Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 08:41
Static task
static1
Behavioral task
behavioral1
Sample
4a41ddec245c0404a2fa76282b2e1f28_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4a41ddec245c0404a2fa76282b2e1f28_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4a41ddec245c0404a2fa76282b2e1f28_JaffaCakes118.html
-
Size
2KB
-
MD5
4a41ddec245c0404a2fa76282b2e1f28
-
SHA1
6ae3a9ca6aa36ebc393edde561cf789322ae5990
-
SHA256
a716e4de242b6f7dc5f79650074935973194b06b20b5bc881a4747beced50702
-
SHA512
155e64e52881389d49ed9c8f850e56219cb38a9e19c74f5bd7782c7b5f1ce73da02a5b9fc717a3e1afb27657a42de634270cbbb49e11bef1e456eb5092d11a78
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000001c348f3d1b803034ada38c625207b2f6255cb399df62abfff34ec68bb66f12000000000e8000000002000020000000ad6f954e086591d5d52acb7d511c60adc31ca9c2a7a65537904262310534f7bb900000009fcceb4e69d02b92846efc457bff3322a2a2584127043bb8f2450e4ff5bbbbc9710355bd088a2f425da8ffd99cdcd63bca38ee8eca09c5174e93efeefee72390a14d1a9c2f1f0451134f700c5f9b34344eff71d04da7de6b337e04217d3bfa7621fb1804613dca4273aded7c7cb391d56d248542e0d25b2b68b954acad4f580fce3fc3626c0a9bc4284712a7ce1339db400000000d985f53db5b240fc3d4750ee442f5f748b20413864c8100518976b40a8313f0d9260d46230f272cb0133c7631f2b4c053a65a7048f51337e21340d6ae494625 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422010780" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24970581-1360-11EF-88D8-5E50367223A7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501853f96ca7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000053430da66d3d08dbef4758605f1daf987ddf63a82747e1808f6be7617dab7e30000000000e8000000002000020000000a2d5bf6fe9ab4eb4f0948245e7d5fbfeb089f9f5eb49259c1b3caa1f4373a02920000000fed2d47aca50cb660fc2210813a2d7d73b1887d41ee670df5bf3fad42058bff64000000033204a76517027fa2d38c520bdec67e24d8107fa370fc02888f7cb23d4e73da6dca018d140f37191f15cc258afeef209da8a339ef1018880507e7eec09a6a468 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1516 iexplore.exe 1516 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2320 1516 iexplore.exe 28 PID 1516 wrote to memory of 2320 1516 iexplore.exe 28 PID 1516 wrote to memory of 2320 1516 iexplore.exe 28 PID 1516 wrote to memory of 2320 1516 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a41ddec245c0404a2fa76282b2e1f28_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504e7d5e6bbf596493383e137e66dd082
SHA1255a7f95be458e344a9ad4dfe4bfed724de2226a
SHA25678bd004cf06500ed1dcf67429438b1bbfea20161e1c0e5be04614b654f5431c5
SHA5124e79cb3df05b4f886ef32378d68e27bb11005beac93a341d565c91ca6301b70bdd84164a93d5b7c40b01101738462c8230d9bb2fc159eb7538df03562585ba66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c58ae350e5c9086a88e81fa81d3d07e
SHA13ab12ff75ba0a3b35ef4616d5251dd4b65decc07
SHA2560e5fbd6ca9775b3d620386d719f58620d113e33120d9d6f0c78b9775d13c145c
SHA5128cfbbbfef0b8b13918ed99ce35ae71f4742f590a81a9b96f33aeb87be6b6bc3f8f9fdffaaea14506fe9ef4d037be9a6a1182eb285918aaa932d69e1f5260ce2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cbd43958cec083b9d417ead61b51bd5
SHA138fdada676479f2d89ecfe0f1f59a3df8bf74209
SHA256690b323599e6a3e782104b6dffebbae60fdf27ac1ae1ea4c02ccbe589e405e45
SHA51234eb691c99b726c96f128c4ea6b353bcc7593f65fb2653b22307abf909a5ec189eed936d4b98841d10e2413050c1cb8bb2910ab72418662ff3804f46b079b498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fa3cdcbaef4040efe7eee233bff7826
SHA10156f2b8d0c82fc63153c331bddc557ea457e0d5
SHA25670325ca8c313677f223c312530c4f2da9e14aa9b189ff83e79ffa1bdcfbb675a
SHA5128ddcbb52a0a09d8b6854fb0da4a67f0224382aa69b053e86ace9007e5b993ca7c4d9c995cee406e03f208150a092ffe60c5bd9558941900389205042090d0987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca61e68315098a69ab604c7c040a28cd
SHA13ff4c7acaa0055bef93958c39f6d2eddd43a5da3
SHA256444a4fc5b88698ff0e68a7dddcefb84a11913dc9655c1c3dbbbf7cada0fba942
SHA512ce4cd0a3c104452be94f5131a390927d07d377052f00660b7f853aa0677e3209b6ee9a3580d871c7116ece844544e86b3ebac86d5ddf043c3e1961c837dbe485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5063a0723d2d5cc143d6ec9acd3541f88
SHA1c06097c54eec39c1f81a0b72e87644f51ae94a15
SHA256cb86065c7f542173b052a68379724230a459d9963a9da619a5dcaa17a54ff705
SHA5124e0b0ce73078f620f57557c6ac5b67d2414026081fb1a4809b801dbad5829e0aa4ba790f08a0dbb001f3c6d951853a2a7343624677e08e896a6d873a5d1fedc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573a9e24faf47e4470a711097108a14ab
SHA14c6e89840dc984154b00986867ab4ff5e24b4531
SHA256de0bfeb2c91852805891eddbd37010fba06298097e7092e049c878ad3946f6fb
SHA512ced4afbe379198fa8ef3faacc4fbdd759139617c7c5b25c2606e524afbf551aa5aec54c8b5ca807a05c7288377399f6987213af2994169524c6cb43a918c90ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5069073c57bda163a10beb0f88af03763
SHA1cd0afba8d09ee5b055891d24216088912276cdcc
SHA25695655bf97459c8b342064f5330e80a9ba4e07420243d4eee7137bb2e3aac719f
SHA512f292e8cc6738396e5aeb5e1812db6e34c464376265cc8e01a6af0de92011fdfd333bd8af70ab67bcb41d9135d4d5b1960e35a6fb53a71fe97f3b3008ffb8486a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510163a63e7ef553ef515d6da6356b342
SHA102e48b80d60eec8eb67cf9d4107a8691f1687171
SHA256b00c40aab9979712b27328f4a97e5ed8d55d0b4d5dddcceb16bc52e55627ed97
SHA5126990a11a517a316869feb2fd4055c20f99e3af1d098edac5d2fa9780824324da077525f9d2de97e1dd25e638f0ecdebf90909ae61f04c7237b32e0a8637ceb39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514e0cdb58b6a756b1d318896ef2be90b
SHA1135dd29af9230c6f9dac628f670575696ea11b3f
SHA25604566df3a635ed21f8b3e70537230d0e02b3ae2f9fbe82e22639e8853507b966
SHA512ea9d673348992f1528af10767ee2d0849196017ef58d05d97f6d3251eb0cfa9642f3fb59eb9fabf8cd6b834cdc8e0707e8df55c39002ab238a23150cdd643fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e1d9630f97df17aadddf5771dc6c849
SHA1029669d61bb2ec5083a1f94072e2c8d61d7c4ab9
SHA256a606eb9f405c3bab6050c14f16deec3563d2debc94cd432b5ce6ae6cd52936d0
SHA512aa02a09203a1723c0008aa052ca3703cf5e39dcfc4505dd7e63d895485046c48f9f6ce28993c5f6acad8f16b95345a2ec701c408aea3bcd20747d2b11632c180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547e4afc438a441f12b4c741162671fb4
SHA111c3a3088184bad984b7f6710f88e4971ae1d2f8
SHA25640319ba9ffebc647c8dfb9acf96828f461ff1d84c70912c9306e943f97f2a776
SHA5124ba9d73d032e6ab670377bcf0ea27f8216f38ead54ceb5dbf3bf94da4ab02be89d3d1ccf601657eeb6aae64f68668ab4f8b013ecb9223fa3b67f8d02699bec5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558ff3914c57d77f81fe49a1e8d11258d
SHA1cc48ae8e013ec9223508b2f31851600642103206
SHA25680934a1d323e07a5230f5373307fa59f82975c8911226daff254ad671f1ac529
SHA5124c1d397bd434597df3164b35cf080615ce60cc37a7f2017f52fcd32dc3ae0fdcbe6820d77d0445d5c58a136679e96df3334d611a947ffbc0aab84c63c34416d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599311a6669802a78a81cefae0745c5eb
SHA1aa2453a6a47ed65f18fd6e3db7ab8cd2afb234d3
SHA2568020440495c98dcbdc189fe813052b1fdb42dc76b772eaacc4819a2d29a17422
SHA51203a1fcff711280b779ac8e33bfcec68a0c9836f11ba923d4e89e83ab4592170b211730586a00c9aebb8ef6306135153abc19133df3acc82088f12e547aac289a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0018d16690c3bf4382715238e9bb42c
SHA19adafa6985ac7f237f5b38a0eac1c9306ca950a4
SHA25651887922856e92ea98e95658b24912cbe38a5522070db32b3dcfb36a4b71dbcb
SHA512fa18e34b850296d6e0199cb81e252b9f62d8e5dcf66b93cc7a282270c40309656d8a62363ea219d13166e591f428c89d2939704192258ee1894150ed161ced01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c213f4ba4fd7d8f2fa17f05a6b6fa015
SHA101ac4e3ea2fcad8aefd704530f7a351487f559a4
SHA256de6594a75469d7e1b98abbc56746f2088062d0c453c27963297c3c31aad320fa
SHA5128b32d30222ceb393941685d98f9a34e17edf77f7be443ff6ca4e0caa8e6ae3da3d65e0f1cbb39ede46015ff06e9d8fc8095ec4ac70e7e1266811fbacae0cd43a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f80974634e7dbea710e3d020330e0f1
SHA1ec533d3edb1e30ea4b934d5570c6e4fbf3079f00
SHA256a218e6cf66c33d4a0049be5f27f06939458b7394bf240e88e485c0d4f4e93b43
SHA5122b4855fb5f483111415ddcc22a24e74a338566a1783d706ae16f6abccc36c9bf3a06809f94edd7599ef72ba07a44e395ae5acfc90f6f087032c272529dd2ae30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec29578c17c1cf17b1103d30ca28d3aa
SHA18b2529e582579ce584ff33a1514b70387c1bd113
SHA256889998760c78f26b02646cd257cfc5da780dfa0c766d739524f4651c48396ed3
SHA512f3ca07e32ecc49d7f5f623d9316bdc5edd1d1705db2361098191c7f61578f988dc1714b2d8a6f3afa3fd786160900b20f422a9ff903fdd51a2b627fccf4b9c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5631d703999dbc34924021fec9cd6baf3
SHA154087ccf863c3aca6009482c89f99a6d929501dc
SHA2567cd72ed6763a90582896086c749720676715155fa8fead7193a92ed780434d03
SHA512a7fd0421ae65c07b9893ee163fc72de0bb54f0ff4663d3e027dfd9625823481c2c12e59683d6d42ae1fee837d29295fb5c73f4310649873178756b2a5900a58a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a