Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
4b4b6d09efe8b0c850698699a6afe58f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4b4b6d09efe8b0c850698699a6afe58f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4b4b6d09efe8b0c850698699a6afe58f_JaffaCakes118.html
-
Size
3KB
-
MD5
4b4b6d09efe8b0c850698699a6afe58f
-
SHA1
d7a084502c9bd21b18d89b8fd120aa960b6ceb6b
-
SHA256
3077d1a180cb3a1c71f8211a3623a3503f8d2d0c1bfab6b1fedb4ba8e1e90c3f
-
SHA512
837a5e863d8b61b870ea0f93208bb5b64d788f5be11a8e88e2349be923940f680947c46e297d33c1f5fb4f0879adc9e9b62f8ec32e0f17b00a69eecb6c01a387
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000002d0f6517f77ff0bded778255aab6b84a2e8cb2b19eee9abd8325f14801420d5a000000000e8000000002000020000000d3b0ad3e54799465a7772c5c65049d8eecad76cb73578a419c729e092524445790000000aff2553ec2a724c02a462c14ed806b5698c02e8e3b51cc72c1d0ffd1ac9f66debd1e584ea0496d864765f53408cf3215237ca417fb4f3a0fb5a6163e22cd539824f3f1dda51d662ca90d748f26cd3e4dc354b4518ace849832b73f13433f784a4f8db10d0c8badc83e570c5ce4a0d8fbfe5508194cc36f7ce3460352d8e5265cbf08444cf4edae7226f9717ee4ded2d6400000001c38684ded0b8239f11d9aade11c17252b4a645a13ca95fe26fb8175e7dfbd95fd1038e478a6cf9fc5087bae9bc023bbe8a169944151bc60c288a6832ab828be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DAC8BCA1-1387-11EF-9449-6200E4292AD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000ce4b074b36ae49ff2daeb00fe742fd78680576d32ae64ecbb6e0c3dad04d64b5000000000e8000000002000020000000ab15dc0e70cbc27ab769fa32d4602ac39cd5120628953acef7ecabf3e73dc775200000006041167ab784db60ea7b5519a4ce7cae31d3e1e46fcf1c051d24f4dc443c5ff940000000f4b025be0a7eaf7d8d4593d790f042f32b8352fc30a8e0b3813ac6b43db4104c5fbd35e83c799715547db30b8e719245497b02240558e562cbb1b85f66cb6e56 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701c8daf94a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422027836" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1520 iexplore.exe 1520 iexplore.exe 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1532 1520 iexplore.exe 28 PID 1520 wrote to memory of 1532 1520 iexplore.exe 28 PID 1520 wrote to memory of 1532 1520 iexplore.exe 28 PID 1520 wrote to memory of 1532 1520 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b4b6d09efe8b0c850698699a6afe58f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cabf0cbbbe19654d7698bc1c7f16b4a
SHA18f567354ce71d4a64565bad263916ac285586935
SHA256bcc3ee4fcb94b6c34ddfbf1f22d966dea14a4558cf177bdfb9c844ae9a291f90
SHA512dfa4aabe3aa7779b7caccc2ae51493f56851679f6ff84cf3ddb31f23da68453c56d3b3db4128a47caf66ef4792a937c4f41013cdf54549f1f2175fae8a266def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dcb140722f83f8af81ade2f94e76ae5
SHA10d9e33a7894f379eda43df9f527a1a19ccd02bfe
SHA25600bd0e79778b12f759e27c6a574d38e03724600768b77f72285cc5f6e9794bab
SHA5125959baddd5e99fc7b71b8c8f193da4cffd60c030841f070c5d42d92b957cdf43d13c3a316df46f16d64c607881e283dc18d6197b60d16bc47682b01885f24a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d2770d26646573aa7011bc7919ede07
SHA1f2f61588fa9948b21cfe49384411601d96f10ced
SHA256a46b0fdd2fd7b166009a872b9386ecbcb33fc7e95c109691898d20413c4cb6ba
SHA51273e0785c1f81de4c94fffc6316fa003ea7ff771fb52503232e01872d33926b48e2bdc54e97d178b27647135cda321e4d701d8f509c6778fd3dfb0b8e775ee366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cb6c6d702ad000c3de0c40cd65f89f7
SHA13f4ff065d14e66f47a5766201751ff3256dc399e
SHA256f3c20f18044569cf206c7f0c1f07517554e789472264a785e58870ce387168b1
SHA5129e2f41ac33a5c56174f95a8867f05fa53b5d768ed0acb955aca153022c383b93deb3b392fb86fc234a463407477d748f2e2c97e2b4d7412446809d8dd54ac91d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5140a178b13e5278775fa701bb1f2d3dc
SHA1d79e54268bf97a6bf454302a0c7fdb3cc92e65c2
SHA256e374000e476c95bc7fa257db2e7a2ab3eb9615d84b771cb13efb08f2d87c3df7
SHA51230a052ea0c762d7938132f3f9195546005a34918018627036271bfaa08995e727c747c3f7e8fa4630cc331695ac07d5f8a0e4b613ff9fdef0469949dd1c234dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501799f42963424e4282ae44691a49c35
SHA19b47b76d2b9e6c29597726265d1f32a6fbfcdd82
SHA2562b639db7784d95f2ac29b792e2846bed3ef132260b564ecc07deb825fb10be2a
SHA512fd0aff3948a78a2cecd795bd48eff9d18a6a7244c255c0771dff8b2319837282ae64e9066ace51b9f4cd1bc92b673e573b79fa9f90496bb3b0ad21b5ae1c4083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2044d5ed74792c16fa6278024026962
SHA1fcee740124d9a71d4c8d42de67112c56809649af
SHA2566715dd28c7bc231195d1a46f47a185edf09da616de5c8341dbb8efab6da81c28
SHA5122481b169e2f7ce513795b2e75f25e217aae35aec06d1fbde5c9b14a4f1777f6b31c9188ca6c04d12ccc4d4ca0dea9e850e4a563f8773f953b25277a1bcffdec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540b8140db9748cf52c9fd944bcb1a165
SHA14ee6fe4ba37cfee086f5466ef470e9ab5b09f227
SHA2567184f74eae885c95390e07ff2566e2db72321e85be6947246c722b9f69416d60
SHA5122cb338ec53640d1641781acbb6e62a65259df5e226eeffb4d7f7f3f1aef7360d5f02956149b5899ff6416eaef0b52cc1ff07e1b0d1203bb96749d0e44cd9d262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d27f14c77ed973b49a5c23a00c111267
SHA1d9007a2c11815aa8c8a06c34d50c9c1a55655bd5
SHA25680a442dc7430b4f877c967817dc85b4e2d732d072ee0798cc8028f055be4fced
SHA512ddc9bb5aee912fb91a223268bf3c01882a762879a9930cdf5c99726c49d3903bca57ba3edc445c05b2f71d7ca88ecedb81aeb162cc39c8dd0ea2e0f5ff12a6ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51091a2d741f43e616089e2f7368aad08
SHA1289389a3d54e8fdd6adb522e79c1b6ad00bbf3d2
SHA256058371a63446caf162ed40a657633227cf059dbbb6686c4615d904c42fe1f874
SHA512819a8d03aed7d5db40db02798d3c1d93d51f99915da9e32df26a0b5e7cc8f24eb2dbdbc122f5c9d53d26887cd9ddfb0be54d3005f726f0967181999e5612f0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518ff1607ecc381d0b801512a5f6268b8
SHA1f4f3dafe8c1d819633fb67cf3c5d28f6d2226ee7
SHA2566fc72e4581d57e4c0fa5a1876203348c878ecc4dc04d7edd91fdac868e3a00a7
SHA5127a5894051aba896c848320034dfa8f8055362bff4e451a7e2cd0410d9adf9ee472d3d9f0447903aa64220b1a13b6524c1e5bac6adb5adb69cdc469fdfbbd867f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53327cf7c16e401490cc1f91a096e6c18
SHA1d35ef8304badcb2f068aa7c94d9fab4e1a9e1d27
SHA256f4fb94c7f27f7790e2ec14a9a30eee2d616dac4abd1130386546f1e5e2ec3504
SHA51257f205b7c9a8776fc0bda470fba58bfab72c21924f7fde23be88d7ee503d663683f89052f4dba94f4d03f44cd6e698a647bbaca8fd9e5e1c1018904077b61f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2db4b6d7bf112f509ca1f65fae44055
SHA105881683b855d0747e73baf4471b2f5ef28e79ca
SHA256dbe8cb9349deb2a87e99892419f4adb58f7892babc0d012be679e02ce94b2d74
SHA512944a298bedaaec7b1ca5ae4c04ebe90559f54d11ba21704b8f69920cbd55aefaba631c255dc559456f12f5520a013f42333a3550c8605c69d599a76c2686836e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e510be1403694d950abe8268e76dbbdb
SHA1b01cc78ce8a560b6934bd433366d0ceb37e848c6
SHA25673178781c1b61679fe5ae2fb0f9ce328ba6e891823ddb48fd7465eede6a65970
SHA5121117905431e76d20ff4a07e2cc2daf296499329c6be7fb427a5828071af97413b1317f4c39da5348a140beb76f62c564f9cd5c6a3810516f16b2bafd5fe1eb76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511cdf90cf9eaa15463bec342a8668359
SHA10a2ec5d48499e2090ac69316099e23d617160022
SHA25679918898975c13ff91cf9fe0ba4b7b21b59bfa45e9d29fdbcfcb089917bc1e1c
SHA512a301e93917d97c4f21e0f200072866276a490e47aa26c56d443537f61e07a47eb938cd7a2ebabda8fcab18e73ec9025655d3d35b1d090f1adfce58c4fd95dc06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5423faa3dd1dcea86a9379a344ada4a8d
SHA1bf55e97e268485f3b1dc4bbf2ee1961adfa51e25
SHA256fe59d2fee57db91e475aa63259d5bef5dca3572bdf8a33831afb5ce6de227110
SHA5121f842367a6124059d75eadf2ccc87d3e918441f65323b996bab26269a16ec1eab8b19c8896b5334129c8b56a9fd00554b5f257babdd808d30e74b791cfbf478f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57eb493b926011f9e384fd932b90d589e
SHA115468eab598ef09bde8866b3100bf78972e2bf2f
SHA256e0ffb7712daaff08a9251511de19dd24bfba12329080e0d998ed93ed34fd0277
SHA5120c09bf45a7c83b64b2b4eb0e7be09c6eaa4c2211a9349fca5d4a2e62a5c7a388619c5c7aaea12d6f242348bba2a306da4ed8e77a03af8e7550467c83203f43bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb70ce17c35fd7b8e1a4923ecdec8b97
SHA13ea0285e94d337aed872d6105c8a407d35924d20
SHA25686b95b956c2ed554825002ac42ddb4d1f603c2a3950b51903cdecada71224378
SHA51215ea0ed11458ba23ded220771d3aa69ad7a7c8dabc5969cacf99bdd75f84d6661261a3ff08e72d5dbccc5261aeae73770b7870fa2d87369493e1055cc293da88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd06bfe5be5a0bda4c64424ce464d629
SHA18e55afb6f2c97c38e08b6603c0a0660419286974
SHA256bbc465401a66edfa54d56b0df8e55afcb9d4754e21f0bb10a95b873433d97937
SHA512c18152a742a3497ccbb33ca8c61610451f8cda3a9229a6def653e3fefa6d76fb91ee0ef7e3c136335d4564eeda4ed88f91f356fdb1a3599fff37e7261ed81892
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a