Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
498c06feaf200f6c1c5733ba904d6e42_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
498c06feaf200f6c1c5733ba904d6e42_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
498c06feaf200f6c1c5733ba904d6e42_JaffaCakes118.html
-
Size
3KB
-
MD5
498c06feaf200f6c1c5733ba904d6e42
-
SHA1
062a93c7a6dcbc8d4efe9afe834bcc31ed127290
-
SHA256
746d67a89c9d8e9108fb73eb2e475111a6770dec702f323480f932cd8edc6f48
-
SHA512
c7c37f1449d9c5b19b48cca2a7c447550b6e5dd5b6efc78830fe6336b5f61a6ba8a052f58dc58fed1d4df8f62055a1b1641b1f187a71e5022d4bde4e9efeaf86
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421998358" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000be0da19a670462d4148d221ec3888736a17e3032bcdda9577ab1fbcb16aa9de0000000000e800000000200002000000083b96966f6754015668bbdea42671d7874292c1f602957d9505aa85a2530b5f920000000e674dcb1958341399579df1df9ac74046b4f68a1e0f7aa1635d263cca84a79ea40000000d61081ff8ea4a187ec2c1dd9b24815eabc5ff9d10ac956eaf8c120d32f1b78612934f9053a77d2266244f81a24e5d4c8414ddcd523ad2f9c1d0d05b04b5ab3bb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d4b80d50a7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{390F18D1-1343-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1676 iexplore.exe 1676 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2080 1676 iexplore.exe 28 PID 1676 wrote to memory of 2080 1676 iexplore.exe 28 PID 1676 wrote to memory of 2080 1676 iexplore.exe 28 PID 1676 wrote to memory of 2080 1676 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\498c06feaf200f6c1c5733ba904d6e42_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a465c9e4fe67eea8c9d3c5fe8d81e47
SHA1f00332b9578058ca5e36d16f85406d4b646afe77
SHA256035e9a2fbc854183a56e636bbf482b234c80991caa667fa69bb3b7654a4d1440
SHA51262e545650947bfd32a4363461f79f6460a4fbd2ce2cf482f2858b325f34ed8ce34a5518f5a8c4c4e47e9c2f731f3d0aeaa19e393acc64b7aa7ee5fd81633d0de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506acd9c8d33d271a8a69addae2b74ed9
SHA1098ed8ac635493fc28d76342f2dd5c8c47754e3d
SHA2566d2e96b5a2f1b2fa40193d948df16252db4b6d3f3604e19dc25284177725e6ab
SHA51215a3df452e417a6dbdcc69f56fd5e32e876e6d44b02568b4f73155b5800cbbec7349a83d9bb225259277fd302993069185261330b1ba6fa233e0af8d01473a80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7015951d0ea0da93b0257d58289ab12
SHA10d8d6abe7abf2915f2494da06316fc15ba4d9fcb
SHA256a2d1ea6094290c54d63456117cf73599ae69901b41e308f0e640c430ea4316ac
SHA512eca070d21cf6bec89116a16ce212b57061b8348f745d85ddd440e0f87b17d3fb009b6685d3b2cd8eaf92c89fb37b772ed38dfc60f230cfb8283e49d265f40e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529dc9d78def6d377819c23e009fb2cbd
SHA18da5b1f7267197721ade2ceb40ecb23fc9bbb56a
SHA2561287321be0f4d7e8bc16f8ccce37dbb3d5f1e24e9493fc52f33c774301916f91
SHA512466399d1e7e0654cc04d968f3d5f906f7efd16ae49c81063e50bb61e061fc3d3e0449139787a5166a8d64a23fc0bf011dcfa06034aceed8123ed431f5e26987f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5089087af08f4e1ae935f762699a4c925
SHA11dec9bbf2c945b19591e29604810a94c1e28c229
SHA256de15e20f9a417ae6e4a4b94cdd9719489c7276370a56d6723331e92af69819c4
SHA5121e46fe58eb5ace16737aca4b8f24a80d38c0256e055eb8a3256cb1977530ea77402a91112108f077a4ec34e331ed3db8b04297daaf4296ac08556de79c1a59d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582bdf18e36dcc9a25facaff4ada68cc6
SHA18eed78685cde298758fd7bde3c17ff64502c777e
SHA2569384b3fa00ca7ce3e97369dca5dc87e137fa64ab9a5e98213fac9994c4e5528c
SHA51282b09509fc32bb52069d12b27293c14b1066dad79348b03907a6348862e39d470d8f97a0d72b2f8444b80f356e251f41f432e9c0d2fe4a2ef3d3aec8aa3f865c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d51bfab88dd58c943d5a88208667012
SHA1d624e2a6346b7f7d3d9a4e1d22ffcddc6ec50c03
SHA2560efde492d689e96e65b303717495fe8dcbaa2aadb4fc4351c86a6cf2e11f532f
SHA512a84bbb72625d59de4bf69d80fc7473d94ad16c687e1b18eefd25c7d63877c213bffbafa1a052cfa2a6cd7e5755ffc0f9a17eae21b2c21b148734d1bfa1e51ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c53447a7a1c273a2f648e8fe9d7c2b8
SHA1c27c6bad7b663427b038469ffafd6387f412ea10
SHA256f4e70eb83f38073c8b2f27da7ce1cd806bc9f7f4240333277e45ed8a39bae45c
SHA512bde21ba8f2d817c7c0d544152e99a0b834cc34ea6b809250e4a88b799487d811af1c17dda46c8b5daf5a12fd09e5f6b259978e16757c9ecdbe14ade72e821261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ff95a26982df8a8c44e5c765174d883
SHA1136fa6ecfc3b63af8311d52c92e931d43ec18e58
SHA25620c67e30ca59222de8a719e2a592b96f1637762538719fb75132bb774a7bc4e2
SHA5122ec033c5c697dc80e645e0313c3aaa71e0db0517a96b19565780b84a0a2b54c1d33706c966327d5c13669c0f2ccdd8c45cef49ce2d18332a416bd6f2e5a84e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba8936138a78f3446eb1ca584a3ee570
SHA1e9a8ea14c1c14e0d1dccc3d3b7e75876ff9aba0f
SHA256439f1111cd705c188f7eb920248f88912472758afb6d6c4b8154187ec712108c
SHA512348e7f96647f4c4afaabca59d8332443b80d1f91e5885083b2ba6e562b4de587632e5f0508d762028edfc5b1d674ae6388d71c83139e69e8eded9d6330d431cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acd53654af29d1db197d5efd7ff5e3c7
SHA1f15a2b437a844130925a7994f04da7917d5bdc92
SHA256ecbc43aee1c90fcf08fe3c51a9db953b643c40070da44cf70ba977af0b0aadc3
SHA512152cf9b41f97365234b9494a44a3fd675d3d3464231bc4310ce5eb2a24f9e0b0c70e09d4ea3e1612b0b0344e4b54803fb387786564bb3939629a2bc9bb75bcb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df79992088d7fb583069c7153cf240d7
SHA1e19cef73e869e6caab2a255c1e1e51c55db90a02
SHA256742c3a32952629ecff31cd43898e7b84b65f5831e92f809a0ca5c362ccb4d913
SHA512cd1e70a3b9dd403804de4c0bfe6f55043a76b78c129f3b6da7fd653f5f46af8a95be8ce85990d04f6b3e58ffc47db247ae7d04761c33a0f996df6709304661e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59066e04c7dca81597016f8e0ea80ece7
SHA190c5fcd4d801a08e86d690df5fb9d65d34d1a657
SHA2566fcbc6e696afc76a796ea4b61ae0d29bee72f625f56de3d69f3528dd4f44f793
SHA512e676e51974148bae086be92e5f1f1e805a0d3b76a988d64b6a090c83b7fe2e4269ce1a4e8edf3290f48c1a6bf3d7314f66682d291b912d751b7af61f0b3e2e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5201a8d50cd43b8db2400a3c189053e7a
SHA1d6b13300a0e8a899560a877a07f84a9c7afc427b
SHA256357dfe8fba049f774418b88fc3c15cc989c850c93adb7877403713d659bcd419
SHA512492ca51014b5fffaca904f387a81cf7c22dba369975eff5b3ad611a2be28b17e282d51a116ccf9809478b4c09ad26f18cf9cddcf78c77154cb7ec3f9aadbd144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586a9b930844b44c74ecb4e1470cd0c12
SHA155b736422caeacc1becbd8a41839fe6a42f41a41
SHA25651b7746b2915b71a582836eca348dc9766489460bad952f94c661c3b18ce55c2
SHA512127acf449f7603a413285115212f4a3eeedbfab7288ab1ed23f91f9ddd553f3239800dda3ef33781df7cd53e3e0d001b4493d61168c5341f7b1d435baaf610c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd48ea76677c6821315af370f5f6c418
SHA1f37af2160d9690af0a7de436663e19bba8937b0b
SHA25639953397c66bf98e01e419dd8a4bf4c7ac5869b8d6a7219db447742087a90a68
SHA51224c7100424331a91501907af905c6db51eed6da9a05ed6f48f50a858bf8d06d55ddaa7adbb4021e45553cf6e60f88291f42a3d6597d0e856b00f7fbc2ae0459f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559e57478cd7e37299fb5475c2d00c691
SHA1df6fc075a0780a42d6f2b112401e5a0d0b343435
SHA256d0801d20e21b08b359e89cddbd78468fdc2d7f1fbd5baec41b81e595e74452f9
SHA5127567927ef0ae890cff9538578e335543451e7e8569851611ef4ec385feb6067d60dcc469a92b28e220a47a7cf3a2f2e81ffd23608fae8ea2608c83b21da3196a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5013a780e6d5e379bea0a7602f0950d4b
SHA12f64121974f8341bfdef50defae5d6c1d965fcba
SHA256f4b0571561c7be678f83032645c19806dc7b14d0cdb71a5e8afc0cacdab9ca4a
SHA51236bd09b75cbbc1ecba2d25da2ff0263f30523aa59879059fd0e4e70a0669a37496ba2175b62ae5ffeb8eacfd7a22c6e6ba0801c0df985f2ea6c2107d62c47e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5234e7f8f1990ecf7c4b4394f5a6dc4e2
SHA1e274e710cbab4329fc0000d72d7b91c4bd3b8c19
SHA2567b64c8be5d49371c1ff61ae34396ca50a0da39a77b1ba1b8cfacfb598e2f8464
SHA51282de2862f5d572aa80901a5031031f53cc82d26f2342eb36a24644e34c0f836c48bf30b49db9a5a2532b651629f16943fa7df70f30e4cf13ac610346d19c2887
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a