Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 22:14
Static task
static1
Behavioral task
behavioral1
Sample
48470fa05cebf2ce12fad12c6fb2e770_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
48470fa05cebf2ce12fad12c6fb2e770_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
48470fa05cebf2ce12fad12c6fb2e770_JaffaCakes118.html
-
Size
1KB
-
MD5
48470fa05cebf2ce12fad12c6fb2e770
-
SHA1
f3563694a5892d80ff32813db270fa018a0c7090
-
SHA256
bca0328b7d9ce9ca5ae86a16c9de39deef4b105c3d76f076c7c7b3d4f4fa6ec4
-
SHA512
ee5a22dcff78577efb56ad5f306831e1aac4a68081e441453826c744575caf194a2bc156354a2e5bd727e09c80fc8211f343db3f6c67ee6710307f8b9ed24961
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0fde05915a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{829314B1-1308-11EF-910D-CE7E212FECBD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421973142" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000827797bcc8a21d48b6ef97dd9a6a749d00000000020000000000106600000001000020000000a2b25a68f8b7786a9d2960a68c4e3212b02fc50cc03832d745947d928c517264000000000e80000000020000200000006d06f1595a1ec215855f4074922b6879f9deb45293e33e156c5dd1b01b48020d20000000fdece7e2e15547af7a11a3d861c6467edc1034bb899b9aee7c8f1a0d2f8cc4d1400000005992e061f34ba6409188c0281da3ef308b57037a24873a17c0b4f8190ce30af970992cbd8135040e356df0755066875bd6a4000a75d5e98718ceb8032185eb36 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2220 iexplore.exe 2220 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2220 wrote to memory of 2372 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2372 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2372 2220 iexplore.exe IEXPLORE.EXE PID 2220 wrote to memory of 2372 2220 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\48470fa05cebf2ce12fad12c6fb2e770_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
252B
MD5ac1edf6b5294725f82cef82cf0f78e86
SHA17a43d990dac6ece498d0315367a15ed300188c63
SHA25688d6c437f69c0c41bc0b2e130bac12f720f00857916b1cd5292ca5768cacceb9
SHA51287b0718242670bbca20ee8c32492ca3cda09b87f85c085c55ff8d74b7126dde96e5e60bda756d402b4cb6d9ec749b90d6eca3aaf9706b887e1dfcee012df8000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5912956db58843e84eb4ee3057fce58c2
SHA1242630401b044e85e53343e6d366742eae277647
SHA2564e9a40f7f94162aa6a29a7dfcf9e5e847b2679124f3d4e841e4c2bae6bbc66ff
SHA51266332c9c78f59c60a57c9455ede6fdd8a7ab3f71077c9687e03aa9c69de43bc59fc2979218c8f1ed9b9d217a4d4c96d475840c8f544dd41a118a274c3e3e650d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD526cbb781a6bb6e49d7de9a4ef4baad75
SHA1637216800f9d16d82c881b82eb2df6d7dfeb8a4b
SHA256f187433ba750eba2ce9b76d056d005880550b2c63af2c1d5bd76d51f038e5961
SHA512a7dd996e6bbce5f6bb1f9f5f2b24aad24cc419363e7dac55c4b1ed0cf6ea5aa76d8f909627b17adfdca15b350c32e4059e2a6113726def4013e026d64ac4abbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58183fd7c31a87c8880d97c4420769f18
SHA1bfc61c6ff56b85c4613cb9030c7eb5e9944804cc
SHA25602d3b16850b4626bb113a3fa3c99be1d2ff12ba0420c9eb348c7fbe28dbf02ed
SHA512bb01fc32a0c5521691da01a3b2dcbf79f1e8bb0d76e84ff76ae963b8575f47416e30ee44a8e2228f0873f4a7802a8c565550f55d3ae3a9a1237a8aef00eb7afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e3fa0891bb5c00cc2815f32482b355c5
SHA162ed7baca89b94e11ce0a7eb4e04a041debea36f
SHA256072110dbf11573356efc76f3f5c482eecf1efa554502dc8e558e6c29254ae182
SHA512ac1530062eac8472f6c6939ab5d98f7dd53905f33e459250a855bdbac8266b8cab0448b76ef2bc94194c494a696f6a380a6728aa370cfe97ff89d3e9a3a4fd1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD539489bf9efdfe0004e08ec3f44798612
SHA1979f5da2d68d2da5fd076d62d716a4aa9720bd68
SHA256b10cf84d355a72f5ff4ec99ec9d521ef84ce192a636d340346f3fc115e5b62c8
SHA512f90abdd5f21dcf8c441d76977c5fbaf68519e7a0dbecd1bc8e304c6f513edddc143fd067086c187f2949fc0f5ec7af2752fc7468d590eb15efdb01c354f5ddcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f77cfa4cf9f32a05f9fc1dab42723a23
SHA131de805be165a1ceed0ae776cfbdfbde2f1f7621
SHA2560d6f729d27c82d11b902c2424cf48b5e9027d5e04a08dc6d49d7159afffed482
SHA512b86c47703f33c909c36eddf8711c6b5a7fe63d2b45fe5241a0ac959df13640878e3be5a73837e023ab916f974adb490078fdccb256720367339552c4b9088634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ad23bb023a08df22cd8697dd832bd872
SHA180cc4b2915703e6580a6dccd3abacbebda1361df
SHA256e4be2b40bcc5b76b55ce90b31063e10c0eaa5beabedf4e0882c8dd4be2d22d6f
SHA5121626f4cb0cda2b40d3a16add6350e549add149f3223111fe1b527e229afaa1c296c84557621ab7b9f3efaaa597306d67459547e014397e689b7d9cb410725177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d21b93f6e4f33d91fbb736b662a36271
SHA14ca4ffdd18f1c09de8db86c9598233680ebbc1cc
SHA256904aa58ac31410a0e3f8fd5525f692fec83253af907080625c070649810d82b1
SHA512a8d7959d3dcedcac6377c7cb9f7d5f18f0f27413b6e0a582b894f6b899ec0cb6ce74a3a6026fc21526504ccd32d906f0461be5733c81cb4f414dc2c65b256e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD556ca8430774912de2b2382c18359a776
SHA1cc889a945f5765d7dcc28abee4abbf6961886588
SHA2563c602cf93cfd50296f2d1b802de43657401504f1c2d1ddc7fa5c38ef1ddb6684
SHA5128b96cb439bc282b3542a9515d2b689e53b5a791da3e5190747de791dcb96a3405c5970d04bfae92452e9992f5c3ce64c2115ae7b4f486ca266b1a79887f1d94c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b9b9a9dff021223ed0b640469fca7de3
SHA1eb1f11f87425f642d64045a140126a9fbf6d43e2
SHA2562a8d69c5d6f357e07f208ecc007bed42f1f435532094e8bc5d2ade51618aaf58
SHA51283b955407108515346129d4c05218b5570ddb90e27fe4f4f60df894b4fb5491c871698a693f3491bf615aa20e1c75582d61e9dadffcaa173de2ca4b3d785f1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56d0308de87f0191de0a929df7efe80b9
SHA184c01b401bdcca3c6ca9467240be898186651556
SHA256d1d1964173aa393fa8e1721d0cd0fa476c9dbced0b2c07bb87b1b8430a6dfa0b
SHA512c5534b8a5cae24e9c5842121a47269c6e93d7bf94b263b3b6edd36b5fcb07cea5d934674fce72c29b6dc5e4e81d0aa3052f891de2840fc9853aae92d401735a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD507b0ebb91b590766be984405c86a8b61
SHA1c4a25c5a590edf97a51e878e5f8ae625eae573e6
SHA256e8669e1a53aa3a3c0e1517f8a91ebb8fb44feafb97dde61fb0caea1a8367e38d
SHA512b21340b8bcfed68ab256526f0a7b1bdfe8792f7137a789c99b4e4d1305d427eea82d83d5d30740426849419a25135ac3a9c718793b9779a3c9e5dd6614fc7387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d3bf302c4e60b069ade79add05d46fac
SHA18db5f98ab84beb14692646110189fd77b355b74c
SHA25686a138f66e85df3f54e6dac0eeada52bdfba107a0e9610c6185beada2182b4f7
SHA512ea95aed2b673510c41d73b476ee2f794fc4484c5a24e99529da5415fc2ba420568d5c0d2d6fa201492b83cfd69b5c2b8af707c0c12740c22723539f073ff9bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD56ae0adb20307d3c261d6d4c358fca4a3
SHA149d8f7d755c7edb700bc8e0253373b26620553ad
SHA25662fa5d1ac4f686a59e2395257db3aaea9e485fb21acff7c887c669d668581e9a
SHA512898ebea27e8b8514a1ac6afda68386d857f13070046dc675e532ef96748833b7912d0ecac308ce86bec58955cbb93ab16ff27fa7fa916572cc8e8ff5207f0708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.icoFilesize
4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
C:\Users\Admin\AppData\Local\Temp\Cab37C6.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar3901.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a