Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 01:40
Static task
static1
Behavioral task
behavioral1
Sample
70772e7b0386b80cfdb0aa5b33c8c48a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
70772e7b0386b80cfdb0aa5b33c8c48a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
70772e7b0386b80cfdb0aa5b33c8c48a_JaffaCakes118.html
-
Size
3KB
-
MD5
70772e7b0386b80cfdb0aa5b33c8c48a
-
SHA1
fbee74a0b8db8cf9bb1d75fbc4b923465a44ada8
-
SHA256
cd9dd0cfa9cee1a6a173886f141e5c8d7ec80f06f3ff9eae437de496898ef962
-
SHA512
94456c230c1629ba2cc448f41ef78103f8fe518e5cf15c63d25954112d259498f6e305ceb6597581eb20493bab707a684aa279fe0765019174e94167f081108e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6F28461-1A37-11EF-A5A7-5A32F786089A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03c5eab44aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000059c4d56c18ca73429a7b7cd03c54d5b70000000002000000000010660000000100002000000041fa669ad3c19d99f1c1c2c650c98ae9adb27aa4f51b417e4612c8411acc6377000000000e8000000002000020000000239ff6aa567e78df4094de48061a9941f9179c91f693629cafaf1f96cebab813200000000ed217fa2c5da704080f8e9acada11eed6e2558d96b7ddc1888c3446454e5e6440000000732c7c5dcde2a1cf91d25ba51f839351404162cbc1060a8114c955161470909078f2629381ab7c78f58ff46a17ab769e52679880ca41c859567709f86c8d57f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422763128" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2432 2924 iexplore.exe 28 PID 2924 wrote to memory of 2432 2924 iexplore.exe 28 PID 2924 wrote to memory of 2432 2924 iexplore.exe 28 PID 2924 wrote to memory of 2432 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70772e7b0386b80cfdb0aa5b33c8c48a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f9afee607f000b5b229d15d75915afe
SHA1954843ebc5e3fd640d243cb1c269df326b55803d
SHA25677def50761a64baeb53cd5525fdbb7f4bec74a47691441955f099892e5990e9c
SHA5123247665db8f9907e8efda0f4b04548b569377307963f4adafeb131e1e0817c1ddb51c62f0b345ccd9173eb06a24e789c10a23d9fc7e75002207cc2e60c79a192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dbb7b2aebd2748d55206da5242609b0
SHA17d09684165fe99c61c9f0dda2c771ccf8ee9c9bd
SHA256aafa021ff3e5b12d5653053c88cceff0eefd0e056fa53bd37b3c4e6fb385ce71
SHA5127d8e754100d18a78e165fdd3344ae5fb0df502faa759df926ac6658a3ef2f417fce814a5da0590704d75f620588929f076a1f7eee893a5e4ddb0c0ad4da474a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ec281219bdb4f31279e98c8928d94fa
SHA1c5e6101c837063af08906942a90fe417348fd12a
SHA256da8b9c1079dffb0e5d0bd1b937fd72f6ace6a6d93b9af179f6eb62e68fe2b324
SHA51288915ffc3e1985091763d25d3071acd68e96eb482d0059b4d09add7e728cdcc3b8dbdfcdea887c8977d697948aceb2f139a7ae1669b7ac10c624b344890c00c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c1e628f3322195466492ea02c899c5e
SHA112fcde3ab9c164e3f61df9e04faf2ee3b4eabef5
SHA256538e322434da5737f8561b84fbe489ddf01fb4e797259d3ec70c888ad2a71a4d
SHA512c32f5bcea5e546327f79dddcbbaaeffe08b71ce659913999f568371400a84a07ba875add22ad56b29e957c05fa2346568bdcd563d5a2f34991fb91a49703ab99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522c0bee57471a30ad25bdf401413d8fe
SHA1e07ff97a9c61723c6d71a7581506fffa0c6af8ed
SHA2565d153ee66999f29614a211cc8e1af81fdc2a434d4d62b13521f57b63059080ab
SHA512e4185797125fb54cc64a2e42213297ce9742cc26853adaa94c9ca73006c387be613d84684d2f6a9b75a3540a0aff762ca952e65d86c3ecd32be487f9fd8350f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5398571d583c99f33a180acca38f8ee13
SHA123d9485a1e7ffc14c58e5fd7b9689f2960d1dbf0
SHA256fd110275070458c1e0ae105e86b675d92bdf41bb5ca4c08ff0eedbd2b67d2f68
SHA5121d5dee429a158e32a58a53eec8ed858dcb696769c9a5afa901061dce964a4efe51201a1c3450a975902067ad0ec8c3930dff0bbb0329f3a28fb3aa6478f8a4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5246958c0ab1e8a40fc71a9d2a6e61259
SHA10c4b4a3506bd262d8e4ddddf1201d0f32bf7e396
SHA2569634d7c9ffc0586d0e20ece39859cdb60f0c22f3e06a185daf4a0001fbe5b2a4
SHA512caf30c9f31967bb1f8267ef3137de1dd226cd16d1139196fb4533a12ca835b0de4207d6fa3e54d8ff2bb024b52748fa7f6acf5c5f2b00bda29254f755a149256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534a54dd15fe455839d5affe94e218144
SHA16e3a1a7bab96c1aec24fa8a7f39da15825182bb5
SHA256832684af6a366448fce8282422885ca108841b5e87211f2588b9605dafaf725b
SHA512edde43f1b367dc7230bf2ff7f47ce3ba6782f8e939c2786736624dbe74ac4735d8b21ca0f050b3ee39f6ffaa24f0511b278b90ecd775586832cef0a3e8de9d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5572e9c06aeeee8a4950de52e10c9ace9
SHA1bb689c45b3bc5b88124467e2d4e4a84bdd6a2994
SHA256770046e3782bc76d9cc2facdaf519ee9bd42d0b17facdfec46d95874dd294a44
SHA51237db7dffddacfcee7c1f81ac170f8fb7b65ffa8b5c510b34f8bd9f7c9381dd1f3437b5ca0eb734fbb9ae310a7cee0f407d27c08399d357feea1bbff65790faad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6a90ffded738279cfa7d9e9bd09a99f
SHA12072cbfb60371aa7e97f699df3e5f6f6e9956a27
SHA2561f5ed1f2cdc54f6708ce575109e3a5be02b2cab176e6cc2b99132abfb41c23d5
SHA51292e685a71f6c356072e4ceccde71e602d8309f09fed993259a5af8fd38ec194d5b11d3d3c2bfade35f5653f558dcaeeda06e6bea7d55a47abb901a3445228e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1647106f8f9a9203cda48faad3c4e3f
SHA110a3b2922cc18d387c77640d5a2ec63b7ef78e65
SHA25658c77e4c4e59774a97a9ce657a30a305b1009983abd0604be284721b10bbff48
SHA512e70d48d495505cfa86dcd7e0184aacfffb3f1871069d5c2e25285569d55c2d2ed386664b73229e9a499c10c437389861d42b76ff3dbf3c84e73503275b3740a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2dadc4f5941d92a9c685b59d2431d00
SHA1bdb63c1893e9f2c0b906476b60c704c7839fc010
SHA2560a99a409ac1598483d3b91ced87799dd1beb7d4d9a4f82b25b6b388c88868659
SHA5124d291ce09347c4854c3709573a9e3bc21b1eabfd86f37075c8062624f59f6cfdb46f424c6cd89ba08f5b89dd2fc182daa284b422a4b010c204508ec2ba08c5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a475e22f7d30f6b7b4c90f7885d24493
SHA163126d353954a5e383ce739ba6d9b666fcfa0977
SHA256784d956c16405b9003db52b9cb4329ceebc069d40e3969b87798859993a89696
SHA512340e210aaed8398b760efa98b3e3a1087feceb5d4407a5a1f5c592bf722043acc9f6d8a94ac989d98c94a8489c8455d5071a3709b3ad91d5ebdbb916de7bfcb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58980e4b58d654e04869c3a4773846e49
SHA13e868abbc2ccd3ceeee096d8a12da686b5d8548e
SHA25676291dcc5c8d94f490420fc6dcaae1da8b96803f39710b489ec51f916b7703cd
SHA5127052e7f1eb4228768b04d1db11bc5573812417497d89cb3ad85c0ff6ca44bbf135389715ac2de8f413c1042d3803ffa28b95d962d728f368c30ff6c43808da6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d2f2d133f5dce1cdc4c4751a592811d
SHA1ccb3286643bc906bcbdb598ba7b8d6470d438e14
SHA2565d43f317d73f624b8b0dcfaf5f74d0a6e468564be9c33b4f5766465640c7fac0
SHA5126a2cef8dcb6459d59ac3f3c10edc8f5000e8d39aa23d5636dc16fbc4166ea0adf2134632fe22652e5bd3a13087ffe6f2fed98b194696805a5e72f71b49fca346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd892c86584529f242593c63d831c38d
SHA19e25a960b45a8b9203331663751d1cca90e19d2f
SHA256d85f68ef8dc910b7607ba8d78ec5c82d5482af0f8e82fe280bdb4b98af6d59fc
SHA5128a22e292cd3d2d3e7d3d4823b7e0008d66d34b6c25933b3b58b4b45b80a5aafcbb349685ae47251dd87ca46960e0be4c42f92bc4a5a5c655a977ccccaf7deb98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b2f9ac3b2e10551aa1f7e849e15a12d
SHA197786b9a5c28d6fad7339111ff0892f9d4debf40
SHA256b58e473031cb75c1f10126a0387964604bd93f3a8c63342bf0ce7142f24e88a8
SHA512acc1a20cc9ed0fdabb6ff6f2c0fba41d51151d1afeadb14f121cfe48e1fe54956bb2fb4a1dc45545d7253919120c1e2f3a2d5979e1ff07d4c75c87063b65a7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecde169e0848099a491cca9f5b6e5381
SHA1a1da58bea1b4b6b145aa13ed5902fef0686b4129
SHA25663d80d604f850847dd9134cf9cc579c2724eeb2d15d580944b012b16259161d0
SHA5124352c587cf9c73af8a4c60c21ffb17be762652b78369db0c9d107249776c93ca967ccd0c60a8e338b0efe3067278386a1a48cb5a1042a5e3c3b77e740a577b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536c7bbb1a3704ee5768b0d90b310ff0f
SHA19065fa1da09ab045e8e5c6f271229dbcbe82d291
SHA256432cee8565256403227c0649cd35641f2c10e16592295fb6d390b8258dd2e65e
SHA5121d25b133aad8f9376bca56f297debbd314095e7bfd9da91b558484404fc0f440e94a94a389f2faf4efc20661abedb40b08212597184d8707ce8595edf8781b68
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a