Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
7ca8b5f8547de9b20ccbd11f03871a18_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7ca8b5f8547de9b20ccbd11f03871a18_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7ca8b5f8547de9b20ccbd11f03871a18_JaffaCakes118.html
-
Size
2KB
-
MD5
7ca8b5f8547de9b20ccbd11f03871a18
-
SHA1
aa6266a2e0736268e5a2b42debf596205a65593a
-
SHA256
46fa94a566e63f08048bec89181b804c541eb3d634b222e5fac9bee7b71e04c7
-
SHA512
a889017a99d7dec9cb096a12abace4672d5213722f69caf2c38e4da91d1ae9cfe0b69bb7f0cb3c99784a2bca93eae3caef341ae9e2a5d4a7ab9df26e9dd1436e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423054569" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00e463febb0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67EAC011-1CDE-11EF-B04F-52AF0AAB4D51} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000090f526c15a41663c15b5364cca667ca5771183ef39827c4ec49e3f004cf061de000000000e80000000020000200000006881318521c8fc75fffc358aa5e4dc129beedc072edb45adcae371949c7b5c88200000003a821d43deca3509527a1168f3823c35486078f153a2b6640890f93af845d168400000002433df076cc89d46f4ad3330f295178dd14737d61b0e954fe29241493dcf997c4ab955dcd5cbd583cfe6ca4f24aeca5462e9d4cf2cee5487f4735b5515de8148 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1844 iexplore.exe 1844 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1844 wrote to memory of 2564 1844 iexplore.exe 28 PID 1844 wrote to memory of 2564 1844 iexplore.exe 28 PID 1844 wrote to memory of 2564 1844 iexplore.exe 28 PID 1844 wrote to memory of 2564 1844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7ca8b5f8547de9b20ccbd11f03871a18_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536951a37dbef8667e385f88155d8748e
SHA11cfd09bfd1b350933b3a963117d8694876829699
SHA2566df12c9cc4736a2e27cbe654b8a214a32e8590e201110f6b9a2b63c37356367a
SHA51282b6769556516ebdcd8339c051a01cba69fe0ad67341220fbe7ea5f5040b03e821dcc3f4b1ce4f0aa5de3ff13eb290d9501f6723431917c14568d599101132a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da2d9dfa65c167dc5cf44ea32e5204de
SHA14dd29d583ea20cfd2c4628dc1024f9f65d206b62
SHA2567041fbd789cd5e4dccbd2b943c7200b37ffc5f56c7c8628b5f31f894f76d2244
SHA512adff4d5dc23c7909746766efc661ea35339cb9acf49391cb1af33f13cf40fc67e96b02524c100980097f078ecefcb981694e29228505d60f204232f9ede8d468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b9b6052490e91255ba3e2de381ba61e
SHA170fa3dc4a4fcd539ee365dfd4fe202faa83ee313
SHA2569c22de5ca5163959761786f721de25b2a264f34d0668bd034e2feb2b0ee2faf3
SHA5124e2ae4e0dd62dfe825713ba25a0781ef4b644459a3f87864c77c2c64c4f93846b18548591d3277ac387e4de2a6f32f16e09cd01e989f8eb5a2444c08d6865477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54abd673ae35c725e5ddb836e4662a7a8
SHA105311b08167f65b74f64aa0fe5e1a8bf380ea9a4
SHA256da94681cafd8839dc20565241d13a6b54a079301454cb9e15374c798e1d798ae
SHA512b9dffde2f82da46bba860fe2dfb98752a1018c51bd61f62b5f526c37e594a4d59bcd438d330a9f8002ec50aad41379a8ae11a061d7f15282437a5544d298c5e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596dcf60b8bd85fbc09d4522faf17622d
SHA173dbe07aa031d8812ca3af171618d82045849531
SHA256cdf56d6c27f056fb353b3c6aa1fc98b5eca1644b598a8cc2d312473633aef1ce
SHA5126b66675596b4277850bb1c9bb69b4194228c8b0b5995470e89ba315f6112ffe3f178a27189f321647c783532491849ff68ee2f9ff8c18a9ad8e776a134bea321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5034b8f805f794d29ac19d1e2e59b3c64
SHA15cc8faacc975d92e9fd9e7626b18781d2c13cb55
SHA256a8d17ceb0ef79b2716acc0d23a6534c4b95bb0f9c0b28cc597268863c011705d
SHA51255c940e7d6dcb9e3180ae515686339388b2ca9b655361998f9d876789f5d0a565265731fccc02443027a33f44fc2fcdf55232686871a7ae3250b3e59885663b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f0d4adc889aa6cb83ff26755bd662cb
SHA19f21e84ebbe9e9bd795d6037451d2a0d3ef191f6
SHA25655564dacd8eaf054b18baad609132c50f7c4a3235b7fa888042b569c8e0abfd9
SHA5126e8ba632b7cf34d3c2c23861d311ae3019dc6814c050624f6c0b3f12e38002071f384f931cbf5ea3aa23d9f2f0f66298c90c781b96c41de10ead515d4674a00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fade80f141485f90a2e0bac7335b1ff4
SHA157c84ca7d61372ddb65d0064ba17da0c140456ff
SHA25639546972b49b4a5333f295fd1f86dea904599b50f15c001388c4c62bcb5c220f
SHA512897d57f493734d51872bf868c081d2e682f01289d86a2b57d97fa65966d2af72bca3aa9c73c666ddc5e5449fabd2f6e0f82f88218c9dbbaa167e455a4041f7e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538f74a86c69641cce6c4624c3da566ff
SHA1d64c8d69df1b893c112cdc9e2fc71ef95f1d53a5
SHA256521ef32fccf66a8cf0f0e198fdee1e65aca3dbe7eecf6544884b28e0adef1d20
SHA512f6c683b1a6bdb5c060bbdb260c0298fd68c9e87d4ecf9669a2df3682eb874e74f8668d63299b7896e5016f18f38b48d53d983471f82cab66ea1889e207d8c781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cf89f46066e3e54d30229d0268cba4b
SHA1799c815059c3e67aa55fbf26a40aaaffbd4c6779
SHA2566d05c5b9c424403d38f1125229c847b9bfb711a9153a52a22ab479696cd30955
SHA512a5bbd176dd75ebc1ca715ed9bc6ec0144b77f50809cec92d37ed747179f35baa2d0d36ae66c573d6e0ed2600d78b545e398f222f012ffc13073697b5dc597064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6d71693cdc9cfa011b06dc1d6e5029e
SHA1b5e544828eac703b18cb0921fc70aa369e7966f4
SHA256e0b535d0f9912ba13c91ac8d48fd1d70ab57c50ecda0c77bc6e95545d5b42836
SHA512ed5ac665f27f385db99fe15816a3008b62a7f4f371cb37908d9029821f3fa9f4c37757d169743f1386f5be0078ea8af7497fc2ce4f2580db83b813953391b821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9963250cabde2bdcadcb1e8055cdd37
SHA1701ec029e5704bb154f563ff8ab9fa0e43c27f21
SHA256be35257b49f0e32bbe5e7ede96375b2328191aae413cc5127a8e9c550c705da8
SHA5129214cef412db3563e4ccc3ad35ffdc1261a77c11ed8b021c88996da2a2fae27360b588578b4312319f990702eec862b6038ac5fc9e37f136c10750e5cfff3366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5244b7e4426b81c72d7fc99d37f3159ce
SHA1b90f2db4ba97bc42c0ccd8e746e796657218610c
SHA256c135196a64a9b92f162798492b3f01f0f17c9cc838d0edb7c326b77a007c9cec
SHA5125515bc3120df873bc59b6f21433519ffc536cb2e273f379a3601b7b0e5df0442970e42c4765e68d997edf4834ddba8b954ee21868e5f15c5bf3d5510375837d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534b84a8ff6e7991d3dfdc02b73562daf
SHA1eb32f5f2f3b65cf334c61d1e33431894905f5a82
SHA2568f7e60b8444694ac31d179ac7a63f430212f9c0fdcb8a7827bf18dfafa9ba92a
SHA512389a14bf1fde099a126f75425cebb5a1a75a3c1fb3eca4271acf770ab3a220bca9d8e4763bd66358d9aee9be1beb9ed9be0eacbaea4ed8af41b9fa46d409fe88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5024159c84ec16214fece40c0ceb178f0
SHA1ebe4667fbefea9af79cc957d48b61641ca6fc8f5
SHA256ace21815e40b129cdccfd5dadbb529bf25555818d56ba037741515207fb16d4f
SHA5126100b2277e6a7ddb9e9a6db5fc66f84df9c85a803979000ba36344bcf96a2df9bf06c4302a7a369bb3fe30251ff2eb63bd37c6406d59c6685b731f8362bcdc61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b3570a718d7550b13f02307e8bd55ce
SHA107fb1c322fdb95eb82d78b4f81860aa12c152bcd
SHA25653fc25b7c92ce64e56eeecf0943673ed33b9e3832ada095ae1541f9e4e574c0a
SHA512c9fc780da41e02dfc09888ec52c0a809020398d8df4a4df7a9c83e5ecffc392de06306df7741db9cb85dc53b18ada695be854444234cdc656e6dbdb8a7352997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5247b615a658c54bce11cc637448ce59a
SHA1d5cba766782073a9b9103af5b6b3310acf245b9b
SHA256ccde4cffa362d2406ba6e15dcd5e932351c048125712e9eb37d5462a8f8ae709
SHA51220e9d9145e8d63145834dce1a464a51ba3c12fe4f78919fa8daa58d4d85b7e960b83bd195a36a649151967c43d7b6b1802106326165ddd975d01140f60b609d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53462483bd39e4164f57956b88d08699a
SHA10a3ce8d37858cca5e6c06bc243e2ee17948cd0ba
SHA256199b7a58fafbd0eedb2be21b2707519ef56bda99cce47df1b2ab56e0b2d28adb
SHA512b9dbc6f4d40d8ab1a6f8b670777d79cf92b1b184afe25dae083c66ef9c81b0ef76548116e1ad609a47941a6ec2ebbae1fb77e45435ad9806e0fe17eb63b2e547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d63bd708501704393c1a55480dea988a
SHA18ba0cce61aa0bd2c10d39a4b0dc9d7ead7ba9c65
SHA2568270bee49efd8a8bfd24844024b8e8039d8b0439c53afd7dfa1506aa8a0ebca0
SHA512381514ceda7821bf336e4a874c11eb5c4b568649064421d1e13a3e0b32142b7d3f63f1adeea05784333953c9e6dfe09bb2ed0a29256bd5a8cbcd9e9f9c3013a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cd87bccae0ded933f36232cb4ddfd60
SHA1b757bf5f1c2f3c92f574cf0603be818895106ca3
SHA256bb42576bbcad86b9c050cc6889eaf9635e91d32f8abc55eeaa1451ed839d7857
SHA51278168f55b180451262b65a7cb75dc26055148854fc63688a548f37551fd0b6428a91fb5479971456f323a868954a5ffa34fb948c5c9a9816d0a1979124770428
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a