Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 09:40
Static task
static1
Behavioral task
behavioral1
Sample
4a745fa75ad176117cb4d0ecc87814ac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4a745fa75ad176117cb4d0ecc87814ac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4a745fa75ad176117cb4d0ecc87814ac_JaffaCakes118.html
-
Size
204B
-
MD5
4a745fa75ad176117cb4d0ecc87814ac
-
SHA1
acfc104a98f3148d16ce1447153d4fde1fc98b43
-
SHA256
8a25577e0e84ff788689811b07e385a1673153ebdac02725ca8c2fd4de3fe5f0
-
SHA512
37f41b905d9762867412f8a18e0997238ba3fab7983016b9d96bb496a05696b71b532b3f4a47376ed24e5bed850c97bb1a6cbf7d0343ae34e617b1ec1040c9f3
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103cc32e75a7da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000012c6882d8dce6ee030233df16ddd66d290244968ce0f6da379f54c601d613596000000000e80000000020000200000006a5a76a60920b26c2c719c8ac25673478850156e3a5c5fa7336a98985131913c200000004404206cb03d7e9248437af5461329e189d5ec0b85b23280034ba44914db22cf40000000660a6cf3d5cf40f2eaed0e5ccb27a20ccfb608b1bf0fd81c16a4ef376eee01e35ac6eff82d8fb63c07146aa9e0b726317fb46fef4f8f521aada37f382da3b945 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422014306" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{599FFB31-1368-11EF-A7EB-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1400 iexplore.exe 1400 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2784 1400 iexplore.exe 28 PID 1400 wrote to memory of 2784 1400 iexplore.exe 28 PID 1400 wrote to memory of 2784 1400 iexplore.exe 28 PID 1400 wrote to memory of 2784 1400 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a745fa75ad176117cb4d0ecc87814ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1400 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f6ee3fc9ed764351c64d3c31c42d60b
SHA155a900cbea83655d91cd889aa7cc7588aae51d25
SHA2563cc5d59a4b70eedd236366c336b4abef8a3a28063bb60cb03eca7f03f2699240
SHA5120b5f98868410fdc0c514c47034d5c429e02ecf5188aab3d2eec21c7a642e8ebe70c9397b40bc1cb13d11eea361217f7907b0af39cce4d67e0beccc51cb34b03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4bad24f1970f931249a080157d6284f
SHA1d1dc370c737423a5d31cd8af411cad89f6182d8c
SHA2565d198c63b61499f743bd30af0f6d1c86dbcd8f06904c8fc3a6419bb61cd7b128
SHA5129adc99e77f878f22a57df73c49fc5bcd884bf3533e7bc864807a9536f28a5e1b0c4303831c73d0ac508099adb57ae95a198b4d671133a29a68b3895c9c388d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a14ceee6d6cc8e2ec3bb23537b7e3fd2
SHA120cfd5f7c4d5a5fe4acb5fc83431c51ae94d1247
SHA2561d77447407441dbd9a0859c8d5ba621b51cdecfa9de1e0b51557c59915115c7c
SHA512756fd937c66d980865e516f154658430a35e32b69c496610df650add74b8ab1c41b0de7deabab986a0781e877e66d5fea2d9cc69351eab7bc32330d35bbd2349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6ece8ac20e2a8b71f5034594a75d92c
SHA11e8f9560420d9376249cd83aac806719723a5653
SHA256497b84011da5becde1fac725f8a835c344ccade421df6a9f645c7d6f09423c94
SHA5127b0de76d801c68ddc6c13384e6232ee1b01f4037a2a1e2de9ba922418207babdcae79705dbf32f7a0eb184ed1d38c58c6b59a51238e2ce507442f1148d3138a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501a5c94bc1d69ef7b83b0f613545e31f
SHA1bd8d19cb955d138389f14fea4d0ab23045aa0fb9
SHA25605dd89814f57e95b6e56a5f15ff01e5561488e59c169510db3eaedc425018e7a
SHA5124a51bdfc531749cd72ad48bc47cc3b22f1f6c2323ef070e4953cd9eed1ef5f1a1a4a9981014bf1f6adcb33b6971982a11c4b678cc7306aea6b67f50ab4b4b5ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545ed17b4278a4685f3ebac00ee89b8db
SHA1f549632429dc9f1cad8b1be8c73c8fcb396f7f10
SHA2564673ab0e733ebe2f7df936d86552a055ee9f7fb0acb1cbed34cf02bbe4ff9bac
SHA51206a7149e51683b4a2aac15abadef0e95d01941ef501ba9b9c5483bb1ab0d8928c8a5e392378daf91befdee6185d8ff3504702c989b382abcee79d2f9b33d11fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527433521c9a951adc536858367aff94a
SHA1be68c26e53b75715996d33dd071c2249518af7f6
SHA2565e451707ae8f866f25ba034076e564631d9aec96d1c9809263bbcec0e8e6c748
SHA512e4ec01ace306bd7eaabc9430444f7d0cdf181f159d8c94e768f9a7281ca7cc1ae6324ea5e57d83430660a652e358cacde4edb3491746e30090f5322f880fd04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2146751075a9b981aa5dcd9a0419cc4
SHA10f69b694284207969702e5e66893b4674054ab26
SHA256fea072c0ff8b42716fdde2cd2ea13776249a160292eaea3cd34789d85113cf4a
SHA5127e19517cba7f4f314f2c8c5beef0ba9ba547cfe55f877c46837bc712ba6ba293c08fbb9a7efa5dd9a51d788b4cb207e1d68b02c0e8ca6dab82c079c07449a7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1207ef8c6715c7161ce5e6fb3603b12
SHA17478d08a2ca2a8bee7a38eaa314f735e93d14ee4
SHA256cc077b7d035d86817ad132b18bde7897bd1dd45aa67c73e374960fd5e1676601
SHA51242dde737efb268afaf7e3bed1b93ea37bf606b4bfd046f66885e251b2907fcdde3f37c8799903590c74944c3554e4d5feb96dfeb94727988b4f577023eb9af95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca50d2c4cd14cab44499bf1976cdbc61
SHA1f00049d53e57acf8895e6489312a1c746f2f2714
SHA2568c4764146185d3b3ce59c294e6b1e4b8a6c27ab69f8da5f486ca0f44f29afc24
SHA51241f7fff3dacd837e277e7bec1884394599bb242747577c9504510cc0b62212802baae0e709ea4b1bfc803c9a1b81b56205d213d3d1be5595c40cd41b05943728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5801e59d09001e971faccfd4d57ced0e8
SHA12fd960be5c84848a74bc73307d6ba052d8e267ca
SHA256d6848b0b955364b249fd489569af920d060a5c392620ea2fff2deb9c5ed4e76f
SHA51239be9ace994be599346a134348ee98eab5e5029b17d1ef36672e79f69f651ea5d4bd83fcbdba08edcfb253412326a7238c3d34be16c6e0ed7fd6cc73bf9e4a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5124f8a0895310de0b1f7919589473fe9
SHA1ce46ab0b4b55ec3f527c0f504b620c27de505a06
SHA2565ec24fbb7eff4aac4fe8cdb10d39be8d8b8d5c7abb6361735c8821c2c7e46b41
SHA51257cd072f6e2279ce436b2b3a145211b4226705d4a4f313ce84239d2ba039bef22156bfd63c9677879bddbf2dfc3660909a0b5d7e7ad64ff5ee70340c9e999b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5669c535142594130619dc0e23bf607ed
SHA18fde3b612c03d3715814b32130b6f18ae9732d04
SHA256c588a0d5372530412d3411c839fb6e5e7cfc3954ba1968058a21b12da16f6c60
SHA51215bd0691225be18c5808dc6edff17ac1bc912527cc75ad641bf5c2412ba1a24a5f43d4949587bd253bb2b91aaac1ed29f477f9967ab8456c698d3ae1496a99ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c0b2c8a2e5bd69fcfaaf50414498980
SHA1315da0f78430a12026c1c645a4d5ae07c3a02614
SHA2565f2bf01728b8757e1859ab2145ccfc83f8ad25a222958db46313b4d0c3487417
SHA512e2d76661639f8e11a0c83accb22e09e55d9a567889822fe04e630f410ea125c530800b576898d3572cf72148b7616d545becdca19bd7fa6790cb019e86109745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55274b4d83bcef63762f9c3048cc5414a
SHA192c824dad8954120cfe21b3c1de9e46537a0eee2
SHA256b5926d9bde2894e879dd0c900857a5679251ad64836a8fd1ea95a9f521ebf7fb
SHA512bacc55acd75822cf14d73823f45fc52aead9704eb1aca2a95996c989fd8ad12bf76ddfac7a8328391594014a1e403550fb9cc425e4d26f1ae9ec42a920ec9082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbf3de40235c5b27a487d3c10f851887
SHA1d70c1d57b12f20a0e14f51316a940f8e5d0b3e42
SHA25627d8c0e0e743349b73da7d1dcc780fb0e5e2e47582740fdcb93e24061498665e
SHA512eb7fd42ed7914392c81826bb559867ba083be20ae8abe581b0011d8c2cd6ec10e068d4f7800436d7f0342e2c154638142f8e608ad8cabbeeea2916f4a11dd0ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fed5153537f192523f39c86cdf08d8ad
SHA1e99f65de6397acb7f4ef58e664193841c33c2b45
SHA2565f5cc5e8916dabafd77047994ba2b9f1207c10600d85c6daecc619d387322198
SHA5127c596229e07b09e0a92bc04a1f77da6c8bd8e23058ebc1a086fb5ec15fa60fabfb1b2231816aa436d76afa9ca19f4177e508c7a78dc46c151555d47152b252d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518d8e01cb0b6983086cb5d491f5c8b8a
SHA102cd18b6f439694c82d744b18b08067bfbb41407
SHA256e268cd4e2054e6272aefc5f17b34376914653857699fd362e28f5b9220bc8a49
SHA512d875cb00ab0b644dbac8e994614028349b2da8d5ef48560834cee50514bc89a9ced5fb2d8c5f1952557aaf720f4c3ea8d08d07f5797723da1fbb871927d582b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3654dc9c84ac62000078a0ada04f6c8
SHA18e3e0e89e7fe5cb6dd0e50635118b73398037538
SHA2563b889934c62caae1bd89d60ce9bf21dcf9ca800a49dc46b1a53b55c150b72aa2
SHA51237009ba8097db17a2e6c3ba28f880e0a491393ff634d097d54f974c511f774d200abce8891f6e2f6ba0d5847839bdaf9f2aaa7b8791f8e883b3475ffeee100aa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a