Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
681f89726bd1690133b0c688fc22b271_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
681f89726bd1690133b0c688fc22b271_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
681f89726bd1690133b0c688fc22b271_JaffaCakes118.html
-
Size
3KB
-
MD5
681f89726bd1690133b0c688fc22b271
-
SHA1
7c65fe7b3569da776f69502222ae40d318f7fc0f
-
SHA256
7e96971711ccde9a9b54c5d077227e0db575f2cb8329575402f6e0c39f05527e
-
SHA512
a94d8f29f58f24e07ed29f8be1d7613f6fafa830674562265ac1908bf78f7cadba4ba227494ca49beade14ddbc93f38264e7c45168fd101577f5bb4627bdeb1a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06e901472acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ff65422243c7114e93e6dbaad6a35de9000000000200000000001066000000010000200000009f7f3eaf53032f27dbf714b90be70024189c374d4a9e8c73ae0168ed7637bcdb000000000e80000000020000200000002396f8305c01a183a7900d22867c95414c5d6ab47907b2fa64403a72676b0da920000000e37e7a6d907a4ea1bf51fde8dff3593e4c70b7fc5c6caa14535529b1a7cc632c40000000f51bae767ab272c8555bd3e66640abd3bd144c6a66903884eaa812bef773e34bbe5b996dea5cf4a454aa4a2edb5b5241f63d88cb83cf40683a6a4a2dfcce695c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FD025C1-1865-11EF-A965-CAFA5A0A62FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422562729" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2080 2868 iexplore.exe 28 PID 2868 wrote to memory of 2080 2868 iexplore.exe 28 PID 2868 wrote to memory of 2080 2868 iexplore.exe 28 PID 2868 wrote to memory of 2080 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\681f89726bd1690133b0c688fc22b271_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56af4b8923c546cd47806620ad0a70595
SHA111ee8af5e98015c375da3401a6fd28f0bd47f3e7
SHA256d0c28658449e74162edbec149e6d181f48bff39b421c23b086079016b5705965
SHA512b197d6b820e95b162d75347f28d1f50dccfd19bba2d5c5e66534caa617c4da87703012d59db12363bda89129ed93e9224d8ed9369cfa504003cfd9deb423da74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5949cb2b8d06b09927f9df0d8d114c1b4
SHA1cf074d7cf8e2752004504ded217b249145caf028
SHA256dd15db4ddd4983ead6179df9329cd2034fdb47df8d2450b17d49d23674cb8cac
SHA5125bec598b38ae34179d4912ddbd4c18779779e2276c37e55459d5c27f9595cf2aef1ae4da2c45c6966e22ecfb924a63c284c67d2b0f973a03d44f60834191d53d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b974f9f6e133441d5fa51a68db1e3234
SHA15a8ffeace4ba593701a32117851bc172be5fec97
SHA25652db00bef9a28931a88bdc62e3efaf7641c671480272276aac4fe72011a2b6a2
SHA512fd87e7d82446439e66f2f8de263ebd8ec808b3cfb8f35f2723a1609c914942a66c9ed94494fb152c12cda694740357756d699e81e6d8e1608afc1a354f1ad9a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae034ad5374777f225ded5495cc2abdf
SHA1e2c43b4a8a32d36129bff52ef8710d9379362efc
SHA25658be5653ac12bc71c230bf2fc2003edca3ecd3c926e05c2bc5a128744a30ad92
SHA5126c5f772a5f8c3e4a61785f6fa83cfd9aac5561d715604a377043f8866c804b6a8ab91a3f5825d13f7f2fe1d9d686451bb9c9dd9e718140403579abe058c975dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f92092f51f1565cd0003cf2eab479ac4
SHA164ac184f9893fc41e35ad9361d446765cbaac977
SHA2567091093f14888ebf217e2fe5e6b8271deccf3989f12b5739d725848bf1b78520
SHA512f3bbce367336aa1b46cd803e7fe3c69f88a4acd67016301984042489fb738835d52d6576b26bba7fcb734c16fcf10c0e20de43c0a3368a86143808924a796686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7ac0fd5d1f02a95d72a9960d3c0e11a
SHA194a853cb7c619cf15c253cae5731eb5db771325f
SHA256df46783a11c5cfd764f6692097207422ca48431d3b6fc0c25e1d75a567c0cdc6
SHA51202cfd1a99f2f8f3b73fee9e9b97f8b79b9cfe135b762e799751adb4fac410d2118636a183311ce68347fca60dcc8b7257a0467cb4053eda05bbc5f95fbb5a8a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5888403c265867ba12c05b98af82c16e9
SHA1423a3c0acdcc2fc45fa4b610b081f2993f999746
SHA256bfd1333a46da7e377761a59e41546af9780d2f88e48010b85fd3145b243d35d2
SHA51274d1793320b2837c5afbeb33ff85b94230d70c33c79d388e34a8d34f4bf261aa8e97773203b1c413abdf91a9b3dbe2cce4bef5cf237a7f6a679f18ceb5219674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a372dd7428e554f4a5095ce4a4e75c00
SHA177e8718e9530e4a899603ba862c9d538543e22d5
SHA25601f258e00daf386ff76fdc6178f4bc1d19f76ddd9d4bda41d80d558d85c4d82f
SHA5120c00a661e5c840b1940202cf35c5489dc1cdf39b4b36cb4cba7acd6b44e1069bb21a0e6256bbbb55d32902f58bab87cfbe7c9b67d5ac9b446e49db558895eb88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d163b4557e1bf9490ce2d050e285df1
SHA1920a35a7dabdfdd26943d83fd9c867bc4f4177ce
SHA25697517a69057317f3dcb9828b6923eb583b76d9619fdd683e77927fb78bda5d08
SHA512ce3e9b9f106697b5fac8ba22f0b16e2044dba2b1e6580d3dad0d776bcf9667c4049042ecc0b83e550387ff874276e5219642191bd5b176e52fa0947db5e84ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58961dfb818780afde84adbdaa4ba04b8
SHA1ab8c44e1cce86374d48ebd9e1e489ec1c9c59288
SHA2563886a92ea0990de002cee2261183c9d13c6d940098ea73def33ea0460b05b65a
SHA5128d19439c0158b444adc06e1fd77bde94a4a28ec0360550078e481e5f0566e2b422b1b0259de9084b0aa69bb250a7ec8db13c45243d1131b6d2c4634cdcdbdd42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5116cd7b75576f74aee2c20ada4c67784
SHA1df1bc4165558f730a2160caf7741b96cb3f4e721
SHA256827397b4b765f4ce70cc038aa948cbb78de07dbf61b2a0a7531f2ed845f70619
SHA512153e9c775d24c1be3fbcec0ef43721f2a81dff4e2189aaac16de5f46eb29cc8fea8f6fa44a81232fc809b943e90999c12f01c00b1d43ea1d08cb7f278f7a9aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a05868be27f5ba353ddfc59c23ef00a
SHA1a6f9888f44ad5e0adf1302c501964cdff1184317
SHA25609d013cffd41c60bf0190ae15ee6fd60f38230ec2c74d6f2d08a76094b06d49c
SHA512dcc054af8a028595614797f3206514881386e3203b3d4a07cc44d6c5980481139fc68b62bf521091ce20d5d249524d0236f52367057c15315afd77ca0386c2e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a3542ecf2466b8ef34e0212c31e85ee
SHA156142ad51cd653dab541970c69922ccd1a5b1ac6
SHA256c417032814882003639cbb33529b105d4545d70e7d39d471b11195dc1f872501
SHA5120cc4c6f2e5b4827c775fa87b212a0a3c78664b9a2bea01b2e42d0b166be89c7d8253764b883fd5560d305dd9bb2500d1704774a11b5cb3e019dcd0c0157b51ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50abfe3d0f789462b13ace07bbd341ba6
SHA18b7850ea4f0ab68cd49019d395a9ffec16bdf192
SHA2564fa609afc61f89e35415ebc7557ed6e72f75d7352b9fe4d01d24424bd9acd1ca
SHA512769e0fa786799aad019611afaee54b3076f8dee729897e2339ee2c2630a7d1759a1ac167a73576147f6f9f2d73b2bffdb909caa797a9cd0f60cbff896f695664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d17d2dad85141d29dbee0dfedf5c103
SHA1f658a242ece1a39db49122fa903c476f1e8a811f
SHA256037ff7b71a54eba193bf9afa8a84aeae349bab2c090c241e9488acb511b7faa9
SHA51290b8db97cb59512d177a9428643fb6ec1755b644a12d8a82ac6736c623fda6ffe5d1d176401dd96f2ec99658a295ab8a3d0d4f0d09f510aa165563a1b985b7f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b261c048be9d45ed692f71901cbabbc
SHA1ea851a0b89f45dee3114d6ea063a21082f923f21
SHA256d4528b51407b38b0620c305a8f45c9061794123db91ba1a556106399a033efdc
SHA512e2168fe7a027febad083125304f0b5d307975e131e24ca60f3d78d5562515582742e0c6a721de974594714be475f0c571d9fd3aabddf8d68d12e25329fad23a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5913073b5c8062919b120dd83b6afd133
SHA104f539ceacccab1686294b5ee0541168e4f0632b
SHA256e3805c4514a928e447db2f12fb5098ae8a3413eba4d7b39d90f9fb3b305a5122
SHA5126489b76e64135c5876076b2a7d488815bded3dcab4b96843be8ab4e8ac0c4fb78b3834ca3fc06536f91e4365c0024cd4b99ad44cea1c472bf4db1dc5573f4e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d73d51e54e3a436b5613ba0fbcde3e6
SHA1c82bfda1bb5b6f37e28d2f36a92caf83437eb1f4
SHA256cb059b548a5b0571037c81369a403dcc9082583b0dfc8b7e6dc1e24e3e67bfef
SHA5120ae848bf2bad5bc4ade98025480e2f11bb2f002646ba05f3e2cf63c849050f53c12eab5a48b70819e5b464836bd3e9c00fab0aff09c4208c2629aeb526daee02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51160f1dcd55acc9c933950fdfff7f80a
SHA11bd6d1f98a8395fd444aab73a52188cb16deb3b1
SHA2560496b47db7c617319f1d31019df6c7d9fe24cee0c45e1a3b354a379ca35db6e2
SHA512b4f44d2f87579652db51005cf6c92fd010b4e075fba9594b9a7fed5b27958a13934ba08052e6e9e26088ee9b542e450a419bedb11cf85c196d76ff188923361a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560551b69f5f49d8bd80171f05b631b34
SHA18902b634a2940450392e93a57aa2da3a9c2684d3
SHA25664b2c895c096f89c9be51160553b9161d598cd2fca193db8c25d30d66e7da569
SHA5124d1653f57033ae5b1dc25ad8f293e19fc5a1e13fffa336a3fb8a06a1882b1d4d34dbe04dc0af02bca123bbeb118bcd5c44d0efa2a6e2776119e47035bed52e51
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a