Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 03:00
Static task
static1
Behavioral task
behavioral1
Sample
77b22a9d8e9195dfe5d3478177f0103f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
77b22a9d8e9195dfe5d3478177f0103f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
77b22a9d8e9195dfe5d3478177f0103f_JaffaCakes118.html
-
Size
3KB
-
MD5
77b22a9d8e9195dfe5d3478177f0103f
-
SHA1
3ece2108e4755660c15dc2c862ad3e8c63b3a058
-
SHA256
9412b3084de5b171094fbe906e53b42c8687515e9eef01433297f7b6b3ff9b99
-
SHA512
9e1b77a8b928fc80d8121150162a4d5301cfec68d6b98e51fbbce31beaa5a72b5be6d0e74bdf5bd9f6bc29b350c8f84e25968ddb38afe4e822af5d984bd9d749
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43F47161-1BD5-11EF-B27D-6A387CD8C53E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000770619fa8dbe8bb714ecd03309a851ce8b0cb0026f5ef12b836fea46541fe51e000000000e8000000002000020000000d33583ba3afb870c572f77a387facb1edcb1e721f9014cfc9428381ac4ce3b632000000063e49f2e9d73f80c42827e843a8fd7a2cd9caad308b7698dda3fab8dca14aad64000000051d5a03217b69e6f5022e0d403edcb53820bca43eb266666d748c8957120c11b333b9aacffd71b8e115a6764748c80a3c4d1504386ab5598dcaeb5184cc8d8b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04fa018e2afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422940693" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2136 2716 iexplore.exe 28 PID 2716 wrote to memory of 2136 2716 iexplore.exe 28 PID 2716 wrote to memory of 2136 2716 iexplore.exe 28 PID 2716 wrote to memory of 2136 2716 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\77b22a9d8e9195dfe5d3478177f0103f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57208bca3517677b5b72cea1f4415882a
SHA1648a23d3f11a011c9db1da0a23c6ec2fbe165faf
SHA25646f5b53da707037ade8d0f764833150fba692ec7d57959d506a9289832a197a9
SHA512b6e6a7a1c01a9078f9e5d9985fd173f93546f13c429934cdac6c61b097622f5502fbc74acba7b83f9a77a5348e1100d9cb55ba233bde683577a37aa997e64676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a40b0117a4adfb15b94da1da5b7484bc
SHA1d3dc9753103d22b7f6d5e347fe306cda0049eca4
SHA256535be957bd26a32abeae5f76bb748bb2acb8d499e5dd44ae508e0ed548e59d87
SHA51246fce31cdf7dd6a04c3a03d6a5bbd3fb05d43fb04844df212efc82ca60604b6f61a44d5aaaa3fcfe4bf9f9fd6483fb03ed67a27de467b57a4e0c1ec4e18da414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550065f63640c2ec8e0f029213ba833cf
SHA1720baf4abdcc338ffb41f52a7c6827818d58d598
SHA256ba9c358e3988088b830353b8f11f02d5b6addf23004ae302538eee0ce2a4c7b6
SHA5122e0d117b5f397dbac9d44c7b3898761043463c0f09f565b26b7aac98e8175d93015b079f3ec48b1c446ce1d51c0820c4da7255dc26d046a485cad1668cdcf5c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544539657f2311839032ff2a3c599b6ab
SHA136a9c155bd8e7e13f5fa065e5e5b36575a6c28eb
SHA256c63d439d95e6eb3d86edf8e22890e5833677ffde454d508438434860bc9ffc9a
SHA512ddf25dd0e2b924536ae3ab767fdbdd0fe729c91603d88ef5a47deeb9ee3c50da39a33809564d786df029435af185f74e73d223c2768c2a4bcbe844a18c1381fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b807a185bf5c813a0d9b36e8a78b7c25
SHA1eb632b14ee26245fb558d70fbfd825672cfd8670
SHA256491cb7878fb6458f05bbab7a1ccb1b0ce98d26ba81dfc5be9d09fed542f9e9ce
SHA5121b9f68cd4d321322b813dc6c24c0f7ce724bb370e3528c062217b482a6f61efae3d1d5529f8d5b1978ff6574f37433881db9f69b13764c4c46e19e0b0e69b485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f27ce3e2b759bf2c3c142adb353cc6a2
SHA1e9899db9a12d7aa9b6cbe90cb87dc421a2d19f96
SHA256165174ad3196b31b089155d159d15e5095214babbc2c9c8431738d7a48407d5f
SHA5128ee9af68ca25a697ec6a26cfdeb2283ad95cb5a41e4513c6bc71dd278c235b7b44ef2937a025fa492a1663c26adfb11f6625bc73aeff3974392bf749ec5680cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556b2f1d3e8e5a9c1f1a1dba81c234056
SHA1a19120708c6fd956d022c944ee45a4daa668589c
SHA25604111591554d739b149ab3f60bbb207c0b4c80f929f1d6d98fbe81eeb16d092c
SHA512e8bc71407874874f5643076041cb59e5f6b8effced4204bbe7425bb8e01b010d441a568462c1548ddeed7b45b0b6a41c8354253533f8b1738788d55058b8ce79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d498170c35923c3a57402db87d96439
SHA1691a0b68123f672fea0b0b8e3e6f43601501b4fd
SHA2562646c2c7740bc8a488320621dc5a82d24516bd4bda6ec512a791d1ebb945ce93
SHA51260f4af1416a27213b02d0f7af7dbd90897c83078f8d1f4f96b3714b1929e6e440fa1d1a4267a61ce9094584f9bae37819950068c43c06b25b8237abf8011c7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578d3636e42c4f9a64a1383ebee1d2830
SHA13013174941cc7ba33755038338c8938105933e84
SHA2566c43b238ffdaae918def4a0fd54be3c800a6e8ba4e17e6239aa9d8dd5d5275d9
SHA5127ffd45e484fbf7243cfc287641b0a9b3ff1045a923fcd6bbf3a1bbaee4afae3f849f19e00ea14dc777d5324a24552449cad3806efc377a3c7f06624f249e9dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5656f92541f211391bd01a994c4004efb
SHA10cd65f33b949643754c73ef08641ab9a2fccb517
SHA2565cf0db0d6ea7ce7fa7518c7688f9541ac218fafefcf79e08f3593563cc67d537
SHA512b03807dfc4e1807850c240e24fa231bc9849c4f644e83420b20a2cb5e296507f335edbced9a0cb11e7bca311d8a8a91e42d55ec1b494fc6b2b6f315ff214cc29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de3f8d6fd9e26bdf0b6847eeb28322d8
SHA14956f831a22dfb5fb825ef9d596e10ddaf11e941
SHA2561db09bf06f2e93e3b7b490f15eed06d7155bbd952b82bc2cbc53eed7097a1979
SHA512ddf93af185c36553dc7193544da6625c6122889848f53936477d5915a9932f41dccf5ab4cde891a2fab83ec7ff64d0df0427af9bc46628fd1e46554036f3e363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d45352170dea4dbf7fe16aebde648f61
SHA12a0ff2bdd8326490a4db4f64777c508ca8afb025
SHA25658d305efe46412b482e4cd8b9a36451bb07d56178140cc215a2b425173fc4e52
SHA5126f445643eaaf1bb3991a2df688707c9829b449a79f8e7b0275004b3fdc68c95f10edc4ecec30f8ca44a2eccf813506fbf4b813eb48d7a51444b18beefc690f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586bbfde646589a984afa09453f576d95
SHA11f8b94c4b3da3ae510b092fd38f2bebc518cb618
SHA256ef09fb5ff4184ff76692285fd6a1942955953d26f03ddecbdbf68b834e61481e
SHA512c7bd40c7a9bbd0c16682ab1e3b7348c9c4bb109f6d80d64a2f6e0008abe84d138baf5b09123e4b90b18238a6f67efda1fc55143688cb7ab58357855115426a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1af44f959a3152ffd5d5d821579b95e
SHA12bd11da600f0c0a49578101c924acc4415668fc0
SHA2568d3b956e0f07710d761744a754f77ad8ddcf1cc532057bdb7fc706e136308de4
SHA5121610d9ced97c922fae6a5e1c6fe03facb621fa8d2ca6ee9ac7d5310f2d9e2721ba258d2e93faea52c1df1eedb82b8cf1ceb9a67afc229f03985d6ab3a1548214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e18adcc207042d503dbaa97bb8dad0e
SHA10b453455ac5ce141fdcedaa2f30141494ae59515
SHA256228238715810c1d53dca249d533a39b7ae9899212efe5f4ff3dff8e8b35cc3e0
SHA51296535b0a2cfccacb72eb3ccd697b3d8ae0fe1df362b95150a7b1717da24c877d0dd8cd802e6d8bc855842660744b0f1842f791f84dae4b9e40ccfd15963f9091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a47a9d8f453aa2ec7f1bc259362e4b4
SHA1953b3b9de202d7ddfb85ca71cde8721640585d86
SHA256038eaf749cc4cde8f132fa4576153b54768cf9e5c1c22aa1fa7d25ff54eefca3
SHA5122195fd1dc6d28ea739092da7cb3cc5a92be79c5a994ddc70dff9cf063b972052bd164269cae8bd2a92019c155de2344735f55703c1833ca66eb4d0067278366b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d614ff7139c14718266284aeef010349
SHA13bab465899f55d6260a49c866a0646619f84b9b2
SHA25607914eaa12637553c1eaca4a03f34d2b53e7e6ddaa8477fe50f91c04d6f02717
SHA512fceb7fe237533855cc1682121e51601f0fa456f853c586e81e373c2a58e46aac341923eb80951887d2e844ecdf9b78976aef042d64a7071de11828f7088261e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1fa5150d0e749a6b33f63d5e46c3eb2
SHA154648a13897b98d51ab7c25c988ea596f18c838c
SHA256eacf62b5a6ec2ecc53846dc2857c135d0d03af56f56bd52a83d0ae752f8dc159
SHA5124b4921adb7dfbac515f5ee69386f035c467c9aa2bee6913dc83fc2ede46b5838016809776273a6ab4864ce508c308d03a567bdf68cc6368875011b7c1afa5566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5566293afeb45109095f0f24e7b3a8d00
SHA1dc98fdc66d4f4bc0fe3658377ac72fa0b0cbd5b0
SHA2563f9fae5db4ca38fe71afde3d697fbc526ca9303e747d15b990e8f4a4779232a2
SHA51252852bf59f52641896f434923764ffeded7c81fad52aa5f4a5d6aca604977ca488a0e084ffc0ddd1f5244cb5aa5ad30e2282643a3d9e5c963488d462502b7d87
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a