Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
441ddcd2f8dcf71d932b827e0bf0ea12_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
441ddcd2f8dcf71d932b827e0bf0ea12_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
441ddcd2f8dcf71d932b827e0bf0ea12_JaffaCakes118.html
-
Size
3KB
-
MD5
441ddcd2f8dcf71d932b827e0bf0ea12
-
SHA1
fbe57edc848085033f601eb2785bc2b2bc3ff1cd
-
SHA256
8b5879f78cb69ce709567e6cc51577f9bb2ac22a8f6b15a1baf6c85beb0793d2
-
SHA512
7aafb9014abea14a375a2eea74efcafd5048c332288cf9f6180ded0dfa8138cb1aa10882eb1b4de44e2b4692e6b98275f64d229220e7894b53a896ebaaf886a6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000000d67f3131cd5898097d6d44c667db15891528619151c870c7e532729efb3abb9000000000e8000000002000020000000a22264b49b9222501e0f7b346a0e0fccf665771106a7c7e0778f65c1005a6d9e20000000aa141f3e572e041248a4893794895bd24c7e81f5e1b7a2d754b453219de42aff4000000016980d03b483b95bab7d079d194c7c1c731eee8b49d162a27b6b9b07c8b643486c14bfafe89ed7d543301b0225684ea602308620afb3693f50a5b8ea1d8e96a6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06E14651-1260-11EF-8A5C-CE787CD1CA6F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421900779" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d3a0db6ca6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2908 2068 iexplore.exe 28 PID 2068 wrote to memory of 2908 2068 iexplore.exe 28 PID 2068 wrote to memory of 2908 2068 iexplore.exe 28 PID 2068 wrote to memory of 2908 2068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\441ddcd2f8dcf71d932b827e0bf0ea12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59785e4ad5a2a7dbb2ddcdc88e46e2750
SHA16b844bec22f47c8480c0b86de02b3205e7351821
SHA2564d7153cbba08fe2649ad275cc5343f0c4cc7896f450065502372671e88b766f8
SHA512b405ae6e2d70277c90b5e2c5dc4f1893a5596ffd00e357ab23e7e154927b683559791b188b5a6e8b16e2adf897c9adf723500f888ed8a244c460df58acb312b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ae1c56f781751e9ade0538b487f86304
SHA12b1d49a0c05d71ff2f7ebd9d3eab5337dafdce9e
SHA256d9e029c1c8b057918b013d1b3da909cac8dd48dc4cc73c8361630b32d62c047b
SHA512fa0dbb51fa0979cb28e4ea54d1d962dc97e798fe7d040fa18cb855602b0f02fcb504b86cdf1eedecb5b157fa58d1ef831a42f7c54d826c90fd09d14bd42fe131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56f9e25c144dda0438314d3bbce5eb522
SHA1a81c3712e1a3ecd510631839df48004a919b9651
SHA25627136ee3a6c9f8360502373b00b304d1e0226eab14b0bfd1c5fe634342ba6c25
SHA5124d2a908fc2568113d8ca8d740127628817a4e36a8068f2346db5f688bae8fbd65475372cb39dac6851f3073793780447805067c9447b7a0d806615b513782d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD556755f3c806cb81514c8a059e8cf8f3b
SHA1490945d7d7f77cb0b65e5dcb0511476d43e22c14
SHA256f9659d209761e977f82b023e0ef59f473eb095a941428424a56b04510dac09c4
SHA512c23132b84e90a9c0ac4266eb3e3bd3add0fceab62dcf2471961c3fdec2d3c8090bc59aa24be9dd4cb0f0c8f4ad536ccf13b32b7a68a4adeab4a96a4f3c49c58d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59df291d8c2a02e8cb8887737f5be904f
SHA1ebba1d5ba3cee8fe0f258787be0213985a87cb28
SHA2569ec218afd27001b35624888d352d4d5b82f3c3a66f943902fd18234ab2b4a58b
SHA512f98924cf8be860cb55268dc1efc7f927308217f758540067351414ee9401072af4b98f47f5949b48b75e638df5f6d67aada920fda470e57eea506d26a3581070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5df4978cb0130a923e6aa14a3114da45b
SHA13a8502682126b87db60e47da93fe1c4ee7e11746
SHA256a7f29d76a72e3f04f59e9915afd619a70ede3f294215ff0b8fcd2bc5c27a4f66
SHA5121e9d927d5945b0ee8e14fff8998e997bed0eb1d04f042dd83f58154e8365469984793c087364815065bfbf52dce37a231cb5208dee7db448901b606e86425a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ef61a39761d15d1de6cb42bdc5d12eaf
SHA1e8e496843871ed5c216791fae9ebdf9b2911b00a
SHA2561e9e510db04d8e6fda0c23b21ef44262c4c394aa9e0a14c1e99550b09ca19bae
SHA512fb9e4767a9f62b15168f4edfc69e5a126d91c4868e74e020eda45ab925d58807b57e187315f10a4e928de8b731cf3742a988bfe16a83cd0eb96a70772d464030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50889a8c85d25259aaacb1c1a90bde77f
SHA1a9baf69b2b85f2d50998429288a667ae8ea2aba2
SHA256ea69910e413dbd864df72a542dbfa5ea78f21f586b706fb349a4f7b34226c818
SHA5121373d5bdb98892716f530f6bc9da464dd48fc7bb67783d5f7baa2f25076be9af758ed1a0216a151b96857f442158ce4a20f87f84459a4f240cffe011c3a5bcbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD573b1ecd36e6245075829578ad258add1
SHA15d89ebf9d44fea3ba5e9ce851e6287513b7568dc
SHA256ad76756e983ea76ad9d48db9d38a528aefa4057759e2fad4d42775916f88a66e
SHA512824bcf7a68b272440c25c51b22fa77ac08d657cfc36ecfcf948abf4f4c3ab6e7bf328c453670600fd3bf1c30299948f34b246e1b8784f50c3d0076d763757ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f30a2b054070aeed4fafc2270e1f5928
SHA1956d261e3f76550106322180e5d5784a407f3668
SHA256135a048c486163c146a51013148f546e5f806fbe585cbf7eee574be37bde6934
SHA5129b373d494fc064cedcae51af1e4cba6c58f4a3aebd044bcfe70018377f7afb4daf868808845f7e175646fd363d53bfccd542cc41773ed07bb3bb524488aad4cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f30be7da85fbd2d0f498eb16fce0eded
SHA1b9cf2c5c7db763e253e05f6bb034ee43f2a78878
SHA25605ccc0ecc20f13273bb7357408a52d5825afe33ea418c0a090dadbf932bfbb81
SHA5122bb5ada155b610caca0bd4ac4230ad480b29974a059742edeb9f75756ab3223b374fc9661a9b305dab99c0bafb7124c38de0ce53a369676eb24c20ce826daa42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD560378f42c657c268e8828c4eb99c35fc
SHA11560e89e2aac9b958bc1ce566da25b953a233283
SHA2560035e7726fbf00982f9ba983acaaeb053af2d3d0f0653cf42332cd77c2c32845
SHA5129191ac7e1801730071a4850ce9d3b21688deb07c3e5785d3cb62b28fcd259a040e047137e39eab8214b3783ba69326963f23c99293e1d1924b16774237571f7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b94ae7fb191ce46cbcee46457edb60a4
SHA10435f3c6fa5715516219f6a093180ec1eee38f7b
SHA2560333fb2c5d44ef8060aef7e314744160cb42e963303f3d8258153617eac58381
SHA51277102f83b41becc5a87e629ac88c2dc64e2dc00d2e8c5b7e7eb9276c4b3ae166f92febc8e8ef9c3fe8bbd59275e246cbf1f44bfd90db126f0aafb595143cddd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55560cc3a504786b6d387171f16a347f2
SHA1d29cb97ba27bac0df2baa13e9c6ff90b77577359
SHA25656c2a64ac31e1885beab635d35482408193a2e2da78cac0e3babcbec085713a2
SHA512df685c4133a6624b2b919454af7ebf68e16cfeefe105462df76322712ffb25a5eaa2722e0dbd6e94920a97627a5fb0545980a498445a8c18d26a609ec9a27761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57d7772cd1ac75ff713e7a4ceba0ac950
SHA1aa68bfb0042a79273c8f21e690dc82c73ce1f79c
SHA256878c4fe7dd3d75e0322a4fc1d3c94f4756eff8e326ee35a62f091230d033abfa
SHA512c3ef169ba049047cc7e3cecea7cd59b0bf1143c8020713ec75ff9044ddb1b7b4477db52febdff6502bd4886c0845093c4340d6bdf5c047d33aa4ba7e7aa60aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f5b1369a30d36d184c8dcbfe6ca39f03
SHA1f8e9133c11e77ff5e0203ba2992e276392271a7d
SHA256d92f029735beea89e3abf9637793469393981cbc7958653cdf410d7420dc1a14
SHA5122399a06718ce9f265d9027af107161a0029d11d1ac789717a5b9ad92902f7212205548c3abadec4960591e8c519393cddf436eed1c57b4c29842a59e4668aab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD527c0fc61682dc827acd2df249b5ab77c
SHA159b205f42cdcf5c4bf056a98a0e5cd261d75b4ee
SHA25641db3e2811360a0ed46cebb05887824d83dedc8d8e28b17c34cbd26a78514ba7
SHA512e09517b37171eb56ac064f2876e941fea89fd49608f4a375b5f3e4d2f89ba0e7bb9bd75da2f4636959cfcdf9877869b123abfe0aaad3f288eddd25b470242b1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51e82daeefbb1ad8028fc3dd9b7d011d6
SHA1e82eef9e0d940f2655460921b5e9d87e86e7dbfc
SHA2560dc731cf814523c4a1fd784e00d427bbd9ebb78fa0be2f3ef1217116268254aa
SHA5129782c0c9da9334aca889ff8cb22346af7ec595c0df88cb7a1bb15bd4361c914170b1fe19ac283a21e45feb93c4147cd61eafabb888e7fd4a262def184d2e09c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d7d953a176309e60f5d24fa0c6f84e9f
SHA1e9172af037a33da6d70d2476a10ed6ace321e6ff
SHA2564d6e9c193771e7989bccd54364138f24b0ad93481286137186c09e709c0abf46
SHA51220dc8c758331f739354c17cee44d23c4089c44cfb016a54c00505142355a7d4c1a6bb77ee264c6e9d315f32396c4371b1c84691f50a56342e03d51606551f095
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a