Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
4a9b8c8d7dff614335966f8fdfacb3ae_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4a9b8c8d7dff614335966f8fdfacb3ae_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4a9b8c8d7dff614335966f8fdfacb3ae_JaffaCakes118.html
-
Size
3KB
-
MD5
4a9b8c8d7dff614335966f8fdfacb3ae
-
SHA1
22afa1c25816da5f6a017849e7140c5b69761a4e
-
SHA256
5a0774f2eaed3823588e41e4e4aa7a6adc84c46384a792c05869c6ea4220619e
-
SHA512
2579081e42812f6024b69c665b8ae86526301d2554137d31f2d114d3428ed62953d20ee5858e53b5d7b3bdd0f9742ab5d0ddc480f1d158c7685b7215be21eb8a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F7E72C1-136E-11EF-ACD5-4635F953E0C8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422016866" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40f91b247ba7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000d9833922bfbbd33a66ce0b0a416fea59fe20d50c157dd5c13007f8c552809dd8000000000e800000000200002000000025807a8b1fd17727f0add709ba27ec17db68d03cb199652bc629756fdb6f108d200000001ae1d4fd93d37d4d0f66ed5bab53c7bd358006f05631f2d475e22ea190db3ac840000000ece6b4fa3a0d3753ad5f52e6fbd9f9f5a8bbfaa2afa299c1f03928b67c74fd5886a534e4d19536f87a606fc1101909f22bf6a583556b4f9d9cf7875d03713fdb iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2944 2140 iexplore.exe 29 PID 2140 wrote to memory of 2944 2140 iexplore.exe 29 PID 2140 wrote to memory of 2944 2140 iexplore.exe 29 PID 2140 wrote to memory of 2944 2140 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a9b8c8d7dff614335966f8fdfacb3ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56850e7ac0e3d0af242666e3056e34b92
SHA1f75b02f220fb3f3768440c36eedcc091ecc52c5a
SHA256c91f57f29aaba94c26eaa09701d928a0fb1ffa59e71f3dcf2b9c35752b90571c
SHA512312c598858f0982c1eb23c08ebd4d7b7ec1fb81638ba49de5a7fa35477710a99d4f092f93dc52864661ed87757a79a3d5f542939ebac01f4ffe56a9459105162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c58b1b080e2829ee04dfaddcc5464e9e
SHA13faae54d476c2f3b9977be47c6d363dd462bbf35
SHA25676c2c0ee60e06011207f235d5ebf11c955d6ac0c3b6c96ff493ad077bd81aaa6
SHA512869666e17d4e1bfe1b57fe07d2719ee8dcb9e19964ca26926856a62c104e583f83284e3e7e8d40921d24045b8d08650323672385e2aa0fcd801d3a26084a8918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5883a185f20fc7f95a436e3e05820fd91
SHA1b4cb3082d97e359fe7eac306e8432c0ad1e93168
SHA256707d9bda736583cc6975f91cf91cd485c2bafad782254924e935877a0c98a839
SHA512542efad16fa449cc080e39a46a867c44495361301bee2a4a57801e6cb134d57a87b13e2bf110c37c4a9dbcd646eae2896904c9c62814080c00d2b23d76b66bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5950f0cee456e9e190f2f0235506eb8d4
SHA1d168a97060c93ab49d59f39119f630389f98b7cf
SHA2566f8d9af0c2fe3f1f697dcf831fd77db60a33950f1375f714fd20b3c198ec2bcd
SHA512fd228670edcfd37ae1025e21b53f2640b0c13bb97069572e3fbae6a27a7fd60d57fb00c0c052c8ba88c95b98883bb8add8ac64079d62e5e53af84bd3767a399d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558573b91cc728ce00aafa6a175b7526b
SHA18851cab1ac47b8a23122d94ca54c5cb35fcf1919
SHA256f3c78b1b563da0a83febafdb4b782e14ab611c9cb343911a3702ae0b3e593a1d
SHA5127c34ea9b62feb5958ba76415d1e0801e14914276ab1c073bbb598a95233ec185352e4153a6dc537c9d1dd461c3b091b8d7b7464e60cb6113935a6e990db97964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586d29f1e815e06a63d70df6b3a663528
SHA1f73544c57509e8f4cb5de69a18dd3f2be215eddb
SHA25665a4fda78093d430bcaefe040b97e922ba26a6ac65010a010bfe52c22ba6eb18
SHA512c9e65e0d31496c3c6212299b95bdb4e57b67f704c8ce68dc11eb20467e400afb8d06d8acdb1872864e3f0409b1781ca9b9622a1ba826a4695d396329a9ca2f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d552526c26ac7ce1ce3f57cf8858f680
SHA13447afb2d5fa42f616e92fb6cc36dca705e7c7b4
SHA2563f1ce78e19714c3b3efaa850442312025a1fcb0af46a1029cff0263ecaac56f5
SHA5124c6ecc3d1c4d535a6ff50f25f0087bd9d0b1e8e3b467f6afec841bff40814feb1ce94736f40d935a25a0596834ecca7676761b0cbbf514ffeb188e52e51aa0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa067415379cb9042e6581a18b284f6f
SHA117dbb07945fab9beaf9a47e8751f0cdf48231273
SHA256263bc917199beef22cf33d193ff1852a8b29517f196018f3f07d774e8f92d43b
SHA512a6c12578cee09360506c65c2d33782d5eccbc3b24b7a09941eb05ee9cccc024b099122042f60654c0762a47dfd463af709465f1f9b8272717b1547986cbd3ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545ccd9647eded01a8c77823d187be176
SHA117762a6f1b4f504536628427b3920eb36f79e669
SHA2562048dbba15682cf5d65803f3ef3252110a7746a16e75d6c27a92f25932da402c
SHA512be89666da7ef10092f7903710bbeb468ae6d504aed0107c186762baa11f46e072099666bbcb1556b79a5db4621e98d8828da16d3705d32e5c092670516b0d33d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5364235d854e6af30933c421dfdce7803
SHA15da18dacb2f61f9f4e0483e5ba0e2f4cfb490194
SHA256dc425996f85997c18e1d7d49ab089b33bab164c98fe209a48399a4d8ae86bf68
SHA51238ead4a9b76aad194284b14257042b2f211b68f80a1116d3fe13296c57f00643db6dafea36f98fde3d5b04234822350c159852c03d02d1cc29496e300200220d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b266c41a007e4ef9b88f7a02a6d07126
SHA14cd0cd673939eddd1434ab684c7a02e5f9226f6b
SHA256a295f986b313cceac5484166bf1047591c8162506c67304685a14dfb726edaae
SHA5122f1ab8c7afd41776bbb6d5923e6cfa5979af4f405a46c451eb09f89bf2fd354f4585e2bd918f1ec7a6132ac350f01869ec70987e8c1c94eadd8a2dd12333f11d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb02d2894c3b1747176ca9cc645aaf8e
SHA113888e99c24701d96fcf453afdac398306759832
SHA25626dbcaeb0baf34bdec84bbd361cca4e3d6e8b337e45aed90d38ce5b60bd059ea
SHA512f628c35885069960d40b4ecc26b8d47d61f84754f4c773d269039793ba3366eddf647f68b69c07b61d55193e0c02b7a1ef7143c58ea4a315b74a925b5b1a5547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dc7fcf6c26799c76cc650ae90c663ef
SHA1bb3dec60f3e485608f22f05c91f618ce5b485235
SHA2568820e348e5abfc63dc9fb401b4d9a7f28343d88e1cd1ccc5f9cc2a0a0243255e
SHA5125008d2081b008ed6280bef7469d2934f51421438ad7eacd377bfe2ae9c995f0e6150c22ef2574d3966a63dd042a6b008d2e927dc00a553b5c0740981cb25702e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec13d78587a28b55165e2e82d1428c1b
SHA1a30fbd9f2786c6ccc6f688b4633fa7161eb80810
SHA2563f575a57aaf6b29a16e8ad0b4e59cd97ade8c3a16b2fa9e3aabeae6dd620583b
SHA51231efdc3736994f50b27a1312b579081c814ccad4ba9a2bfbdfaae10222d8cc92da2d9887954de228f6c4f87dc2170b93135b04202f7632de7ac4350e9fed659e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5107ac38f4d32c1fd121bfbc62a91b1
SHA17e3baaf1ff197a01b563e010aaa8374b86a8b185
SHA25675d50582a9f5ad991b34eb92d808bed6d315242aa56358aa195b20bca618614a
SHA5125060fa09753d81168a67204a5a87795debac7275e7dbb8897b077a963484085a341beb48f1273b36665358da17f5f6cba6c4ca734af1d0091f294cf14861233e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd3f32a4801cb930a6307bb3e5e706bc
SHA1d2ae1747e262879ae074a15fb963482c25c988c0
SHA2562694946135fce680c9e80d9eefa4b49dd21a077f69dcd3bc7a49f60c76901a20
SHA512421f853d24d606cbe8220ac5ba2b25ee39b8054ca328e9c9f8c5afc6bbe8dc63b14c5b5a44b3a5f379927091c7bc6e7c1832d93032a68a82228a6e2ffea9abe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c82c1b0c952444a2e72730d0f94250e4
SHA10a9f56506cc9ffc78755ec063420109962752903
SHA2565a13b4efea053e13fa52c75171bfd983b5a35d3ca214830a2a426ab9a3bee622
SHA5123675dc2b8d29cb1b5b4ec1888c1c7c7af98c035bbff6dd953e6a0ff86e652ca2571cb7a0ed3463f431cb95c877fb2092b08ed618335e43d61b0b4a3f8b275dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51325011a187edc545c110c2b8181fe8c
SHA17eaf8bc4fdafa08dc7536b23a4768cde474c8cc6
SHA2565d3fb36a15226a2acd99988e751bf19748dc5a3ba28d4b0cb88893e5a23afca9
SHA5124cc7e4c64a7a20aa1f2b07c10a546a57fa9285cbd68a37b9ed908928ba0c4eb071341a04c76071b45bc722020f3ae77b61a5ee149adda7b67cc5150648ee72ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb9c9e290f7bca29115d6f619a64514d
SHA171c8ba4730b21a55bed50f888bf1202a4f3dd756
SHA256007f6b082522ba75b4a19d7c48d9d9e8947e18cff570ba33b09e4be533d842c0
SHA512f96223aded6c9632fb9bc938849b9022625e10b1e19dfaf7eb47da781953d55d1a86734d36b38a77b5dab49ec8fa0a77a1954410422cc686e5284ad6fd54217b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a