Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 15:21
Static task
static1
Behavioral task
behavioral1
Sample
502d439b3e6ad3d6c652a2f1ed555b31_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
502d439b3e6ad3d6c652a2f1ed555b31_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
502d439b3e6ad3d6c652a2f1ed555b31_JaffaCakes118.html
-
Size
3KB
-
MD5
502d439b3e6ad3d6c652a2f1ed555b31
-
SHA1
7e4f9ad2ce7ca27fd874d4d025aeca4d21f24f87
-
SHA256
a1b79cf0ec47af683520d1d83a7fbfdb2a064e5f5b8c7f5ac04746bd4f187e01
-
SHA512
59dfe91cafafe0e411c5de912abd4f14601ef495db82f9076ed58ba81dd7fb74646361f89788ef81b765cf806f5d92f41b4511447093e33c52ea640caa691118
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422121178" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2EE111A1-1461-11EF-8F9A-6A55B5C6A64E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0dc7d036ea8da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000cdb0e0c9e6bdd19698280251df2a73fadab3404159172f457d107787b21580a8000000000e8000000002000020000000f69e62d6c31a89610cd12237e37d3088f73d3db6642a3e44cc3f88320a6f87b4200000001fc4da3bec374ede7e4d19d5927b8dac1cc8b5e6c6e5341c33b94622915242d3400000006226733a92666fb7e47fd9ea997bd0ff76cc576431bd05738f13ec81388fe2079da932d4d61bec53f76d79a16e024f177dc38ab6f453b9d5629ab2ebfbe8d2b9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1624 iexplore.exe 1624 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2124 1624 iexplore.exe 28 PID 1624 wrote to memory of 2124 1624 iexplore.exe 28 PID 1624 wrote to memory of 2124 1624 iexplore.exe 28 PID 1624 wrote to memory of 2124 1624 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\502d439b3e6ad3d6c652a2f1ed555b31_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1624 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bd54628d9cd328de8237473ef84d15d
SHA1e59bb62fd12a89d4cbbaacabe045c97502212587
SHA2565124d967ba1baa9c523a83efeafe4940dd441b98d3dd39340c0efb0376ce3802
SHA5121af342736ece35246bf63253bbfef3673d2928576560b18145acf3a2b898a8769f4306f9784510d38facb30081e9b0a291ed40d4ebcc7453672519d0b2dab59f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd5159be2f2e12d15b662a648c4156ee
SHA16303c8884e33843545dc5eced46479c45c259e9a
SHA25641c1915ed48fae99baee593c3893f7290f1c5376fc5600ea7d1e6fa62ecd9422
SHA512b412ddc44ccc74e926db72083b2d239bf2a1c705b8256ef269f179dc11afbaf1b5a2af8c751413d75e8107c12391810e12ab3d81aed1cb17f76284c1d49dd6aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e32736491d1995f7b70de4074f12e6a1
SHA19f1bdd2e38e59b9b49c97e5f3b3ce827127aa9d9
SHA256a72a4382b073f9d51af76a2d1a0ef5df91b253a1d992ebe804b1113f8ac14fe1
SHA512eb2f0cc829315041f3f33342579ce1b23648c4ff47ffca10f38ad24ce7c39c5e6e729e4ebba1728f8ca72f474240b236869cac4050278a3473311305a33fd0f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f088026a1ac4312d071fca8c8be7e66a
SHA194c265eda252da73e30cfde73cfa531d2e618700
SHA256a1a3ca0813fdc2e8823c412ddedf59a04052f138a071e8cc870d98407db8be21
SHA512e11844ff4a1e0fb9e05949497f6950052670fb61680c6c3d70b6912bc40c551db6bc833a2d947ea18cb5a133400689d33e942c9d09e4017bedf0801eda83b90c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54888704dd5222290aa3f559e9b227c87
SHA112c1a662d7ed2bdbeb9e72ab7f69992c650e38fc
SHA2563158174ab04dfae7a8c81fedcce2498757c856a6ea4c658365969f12221ba8a8
SHA5126160b60f69639482041dd32c24d4432fe72312a74e74fb431ae875a1e9c71c1f6a8accdaa777fc0c4aae002e191b61b1da8220bcf016592c1b95faeda8a46f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5844b5be4738550c3ea3168bf2414f669
SHA1928c9c6672d044bb149e2cd8c96d41ea54036142
SHA256ebc966a5ee0f08fad4706a0086378ddaa8b7e13578366316a33b0678ccdb386a
SHA512442d5a923629ea22bcaea97be15464b978d066c701ca1704e4d02e299cf1ccf8b8286530653d4c2cdba31e8ff17ddc821836f9597d7489351e6b871601808446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f23b27b6d1bc5d377cc62653e06a5493
SHA1acb0f365f2f4394dec37665810a59c5763d54739
SHA256a9c806efc3d3b3f2fe7f7ccfc624a7fbdf9e0e4fc5f2908e02044767e83bfc37
SHA5121c882ba4e15d47292454ce9b81a1189622ca1b58c02495f5b0740652777529de5d501f8150a93c5d4ce58c274c0d2b26bac4e0f0101126b7f2f49a4949e3a087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8c509a27cf356507fb7c46174a96d81
SHA102e04d0d557599a27ff3711c88537006829bea48
SHA25673ba7a8f7e5f2b9f7284f2cabf93a1b58b459b55ec2f5fb3c9ddfec01ee306f2
SHA51296675df7cd4bf66ada0a7474c10c968ad8bfabc79a5d362c781af0d95a4340065fa34d44ea87c65aace66f514b934a7436ef27253d5340308b8e86ff62ed096e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb0c4f77b9066a45123551513bd61238
SHA1ac896f5f2b2466d2e5a0e9741096842bce93232c
SHA25628c3e209521f255fc559883f2a957d0e6f42bff92da9b3d49980187680a40202
SHA5122bca9a2dabdb4bfc2e197c90bc3eab618b8fd9741da9eadc5a6f05391248ab088df1024051a5a0ca10b56d436afca82aae51fb7088c52f3e28a854f766a53a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bcff546ec59a8c2650b2710d55f89a0
SHA15130836f113664b3cee7a032d47239eaa09f8321
SHA256204caa8640ae01d5ee0488b99de964943a28c10cec0643790342dcaf06315534
SHA51290d4366ddbe4c7e759ba6436b3a21938e0e77a47ea6bb2803b8fa899fa394d845328cfdb836bafdcf5a8b5b0963e2ad1c4f7d83e441110e3fa5f5f1b905043e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57708165fa821b58ea4a29d370e41cd66
SHA1c5ba7123d30b5f4d9dae94ae757cf408005b7ddc
SHA2567b6c0634f6670bc1eb45bc7f90fea42aac130298094235152ccd30c2bda2cc71
SHA5128012c770d8d6f72a1f9e8abd5356365d53b4b106d2f6a1c9038ba5a03e9849f22c36f25acf94d205d3eebdb34259aa38095fe722e55c1c9cb939ab1c04fdcd56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559803c807fcf1bc45e27f94634b8b8fa
SHA1461737de7266477939dc8d1318e9766c6101890e
SHA25671591b85701733d88aa41c442114da30d32ed91a58d4dc9f3bf0637f7da79b27
SHA512d2f64eb423ef74e9317f9021fe9834cac93c06cf74b125de744a35c7ff82bd86c78a240934f559b0fe74c07c518534d91219cafa2fa3f51cc4993fb15375f5e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbbb02783ce8bc5fcc0322502851e4a0
SHA1335deec682ff9c0f6d8fc829e0de3f20b2c466f3
SHA2568ed88132620173c4b3fbea26a712d933577e58d36d4efbf330e6b80e1e908751
SHA512f4d3673fdcc32d6eae608fc4f6375de8f32ae7f5c359eb0914ad7beade2909fb8fd1bf2e00be51f2fe87f3f8c355ea2a6c41a7b70bb6a28a72d79f011c262313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d77e77e88759d464703ddbdd3c661c24
SHA1d59af030562004be12774e6adcf878d302b46312
SHA25669ca806b9df95943808cf58ec8f6ee9d0c045aa0a9a451c3824533a1964ef110
SHA512e15d31fbbef9aaf44b288bf636c5b2aebea02f8adfead4c4abd183394d3007bb2e447c4537190c592b6eed91173b7243f44e1c84a295f55ab9a132cc9ddc4a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526f75c6096f8f7e7a5ab7dc47bf42c33
SHA161db794b8a4527e0dc4b1b2b5684493ffc19bbe9
SHA25691463799084e31c9f02a6a05c1b1b607436022f03bfe729adb64076cc99c0893
SHA5122038d9c9a8c341188380c91f3f091ea841e4699bedf3481a09140d98c2a0b59511f186be3e34ab6901c974b560d0d320ae796a2d658b00f759faf018766f301d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb47f8b20bb30c86d701ae15e2c83973
SHA17ae03bd163a2c9e5b05b4ee924b1dc43c0e8e877
SHA2568115af6f486403a01cb79533780b2333c3d0a7b09e19ae890a2942c01e8bb702
SHA512d2d48c3b3683af7eba3dc4e379f4939cf3aaab74d5359a079d480091b91ab00c85b7d94b75676078b4c3a89ad2c22d3486abc7053d3855ffacd3274d672d7338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf44ae74dc5929cbe453e101f25203a3
SHA1e25c46cfeb067d31e52469931d09b6b2a45c3a56
SHA2566d45fbcce9012537e87e347ccb417cba2f6484a6a6dc97c4831a5481c87f7af3
SHA512a7cea7ffefad8c4c5557193f1af1b4145651242630e57fdd0f8e65bce2994e96d53ce5e7166818dd12b58591c8457c225afef84c09d0cbeefe3b8a4a2616847b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee52bf0dc15f3eb4062dd4786fda3f34
SHA1ade69d7deae06a83e2fb9858072b010961f51796
SHA25694357c889d2bc8fac3df3d057406e150db65d0b061b45a90b8a1644a0f1791c5
SHA512d57026a3c36fc4fa7b28ebbd4ccd2b40792468f307ca2baedf09a2a65a1f79a49a813fc3eeb27476d5b7d60aac974267322cb3827daffa9852c95eaf32754c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58446f1d7d6cd99f4a0ad3e9b6e3b149b
SHA1504d44c3e07e193996775f340488b859c31818c0
SHA25694618e383887342c9bcc9d692ba2a9a306701d012469c2ed9fed29d82440d9ad
SHA51283b51cf7ba8838d9d4c44680c36a56c69489fc21731a7171a3f0595c084e472830a929e4140bb5663b9b33e1f10da0afa43899f0d3d2a6084d0ff10e97d038b9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a