Analysis
-
max time kernel
138s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
72772f5f167320deae94daadc793475f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
72772f5f167320deae94daadc793475f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
72772f5f167320deae94daadc793475f_JaffaCakes118.html
-
Size
786B
-
MD5
72772f5f167320deae94daadc793475f
-
SHA1
729bc0a4e62980deb03877dd988b971fe09ab01a
-
SHA256
03fe35e098de668d2d85ac622bbb58d8b5d09d7fc60eb8008e14840bf2c38307
-
SHA512
c3f055b9eea7a374c9b99ae2880912cac941f407899f1b72837436a2e6bdfdd84b99736d4b8f1b605065df49e4a41e39e3b941d5cef56c5ec1cfceb964964055
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10be3344bbaeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e2631ccc67dfabee47d36ede0d7e6fd24bed3eea8335547aa2c48d521392a1d2000000000e800000000200002000000016217cd11b7eaddf924cab4d03c54de604167c89a0909e61cf3e7206193c89d020000000a1561cdc91a587d5aa50a5023ee8d51cb02d4adfc109fa4946d18e09b29b24a0400000001f3892ffa228a40cca2e3f61bc60142a46db6286f70b799c99afcdd87591a98f4f717e717c6cb7ac3e9e0f5a1dfb2d17e27627f580da0c84914d41fa11230123 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E887111-1AAE-11EF-A5B4-4205ACB4EED4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422814062" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2460 2248 iexplore.exe 28 PID 2248 wrote to memory of 2460 2248 iexplore.exe 28 PID 2248 wrote to memory of 2460 2248 iexplore.exe 28 PID 2248 wrote to memory of 2460 2248 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\72772f5f167320deae94daadc793475f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559e25ff4d53f24e61ea6c411e0bfcdf1
SHA1b6b77b5e91ea9faaa2b35fab9b80afae5b099c0c
SHA256afa086de15b0bc9d72fd06443f9ad4ec9e3b19dda88052ab72641cb36ad0d7e8
SHA51289383cbd1a22e5b47d94b836e525c20a490d8333217ddda9a72ad343350832747fb3990a6247cc22cb0a994d2906cc949df2f76c8831566897a7e82b048a60c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bb5bfc5057c4b0e2d23f0c3e74ddc05
SHA11200a658332415029012b92294b9ed73ab8f2e2d
SHA256485106b5457b621f9496e5a084521e8866f407d9fec1fe60ddf915d1299a5dfa
SHA5121ac349f2d5d06c90958fb9be762e39a59d974fe8d876ac27924a56c29a6da74af6e6bf31ab113cdcfbda48f542eac7f312d01c7cf21877eaf6189080e3c2b6be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5621f02f02fcd9610cf21dc16d526046f
SHA1db4663253d7ee740cee88ede154da6e19fd9ad28
SHA2567b3cb033e36fde895855b30cce79531ff61d9f3e512b2d921103710e97877c73
SHA512a15fe58df9602cac52b6b5148727b8b2030a2fadf0a4883cde62cd4dfec231e23ff464a0f724bd4f1153a8f1dc7a9f3cdbabdb161bd191de1ba1289d3faa81bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562236f7fd72c5aee75d957959d92a252
SHA1dea0f863617ca6cd89c8be2bb2303c77a28111b4
SHA2564255b56ea07b5c29f989aa5a44f461c13bbb53f6e989b56a2f70d252ceea5d02
SHA5121543cfe5affd3a948d0435f318e090b67af7bbd50c9221d950f97382ae6fdaf042682127e6560ba06996fd39c16f624590afc72bcfbe8616c26f9cadcf3056a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c54c89a25a4bb203bca5840e998e6dba
SHA167875d594e09961ee0f1b811d421e18fd2a47a9a
SHA256af61dcc96caeee56482c4941715fa4706cc50e59cd970d9784415610a3151354
SHA512f40e899ec14d2fe291ca33f9c957f5c5d46dd82eaadf7514bb08f173e77d11823b32a2d4a2eaea409a660e5233c2887a8786a19b2be2a1e01643d1d608ca7089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5177050eb3473241891237077ee7448ee
SHA1cc4fec3871a7a2da8bbfa4b5098efdd173e50882
SHA2562fa9fa5ab9dfcf2cb283d114a9d5fc98f1004944bfb742f814e38e6121b7f023
SHA512b6ca28c6794f8ac48481294fb2b7c2eba90a64f587f9b3e979f9ff3ba0396b90fd5a15381afc8aaee72e9fe2dd3f383a02115916a66222ee67ebdc93bb77a1dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b72d40226b9de42a022742604464a7ae
SHA1b14a9473be472649c612a4bc6aa895cc6fbe7c95
SHA256f7465c6db0576e22a52b91c40c02266d5424ff2729c934c2f3957197da1c3e15
SHA512435df266509ed293b234e57dd59115b0a06d3896dd4ccabce8f1bfa04de583803c070e1dbd7b835b5935689e896cfb75534742af8c55da9bb3ff7e7b7fe6bdc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f91d8e6fa5816cf5af4f06f649503943
SHA12535af72d0d3a6cbe17b1d9c50b11db50d743809
SHA2562bcfd5cb9a255df8a9f619fc0c6a4d0249469f5ba2338cd5019363a01bf5cdeb
SHA512ed31093aa1067d34cb6580a6d9fd299effe8bedfaa01aa4b20a70dae84527c1b8dec64d993fe3cbbd42a41886aeff8c2a7e19637a30a956b054e2a0df00ff760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567e7b0902a322701524d311421ac6494
SHA16c6eef9f31f9bef063d8f6f409ee781e8c6ab7fc
SHA256598bea04b644ed2d3e438ff15b9b06e89dcf2c336fb6f4970e1af5b54577e03e
SHA512e655c8b6917dffb129f3754ae9a372d8eeb4ae495f6721d4d2747a453e49c5f5d1da8e52260abd1ca38cd0ad9994b875b78cb4c570964912ba0214d54b4e14a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df3c626346b8c4b4dbc6aad7e5bf0a87
SHA119b375d4d39ba6a48cf94fd8e46b41951ca08c85
SHA256df52d4fb6c5774c1a076fcf9f37d368a1a3b8b53f07a9f7d90bcc8afa53d445a
SHA51278df3513502fb0b9d79084f8ed3e726d2f5003947a840aa5ba4b012fb8ff0a0bb4e50f19b7caf7556d9920e63e929f0127e0126e86ba5a28a59da90a230045c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532bb3559fde261885acad116bae58cfc
SHA19c2ce9288f5be480b84222a347ffba09d44df407
SHA256014cf050c4a66336476470ebdb06ddac924bf7ed782af9187ad9217034894287
SHA5124a703c567620cdd8819cf1c73259c164a3b563bdb011f17240c5ed7529d4d5b9fca7332a87a1c50f111d48311119d8fadccf59dbe758b94962cadf25185df05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574a88456e6aa46e8b287e563124ab956
SHA14cc6879ae689b341d78a3cd8e3860a6a3bcff2bc
SHA256abd641973b63c69990ae26445c346aa81a94a6dd86b972ab28c85eae64e9370d
SHA5122b8d1ed95366026d9db30af06ef5c0d67450aabe83d0abb7d7e97a529badfc2141e0f72a4691cfcbe00b4e0b8e48113554256ff7e22ea731b4e36afa19f6498d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c675f86b941a9f902e1a945303b265b2
SHA15d000f4c103ae9962b1f555e629a0cc5a2538b43
SHA256e01ddb976e2170ad476294dd5acc27fffa571b40d0099fbfb52d1e854910f0c5
SHA512ecbbac3cabd811755a9a3f4575c9db31ac0c800a3db72aaa04e244f66473f11579e3f9bdfd26b79a52661fb798c1b895c851325a23a5f4bd7d9ae244a68d2e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5677cc5d567b426dd32632520b31f2664
SHA18be7ffaeed7e1aca84c93457b02c58f7cb4773f6
SHA2562e159c4cf6a7644b75d59aedc7383aec4a630f1688ec7545e2d3837bac136d97
SHA512205774c6b650e57479be92d37618d6962aefb2c0ad9643293a0b524801dbf2905958d35c59d67978e4a3e35016f83af1961e169d0f57e76d37eceaa87f03bfdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d066cf3fccb322ffa1d7bd140b003cb8
SHA15ee407e8bf9c4420dc5e74d2a23957a1fd091682
SHA256ab137021ac8347fc232a66524f282449a6143776b744ed41c4988206960fcb6b
SHA512379da8e439fc750e86d0ab7d061834e9bdfb3a1f3ea7c156b0be98a7086959b44393bedcded3cc91a9fcbe5c18f9029b60f428d339da23f45b8b77e2ac0d754d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e1d09b0b0311178e02311e33ef2ffa3
SHA1edf0507000c3f929d714d6a80a4a044b706daad5
SHA25607ac7fac7dbb78312197734531f592c12585eb56361a8dc21550996104c952f6
SHA51250dc5ca8b664def4149d353cdf816281b494ce561a07827e6d824f0323c76b816da27b8ba44476e1c48eda26a32c55c108982e7eb1539c8533b339c225a9e8f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3d74f478605db6e0ff66ca87e873620
SHA1b384ab28490cbc35ddef9ce116113cd2504234e6
SHA2569ea740ec24975aa3ee68dd9e51c7ec22441f005fe423b3cfc505f4fbf2d4dc4f
SHA51201e70fa35d5c5c45f811c2d8323a49aa8bbe51d7d70f239c0e23ec239a50b95590698b50551ab218e76fc818f904ec5562b04fdbb383725555a0ac7cec6afebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7562a884f4ba97c1b3c333fb9b46b05
SHA1cc538f816666274638dad9506b6839845e1dc0ff
SHA256b5297ffdc52fbbeb2661118a6007f4632457556b0776c850673c3d3e46cce9ca
SHA5129db09c013324c52ec6fbaeff251f808f4e311d188de39e708aca3f5515378933e93147d7e06e255e43fad18c2906b7a679153171682360669c34ec1217dfdf86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce4f8235c4417674e9161558e295e107
SHA148b9c1b1ed107908411d375cf19aaa214c16ea68
SHA256b03201361b77fe22f3d547f451780ae43792c84e16a9336c285971752c9fa158
SHA5125c3e478f0d663fff231251c709e6c3e06a96cfbb56424a09e8ccff530eeff1e4cc253e9d286445fbfb1628714e4603b1ae08cba2d9938b0d14c647fc5b42f9a6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\favicon[1].htm
Filesize565B
MD5b1245fac4bd0b4c68b392cceadfab47e
SHA102c91fdac24280933adba5eb4f8ce1b6ec7f5ed1
SHA25673218a764f46e37d7047118109abdb7b80dc93ddef2e2efc7860e53912b1518a
SHA51201b62ce95d7957ce5b3def5296576a7f6f4ec13e7ee939a52019d0577210d229ecc2856126fb9f07c84400362a674c20c50ecef6a47432784bae6351a8206179
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a