Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 19:04
Static task
static1
Behavioral task
behavioral1
Sample
4c99032687c003e1ea73495c7c9db1d4_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4c99032687c003e1ea73495c7c9db1d4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4c99032687c003e1ea73495c7c9db1d4_JaffaCakes118.html
-
Size
3KB
-
MD5
4c99032687c003e1ea73495c7c9db1d4
-
SHA1
b95af4a52e936485f41222351108055509ee2812
-
SHA256
7772c87bdfecab84bb6e61f403d87bf55b305aeec1c298e30b80955a031e255d
-
SHA512
ded38d96b3b31efee551c1c9da35e01f923c998b7fd58bea17b23492a2daa44423e336d3f894977bb527deff6bdb19300f3d49917825e0101d63710bf68eb8fe
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006a3734e1be337f448da4a628e20939cb00000000020000000000106600000001000020000000efa360efea4d27c45f38d7323b9dce89192db00b0b31973e7735860eb147907b000000000e80000000020000200000007d42e8467b42093fd2dc61324f932f2981729e2ea5cf778f5fda13c57ec476d1200000001777f3ac6b88400ac32b04735d6bbd99e5bffb326fe5d6f9690b17f99935640240000000f3e79932262f4c5625e353a0daf352f6352240a0786e2f9887f642f052fc465599a2e64f1949bbabb6e3312171f662cfb60a40aea28f6ec4431f968c32b57119 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B806161-13B7-11EF-9001-CA5596DD87F4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a821f0c3a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422048131" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2968 2860 iexplore.exe 28 PID 2860 wrote to memory of 2968 2860 iexplore.exe 28 PID 2860 wrote to memory of 2968 2860 iexplore.exe 28 PID 2860 wrote to memory of 2968 2860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c99032687c003e1ea73495c7c9db1d4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bfb4a5aac1d403713dc25e0b9dd40e6
SHA180e8cf04edbe9eea010637230515fdd24c9af9b7
SHA2561a128f5685be22d12b3cc1621ea635f396105c1b14f33139739326cb0f1f9dfb
SHA5129ecc51b69ad7716853e23f5c4eedc0f15c4b5fd23b3fd9d28d96c5b4b9f4390d33b55e00daccde782cf7ac82c1d73dde7e22f0d1342407af647753b090c0f170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4f40a8b3f6fdb75e3df372cd2f6aa02
SHA19198c6af086986157eb1485568a0b14db20c00be
SHA2568778a5d1fa06b7d839cf6e63cfa041cfe56bc693702e086abdd0b7c98f229d0f
SHA512d65eabf9ab98c93939e5517140aa631186931c9655c327f7d3607bbcaab8fed4cc88560e97066e1ff3fe050719d45fe7b1116dcbb9c15eaf31b5772381d556dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50304d3977f0e633b5f833e4b71dc874e
SHA10868fac35a91355309e2d7e2b5122ca0ddc2f024
SHA256151a0f37ea57427acb72b74497dfb7f5f110926a200ed1314464133232a273ec
SHA5127aad9c03e534d507e1b8e99c8dedf4a5019f81ccabf4cefb64e07855e72ea08cb6f8def29f43593ffad05e46150564cffc558c2b2b300650a1bb47f578682d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe8f036528397d5b9634679a6e1b9725
SHA18ce6e465d6f8ed4f5d43617e84d948345297e306
SHA256caa4bd7d3bbd3ebbc19abb82210764948fd70282b52cfc9c2d3a0356fb617939
SHA5121c31af358d27ee87d3577bbe81680a39f64761a7f4782dc816b4b19442f159e929cd6443991922b03f783c8bb3a5aeba36d5370a0f9fe34b2b287c9297c46279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5033a49a711386761e19cfb7e154cb966
SHA1cbf09a95a71bde6613f8f50069fb0afdcdc1c91b
SHA25616d76d54b02c08aca51fbd2b1cfba4b8c3f64be7358cb063b0b60577539df89e
SHA5127ee8e8caac1db558a0cc82a65087be6031cc92a13461c47f90a3cad81a07da5a2b41985a0c46d1e51edc44d8cac1cd5486812ad922b4f96618f2c2159768dd06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5540aa16d5fc948d60680aa180830e348
SHA12a49a28bb3a1e1e543ecfd6fc4338f6ef83d6b37
SHA2568b341018247a2d64cafe1a815b84e4ef1b68a0c64e7064ee2f8b409ec457ce9e
SHA5125fff7343cfe8dec140468037c919612cebba04ece2ca6485b28888539762fc792b5e67cdd1d4d20f723bfdd804638956848028a79b2072e5fbc9f2f3cceb80ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592b98d1e4c3dd04f2faed2f302c5a583
SHA14e1c2158e0b46c77a1c76e8c1ad4774460bda580
SHA2565c79d66c0681f2237afb1ae8da24972163febf6d3facea828c940aed9449add5
SHA5124ca4251f1778da1899678ac34e0611b0905330c97cac97830faac0e868d3b1a98de62d030c7b61e251a7203dd027611529b3c42a9c1feed65e7e51519337eb75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52eaad8ad994982ba227f76763e64f2b1
SHA19d1d98c7638095631f5350b15f1001a97ec69db8
SHA256ba511a144e2a7b0223ef6af13b8d9238409860a382230da70447ec0f30cd5d5a
SHA5123aed15618965b9590f184faaf4413609d45ed8f244c83c9065066e46a1676ef54ad1d1926f0ad5f5b29ada380c46bbc1d5daff1eb2634a7022596f78ce3d7e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519398ca224769dd011b7521ccd5b29ff
SHA1fbb0b9dd8da68443c07bf627415c7e3b2a3ba4cf
SHA256dd4352b5e914a6f4b10e1336db67dbdc1832ae40852c872bd01e7216e9212a88
SHA512f8feacc18b3580c81a494270b926ba9707dcece2ce861d740ef6318850b5b62d911c30ba9dabce42e84645816000cb57a4397cc7f1479c3aa70a0b40693499a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532a38176d06876e532211c24b87a30a8
SHA1d16adc9a5a419b8e27d4b07922d5ec6a23755a34
SHA2563ddb2aed8d0b105b37d3c2c2f56471a22fe38cbc702ab3a578f70b98fcc7353a
SHA5123ada3adc2efc283b655a2d4a32c3a1dcb613885b326f2130af2950a7b8b13e13f41c14563ff5502ec7a559bbd4c567213351039b929e763d79df0e88222cdfea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcb6b7a6dcc8415558a9701d73ddb1ae
SHA1971a4368ba2573cfb030774d64c57f02f6a995f9
SHA2568410d24c54d7192242fb2f525278332cad81291ab1dec0d72fca6bcafe0be2da
SHA512d1c0c9361ae4739ea5b2cef80f0a4c7f4a7d1cdc1c0daafbc602c7a0cccf00aa429c4a342067e5e62b402f1ca8a152d63ffdcb068bef751b8230c9bfbb47a4aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571e0b5235a69a6a3bb6ce950a65e2b3e
SHA153e034547a7416ae7f31eabeda79207bf0c7e4f7
SHA2560040dd9455951a5f542b40901965521479309804a389df30d8779763f8630961
SHA5129314cce8fe6408b043d7915ed77de934f818b2b0bcfe3aa91e4684a57ba3f9f2cc29780c3d30d838f1750f60059757ec5d6b9b89612d09c1e9a2370d156245ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54507f46faaa55ba7d5a592c01df20d71
SHA153df03a9f9ee6a249460deb8088c400744835f14
SHA256bd877d391c5b8df64fd73bb84564cac9c22261bafbe3395a391eaba9a0400184
SHA512a62e2b468fdeecc8dd540c01241b57d055a7878ca2f9079859c16b4a058d2e796ff05abb9b256c774a622e90dbcaf19753285df645950ed3eb42de2375580ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f707105553a90872fd903b14b5168f4
SHA1caaf4a072e4fdc46bf85c39182625be50daf92a8
SHA2565586aa3bdb9ccfdb50bde8993e95c596b098110cfaa12943ee727cfd653d9f8e
SHA51220aeecd367804ebbbcbf5015e0c37d78a74dea8d137e106e09e9d685ded80382e52a5644d9a8ce6bf0f24bdc29c002b47c625f9c408cd63ce10c04ddb323f04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5136e31d40491e526504487ca49e8c967
SHA193ff3eece5f2ea853b82f02f33d95e2a5aef6c56
SHA256df7d3b9fb2db6c85366efa74fe57a5bffe0545605d6ecf2779b2742a0c64e8ee
SHA512e4cc85ea7c77352589d74cfe601b8ec34d895e9cd1082e2db3fb58586ec21ca2b9c8efba4e860a71822340b097d494a52b1ae048ab45f1e9ff97a203139b9b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cb3410d3f4dd119e80c753631ecaca1
SHA13391580190f96ff4827b3d59e1b05b37d38c0bb4
SHA2566b585ba25d451ec26b5442e4fdc2e52e1fc816c36cde7f7946e3d55a3fb0ba60
SHA51280f937a9d7755eaca4c19e85724a4699b9fc810451f13dd7dcf4019877af4e7d9298440b9ad800465959791430ad582060d3e8553e392d313738bb4d43adc551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5519799949394f9d9117559fa9398a41e
SHA19cd6f5ed95a0695d7924e4f10071f61e6f61de15
SHA256855e121a298aeec130251965cde01c7e7bbc826f1d6f11d4794b06dae5e2a3bb
SHA5121ffc09cb1d90693c95e13b295e98107bd7fc9e3c10e84f6408a9f3d8fd4c5de93db22d00492f849130dcd984949a179720feb9244c4fd6bbad2821d4b8e6c3b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5714bcb07ebc50eb2d418f857c9329e9c
SHA17b223e16a300e6eb5ddfebe98917ecfaef07344d
SHA256095b4df25660aa631eab1ab41caa94361406f7927d9981ad8457f10b7d583751
SHA51295976670fe0cfec7fc1b7f5e11be5e53d27a654f4d20c0ef5b7952122a3c6bce9b122135a1c2c197d5b1fa067610b131e694285a7e3172eac22e21b6b8dde2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cfd0b1e208ded9d85d0fe1fd04a90e6
SHA19d6db161e86182c154022c83e9a49395837d75e6
SHA25681f1b8fdfb6b21ba9ad77d58fd095d6ff83bf2eccce716f70ab6366870534173
SHA5128fb5cf7d9ae4e2f0cd8642ab2e7b1fc1aaa32cdf21bfd2614cef0aa1a74e7d80d6ace4fc6d1bcf761a3bbcf2300da131cde6c9db05cc64fb8c3ef36879c4f643
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a