Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 21:14
Static task
static1
Behavioral task
behavioral1
Sample
5b81781bc959926d90b9b703044b2f7a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b81781bc959926d90b9b703044b2f7a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5b81781bc959926d90b9b703044b2f7a_JaffaCakes118.html
-
Size
985B
-
MD5
5b81781bc959926d90b9b703044b2f7a
-
SHA1
4138ebcf2ca00108460d0a723dd318a19054795b
-
SHA256
c449dbb36f7bd501564fb3ae8923d79c23aa7c67d6025007570ffeac4f104d43
-
SHA512
c93cabe6bf12a483f63cf5b8eb3743ea939183250e93e5717a6db7efd54fe77a9cc3b9bfa09431c4926452f164f85ea83feab4a5083540442173146ade1159d3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0547181-1624-11EF-B991-7EEA931DE775} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000e88c363c62a424d636659e4edd2acc38562f5881c623f3841654e3becba1d745000000000e8000000002000020000000157c99f04704258442f6f199f42e8c169cb0001df090075112d228ee92a49eab2000000027e51e7beacd64a66913d2e0f2e7675a7f7b1d17eae3e135d83c0266fd8721954000000025523970d3d57c9a6c87589d8940230f53b9bb8eac90c363fbae2002fcf8267e5ca591edde3a2475763cdee19e26780ce993afdb7fef89bb6ef9ec6c60460bc0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422315125" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a051bc9431aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2232 2164 iexplore.exe 28 PID 2164 wrote to memory of 2232 2164 iexplore.exe 28 PID 2164 wrote to memory of 2232 2164 iexplore.exe 28 PID 2164 wrote to memory of 2232 2164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b81781bc959926d90b9b703044b2f7a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2d1163caae0f676330491f3c3ad1d53
SHA13445ca5c161043b7af7f8143c696d19d5876ce8a
SHA25615001b7f516450dd878cc52f0d3e522cd4ef1c7ec452a4f675ae7d9162766848
SHA5122702e58358ce6a4a67831a6b28e77fcb098a88049967585434a8ea6fdcb66ede7d6ed280a4720e2e69ec46454d450f3c716941a6182ac853fd659b3236518922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6830bb3a42086c46dafeed2cb372e70
SHA1a34f007b9a4a1698a2d411f371ba71e645e4315d
SHA2566f790984afd67fd50752b6bb7b1b6927b3367638c2c6ce6100498809ca19ab15
SHA512d659047deb628c52acbbf4ac2d527d3375f25269da281711153ad534181f45a79cc785a67fb7f290c1be69feb55dd2fde7bfa142521f6b28c567382503cedca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e6acc5be217bdb8fd3ad1a5d11e1ebb
SHA119bb6fa361896c0db2c1b6cb6405df4b7f90a782
SHA256564e9ebcac3bca4dff6f8dd488c67d08f8f7faaf97b492b345b624ad30997893
SHA512d646ab6f09c3af2ce8640e530f0bec6cbf4f258a588df905ff722c9238b991c1229bd5cca6ce153bc88eb75b63935afd18db7f660277ae6485c1fec479326d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da69daeb6156aa311e4a7a63a3f69328
SHA120ab6ce2148bb9beab37c8426b11920b559b93c7
SHA256085ca1deb9b42599ce15140d5324acec927e35915a60094505e93a9cb42b6075
SHA51245b0a585af802bb72cb2d4edd48b5955ed5b4f5d1912b397fec3355ddb704d146bd0172f81b2a56d130c3dfb72a6b2e270a919dd6f0d594de6bfb43c537786ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0b34e5361339465302a807645b7179d
SHA15ef45276fdc0255e876a6f7fee96bf061a9108b4
SHA2560d19275c8b21060fa4f01c1f783a4d037b1ee8ba14d606280d23b3faeb2854a5
SHA512ebe489e39ca71a7f7f9a4ec881c99a84abee60c237990828247ebfaf9c51a3868f1efb66da4e45f6bc6c9e45a9614613fb83c42c74c24bdedd2ad6f6433572fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aaab6826a1a45167c7708c1f9a8b8b4
SHA1d6e4272a6b7a35d70fe17bfd0cd47fa132ae300f
SHA25604439e24c8c04907342016af6bce7661f7c717d0dcee3ca60f7ca713b40baf3d
SHA512b9268e107e2b170fb8212fba42fc414654db51086ca4859540c42106891ca5f36ee342ce16adbeca5c1eef40ecd390c0e006e2575d807ea980af4e2d2c327972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a91e961e982228fc64275f5400c36241
SHA17a70930d03cd8589bce4ec97d3b3bb31bb6a6b41
SHA2565874e62db13a574a92d7ae265fcacf73af4a48b9e34583d98a077a9bcf16e745
SHA512ed16d1c52999c08b398a180aaf73572e4a104c7ff15b7a72798f5e9a19af55be63f85b5391873c446974d9d56e56c84e0d7e16fe950569e8feeb83da7a6f9bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb58d38d1dca69d8531c235494d31192
SHA1f04c727f1442778501dcad7cb354c6178536ef49
SHA256ab50aa22599916ceaf6fb5b291ee6bbdaa532d789b4752d931a5e659f8a09914
SHA51212e1ff2cfa87fd7beba2e019f2353134ce848b60bdd280c54b84a54f06efd8a43e5703c6cd283cccc4a2f5c64e95401fb37e418a28664ef31beefb1b046e3eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffe404834affd7a7c78c508a1ffbdc81
SHA191af8897beed67eb340c73beb414fb184fc47c56
SHA256e54d8dcbe1aaa0bf2bd0e4b441face8c1799046e121d8aad58cfff1e36159bc5
SHA512c8812eaa94f8b0f128ea457d8853a642aaada86e24a96bbec1add3cda737c4e96a9d41164689a5e61d298fb8a0c4a0f3e858aabdb4f7efac3326894ecc5ea38f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac0f36873b018be86fe3827743d66270
SHA15af323f632ebc1e48ffb354f8693f86cdaec620c
SHA25657aa7f259cdf0d3e45aadbffcbb14c6f26d8f249d125ff0a35a78702b6ee9328
SHA512a8c72e91fef2a6b99bdb3872164641780cdd0ea3d41c70cf0ab88aa66bedbbb70177cf14fd4c69ebc907b0c91db020f34b331c60daf6536cea395abe41edbc16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9912ab97e5be6a9050fbae86b3ab907
SHA1db058568c657eb8fdb5737f78727ffb254ffa302
SHA256d93bfaf8f405394a5a1d7db0dda087b02f176c5c282d5602f3ba2708f3c1be81
SHA5128a41054f6e3a7c1158aa5727cf599a0f6b85e58c0f2e813b1e02478748437142ccdb50066b1236e6fcab6c60eca80984398fd56c6cf7d2f9647b2120ae6008c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b12f1596f9f6d04d5088fbce027686a1
SHA1febf529a01ce4816d1485da89e003531188459da
SHA2569904ebe4df747610d685322b294ae98c1f41365ad1cd2e65b889abf92e01f0fc
SHA51234654cea4f8c43aa8240099405ce280cf3a217ab94edc857ec4260ea062cbb91142c994ab3a18e4cba475b43a4d363bc3fb2b7a43ede5e1106c6328ed053ddfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a4011084fe52c26870eb8b1fcd18055
SHA1af90fb8beffec5b8ac9cc7f5891bbf716c8968d6
SHA256c4cc8fd7bf1f108e172ef42f33bba70352330f1030c78c836a9c89f9a6018404
SHA5121d5811955a0d5d5a1520a0174a0cd504096fa5e87dabcacb9fc86d515c68b5331fd5d074e811db54393a70c8f4e2283e67c2b020bf72936fe8d275cda00961dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6a11a9a675f7abee57eaffd9884e156
SHA1fcd5d2624661344e0d33e1c4147e71c0297a0a00
SHA2568cd2840783a3251c0ebca529b10a29766ab1ce88f9d28d7e42c8a39f4457b287
SHA5121832510e3ead3e22a39697db46708100e3ae89ed96d30049f197ebb08c59c9b1fcb83909d2800ede2692ae047ea712b2c6888d8d5a9f567f64d6adfe5dc54fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c85953371cff7bba697a307f86a86e1a
SHA154cefb0beecdd2225bc711eddd06ab24b6855c4a
SHA256afa3e483d34220f21c8de3edb9969eca0572400fa2e0eb067b83f83f2715a90c
SHA5128a2aba2e98c6730b3ae985a13f89d69f36727267bd0503dd9ba9b3d561931189dc73fa2e8416589ff9f058189ec7578f530948c60e2684afd57e5677fccccb09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51484386eff7d18f5f9c8c9c2040f5344
SHA14c3840258d6dde3c9b868077e373be353aa0426d
SHA2563e7b50a2144bff527e3cc8cd8388e22f2237382ece004e3d851d3c58c58d5f8a
SHA5123e79a2ba106640badfb247aed94ddb925ef89e9d0903f1d28abca958b9440a452bdb001a542644b5c5f6051f29339e3cafd4d7cd5360eb341d17c5e4e23abffa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a