Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 12:22
Static task
static1
Behavioral task
behavioral1
Sample
5f0c0fa9e787d59c368c1b20479de631_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5f0c0fa9e787d59c368c1b20479de631_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5f0c0fa9e787d59c368c1b20479de631_JaffaCakes118.html
-
Size
3KB
-
MD5
5f0c0fa9e787d59c368c1b20479de631
-
SHA1
73ae0c4b35fb4b9ebde5a8ceb31819d09fc56fb4
-
SHA256
172d9378b3ff52ef0c5df0c379c7d789de56dd679ee126a6702dd15ae8362fa0
-
SHA512
c0e1b1832e9a5ee52346c63d2ebd435d3f7134fcd2f04ae589da59e47e34266cfc8791d310cf82521552ed58263fdbe748e84d1714fefa1533988ba13c64b5c0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92F98891-16A3-11EF-9CE2-EAAAC4CFEF2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d4b267b0aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422369595" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000026c42723f8a2926e6a9a83c52f395ca1dd7675c5d6b556cf54bbdc7d6209f2ba000000000e8000000002000020000000634c3155813b7aac45f72da59c159af7e3c14a717e81195a525ca2dece04894620000000f0c8569685b00f700a547252c82622faf1e3e7293e49d9cd0c2f896016b482d540000000414acc619743c4ae47366bd0b6f4f3d8f1c5be84ee25ec77e425846c00c69ec2e26de8ef2b332d5d98a8e1d404e68d6d142f1969ed6d5a7acc4e5b8998924970 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 3008 2020 iexplore.exe 28 PID 2020 wrote to memory of 3008 2020 iexplore.exe 28 PID 2020 wrote to memory of 3008 2020 iexplore.exe 28 PID 2020 wrote to memory of 3008 2020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f0c0fa9e787d59c368c1b20479de631_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e3c3364e0199b52a3eb94b10c6b1f0a
SHA15834644fced4016a8af6350bbba20ebaf2b41125
SHA25618de7ea2cb825fb127417155027ad64b1be3090bab7921f3212f00ddd7230bcb
SHA512bcf26117582b5c712e4c3c527dccb5163c48bd90a6797d617540de3adfe8ee01fa4803a05572813c9d5c2de985fe7e9036ff44b93326c0dc9f45434c0bc65ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599e42a5b0d6aefe90377de4e591cc79c
SHA1387d2a040e01508d25c2a1f58ac9c3973064b91f
SHA256d580e648142d666357f3f62a8c42219bb97c0b30bc0fbd77f0c71ad7590e1bb2
SHA512024845ee99c4fa36b19a9e6dd81e5fc952d341560e3f8508d81767d840d3ed2a45059d858e7d8f35f5e30f019b3b44e8d64ee6ca2c18cc65b68265c3f351f496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5018176a6e4bf5e464b402dff881c88
SHA1f749dbab0d31ea09beb37d4f4837982d90e2c94a
SHA2569453a18196ce1e068aead222cc72a5c99a1df4e9357226135a7c41b1f6431ddb
SHA5122dc2147c817fb2377739165e47d1d5f977062266efbb15c6331d338c94f466bc716f49d2616e5b0fba7f04969bcfca0af7f676c7f14df1dc9d93432fecd86c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59784bb918b9de2ec1fe77f87eb368892
SHA16256907bb76960f58a4aeba698f9fbd413384274
SHA25652225044b74bfb1e7f4a29331ab3619af7bf56a4c8fbec03816de7aa529d3422
SHA512342b13bfc86241f4ef0e3959adb230fe34689081effcecf0f8303dbd1502e3bf72f7f6172ff5c810ca022b1f9095c04e7c0df5ae28d7ca3a2f66b1dbd2b7c80e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591ae27fbff6f95c39864616ba82dbd28
SHA1115532a8f768614c49b7e46c4e32b525c1257d29
SHA256195ad360285fe88332ddf9b145bc3a8987e7a069d92d0453c90e8626ea70bdba
SHA512281b91d67bbd058f392fff67c560eb9b7b374b8febd2f9fe15764cb26338333840af61b70052177816a32be52e140b063541a55ebb5f468cdb953106c48254ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c497c0f2703d9ef6b79b0cbbb4210ba
SHA1952f4a2dc1fdd636eb296ca861a0c79e16a4eba5
SHA256058ea1b98e8090acdb576d479e85a9e8f151c56c3b7252abf7d2c02b646f843a
SHA5128d0602f0d601e1a033edf1e3da1f0f49ea9ec4f51f7f75089b351b5c4c38f95488f4a5ebc4c7fb95f9cb54d46db147079e6f4dcf3373a3da42e66436319be6ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f02f8eb4131c44e22e6e918fcfa2cb7
SHA1286216c0a99c9428f3323c8a0b2fc63985996234
SHA256a5a4623d17ca6c76f59f72d1587e64ebb24b45176f8fbbf9649920e0aba08c48
SHA512599ba71c2d0ee3597f1e1690949ac41bc3eac1a4f098719e2cfebd06f44addbf380edecc641844c7e5017c87a17b8394b71334b7e6c21642cdfba8034a83a070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53eaf842c2572e89574cb329a6bbbe547
SHA1ac8d5b31e42929e5d88491ed2928b932ca70f71e
SHA25620181e462067aa8f0bc0578c1b7acb6c8829208c7dcc0fb3ff6b39678ac68200
SHA512d3b91ad84453e052982f8d8a61356a60804c0e2fe53ab07163ec0c6a4c6f0bb1bc8aee7f977bbf7e2fef9d8b177e3f0e4ab0e5d797fea9caf867094cffe00bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac5ee39c8531864633704afc98ac78f6
SHA1f0ffe2a4877048a8abcc8d49b5987ffc1da50e4f
SHA2561c584e103368cc9012c287ce5807950bcd3e8f3cbcce5339ad2b5df2b434fb9d
SHA512d87942c7a509f0c731eba10063b04397343123094c996c22aee0a6a9941a74233a18c7aa04e67594cebb5a1a143d36b49dbf5bbf75e2b4ec8877b32b7a038661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e542df3d81b83a9875c4ec7db1c9951
SHA140ee2d12f71857c58b4eb4daacd5da76c4302115
SHA256429ddeb8f277e707fbcc991268ae70502e37b01370bb5458f29acf4adcbc0f70
SHA512dd697d5bca23810c66e67a341ec3af207358cca4148df30b75b6ca0756299017dd31af28d9ab0ae28a2028bc2021be0d5906e8701ccc7e7ffb7d7cb320d493b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583699e057388cd39f630807e4d59c2c8
SHA12511f070e404ebd24531f6a5724bcf570ee32ddf
SHA2563642b4fe0d8a215ab7b7d1b3111f17f04b61b6a8858f7c510d42f072f8a254c4
SHA512e484e81af2f3d874f346d1d73af93d9d4332830d8a5479a96ebd2960ac327b199295b367554ae5de5ecb5c1c2f0244600ef5708ed31658ec2cba3f88fbb5257a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb9bbeefe2f5b346edf16345fba59157
SHA13938d2d52432562b84ecf3350f007a70f666bd88
SHA256a6d8b2cc08cb5ff4ddc8298fc61634f668f985cfc0aa1a08a50fb5f7c71bc3b3
SHA5129956d60c3939ddfcc4b80c3fa342497ce3266e325c61f74804a49407bfcfeeeee68af2755489b69e5d7ee10ca93f05b3040eead825f524a25918e10b5122bc91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e8d072f5d724ad6de81f111bfd8ed4c
SHA1a4ce7db889aa017242d4b67b48a08aaca028bb53
SHA256d077e95aa9efae7a8f427041c528823b7f20d8e01dc18822c32567db293285c9
SHA5124479d117f565c794ebad7f75fe75a13a6bc205466b6349c7d1710ed613de0676ab6d138bb7410270a414d1758142db99b3d479436d83442356a9454d02c78ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f2898f9a1c6ba957cf4eed4ad1f0a2f
SHA1a8f7a185a04290ec389bc68c9d2f3ecb8fd716f3
SHA2560627e0850d01aed3f9ad475ce0b7f2a87e5a36b8b1841e904cd5efa9d216d5ad
SHA5126abcc4fc02afbded41df2689ea200f729e00292052c49dbf9e81ad33764d761682470d8e3a465481f9091ba691ca956724c4fcc990c39a5cc1cb846dbf95299a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b0ff812a4277fe235a55e454c2d99b9
SHA1591f25a1123d0e6ef1fbb7d36929c95f665f843d
SHA2561c3645113b389871b9a3a4e5ac5a074af15b28db55216cfc3a17666f56e5893e
SHA5124d20a841d3e4efe09f79f042faea9d00d798c43f8c67023aa99eff8192063b07ec9dcb31a928f69033bae90aa8570974edc2f83ff3c059fe7157efa701d76259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac0fc38263a6fce61eff5107f0aad3b8
SHA1db539851b783ba363f3ba4f5dbdf22344e648bfc
SHA256d02cafbeb230928f379726a1333a9ead119480472fb859288057e60e44f9fca8
SHA5126d6734661f0aa9da0b5d62a9b003b9479d43b10d06aa86fb1a7dba5eec49e957de80f0ac2f29019e615aac1763bc9a18f736614913ecd5596fe1e22e7fe268db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51de5197963d4386997db4aafdda20021
SHA1dd0edc7cb4631b1b0d81b7a065e49fab7048311b
SHA256c3d684597524ad939896b3658428e4db462842578b383920c742f780dc3e665e
SHA512cf26ae30ca2321c6b9b62919fcef970e7ed7696df4ba0638bcd042b664340fb7c68dd99ed653c2df3fd1ad552d547fae110d676d52f3d1688f7b6bc73bb4394f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d802dc954c2f845739f02c3756b39021
SHA1222a97ce67ea4aec00395995e60f51095c890322
SHA256f6ec7a16dba9c852c8ac269717f9b2e5a2be9e21d7f6f5de8c581ed6c2cd353a
SHA5126197b1fdf9ccc20c9553f71dc369f58599f317b2be727af5eb64f945c510b713c7b76c2cf372b8d6240f0c3b5f81962f986eeac17d73837899dfdc9f068ff035
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a