Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
4f11b347eb337a616e8ff918940e7376_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4f11b347eb337a616e8ff918940e7376_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
4f11b347eb337a616e8ff918940e7376_JaffaCakes118.html
-
Size
2KB
-
MD5
4f11b347eb337a616e8ff918940e7376
-
SHA1
ece5c1b9f4c134dec083b6c28737c457dbd0cbcb
-
SHA256
d7c128b0f2f1dbd2e746c2f40699d1c38ca4725f6927124f8f446cc335087308
-
SHA512
c4852981a7f1e206d487dce53431f4d2e4b62e61e4ac25a917a3beb4de27f2d2fc9adf3f891ac1d3b04103cdab40d58ed50d434e7a37ddbb272aa9fedf698eec
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8585E151-1422-11EF-8189-4637C9E50E53} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6028005a2fa8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000000997726ad496c9f7065aa9cc58b52f7eeb33ff0463a7e457eb4bc495b73bf1b2000000000e8000000002000020000000c3055ae2ec6faa257cb433d20213495ea15783b22d6daeb88fb114be5e0e62e020000000a525c9130b2e052b82aa3382a4213d8be34c5a62d6cb87848e0413306855a469400000004ee3134d4e1453d9752fae7a1563939a453098c8562923d7262595c6f577c9df0f1b18d22d4d9fca9575346e35f6c85346f79e818018df4a86d1ac324a61d36d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000061b0349e4ad3fcf96b9e83d379a14b51d433d6b914552b8aec058a570a71cf89000000000e8000000002000020000000118ef8af4680527e5751fbf4897eaa6c92298c24fffe6b2fc85792e4791579dd90000000e00d60ef81b5c16108d8154f2c885e375bcee89c8ba9f970c98b8be443f1c409756374a0643575dd16f8197826f1686d19285552d573e24d2c4cbc59ed808c3a09e2ba880edcba4f42c17cd67901f627aa7ae13e70498b0cfb7a745fc8814898a3e60228a09ea7e37b127644f42bb48e9c9a744eed953d78f6f10b18a623cb1777b0991e86b4b2cb41c70f8c7e0b804040000000f1bceb897a3fd093632a3ac1b6d4347c0e2e28382575223adf17b84a8b6de51158cd60b01c11c70c59252c54163a8bfdbf1e0b46a5516d809ea5e34e8e9aab77 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422094264" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2700 1680 iexplore.exe 28 PID 1680 wrote to memory of 2700 1680 iexplore.exe 28 PID 1680 wrote to memory of 2700 1680 iexplore.exe 28 PID 1680 wrote to memory of 2700 1680 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f11b347eb337a616e8ff918940e7376_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5396c101ad552ad245df96af43fbfaa0c
SHA14a2e794ad62af6d5d6ef887b4851592eb9af31e7
SHA2569ff6634b40fc362bcc3914eac7b28de3f4a36d56814c6f19655b783cc55e1c57
SHA512e9e96f42b518672680d6f73dc5c4835164323998f85d88c37b8e30e7c908724b5c9c2808893d8bb64d497b7c4e5efc0ebd13883f64ea833f4dea294c083710a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56837fb151274fdb9cdb15f698977b90e
SHA1cfa7179593864cb8f154a58c7cf9a589135b3434
SHA256bba8077b745943ff163a621a5dab5705f1a5b03f8545dcf397e328d84029fa56
SHA512cb6ab3d80471227341dc3cc82abac7053e248daf95919ffb5d9e6bad863dc1334337c3c4a78b71342063f2190721737f22e26969373bb26f5baed947aaefb1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51545a1c44db7429d897710f4eb17428e
SHA1aed82d66a99e2d6a65f686b40c2377aeafc35584
SHA2563a91d075f229b5181371ab74f23b4edaa443e84443360ce8533671c0de835acf
SHA512806ec0bd3dccfa966fed2d6c195b9b489e742c6c8bf06505334df01a39d8ac829c8c4ed910cd6b3b3787695cd9372913144f6d56ff0a28d5498d6c19c47a9d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5811126b6a4ede6cb569359532d8e7c2d
SHA1ee18a900433b80d1fd7ed75a933e65becbb18c3f
SHA2567c9c1b48394b6f361bb28c946acc040aed0e2156da88f2e4d26e3b589b23cad9
SHA512a2a23274e8e9eb17a7113bd8b9f26619e5976494d0d6263beef1a127283386e61538c25db45123e2781a9e19aa73ee3aab9202f79f69b61a57400f311946c3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fcc341a8c160f7524059645e1c6e6e2
SHA102e84c5067d2fa3889ee6750b5f24464ce7c9bb0
SHA2562814c6864fe59802d614152e57f325584729dc3c0fecfa9b5c6b60dd47f3b494
SHA5122de116789dc295d27d1ad2c3f0f94d3fe8a20de97ed4f58d2845aae27d91468f6821ec13032870cb7f20f3c2ca5d3010086f125bf85112f195285f28e0c492e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5028f4d3740b7b4b069dfb1b79c114a61
SHA1677c0e914e3341461a3c27c150d0e6847e9fe276
SHA256399c4eb81f3b6061e424a41c810c8c09da117fee2a477035a536ef6e4902584e
SHA512049ba4afff7cebca5610633e05ffdb7d11971116e13301af2b4531b88efbe3544aa39f2130b62225eb816dc2ee06fd5c60f7b1cd170f7444ea969b6e440f4883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcb01a72feb1cf454e526c6f217f65b8
SHA1863dcc8579c26000165575e601cfedd362b7afbe
SHA2562a0785cb6edc8b64007c257600fcbed7b809332e3719108bfe7b6a3406fb764e
SHA51258b73cd9bee40e75ecaace181dc24b4244ea3dbd1da0033d43eb59cda0c32b8f1d9350893b92a28b73d09fb12e1f49837c3c9cc8cc61cc61734cc3433158de0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d079d0b31d6e70ffdd5d1451a232e25
SHA19f6dfb6f3507a245a427ac89ffa709e733a2c386
SHA25622ea5170d2b84672b0405db77510fc7e706f3a112aff083815428061885cd308
SHA5124cbb234d246a164f6a1a49fce36d367a0dc17dfded31b870229ea63f1337e76fb4c45041fc7bc50512fba9a16a2b7b853d0acefc6c17196da179921e3a471dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddd888256808beabbe2891d18c43b66a
SHA101abfa88e2f9ec6dfc69c3858db293aff160e5e7
SHA2566ec1bc2ecd0a8aed445630438ab76c6f967391e8d1229e75533990faca01964e
SHA512f8cdeb1cc5ac0dc129ba53a95c31e2edd0fbbdb8526240241de35503666e7d5613bcee4803c580ac8e059da3bf1c8bf6f7721a8ccd4e3e30149d5238e8c38abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d81bf5b5178de9e122324ca6db9be9e0
SHA1b1c4633e6a81d4993b2c9867028b4c34fbb9d20d
SHA256f623ed77f7735db026517060047db2f72a2088ae2ed8f52dd4251385ad367a06
SHA512668a9064505ccb10731fcd7c8e615631f3a116a0451702fa40e3b635462cbe8989384b02ceb0522b226b540dd97c9c2672edb7d1fd545cb533263aae1f515b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0b67dbe52c402e42dc53e806077fba1
SHA156f2a07aba29ed575ffcdb97cc6fedc959e29236
SHA256f9daef01209eab67c4d84171b0cc60b9556368cc9bdebd9ff6cacb63142a4005
SHA512819aabd8a013754533a205fc56d4bdd83418b9e21aafb988d3a7c0c7ff7bc253d76a0886a57d1596259a5ef0e1048b65920a32a402f9b1fb358c94d898037f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58432d55232d1fd0ee5538f4bdaa6afe9
SHA16bf03ebbebfdc0240074a6c3a5cf58b50a5a02de
SHA25674ade116ceee04b12abe339d86def00355a7409df4fdcaf456b6a16b9a403cbc
SHA5125d737345bc83965c6222b4a81007002bd22a0e19fcfa2df7eb5c7de052fe79d6d2bd26588b309d259cb491201e09a176dd7d1f988f8196fffd00c4ba04e85aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f16ef65d567922be5434c724401a904
SHA1de22b28d30840b5c8fda2d45b3e18cb6ca3284ad
SHA256012c9f1504350e62a5ebb92c742bbdc3bde17528bf43a00f679af9c3d6e14167
SHA512b4a2363f81dc3f8726a0abf9c1ad6ef916d023bf9f318b9556cf96d848de9b5d01651c8dc589e94ecf304dc604abb6aaebc33ff81ca15d8f2c6d4fe0f5bef91e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5139ef45bb6f56831efad5f59a62a0204
SHA1404eefbcde1fd1d70903573c7e03bc81cbc90acc
SHA256f850c306b76caa88d1af767a6ca24a516c5c5613b409746f6a9344e904d27bc4
SHA512a9a64699718c9569bbec56818aed0422e4e989143070ecef0ae554c9bd6f2fa3659008d213f11b3b1ddcd358e197bd47b916751e4bfb2dd58a5c228708967d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bab29b18662db04d79144ccdb7678580
SHA1f8df920ba2589ebbe81aba46b80bd1eb5af9479e
SHA25629a6cbe4651f94846fe84357a25ccb0907b46f808765eceb88d882655ab02521
SHA512c17ddc4e2135a2b3cc1c4e501c2c49707474c4b4a423ec64bdfb866a153de906bd39dda157a40e7b4ec7ae1ff17dac5c1c54ae4e5b3600c66f464a5370199477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53541b48b7e99853883bc754ba454a32d
SHA1e013b784de30295ce21271b4e493a51936a032fd
SHA2566de8e2080ac1868fee9ec20737a8cafc0b904c8393f0dee7ff3edd63f9af6bea
SHA512d9ddfe8ceb83a6aed947a4568f308aba7e30111b9883881dc3952a34b8fb356d18d339134f69c5dba18d2dda61c9b101d60f6a11896309548df8badc2d9a0032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54625b890beb7655253d59f3d03c82f07
SHA1c803ce3532d1089182ff1e45bda895103fc2417e
SHA2567337ec5d6fe9f374b85dcadb717c7a5e87ff18dad258b80e4e3db41cb8b9abd9
SHA512f2415a9350dd925e73a656985eb0d8716f6bae833ef23654ce6b3c0efa9278a32222ab2f9e824e599aee615c80488bf454f671f5ae6567c18e0952bbdc6a78ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5512283821b7ad5e012689c7932415493
SHA1e3586f25811327c917a8b7b5de60016b0fd51dd9
SHA2565d8b3f3f3b5c32c41cbf559df2cf7343986b6d8e7e704b4f0338507148627330
SHA512dc4625905ba6fdcc403207827e8b60da480f1a7c3d5def9ba3cbc3102e2aad23a49a9c1de8f91afc7314a3b8a2b2e554e3a29d7c577a41d0b651f93e766a430f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b8c6de74e150618e0d8f11e2a46e2bb
SHA1b7d594457e1b2eb559091c56b0bc9e34d61fd96c
SHA25610e7986069a6bf9b83db662b699ee5ead20e0b9c3aa0231a9f78c733792d6136
SHA512a015345a6bc2acf68c17515c45b3934a6474e0b293b0ed633b8ce978d9078f7bfdd68695fa47c4742915088eb3e1fbde70f9e089bcf826e6c46c0e07130f659e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a