Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
798a36614f413899b25c0db2e8992e5e_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
798a36614f413899b25c0db2e8992e5e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
798a36614f413899b25c0db2e8992e5e_JaffaCakes118.html
-
Size
3KB
-
MD5
798a36614f413899b25c0db2e8992e5e
-
SHA1
c444d52ec4a278a91c02dfa577fb64d5eafef91c
-
SHA256
5667d936f8928a65f3ebcaeec0ee6422f852ab4df1d00002d3fd1a89a8d570f3
-
SHA512
26bdc63f867f48bd757d36cb054c29b226cf60f53dc09e9b3e1564e2077860a42255b5c888d9411f538b70becceaa53fbc7e4c019433b92ea29c2cdb6d4585e4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000381b929057d2a642aa88a71b9a279105000000000200000000001066000000010000200000006f30e67e11e0177a3d5484fe07ac5952fbbb0224e28b8fe35c0d76bd767669cf000000000e8000000002000020000000295f474e7c48ea66fa9ecfeec29f9c519c0fed31a33823f0062256971a341570200000001963413b47e8b51a314aa44a0981e847d41d0994776459df26f13a04f5062b9d400000004b15a013f2c64bd01ef472b8afb2bba543255475d7b3f89758b16948771ddbe503c374b1a87b0de3c82eb2797ceb88421859db7145147dac644d1d601a6fe275 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B8FAF91-1C3C-11EF-ADBF-FA30248A334C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8023342049b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422984944" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 3040 2384 iexplore.exe 28 PID 2384 wrote to memory of 3040 2384 iexplore.exe 28 PID 2384 wrote to memory of 3040 2384 iexplore.exe 28 PID 2384 wrote to memory of 3040 2384 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\798a36614f413899b25c0db2e8992e5e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ea20973bae3427fe48c60a5e8f13831
SHA1d66bd5cc729aca8acef41b88ac7e814f101ef2b4
SHA256edb9071d4461cecbbaab6f7a8b5134e40471765e853e079432aa1c06ada37f3e
SHA5121839a8f36c4e54200d2eaa36ef2160c30ee9de4aad7276e94bea05278f2ca8604ca88eeb6daf67dcc0d68f0789ffa498ed7b6a86305a964e47407f4186906ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1a3793e587ad6a9200c6ca62635f5a6
SHA12ed2589a9b4693162d74309238b50930e4525326
SHA256345f6d94578608639d84821ddcab698ecaa20649bf3a6c9215f4c1719e6a8c17
SHA512ac21b65d7c57ead0e28ea8dee274c8b598bf43522238fc3234f808839b3834039c0dfe7747021bc71b96b6a60059b9e9b28b55384cd6488333ffd0c41827a77e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed94786f5ac827d481065210b9daffdf
SHA16eecbcfa73905bc44056cae80ce19f3c60b3a26d
SHA2563b556a7f50b6ef59a11544ce12806eddd57051e3a45f9441451a2cef6a08af16
SHA512ac79f0cc10799d38fd81076cd00e3d40963611615c22867c586da2cef6a0038797fde05929012795fc8079c7bb598ac092f85a026547c7f6bac3beccb809b6d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56053b95b54fcdc86ef791dd4a31e0bd6
SHA12be7ad8d7961617c1c390d5a9e0d929645f644aa
SHA2568dac1485cf48778a424213c118f9c21923063bc6c65b662bc790931008b878d0
SHA512574bd7045106cf6ca820fc62d43489bc8fab42395ebc6284218792dca9287b7ffa9595dc181a27dc4b90ea98622db60ee6cd6423a808e52b8ece4af81bf11312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a502b051360e7e38c7ba1d4ebd8843c0
SHA1f5f7366b0a5f572a6021a93b72b4039ce26d9d21
SHA2564e86cde33ccedffc2626f1c3e3b3f64c1c017fc992bdcd018cc089dbbb723e41
SHA5121b3629b6d8f1115236d7cda81d745451655747ab6728e9be71288b2ce3dbb75c2c464a97181cd74b21608e57e645d03d61ef0641e7c97e6d10db376ecf809a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5690750298068d96a551ef8bdc261336c
SHA1c569b46763b31b23e8ca41de67765455a748ae70
SHA2560fc26fe53ee505da9cf292432ad98a3b0a2dd88ed3a64b899d85dae1cee2e8d2
SHA5125861462c10d0725df7af821e86020a8faa78b37991e35fe243a92957a370822ffb16ebd1cd680492a5f87b707a2ae6754b579ad76dda9a51d8d8db4ca1435a02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538e35baffca97d9bda691d92d3bf93c3
SHA16cd229c157a2aef63c89d79fbaa80ba789eaf412
SHA256445738cc4b2216d6b60e110292d2ebcb958614d8a8406c828b16773995599439
SHA512937134f6431ae4d281d3008a80160c79888d009701f8a42b499a94a4569c807a7ffb65398c993f6034d798c2a1ca75fa66ce3ab567bb1dd92396a2b260481fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b4e2bcd2718bcdcdb8899a081127eff
SHA1dbfc78748eafe749e44b0557a7af698af513c2e5
SHA25622cfef5cf6cce9ffbe79aae6cb52c29664b68cbbabc25fc8c3cb80c7e616727a
SHA512a1ad5f56851397ff1c7e6e8346df75c839fc3b1aa377bb85657d9bd8c5a65cfad1cd82abc5e795358a8318f05409549b49d45a29d933377eadfaae5cd0199269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549fcab7b8d47265ecbb39e40d5c602d2
SHA10ac54b5794648a99250d62ff9a3e345243a9b68e
SHA256c9db5f09d219615995df24e62ad27b70bb956b0a283196f8c5095bc8360b827a
SHA512a4ea452cde4658543fdd70bfa5d2ea0fd16a4966c47bab5b2a4a6eb0ef0a8c4fdbf839ce858e07dfb2c26ff2c744b4a19f7f91a3677d9bf2f6f8fb0330c43d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d11f3dbfdea9dbcf624f1178b7d0d3d
SHA165d67d79cb48d2cbd74b53041a0af18f7f63b10c
SHA2567be4fc7a01b5624b3b420ced18ac7eb18a7759310e7bb73dce1058ebadf08759
SHA512cd1805647a24046a4690734907e42b90e2512c9fdaf2ffb7a6e6d464b488a3a6654b7dca73f16eb69f3fc9068427e1067ccf4cc9582d3ceb3a8f5e2eae20c40e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd5cba2f0a00f4c16f5fff01d0414432
SHA1499b4a165d0923facc199bce36a324ed068507f0
SHA2562eb5ff20be930367599411c809c3b4ddbd6ed74dac5511b60e6aa71cdf4b5ba5
SHA5120b8c9e57edd5059ac01d954d55f4dd6bfe0114a8e8ee375a00a5291c12209a1a0df4d206214a99a275ff6bac0e3faa5cc987707fd12aead702929a9030c6f649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3392bc0f6b323789b8cdd701361d265
SHA1120cedad566c79d959707538bf1454d77ffe1c45
SHA25615d28b7cbe7bf448a0a357693d8cbf937febe290bb7982135ef63b2abdf98c9d
SHA512bb26f2a82ab8c86cfd07ec10091590211a884329c3c182886693a6f43ab380f23c83de9bb97025abd5ea98e929b211b31e934463b482a55572cf4d425ccee1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5c1b999f5dd04b54de882d88633ece8
SHA171f86de8559a91316ed3a8a9a942fb090e244941
SHA256301edba88dd4b7b49ee11c51f28e587d363db0fa3c9ea14fd025169a428b087d
SHA512bdc6c1b06c762f430dbab98dc3c845d37f087a6ecb3cef9d3226150bd017dc0ee15badbebd4c990adce03154518cbd7a3da47125d833234615c91ff99208d082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52438790ca7419a77fa29898298dd2070
SHA112996c5ea1a35da607db320179d9c7878579ac41
SHA256b4c785f9bd5e403918b596a20e25f744a5e6846d07a4359c3fa6f075ce0146a7
SHA51242f79930a3981d23ad0334a5b888ec60e88fb548d25522c25dae5be90abd033bd65fe9c36968bdc176325fc544221b03de1747caee2048a80f78499e8dc3b570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca07c81f0c84104a415d01072a5d1fc1
SHA16630fe5df9f0b9b62220ad3c556db797f9a10b2e
SHA25687d209ed60c00afec94a561878ea23afd72fce58fa6adfea98ba6ef956e409fa
SHA5124b95ec220f51400cfe0afdb0444f6c6d2ea7d265e5bec43e10398916cc4fce75c3b2c6de3756b631c2a830deb3500865a716cec04d14914d7d346036f4e3f33c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520567ce66e97f7ab553ede9591284f8d
SHA1da5fa461bc122928070f53392ef78385d903c089
SHA25690c5369ef086f1834f2566d644f64cbf255d1d7ade1d23736062997314f66f59
SHA51204ecee427da9b5bf7d439b33ea6888b6096c09ca2d2af00d27049c0d6dcff178f6e354f0e7db458d5c620d57803f2dc4ec70e6cfb6e2662df66b794f7090d9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a993ec9d9ca25c98c733dd5af583bd0
SHA1a5b149ae9e9c95a7cc469d64a27a121f05750d55
SHA2565e15648a2a96b28448a768ae4796ea4a0e6446ac87e505579af5a2658f1ff788
SHA512d3234a48b1fcbe1fcd0a5b2e8236a3ef9989311087b5f45dc5cef5f165fcd13827ac9476fde1249287fa0ec1801fef065a958de482c8cb26aebda8654e1b750d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccc8ce2fb9d27f24abf3c1f24ebec153
SHA181ee01459bc0a2d4659482e025f3b8274d5b4a20
SHA2563739332730b3b8bd678a0d1cc4c90397b2ba88992650f20b4631f42a2a017b11
SHA51257cc22fcdf6e6b216a58e626dd21784c23b49f14660b3c3e952637637a9b4bd317d69532753de4f84317a3a2d2983ab10f275b995bedd2a637f04efb34667fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524fbe4d928fcab622a4248d34b07da89
SHA1e57f27860d10aeee5a0310496b60f9defa0406d4
SHA25677b5c60f479352dcbc7ef5e1acde9e17a421f880d82edf6b5be1458c08af87ca
SHA5125b8fb2156b4a305e3a4e67f237180170eee38c5af40a34a2bf8e5928ac60780084871f6be5d74380f24634928c9a19886b61a36ad18b3a3086cdd349207bb61d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a