Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
43d636380ce7e1216226530ec8107c3d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
43d636380ce7e1216226530ec8107c3d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
43d636380ce7e1216226530ec8107c3d_JaffaCakes118.html
-
Size
848B
-
MD5
43d636380ce7e1216226530ec8107c3d
-
SHA1
dafa773cc6c4eb5468b3577059f1090818e1d380
-
SHA256
17c2448a882f1af1e16b79f24c5b632fe788f44b1fbb3bf5171065825b2ed464
-
SHA512
58edba223a5a8ce1fb1c5231744c189c45b650cd9324979d6762e72009b0ef8c21ca152cdc7f12dcd46f94d7517ae65f3bc100646276473d93f7021e09129a7c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e21d9796c693d8243905c81328069637ec1b34a7c1ffbef827126d99f71d92af000000000e80000000020000200000009b373e8c9ade6a1d7b5b74e26c5a36daa612917744cfb43d056d3cc434cddc5a2000000094699eb70ddd56fda74ed4a8777e946a4fce4eaf58ed0c9bd4b4ea7e2716257c400000009e3204b6d55f9b34e7d9fd21b9814dbd251b8d54fdf4525cbde4ded64a57fa885b99a2adf639ac3a6f96df8e0d64a1675f9d6d4219deaa6b86029572e45b6a83 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d1c89761a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C33B29D1-1254-11EF-AF3D-DA219DA76A91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421895940" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1716 iexplore.exe 1716 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 3064 1716 iexplore.exe 28 PID 1716 wrote to memory of 3064 1716 iexplore.exe 28 PID 1716 wrote to memory of 3064 1716 iexplore.exe 28 PID 1716 wrote to memory of 3064 1716 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43d636380ce7e1216226530ec8107c3d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530c14d65fa9724e43458147bb9d2e4ef
SHA10f7bad274316c755310abb088b795fbef0d09f96
SHA25634d47db97b70387b86b3eb66f0a05fb60e48b8309e88df70969059c9cbdf56a2
SHA5120077673b1e84a47b990286a488cb081109242bd87cdaaab8728d8cd48d3f8744c069a21f8c41cf0029577854e8e7b44b3d213d86e9a811b9de31213324622ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f4b6d652779fd45a0346a03347d12ac
SHA15c8b542afeafa1847399960b3d96743da66425bf
SHA256430c89cac5d947cddcb186bc6485fef2ea87e513f9c160011600c433e35eaf0b
SHA512e99ec81406d78558cb5436b7aa9833b87e2733213c378023501566f2aaefdfd3eb8c575a675dca08367d4f592b2b0b56648699ff8a8a7e46386f46ec4cb6a4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3952458b61f9229f63f7c6a21afb66f
SHA1d38826857259594e67670e8a99b2793fc0011a5b
SHA256223d389ca6180cb6d90a95159c76052fbfc20a2848dd63ccf484187c65ef3847
SHA512f1f16707a77444165315ad2081b18e627d469e5702710cb96c5249043644c28f9b7a41e6f74ad128479d4da7a1ef3126230ad0c2ed2b6087297c67ab8228c4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b52994c2dbab8f35ffbc7844fde73a59
SHA15148573d4d327075ea770fb214242881074f2502
SHA256acbc14b19a229e027879545daaf418fa6084ed0faaca15c01be00e89afbec014
SHA51228ebae398cbc69ca8c32bc7e99ef7db88cf055fd8c0ac711b3609bb7b1baf508204c73eae6a4af2528a14ee96218e4c6acaf80abfc3327d44c1e164bc69be0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b39304f051f7707d93c7c936169a5fb
SHA112512e490a42ca3f76fc6963b1e6c7b7a11a7d89
SHA256f057f76e5c505d811b541d0904f440c828fe533922f0656e4fa102e25f43230a
SHA512d7a19c83d6474fb94379efd94fc1dba6bff5ff542adf0136b879f788b03f6b3d7183c9f210c3daeeecd6bf4b890eaedfc824119e4edcb56362ab48ad7f9c5495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54abf2d3744bd612f45e1dc02392b67bf
SHA1be4388a698fe6454ae0eada632e29905acc409ca
SHA2569fe45076e05f3f609849545d067d67a3f487da2596c5cf771459058af0ca1ce6
SHA512a18c21a99647ec174673ba120bc1f328a1b478b145c338893fd76e6ba17042d6099bdd57d3d400d0d40079242128f77c0d1e4e72005f5c4d3b893a2146864896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f05dfde0b9e6f7a8207a974a67e54d7
SHA1c45d3d7b4cd5629023b346bd590564986434ed24
SHA2563f4cde5a36141e8df8f7c12cd75b4260a6dca7a188a9e6445d2dba6dd6ba7c4d
SHA512be186656ff43ebecbefc2b3471d517c105dade909f1d6162bda3a0cab4cbe94803eb52614080fe5c4998f73c97defc892343111029234bc5c802d9cbc88078c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5933c7277e0809feeaadbe2cbeddf9c5d
SHA19e9b843b1ac0b163e302f17e3dd6c4938368ee43
SHA256e03ced9a552eabd955f69a1a2679b83ce9077b031a32061eb0c69eba8d3ccbe4
SHA512a09c9043ce7499ccfddacb5bf32d2cdb736265c37b433f16224f86ee046079af60219ab09cae7549dc275dc9f4bb4ef5fcdd9b855d7754c17b1384bd57dbf572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5277b01f8772dc63e88da6f06fa3ca78e
SHA168ff702a4f3c64be262565301f899d7d8054530c
SHA25649b8979dfa8d26773011805dceb496ed7e07ec866b233a8a25fa25f10b8a6fe1
SHA5121aaaa40966ca387b168793edea97d9607668714353d9765948e0fc1c96ddf6fb60e07afd9b40e8c303abccba115b64d3816149c81a5fbc2fc8ece694158a7b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2bd73d596ab8177aa9a477a04cbdec2
SHA17ec16a8e01de3521b5b0cd7356f5204925c771d8
SHA256093d5d622d227b2ecaebf9b2f5181848325f686bdaabc83e256e4352881e197a
SHA51253425d56d7ed5bf78c6a0417073ad83921e8245d1f658b1cb3d989e5c5634a1fff2cf99833dd5184dadb45ef9c3ddab688046cab558ccd6d035ab3e6305825e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5113beaf07ca2473b93f9e5004fb4e050
SHA1bd24e6f071745332b402feb0e9053a7dec5feab2
SHA256cf96e51de49b5b19999457f57b418108b9315aee13fcd35a5a59ba2b90151533
SHA512138b2cca5de626a8d8306fb4d3d8edb2d3a890e64fc125d51014993b78d50c7c80eec0fa40cbdfb6467bf2b2bb8599ddccf9657c9833a7e3502153cde5110058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc5df52350d78c2ab8f52dd54510182e
SHA18cbbbcced460a53a79769101054f05dba749ee80
SHA256171f88dd57f908ba21a2e5d2bb67d579ff8a4ed8a7ab60a85d01ff9a69eeade8
SHA5121b8f7184cb9d5804abf7d0076e7ed5c511e34e55ab89cd21e12782ebff424f5311fd8c655309e49c7105723195ab3b816905e796673a2271888a40a71973c80e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a3dd704aaad67088b82c500fb0595cf
SHA12bfc32d5c8748c433d484ae60353c4b6f0ba7d46
SHA2567015ef2e8bff8ae80cc1c8615f4a6e8fef00ed5e3a18e204d3ec01388635fe97
SHA512f1b6e8bce2785bc7d0f40a7c4dad6bc75a485c17c3554f328a5228875dfc8784ff988b64c51f9702147970c4e87d6440e0de8ac6e3081badde062e7e9b4fc02e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e270ace74ec40f71126465b6b147be76
SHA17b9c6b6fb54b8ca83206948821f837412fa781da
SHA2568ea86d6ef4dc1dad33e3dbf31a8a0d396905cfcd785e5891162a8a79561d548a
SHA5123c90aeb5f6258e2134c40f6b98a0885d3869c681568bfe334adc87e66ab8b3dc9fe54aa6f39f4107fa735875dd8d8477d3d3f9343e452e0abfc3c7f1add95cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5672734d2f40200d81e81555916a14b7a
SHA122fbcb7769605be28f728e4cb0c1e8667ddaf5d0
SHA2567bdd668248eee4546ab12e8a66e57af43777d329dc71871715fa1347b6cc4675
SHA512a8bdea84025404ab2d6139697550ddca918c78fd2f415d94f703823af23ad5e367a45e9d89381be709a58ded3aec77a42e8ea8b2e1c178ad21776ba5001d30d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5112f190f9ea0a0bc4de9ab6d06c812c6
SHA1db7786cf5e21adfbcaf061309c4d6f0f91f55a5d
SHA256a1fef3fb5368b68cb7619aee96e2be6a49f347b0051097b28291154dbdeeffde
SHA512ece6e810c7e8dee083421d5d354d2c533809c2880a2e2dcb76e9444018ee4637ecfe460d466165f654267ae3bd96a65520229b779cb5d99ff16eb00dbdd55ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58037e22eb84b1ad0cfec1f4c8ab82782
SHA15a9c7c094be78d0c4219c3d99a69b4baa55bc5c2
SHA256b725b2340e0d4d1efb491d42e94bedbb7bb7b4708b5f50cbef59c20d43e7a2e6
SHA51204327741340c08e064c62ff2732d5488d32bc336c461f2322202ff0f3752ef5bb32efb2f5eed0da11ad21661f930563a4f84aaca93196498aa5250ce0c154640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b851038ccbc1ae956be8b8830761ad6
SHA1ed7cf854a341c9db0e0ab192c76ea5a305234760
SHA256c3b46c9f4e2c4a221156fc9925cb8d25b22594af0836c24460642f52b49c61d6
SHA512a87179b0d1c114e1db55ace6b85e49870091e33e5765b805ec9e7937deed467bb771839ff956c4de2d9bf6b665ea74c4a33994530ae7f9788f67ec47a5b6a476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51768505956a67d1114f6a223746a9230
SHA16bd0f450e5809b633eec0f1ef8c46849935ceca8
SHA2561a6599377d81846bc8885971ef5021a4585ab03d8a44cdd82f9723f0238334d2
SHA5126f23f28c08adaa1cb14d88e63eea44683075ac24a0043d877d8679590c07557c3f17f73482dd9dfe49b26ca994e566c249447d0364cd045553331957de7476dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a50957aff5d7d0f5e143ba7abd13e4e2
SHA10ea8d1b4e05484bd1c5217c380249ee6a7fcaccd
SHA256ae16387ac1b3dd2326d33094ec1ac27926f235d8ceb2ede199a3f91e99ef3574
SHA512cc55efee85ecbfa9db00a17d161f3faf2d8c7b5898a702f5d870e9a2b6ad0b94dce72515dc84d29a6d4666cf5aec9423284b4b48bdbe47ea7497e91af6393f0b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a