Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
67421d482b69d0c49f48d3b426b4d70b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
67421d482b69d0c49f48d3b426b4d70b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
67421d482b69d0c49f48d3b426b4d70b_JaffaCakes118.html
-
Size
2KB
-
MD5
67421d482b69d0c49f48d3b426b4d70b
-
SHA1
a47fb92618f0e5054b844900ffc1880e159da8c5
-
SHA256
601b11be95a0423ab3868c861d46101f0197cb1849ba38e1141fa9aabd1fd0df
-
SHA512
cf080d7b36ab7c6b9f382a6e1f39d2465b16d4a6f65ba2b0078bcc1504b29cf55c218b9b914d25b96a81a2969c2ea33f4593df181527329c9436cda43b59e298
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D93BFDE1-183A-11EF-AB14-E299A69EE862} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422544517" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f9d9ad47acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000008af4c2be327d94ea506ba350f4a1ce200000000020000000000106600000001000020000000fc408aeb34edd0ea79dd6061ebdb3fd411af8314ca0281a0d31f0ffed04110d7000000000e8000000002000020000000a992896990c58c969c483466f8aac64265596678d722c703223236ca53189dc520000000564a9f9144e585cc61c218e47db9a8a022cd6d1149f2b9f7da6af71d8742190d4000000010d49a8363975b51ff085c40bdad1430873e900e918b6e31df38e3e9ebdafc7a2ea288a17d3bb94bdde23ae377c5cadbddf5c689a6d10d6407c79bf72877e2fc iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2344 2988 iexplore.exe 28 PID 2988 wrote to memory of 2344 2988 iexplore.exe 28 PID 2988 wrote to memory of 2344 2988 iexplore.exe 28 PID 2988 wrote to memory of 2344 2988 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\67421d482b69d0c49f48d3b426b4d70b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e70c89f934b2ab5f29265d7bef56183b
SHA1eea59d2103f34889a151efa7c17d8310dff6c5ff
SHA256771ad4ceecf6b2f005f50898b9d2b6a103c3e71de24fb7d994e665694320e056
SHA5129c15e02a008edaebebc4dd3a599e4a6beea3ee9eb74ebbbe9891706fad0c3f7465830e8fed7d000a7c3f714881822092870c82e22b082d2ffe193a091ab513ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5259a592614a01d304b40d92ac0b07eb6
SHA11bdf8e9e861f1be8e703adfa4d77e30f4139a89b
SHA256412aed20a47af75605f7142ce23444e885e78e17cee33261c98f80889deeb3d9
SHA512faa2ef0b30bd17315416514067a0dcd903284bc1e2dcacbe548c3459d048e7655c56c0a3d19be005d19b14be92a2d2192c0811dd75e49c005286a66cf9d78d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a2481c68930c8cf15f748ea8fa165b2
SHA106cdaa3a88696959509633f8f5092ca73f6c56d3
SHA256ab3f4a0cc4ead012dbd06e19489e87cdba1a9b12a0275039359013eb5cff8c53
SHA51204a94d0e81da77047695b43fec21eeb3b4fad480fd734fce2c4a47bfb78e34934e73f212a381f92db5046619debf91f081d380b78250b426cd42801b3540b131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ac0c6d1cc6f2b2b4483160f56b349a5
SHA10d1c3e0c34ea8114a496f77ee1288403b96b9b65
SHA256efa2f615bcd03ad98667ef674769a77e2075829732ecf7054b90672344417e99
SHA512494b964d9598b32893bba6b9c5ad1dfd02958c212218ea613f107cdb70ab28c36685c485df52ac0a8ef6bc2af3b291f949527d1e6a5f1e7a8b1eee6472a8c09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d448d1fdd541cbdcf11373c1e5d47b54
SHA1e8d535b061a3243c5bd31a38effc96ce11b95a04
SHA25635d0832902f37d1ddfba0894d192985a0c7591308a16cabc6f38a000126c2442
SHA512bff61b38fcfa68bf8154e1b7432715a0d50cd1e8d7b3921a829bd5dcb3046f3bb7dec4b80277eec7d94554ea31cd8973b530d94faa58441819e1ac4b9b20bf72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5221f2f3542b09d82d87e947284d4f81c
SHA1e6436a28390951d5852026fede0da6460944ddc2
SHA25640f969322c6c3f1b00131a52b072f6bbf4966d6cb13de269755073d0ab6b0265
SHA512f6991a12a9aaeedd5e3d4a0fd8dd8015d26c3ef3b0523ff3f697e34f7675e37787a91edd9d11dcd040642d553fb2f09413d222bab3cebd88a58675acd95f8eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508f4baabfcb9b95a4face09e2332a90b
SHA16c7975123b00794143ada84052ec3d283ade8d35
SHA2561fe0f164d6e70494cb56483ae1ccaf189c89bd78f463246ee0eff12ef1ea7dee
SHA512a607e5415303a077f6983790a90974e5e6be2a0de4731ef766e0ede38de100057b5812dd731dae6a8d5e3ca375fbd42f5cb2c87e4f59a0dde2e7dd70f10e69d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bc5e1a57d84d6af950777c3b97d4f52
SHA14e7d7e6f8fed9ac6a09fd4e47b1c4c3f77b7ca91
SHA256cf3b9f7db2617c3af740ab222f2a631f8e523036eb313f4f60583f5e108812b5
SHA512f721f84e9bb21f4b0b446cb7b9f0570d1611b83d6874eb093df4d6b4b1d55d2eb9a07fe8f4513f02ec4d643f004be443619a1af036b9f0e0bde3806c4e0029e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514fc7cde38c8d379d70e6f7a5fe46e3e
SHA1e7a63802127642a1da83b2ba0572c002bc793232
SHA256603d74d3923f6f98fbb3ee3d7d9c3ec1ac3e6ecd125bd7006b3e6f337831441e
SHA512ed0c55cbb9ae1cd39746520de4364642923b6f4b22f3d2fdee8c3068b19d30db236c5ad65bef173fa8652d8c20a4ffdd3a98a74120d6d405b8b88ee0487951d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb04639026ec7fbb961e0bfe4eaf53aa
SHA1e6f568ad0e909b17deafa6d25445843206d4d9d4
SHA256d94a0696c29b02f8ab07afd9921979f4e8f6c39b6650e748ae6ac711b9afae35
SHA5127f2d3cb60a5d5f232bd9300c85277c0a01d13338424586692ef978a9152e4ac932e6db9beb0c763ead1a4896fe7a9e5bbd0a3dbc3645a582c90b3c1c75249afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b646d3dbca9d7ce499369333759da7d
SHA19f6752cf7d5e65c0c46bbcae3e117ac395ab427c
SHA25663cf0eb996f2827f9c2bd8e3465decc4830316c98f527dcbca6da6b4bc5d9295
SHA512e3313ea797f00f6f06d30cc866c7b79f8d5d84efbdb8d6e1a398cfda58a134a85d2eac223799d32eebcb5e684defbf4b800ef5b4ccf314b6ccacc426c491cefa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59275f63a13d7f526f2af2f9ec0dd1212
SHA105b2d1e84f83ce41dc36b8975c43a92b219e40bb
SHA2566c244df2266647aeac741a126f9ecaa1405790b4bd242cc4d481b442182f55cc
SHA512acc726689cd1744b5b3033d381d9ceb1ba2111951f7465fca73fed9684b338bb06e14e91aca6fd10f1847893b01406a0bd9f38a3a63c63c5c526b78088130c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db4a87db86ac0436b606f874168651a5
SHA13b809df3fdfe6eae56353a63bdb723aee9721d7f
SHA2561041482d724840e4d354d75aff806e07f27ee684e97b503427800b9d105748d7
SHA5126cd716736cb888e41e83d20d8941b79250277fb04cf87545928f4062ab442639bbd47a26d2bcfa163ba221d90ae6e4feeda6294b58e809537d7282f9003fbbd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581696ec79a6d4a5b346bd57db3fc17d2
SHA15af586d5e6e23171c76a5bec8cbc1bf2bd05a302
SHA25683c6886cb8dcccad5d2f9d36f51eb0890a81c41195d42e90e0b25d8d5c1a68f9
SHA51252198640a4ad1fe0fbd7999084341bd81a48d174ea77373c5a867d9878b089eb5cc125892b2a027c15d4ed0b263baedcf09a97ca83aab91232e8bd3ee072d193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b74ff2049a79d44a9b99c305372610aa
SHA170216823ef07c35d8340f50083757b672744dd72
SHA256ee0df094c07bbaee10d02b151141834b53fcbaed9010e34e0930d07dbc27630d
SHA5129a3e89980f1fc1b47401dafb0e65165b813f56c770d72595fe8dd195decb8e87d70bbff331b7c1efd0da7db58a53f371a1a51646c6680c102699bb10c2a23352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc1ff5307e489c0727312ba4c4cfe80a
SHA1e609ed7f9b53b2f42da02db0a93f4b291fa61a78
SHA256094be918128fc539207217519ebdc17cdf1fbaad5d588217de0057e06f974f52
SHA512e2bbcd3af6a67eaade71139f295dc472e250bdf6ddd9e81026b50d75f7fda4a7ad5ca3cd1b106108dfcfe82bfd91d9a7594497a7fc72b49e6228d56e0ceab8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f1f2d3d7d9c9411eaa68cb58c989a12
SHA18bc133234b6b19fe549f8c74ffc3be0412ac28bb
SHA256f043f24db3d8cea0eae795ee982767b6bfbb37abaf48d15122e7dcdb1b7e637d
SHA512be3358784ca9fcc8e5a5b2061d8618aec2b5a159558d45d47eb74f9990fb19b4130d50e3aad829b427250817a85c0f34a0d492571053f59385fc7b10b818655b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f77d1c8f66c32c01336bb84f6360126
SHA1ac7ee5717e5471cce8b1925c12a68335dce9bc03
SHA256ed7dfcc91e0a43bbad1e668bdaab4a0ba34fcc76eb4850ff1d07b1b3d3be9720
SHA512fe82aff82d73ea8c14caf6d331f23ec11cb3bba65cfbf2fe1c2c4d1aa905f8671dcca82a96d7d38755bab673f311a77c4f58a6e2c188e8410e112e00b4e71126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da161d83c0cb35162f7a79fc319decce
SHA1f740239bfbcef06b869a87487030ba74f6cf72b3
SHA256cf87501a694d742401e12ccc5ea5ffba7a54e3c8069c1f5a096325cf334a944d
SHA512a713da48adafa3267d8f3e6c9a06f31e61c035e7ae395053b289b41f47e7a235512dfbc61738a0cd585cb3d12f863715212d5461a5e5c936d4348c3e3482342b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552f09e4e736ba5d0e1c1b2d7cd5d4fe0
SHA133ebf337e7a79d119719a4e1f230c96f112bda9d
SHA256f9d194fbffaef785367b9f5ce3a4b4c26e5540b7120cb8db459907174c8fa495
SHA5120c23e50837a5461405d2ad44544698212fd93df6de8a7499e6f6c1ff02a019c2e6bebf80209857e7ed56525a04279e1d768279a00cd81dd7d7ab0b3b67863d38
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a