Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
797900f95b5cc60e1a4d5a20d792e9ae_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
797900f95b5cc60e1a4d5a20d792e9ae_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
797900f95b5cc60e1a4d5a20d792e9ae_JaffaCakes118.html
-
Size
3KB
-
MD5
797900f95b5cc60e1a4d5a20d792e9ae
-
SHA1
2becea47fe7acb9d443ee5b478dbe6796c0edf05
-
SHA256
0521eb9dc912512aa8fbeb8fcd2752de1a4c91d6904a75ebed83a7fa06b3e2d5
-
SHA512
15057c56f8c832a09bbf25a2a2f2ca23dd3e8f2676bee9376d83c61c9ac09862edc9a35763e4f4435904f7f7633a5a04bb51516218c0ad76b08fa03348e05e5a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422983350" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95749AC1-1C38-11EF-82B1-CE167E742B8D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002e3caf54814ae44182b3010bfb31998600000000020000000000106600000001000020000000dfe0c6182451c8b49fb1eaa3e4c648348970bc124a780678378370b7b8e7ff6b000000000e80000000020000200000003542fbe950d2c1bb71dc26fc3535fe1d7861eed54356c9ca571a5e2a265474262000000050d7f77ad3b5e79298820261c465a705b2a4f54b56f42dd0ca2b4104199e232d400000007f3122cfada365e330dbc7f0412e78868796b2e35497d3055d8e9e60ede5429c69cc5b156aa38dc12b8746d7ab02f28ffcbaa05db825f1f9f15353e1a5a0edbf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ea3c6a45b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2968 2480 iexplore.exe 28 PID 2480 wrote to memory of 2968 2480 iexplore.exe 28 PID 2480 wrote to memory of 2968 2480 iexplore.exe 28 PID 2480 wrote to memory of 2968 2480 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\797900f95b5cc60e1a4d5a20d792e9ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5390c0ece0d512f55e1e90be2943a20b1
SHA1f94daa1dcddaa322440fe413073b75864ab637ce
SHA256fab633dd2ba0c2207900e1f99dd593129141919e0f81ad70abfd4abe7c6e6474
SHA51299ee5de4b96c87a799a1e13bb8fff3ace4b7bdd66d5240c2250640f495725614b67928e808789bae4d39d0213ea570dbcbb2544b38395cd24e4c551299af9e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52fe98ae2f6306f69e0ee7dfa1b33f957
SHA1d47ad37be36ae481d50f0ba75c1dd013b14273eb
SHA256230418786aa0f351019ec2c5d8e9d4b23ae571dabf4d3d4b2f1658ced06338e8
SHA5122a9222c94efa9cbbce9d18b906ca76ab794782d391a30c53d4b331609633d90976a69cf2a4913adebef12fa4c58a018c59052853632c1a59febcb40b46159251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ed2d740081f5b3cab8b40335301809a6
SHA1eab3eacae3b798014c64f890fc8e73b38716cccf
SHA2565c5fa825af017f79706e49e0596849b521e59a3623db832cdba88a97d4c30711
SHA5122871f07798c0a8e809e5ecea42018beccb6eef502500f25fd6ce51a79b4b035edf4f0d5d929ba7b68f567af5c1c38935864462da96fbc16b349b365d10e1b468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD577606634e7bc11c0117ff3d96fea25f7
SHA19c1986832ab1fcd0e672c07e73adef148cfec121
SHA25664a754fea1f0d0b3cb2f1d55f3e21442c3fda602319bb487189ad1e46d543a84
SHA512b5462198062489a14fc4e6f047d7250a9b996fa213346a37a94523b951df14ff6cbbbedf767bef867d5fe37d5971105bfba365b41fd17a37791776c3857e8b54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD547614ad866ae040d93ff0f45835b4d8e
SHA12c0c28208f3d5fb3415c59b902d63722882b3f8c
SHA2569e6e0128205b14c28ad9226a90d15b9325980ebab148d514228c4502510b627d
SHA512919328668b3759dad4bb889d9465caa3c3428fea5ec5d241e3737b7293a24251d0aa2237f53b6bbdb0c3f074af5ccd5739af6d55b0e58b39f00852a474371c89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD506e501757b0d24ec42022bdec83071db
SHA1affccc9df4b76a06cc1b4abd423892ee5629d6d2
SHA256f425e79c83735b74c3e075ba7f738b5b7fed4d7905f82ac07a7105d1d410472e
SHA5126d7212d4d5d3a13e1a15c77819e6263ea69d3b9b1a7544f3c35ae81a589cdb0c4c68744714e8dc11445dd808d6adf1867f4f176cb1fac80429b33317b303b3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5704c6b89c4b27857a312ca38019333e9
SHA1518a9ca31af97de42d06b53962cc9444b4ba3d27
SHA256eea2b0555e36e7bb4ca81ce87de8920997970b9a9d98cbcd1f43b683bc92f222
SHA512e34d05093ca433aadead95957f21ef943add8a26d91ddfb4731221276cde548902d47d3537535d9102fd8312289dea5c9d881ce01b46bfc13884e21ece94322c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d4123e80dcbaddd9e0eee3ff1d040f90
SHA10f960fe3054362101a649059dfd77c40c6d724cc
SHA256287e3cbc2ae0b24217df3ce4031612c2372468f6a451e52e209737c8e7210c3b
SHA512e1dc67380b216674a17408c062466079c71ac95dfd1a2f984ccbfdd11aa271ca54bf459372dca6bc5fc7b9100918dfc87638a205c9c9bd0863738d12b647133c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5218f1faf6a9dde3e8f2b7da75d0f478e
SHA143853ca22061730c472bf57fbfc9e5235fc1d229
SHA256bfbec7025d38442cd082f620876b9d50f05bea2cb0301efd14362ee0d37b03eb
SHA512a18a4a979fd58815c0f00dc6439e3c29a03be8e478fd1772ea7d831724c1de3ea84a01171ce6387cb478f0c57eefe10b9dc484342cd613715480b9eb05468495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f11d07e1273c1f69d93283b1cb94fe68
SHA1f50d6575f84747d8915b4d86c78702fa3df2abc8
SHA25644de35b6048d0a33a5140e9c6fb284cfeccd2763aafd6ce9fb029ba340782136
SHA51238cc0ba4a68eba7f9620159b504e01570907acddde7b826094f84ed9a777329c831cd9b86f811f5bf89415dc031c28738404abaef257b46b334cc0e54a090f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54cabe12762bcc802954eda367d229c98
SHA1f526ed8a44fe5bec4bda17397699516632783a55
SHA25607a04f736b084a6e832dcbd34965c98a85f6376d3fb45535b739ee972e47906a
SHA51267fe4bbc8d1e5ceacdea869de1261368ef39742d02e7c714d4b430bff123c0e27d4580e471a04418c7ca344a767ed4da2a920c479082fb7bf0f7dabfed5b78ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b45c39991840ff2e927a3e7334d96bc
SHA1aaefedca9695122c0701b5ac321f5faeee4482b9
SHA256e27ffbf87448d670e822470612bd66eddd5c460d050394e7cf5fbf08744b3185
SHA512d8a36673410965272ae45fda8f20cff9eec28c3c82edbcd0ad921099327fed21adafbc737a23f9813ec6e3a61a8d8f63d1c361c775148d10e0b19de715292619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bc827e8cb202a381bda1d84a127a8139
SHA1d8f896804aa007fbdc2a4a627b3d6631700850d6
SHA256aae32e95b7e7ec8d1fd1053ef6115bca75c63a33bec002012150e5289e1090fd
SHA512110e1a70b1ce1c1964f03a2d1446e0584ff304fa3da8992b445791c52c41a3552b2b731ccb827eebce3c15df9ac36d18baab5c4ad9a31c9504a79ef52801bdd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b443ad1abfe3a1a3a14f96997ba08099
SHA17662749d8956504a79199f55a859204a6cd16f9a
SHA25666e2e267124e096a1af100ecb436555a98b92f28a3d34379544294b10594f40d
SHA512d86f7f0ef1a795953753f853c55e1d7f1f67c754e586aff5f1670a652c59dde0141e0bf5e5469e883cd0f2aeee3ccdf75414483b4658ac69f1b25ef62dbd172a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55d96e73856d1c262e451ce4122925b99
SHA1be9b0c8e8d1e9c727162fae0b85efda0210f69a4
SHA25612593e0f923a91c77c389c03454c080f0b97905ab16b7f018cec704775636097
SHA5121ada9d0070171e47808ef393ed5b9a87314524f85efcf35f7f1e36f491deb4f7128097956e4d82c2fcd64e838825f39c23db0d886eee72296f5be09f75b28723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c20280076171cf2fcc5b3506477355ca
SHA16814d8cd4b70298a96c8c7475f328ed63b418145
SHA2568a4a0778b1c0e25f1b3cf4c61d70c361d21e58473dc71c903abe77739bdd6b6b
SHA5121ef5b4683b3d30e7d327c708edc427d031b9faabc89bf2dad4695281538c058fdde8b5d38f73781885b049756a8a2548c7e9962984ef1127ca48cf2826222996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b18539daf8d9bf534bea20a329a6b8f6
SHA1d06c010814f691082a02e059e24b67093f41104c
SHA2569fc7ebdc181de963e47fd91a8aba0012b4e03a0f86932a483d8edff83fc1d1d4
SHA51203f9737170698a5be07cad8ca8dea83ca10f6e2211f1d38ca2ef6448674288615c4dcb7bc7bfcaff05f8334f34b6248e8a8c49c4a360336c68711a613bbd633c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55298a5975a2467de1d890add009efc0a
SHA12a77cbbaed09910332937d12fc5b6e5b43384a45
SHA25616eb5d7491b6eee2e30917034ecbdbabb4ec742ceaf414ac3c75438e553365ba
SHA5120f0e6b744bf6ae3fc927092d1a0997be241201f4ee8eac80aabb55465ca9e9f2b42268646f9fff72a2974fe0e219541fb4065b254726cbb26952b1fca779a6c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5be2f3ab36117a1396a310b3ae84d8190
SHA1d9328ba674ec944cdbc04c6e088173949e6c509c
SHA2567ec21afc6af54ecde0b4af568548c65620adb0e322227930e4c87b6a8d2d48bc
SHA5120f8da2208cb7aed40db1d636f3696840c7f229c16e37f81622ded267d4a445b0b0cedd8aeae40297a25d2150d9684f8931e2df66826e7fde3775b8992a52fa33
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a