Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
777c137632c375d59172e4a584e21482_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
777c137632c375d59172e4a584e21482_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
777c137632c375d59172e4a584e21482_JaffaCakes118.html
-
Size
3KB
-
MD5
777c137632c375d59172e4a584e21482
-
SHA1
752cb2c0221a39fb4554bbaf3b16f20e70d2baa2
-
SHA256
578af735f2257ac12bc568854390c2dd030f3fa1ffe0374fa757d375101d2d65
-
SHA512
70273ddbc8151392a57f467d5073492506b160934dc70d11988c2fdf5af51c889feb92675c32550a1570dc40746b55eb87bae5a1328bd688cc22abddddef1753
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 305efe5bd6afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000afeb0124bab32858a539bbc993187f6e705566ccb6b512bc477672709433fdac000000000e80000000020000200000008c204dc1c3a2e73286f5e26ba976b613af143f4eface084db1d7dc1b91d440d520000000dbe464452cb1d3f78953a5a7f1c03aa43abc84678f9af2582c2a7aa0585c5218400000007c876b242423e806231837e5c5a331b4eb98f6a016aced4c07b761ed0c4db89442c29b011a9df97127e58a6340b5bbbf4adbdaf30248d4c5bfe6b57ebabbf074 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422935651" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{874521F1-1BC9-11EF-8962-7678A7DAE141} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2828 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2828 iexplore.exe 2828 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2604 2828 iexplore.exe 28 PID 2828 wrote to memory of 2604 2828 iexplore.exe 28 PID 2828 wrote to memory of 2604 2828 iexplore.exe 28 PID 2828 wrote to memory of 2604 2828 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\777c137632c375d59172e4a584e21482_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515d121d3b920ebf075edc21b7519263a
SHA1f852e9a6ac3d0ef91613a7502e16d81f7cae37de
SHA256bd4df41692f8bcd3855f3b294054ab26b9b910da7bdf81bbb432f2388c5e4c3e
SHA5128a06136c01ab22f35bbebd91ca663d8542084375266672cff16fe151f87fc39f89d2522d729cbcd5635e5ca3a98407edbe378b1617e2fc191115f42f89f88775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b65d06933d03fc85ddc16f1c5af1a93
SHA1b65b6a73ec5969f45ef1960d6ad32b0b0ae7b202
SHA256e4e5fd74e1f9215b71fab31590d1c85f59dd2de58f5538e4151784f423734abb
SHA512ed03f16883caa8ff8b9ef9e7ec0161078dc1cdac54c92dcb6b205b0af8ea1632f07fdd7bc2a3cd6bcb9211b0dd2e5ef8b146a0b58afbdbd4854da9716a9b6032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5457a4fd30637f86df7dcc9b229215dad
SHA11a6b8d73f5d29a5b94c05a48a445cf8db2842e4e
SHA2568e569ad58daf2bfdae0d5dae7b71734523d2e0057e44959a38b2a807a87eef4f
SHA512e0208b59a0fca475d60bad6ce8ff0d30cb949fef6951beb05cba03f407f495fa82e2fce7611a1d48fa7b8a2e4bdba2c9e94c329f3e679dac39f04e93c9780493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa779bb2197779461af3c99647256fac
SHA1f8c47f9e719052da29c6837326e9f599c6a7452c
SHA256303d2f96c452dde99829c367a34668efd9d35092a7ac3e54374e8e1314182e30
SHA512ab8560b9a29a601413c4ceb3a5f5f3298c7cf235ac202fc9b2514ab11bd556b3022ada804c87d2d64890c24a3095eedcc4e8eef19f6f07b0ece625be5d8a7af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8a236ef96a8398820b3332a3076f524
SHA13b0d9db922611f015d2f680a02eaffe0109a5a6e
SHA256587549396401bcc6a500b36750bb328c19f370852b7dbf3aa4e2e20bca2df275
SHA5120ec3180766b0399c57920b261576116944d21da9166877d79c32c0680e25dc7476a7acf50f0339d2f38b53ad683c974c374413124f9d6e9228031797f22b4d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547ef0956db40a95c66aaae505ae331bb
SHA108890a8d7ac91170466534a86a791b2033480481
SHA2566830ef9d05871e68a734f98cd07906d4a50ae5d405c12f3dcc0e0c46884848aa
SHA5128453343e60534eb58404e99ea27f802253e66d81e0b987ed6e327ad56daf21ca11e1513a5fc193aa225bfa86744e983848bf4755775b67aef074ca8545d83145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b23b12ff4d0d6761b18b03b4477e8dbe
SHA11057c6f0a8aab55fc6f9c13ce8550f4d0627c160
SHA256291bbaf4c6397b00ff3b5c4135ad4c73ce30f89304ff0edf7c3714097fb32720
SHA5120de253df0688578ddc7d5a415b6b1fd2315de741d748bcff442b48bf4659bebb7ec4f27f82743c97e12f0b5abc8a7b07dcc5f9dfa07249ab022858febefb5587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592a5e296868ed2a1163f00766fcf3b83
SHA14f2f2497b5f6753f7346e6c198c8e13bd320cfaf
SHA2567ca8711eea4ea2feeaa63d4ed5199265b06feeb7e15ace652bb025a80b2f3e08
SHA512027c5b2d66dc067d757c81e0c0aecaecd518552281c6fcfed4d8dbfccf545380c3796d7b6d5789276edeb0ac003522d17f083047ad21e996102a59223854cebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b80a377ac857206c0717f1d53df0ab
SHA13ab367c86a000165ad8b4a9400686d4f557f847e
SHA25653f1cf48512086668a454742cac0a59eb1ab14e56ca321b7bd46fb3f0f44f256
SHA5121a0debff43fb1f1a0064e8322fb6008482b7d477354d22ebb9ea465b4db07fc955c640736ddb3b2703953149e989be898c801f6d8a5c4abbcaa05e3fd6c6f7fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a095813f76c71c8b81d44296a9c56fbb
SHA1e2c1703a30a160f4023f5a212b217d694efbdcfa
SHA25643a41de9180d4ea99e6d2ceb0de14b05053f17eb72ee5cd340daf2168d55b58e
SHA512f3b03487f23581dcca329926ecc19ce3012892d46ca0d3a08211471e2af582b43d2044226b775f6ac28680aa3cfb9741c4c1d8b17f973b35c6187ec45fbbddcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5011ebdb2b96626bdc1c348474fb0d3bf
SHA10663106fe44e967aed924ddb880bfa5a95e877d8
SHA2569672e7112362147d3fc64b3ccff1ac48d3d6b924ed26457c9ec2b8c258a4be06
SHA512fd2be65e517e28e2fb2f73ba6b2cb18280f31db054941544d01d0f293bb3da3cc2591cfd0d37a5672fd133f7777097068f2e0c95b48c51d39da8f1745f625d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5337231d07667d4f5cf1e391da3758786
SHA1bd2e9b64a1bc57381be1c5964a5f08568254c402
SHA256fcb93e6157a1723474e9c0942d73581660bc2546e612b8c90fd5cf9a2a24f721
SHA5125f705232a61e53ff14709c04c080944d1ccd409883d8571719e041c832cffc31051cfce2050ffe9e1f1b308aefffe754ecc57bf71a47b06dcbf6d5430c099c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58690df3c285f2cbdeede1d3cfc364bc1
SHA17bec1afbd4b51ded42963ecd4f6a13a150f5c12b
SHA256e4e5b8971e65b90f31d70ada9ea0aeaddd15e347a2490f3f0f6fd073e11a9281
SHA512a1953291f5a692ea68d757f8d28cf328125dd66b1f012af9da61acdfeb19e77e1519d666e5bf365680077d5d002b9c0d3a7b61b8f85f084d167eea793e6f6cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5368562411e902fc36a31c6ec76d72c24
SHA1be13089dc43ebc3943b280a092bb3fe2def778b9
SHA2568451754f68a54e6bd3bab6e78ef5d86d34378640a367df473b653a102ae0af2c
SHA5124994a39cc2a05d566689a5de4ae09fbec2ef007ffceb28cebad24b67c8896cb0cf8d0f4eee7b7358361ed30f0c18ab72ed7985151c218c0104e80fba11482629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582cc763670e0ef460f7f322ebfdc0a05
SHA1aa78561f97fd21074103367efa8e61566f15f474
SHA256c8fe829bce9792594124644ae9634325bd5dbc95a53738222ea265e67cf9d7c2
SHA512e865f5bf91ea3252a376348dfd7168ad0f64b1597bd0c9490aeac11776164c0bbbf5c3ef7ec0bf36c5bd2c778b91ae950974fa0cccc8d0f1638e98ab2a604124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578950495c3a91408829d6c806882e90d
SHA19cf129c5167c92a6bc7a845b42133a5c675b9702
SHA25632014c5c70a56a9acafbebee813cda7b3b24b21c3e550fdd5c4667e8eb9db054
SHA512a8e5ed2376343727272ee78e81cc2a8421317df8a0635ad8dff30f44b1ad34f01df877575f19256b15d6f92a8e5c2e226a2352748a9b310cb7cd3709b3219e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c9456eb508e0c9b2e90f0ae3b65185e
SHA1556c22c6368d1f7a8d7b360029294975aef7ea49
SHA25691f9d26c614a08ab88397491acaba0022a8d3fb3600954f2e9b8a86472d673fd
SHA512d5d7e5bd3c2b3ac8e31c6e2f3e0b75e283bbe790245cf3325f5ededa99edfbb95d3b2232ba9a4117af0aed637fcdd7ce7c9ca0f9d52140834cd5dfb4620a836b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b43ef0a313a5de216cacce7b09363f7d
SHA1d311b5c309a931d3933dd6b4398c5a5760cd285c
SHA256cd37e76889f64120c04a66e1044ebb7fb9db06400b1b3ecb9cf3d51bf86e8676
SHA51244b1188244cb8609aeb5e2d6b445b27ad4917cbaf267911b083fda6acc0196f0146b42b6abd04e392d07f1d8a6ed06ccac8c66e36faf8214669434d838190d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d8f5c18b2c0376e7936307ee55100f0
SHA11d555db9998b5a4ac74de378d17fe76acea9206b
SHA256eafbff28414951dbb2d2624549c313fa1c51f9fc320013e2341076213d2ec61c
SHA5123ec1c574b85e693bfee1d4dec2b2d782b2e1eeeed6c0d50a059ce061b31777317b3acbb221550743a2d7c93dea9b1e41f7ac1e6e978a7bb6309a03c3b9c8750b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a