e92e132ad5bbd7db
SHA512b8a9189c8b2a0d970eb882bf90831fb15013ce4dffc69d78c7210e8474d269b7b456574742903e4151b7d7cfd06958b918a7a29a3e835901e54f354a46f47bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5700fbda59352dccfe270a5dc6080ed11
SHA1048fc8bd4a12a9ab75afc6cecaeb6b717c92c323
SHA2560679355105deb2ba898c4a73f0aeb50f210a0f7d3f3b900ce27b408869249898
SHA512415008fcec630b57b40fa0ad9386575c0d633b16a51f9bb65a4fa27c40f75ba44145ad169554ddac6c82254ba059b4dfc53dec0d71172f6fa23427ed84559021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e38f8919918bd12e4971638247234f30
SHA1c7ba9b44885e114207cb1e41c663b82771670d63
SHA2563623c99c406d96388a8d07fbe43b1fa26c3d85dfc5401e0163e0c519d278439b
SHA51248d98370597ee2b33f4906b857bb9d6a519537133e773034eb473398db9bf0b3ef2f70b4097bc4a5450a77ed0712fc1a174b96ce55aabff1b32c4a22a60f7d46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52d2dfb8d920e80205fa6d0cfa0f7a9ee
SHA1281daa3e420db2f8ca467d39605a249bad0e0c58
SHA256cb1f1c4f61e99a0a1184562cfefcef9a2e933a2ec2c8dad64147f0d6fb591e3d
SHA512252125ef37f104916b49a15294065c4e0405c0f85569d64cdfd7abaac090d6b710fad6e155ddd228bc3097e65a49ee35a5411350dabd38cb973fe68b14bb807b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5062724fe747471e5f52874e0937e7746
SHA1b9d5c3b4122787d82fd664d10e3ae7f8bde5ca3a
SHA256ae29a13065a3bd836a0679fee99b53d5d6d59b7b97ffd6da519c5cb1c5156706
SHA5129f4fe53c2f11b6599123893d2d2e02db2fcdb9912aa8449d7a1fd3db4e738ee29e0effcba0353042a97072ddc33ef9e42e96c159529a6891b980905e75029f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f53a9921be932d3f20df8c60a11f159a
SHA1bc2cccf68ef0aad4315acd5de599e4d0887aecd0
SHA256009169bd69d5c6f16306bc323908295b6e67ac458ac7eeb2e54acab87e871e14
SHA51280a75a30b01f9178bd7a455d8df54d4c43bd08c73b511dce9a2c7a2b80a692c9467c43ab29ee204b824b346e45ce81da10d8efd60d259d9c5150df65a155ce6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ffcf78cae9146f39cd44b495a5822592
SHA164bcedb0628986bf6bbb6799bde12f65238c313b
SHA25678dfc635bcfb7b26edc90df673d9cd2f7fa42d06f0df51e158e5562b1f8286ee
SHA5123c2ce47d6d7084055e86f88db0dbd6c3528554ade3f39072cbe9211840b341e934f4399f75f6c8be5a3d2b1adac115dd6396424c1dc390ad07c58a32fdc83bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ef03ce83d215adab8a33687b8bd42217
SHA1950d9f73f3da60b104f2008f689d1af59b7b8404
SHA256375ccbef7a2dcaf67be6833f0826b1aaa7a4804560cb18c2b106a2f370cb4e15
SHA51234498ce3641091698065bcca07e66cc10dca6796cb724a745a1583f0b09a7f903150c3715f5fd1446d973e3f1a51f912727ea80ca8475d502dc1bd74049dac28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD534687e395b4193cb5e7cf911ef107d2c
SHA1c4a4caee16d2e392422002cca7860d0758ea494c
SHA25662da88ea7d1941d1eb86d4963faabcecd84a19bb229c43081ff076da225230f1
SHA512dd4fd2844538d4fd4f7ba68e06bbd57a473fbb0c6ad4e8e539e7d5de0ce3c5a3645d79592de1ae9a72d491cc276da288b4ccae059e9d433ad6b2ea5bd26a869f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5199e1ebcbf55d24647d43266ea66f497
SHA1a50c0d9c96bf2ca91be58a42bcedb58876ce775e
SHA25658fb1211721bf4ac437df61814c7a3c4872151fee470b44fc8b29bdd75c4adc8
SHA5122f249658ce280eca531613579df7e9bb5fd235acd5be577f67e9144645407c3bab6e51116658c24da35b9736d783a8ef39ce0f1770fa3b1024a3e5724fd391ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5dd1a10bcd4011c3df2611116524fc7ad
SHA16d594af7e325a21428a34c067a1858516071a225
SHA256555c29f40e470520cfc1391e7ca375c64e429831e6a75bc73516339974197083
SHA512f2cfee7e39f2f45dc0b4d7586f38216e55a71c271dcbaf479c3eef87c8b49b2529aa2fa4c4bed1e679b9a91c43e9109dfa83ca9184efd4a1d10f464cd0eb71ee
-
C:\Users\Admin\AppData\Local\Temp\Cab2AFA.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar2BCC.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a