Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 16:02
Static task
static1
Behavioral task
behavioral1
Sample
46ed492efc9de2c61dfc70c0b4b6ff79_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
46ed492efc9de2c61dfc70c0b4b6ff79_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
46ed492efc9de2c61dfc70c0b4b6ff79_JaffaCakes118.html
-
Size
2KB
-
MD5
46ed492efc9de2c61dfc70c0b4b6ff79
-
SHA1
4c553a9d52dc07622d9f0d2201e4f1206fee2671
-
SHA256
72e223c15b07fd1fc8dfa63f572eb3185bb830190dd8acc6cb8aa8b4cfdfcf2f
-
SHA512
9a6b32359b8fed2955565bdaa97136eaf57212b7b48cce90a10a49db69ae7ec9ae43f3208d42df8ae63751f0ab5c086c929cbe5219ddd2818b5d3f5485f73608
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{860B3981-12D4-11EF-A40F-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421950814" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000055f4d9dc43a120685ce0499feb6119b24b35cb375ebc0bdd9088e07901e32ef2000000000e8000000002000020000000fc466094cae115733a2e8dd5d6b730b7d9fd1afa1c535edaeff29bd1238d6607200000000656d6587187fce9ce02d2e6ccd9f837c1ae812b47eb4d8f11126f38340fe25d4000000039e60d7890336cc09a985fefab0335fee8e9d1e92420e2e264a0d9ecea35743c92a8754466522a7a310284ceeccebd2bcad76556811548343e53fee5214ecd20 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7097895ae1a6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2476 3000 iexplore.exe 28 PID 3000 wrote to memory of 2476 3000 iexplore.exe 28 PID 3000 wrote to memory of 2476 3000 iexplore.exe 28 PID 3000 wrote to memory of 2476 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46ed492efc9de2c61dfc70c0b4b6ff79_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a73ef76f28fdc500e2e2a977b71d077
SHA15bbfc5af0672d6b1065f0deaabf59a80c4631741
SHA256aa480a843c64bca0c1c4204aa7c43b2997864cbc34f4660e2b030a5876fa6358
SHA5124f25f53ce07b1afa4489def97cd2e5b24d6443288a0cd906b5bc44d3fb052c2f772bf60b07d28ab9d291401c481fe77124b25b5bef34f1c6a1264f96a98b8993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527d104bf150360dda75ef8cc5e9b601d
SHA10683e0b5d8591808de6ab664f9a25983929d0bf7
SHA25643b284a2a5ff15e485bbaf234f5d05c754faf158b93bf8e198227c4a99f13e19
SHA512feae30f9e9a1ab2c1051e8b2e8abd1594b99a47c6ce2f09dad97c2c7abf5e11b0121664fd76cfd2a514cb988e7c78c02194ecafd204b54ef11c68ed9a79053bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a03e0b4dcff87fcef14d470370733159
SHA145b7f25f05d2100b2c04091d0875689bb2078eaf
SHA2560a2644fd3b38c9db5bafd9d5c318bce65891b2bdec4eee6bc75eed12b96caebb
SHA512a2c0df2bc0fbd720036172e9a67ea5c1102286cac64fb34dc988f23880c7f527a61f69f4e08c5ec7ecd9fedaeb90552a8cb2b090d1dfccf75a16b0c38e57b136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dd48d2fec060abab0bae6dc23346631
SHA10924a11a02117c622be0f84a3d778f1217e9b9c8
SHA2569e6bff5cbccbe734bd0a1e04b3fd34aa6a7923021dd4975ee8803a2e83b527d9
SHA51256e317d5a60d2ad476d7e9c574a132aba7cc791061fb3c5c54770fed0ec5a8d4d9238e5b6d041e6e4a95dbd0fc90068f4aa7ae15b9419fceaae91a8e8e517ad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbd66dd7bb04e23b6574199df8864e90
SHA168fd3445b9258455d3fb7b17ebced2316fbcadad
SHA25671ead539d7a005590de74e9b22f999358f2bf65bc6c1428bac4a9306513c63ba
SHA512b129c23becd6e37257098ded2a4a5d959b19eafb6bd27a5c634d703c13778cc73795892e1f8a611519831065be58b48bce4f9bf450adab28eef59e939c4d035d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5319a73f0b082727e26d25b776905d065
SHA1b0eec5aa6874593d03f0a667374562f51e079988
SHA256a091d436380279edc408dbd5e8f82dfd2d9244d1624b61018840e41c5871e098
SHA5121866ace9f81e36e6e127a64ab309b633fe5d86827c3ccbd6091d91d94234a187fe813fd3b1e5d064f722a80de6f61b81e9223a190dd82bc0e30522a095ff95a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bb251cb66a3a3fe9e6ce6c27b7c7543
SHA1ff59aea14b631d31fdba06af8730da8121df261d
SHA256d68fd6b5ea87598677bbbcc134021a8cda0e68739e3b9d6310a8f5168e28399f
SHA5128bdd812a918c477f6609bbf73d39e32ee20a9395de68fcd3d0ffc47425d8610973e83f333836273dab86000ca53d8613cbb9324e8c9efe6f89a0957c9758f260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53598d9c3f28824f736a0f7a38f2fe195
SHA11e04dc3d89606ebd0da3210c32ee82bf9bb1db56
SHA256f90c569989b1e71f5bf991d377a0c654108ff6bc74acf1a5fedc5f973a142d99
SHA5129e7a1efc2b0ddb1ad90d0fc6745d3c2b96cca9cdaaa93660d40431c22c0066df0ec2fd6921fc5a5ec9f54704e8fa60bd44c43f00edb2383ac0c6d02be56fd83c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ad8505a1701fa0ad1e7b75980aebafe
SHA1ba9ebcd48bd1b69de0b3dc07c2e4395daaf25907
SHA256e1629d09ff1196f78f37109bbebcecfbd2ed10addd7c86dc7ca1c57ffef1ca9f
SHA5122277492cdc4737b62cd756e953be67f1627d73a57f98197b95cf48fae3e8fa97f53984365b27c5c3355199c990e0c83f15a87455bd4c15d0102b981bd4792175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5987d334857e0bfcc5f6422b6188d1a65
SHA193451e9254bc08ed6f15bb655aa9a2da5a315fc7
SHA256edd8418f9e28311ee1c3cc1f085b7ac944e3f511a8a7c9eccb9f31cd5d09fefa
SHA512df433d0fb412113782bc1fc56dacf6151ebd40a44fe3272634354fea04aeac2102e333db812d63fc4b1da449fb35f115e69f9ba5583fa2af1ea0b248bf2e74a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d49a9ee3cb034f9f997041535d27992
SHA1c7aeecc0bd2aa4758504044e3dad435d4e0d5002
SHA256606fe38e9d4697abe564efad0ba9aa9b056b12088390f6eb2dfb6cf74a79eaba
SHA512a9b372b5abdbea82072a75001d028dfb7fd1c83209bb123d354949fb25cea57825066cfbb170edb4feae2bc8977f7ec42903f766592bc36d4e9f9edd489a80ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567219956e646fea6455b2239262be510
SHA116b13f2b67c8e9ae71a992400da71d31fd173dcb
SHA2567e6209cf5035db4b48c28ef7d0dec7ab1c0a7f0e4fad538e511de29e06506eae
SHA5127d50d09c60560570fe04c50e110b9a35444c5684cd5217e50dcdbe4e1b4059579570551b240fa8e00bfaef7e98f6cfcd9bcab80a60e386d3b56228a8c79c9ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548b43715f8af5f8a676b071011b95b76
SHA195bd5f5a974c115d13035806bf45e6bd7fc92375
SHA2569411849faeb6efb742827ff00ecc0b39b41828e7800e7ebd05a6c2538937f01b
SHA5129e2e4db445f51ed8566dad38d50b38e98e0eb9e03f5e48b1e6e5a853c6a6def5d3c78e5cdae6b3feb4b0ebc5101f097b2f2a1421d76a524ecaac590f2936464c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8c0b7e1ba19af21c87ede6be3ea98b5
SHA17cd01151465d43c86398a4b17568cf3754b0b968
SHA256f274997b4d8bfacd9330eea445641899cef948837c01abc7df1f77d3677762ec
SHA512eab489055f78c337c522cd95744d3a8bf088c375cf31adb701cbac36ea4ad3a751087268c258427818e76aac26aa629fe4586eff545eaec097bba98693b2daa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7c0afaa0e6625c2d29900e840f7b793
SHA1388f790412e64f3f6b10287d6b60577cffc5dd2e
SHA2569ebeaddd69016dc4602dd681e79f8fad44dedba958dd9be466bc420fb99a9cd7
SHA512a2f0eb1c6f921c434c195dcb9f04219592d28b91d4878cdb91e9d35c1aa5958d18981dbb5fcf26f7182078c465e959a5ce3e00757be5f00175c4d6306f85cdaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b732031572ebed860d9e35795efc307
SHA16ff402cb1e8f6a6dacabbf7c4805857e3af66b8f
SHA2560b6be2ecf3f5477f43c0d35d982f5fa123a3ccad8bc41389aeda78db7428b7eb
SHA512f3f48bb184581b5bea61d4d74e05d9e54d76efc760c2b8405008382a1696d360237ffca7a4b40084a5ed09c8ac901dc8f10240a7a0c0b9bcfd5b983a106094d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e858b8b3f092c81f94881eaa4bee41bf
SHA1027c90ddb4a958dc63e716a02ea61b71a0e5edda
SHA25698432d007c84f016f41da5857b94bcbd713e6756274edeadcc92f353779a5ba9
SHA512ceafb706007b7140801283ad1d8b47fadf06b78636cc2db13eafe1fd94ef287287d010e4ccf2124ce88fef413fcad3500707fcf70ec04ff065fc4cda82fb68f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7466bc48003c799fdd36c8909016b86
SHA1d13738b7e5b791860dc27a77b48636da8c535ae3
SHA256c42d18f7e52b8908b8adb5e097d98fca749488fedb7b454b11d371510b2fa530
SHA512315e26f95ee47ca17fd99386f3aada4ba9896dba719b13aa2923821ddf0308832e36b52ffa448c03e1c49de522abdda8d013592d9f46ba94357f558d6363df4e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a