Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
7d34937c398382b4975b4c6e853d79f2_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7d34937c398382b4975b4c6e853d79f2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7d34937c398382b4975b4c6e853d79f2_JaffaCakes118.html
-
Size
3KB
-
MD5
7d34937c398382b4975b4c6e853d79f2
-
SHA1
25a3527c7b561715f82eab521cc9edd4fbe69666
-
SHA256
8be9c591a0c2b5382c5711ce100a6e42270d8bc0c1e843e04f03fc2be468b493
-
SHA512
5f5c8306079cc1b93fd283879ad17ccc5fe114422f88fead8d8449bcecc610740c837d6cbae7d654f0f2d154acbdc70a98f08227fd298edde7c7fb195f1fa515
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fef3091b96e7e44ab4a5d785140ff787000000000200000000001066000000010000200000003c8a58fae601eaba44370dc0b8bf6330d6436526cd0a8a4e1b3d1803ca641760000000000e8000000002000020000000529531fc200bb7239e7a1c43eb187a781278444df47bf3f570e6b7fb411a1c32200000003fc2960da275565ae1e10a2644a5f257aa13f34e6123623777427030833ba96e40000000ab2d7306b55a3d7220b4fdae458b2c47856902bdf13ec0dfb72fdc31de487636bb188948488a704d968c4602c55941bd1ab0bc77a7518bc5787c6359a6730b05 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423066502" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2FE82F11-1CFA-11EF-8FD2-F6A6C85E5F4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f7940407b1da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2504 2924 iexplore.exe 28 PID 2924 wrote to memory of 2504 2924 iexplore.exe 28 PID 2924 wrote to memory of 2504 2924 iexplore.exe 28 PID 2924 wrote to memory of 2504 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7d34937c398382b4975b4c6e853d79f2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52490c3c5c4059868ced416ca661207a8
SHA147a331a887f28b086ee231e052cf529011ee96c8
SHA25624b75e79a04cce85c56834ed0c5da9c552e6ccd0ce9032b76400e55143602eb9
SHA512ab0685627728d104325bb21dba8cb630de8979bca264bcdfb48e9af23d1f797073bd8f3c083af70f8327e65ec10ab1d9b24cfcbc643d30675210428bec92532b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548c5ff0f51e3c7b24802c89621e2946a
SHA1b1f9abfcb96c5d656fdff79478fa4e8e3c3fe392
SHA256f6ac36c9a04b1b268bf24644cfa102eff8755cd160e6296ee3b634ffaade772d
SHA5129a6b3de053a8b5eed8f1507f392b7ae34a5e5c9ab02336aecfb5fad911db61f6d66a15c45e756839aaf330253aa9bfa8b05ff685fff6131a7d1e5f931f9a1a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df201353e1f05f4611e324a903949f37
SHA19d5c5b82facb439d4f4ffc3fd4f3977fb2adc171
SHA256afad1258146f2a25899f7f92897a6d73dbe0e958103ec1222d743afd8f4fabde
SHA512b31ff138d9f3b6d877a100d502fc90b4bea422cfbb101cad6d64b7b3307b88536563adf441c4b4cce20b57ea72486dc35a8f11cb4b5fbfc923c478a6c4367f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8b9ddf15b7e7ac2121ba8d9ac2b0116
SHA1e69c800bd14ddfb8626e84502df9351279827ca9
SHA256fa7c2d83ae79bb946278f03d39c0001774e6a43610536a24b7ffb8836dc9b4d7
SHA512e55a0a54f9ea039e4b46a86f143da6731775c0446c5b1d6db1a76526306efc17e2dd036c2c8d3d11d99bf9c70fe340c1f8cdd575b74f9f99ec617d92407624b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537221f3fc115f5538b91b29b108a2fb6
SHA1c50670502d14e716f6b0bf47fe21ea651cb218c9
SHA2560dc7a7411cc7a0f3dba21741dfd8d671bd838bd3a42a8abf10dd4b4e537b6946
SHA51222310d6317ba4bbe626013876b3d89cda92548fae28c9a8c25cf720f13e695c211377c6e90766fca686cd8d5f499aeed4df9c4325145c4f37bcaab0d91bb7ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aa7571ece071d6248b6f01edacafbd2
SHA18ee46f1f5d9eb8588f834f69c7ba0a8a9453f98c
SHA2565e879a921856a05634c4d9bd9c77018c0d12d3ce80ebce4ca4770ec14f9c158d
SHA5128702433fb75f6d7690aaf774dd955d6ec2ad17c567f413b5de20631540f583e2f7a2118ff88c0357f3207b494ac47513f210dc57a4f4627471739acfde04bb07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d47c09d6ea1bdf75385eb73cdfb567b7
SHA1058b80b9b4ee243b09cd128fb9ab6d7deb362458
SHA25667ed87253662f31866d74a57071fc52dbf00080a2dc55c8fb5ec8061023668dd
SHA512e9cabfebb174c5b3e76920d314a9b380b4b1af0e9a56091187c46996c2a75beb89feb7ddb16e15e602869ab1c13c403243b65639180b4612d061835236e591d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db78911da949b3bb04ada1124012b54a
SHA1dc6cefd8cf77edabf9b011a7afa22bf2b8415604
SHA256a6c1148b3130ea8600d2f5ca6c4a8147211c4bfc873343ee97e0e46575fd0489
SHA51284bdf33f63dfeaff9798845acce34c01e282563a66db88160643fb8bed5b6f93ca5617f3543b3df257af7559a602ef59e289acf95ba66f9041cb3c6d96ba8a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de688de8d4c4387c7ae00c17f5c90c61
SHA1a91490c0667811c98c475b483fd4018d019db6f0
SHA25657e892427de1c82d08e8e9724fe081e3e7cc3c2a96beed7128b8cf3736f007ed
SHA5127b3e8461dcdd46e93f86707d24fc9d463505844ca760ed7cc79da506a59d3ca2aa884738b74f933e03d67e5f0df43f37a61f827d7a078a5679437467715a6147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1628803c01cb7048eaee3bb98c69e4d
SHA103db99096d046b9b5f1f6fa1e7026695899c50a2
SHA2565f57e9798a0459e7033619e272006b1aa485fa5f9ede45ed9f7b778fa2298e42
SHA512f1146bacf22ab3bab77985f9ec5da0f730a07352af38b9f703d97fb18eb8d64931464498ca3c248be70cacb09888feb39d466094894fe32a062fa51a0b9846f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5802883a8a5053d2b36a8075a8ca7c48c
SHA120b79b752e0c15c165fac2d91879f3ee3c42aff4
SHA2562e9e98e2ddd56c498dc05d9e3cf999f659bb0b147a6e315aea22f9da9c08b955
SHA512687c5346cbde07b8b7441eb6391cdc7c287b28f61e6e423c30e4294c1f8ef1d4dd6ee4582c465b674495c32a8772c47ab11116ce1c65bcddbc3799877a01c56e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5750ad7f4ead317fcf2b0beb9ab2c60f9
SHA1116ab4bd3aba389435967292d919143617427cbe
SHA2563b11db2681098766c08bb9be17f25216a59b0f70f6d26a04348a9559ec08c0ba
SHA512e0f5e733d42c7350e9dee884dd7d1f5c13e0c4251f230ce99d337fa8efdac4ee9b4a84169fbca8e7e9c3be15d97a0fa607da5e67296574f2c72181f5e41c7f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5742bc3c1aac1e16db97c2a8c9442640e
SHA146579b97ea01420b2bffc7d5633160753f850c4e
SHA25692bc7ade1700cff9b50331fe43c18754888e0331a99f7d5961d9f3dba72c3c56
SHA512de03105cf85cbc3beefdd5d40f01d2c4f40a32352397acf73ffff132aac3191e10c14e6253db14ac47dfda6d3b8216f539ce39db1f5e7ed9ade464e20f132ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524f0199dd752be41d495b5bc589bbbd2
SHA14fc62e4f5b959eea8d5e589a0498ce637050e98e
SHA2564082e86d1352c35f45d0fb46648d728c148e75d349437bd2d8ee78e16237c29f
SHA512aa24998e93027530289c4ae9b177bd3c3fb2d4da06fad16f59c54d4bf0abaaa3870fce0b06955851717905114aa4d044cc49e851111ce2ce8ba68d3353682941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cccab0d16d14f4d4b381709d36f7f70
SHA195b607728004cb256241f24472391f734b49564b
SHA256a28ba8437fba73f93089f84ab5eab222339c3b2745e193783e6ac7b83763c35a
SHA512d735a4cb6dcf39f7911a410971b439ee0b4461e4f3183ea79e3575bb5dba80434106d53a0f73455c6caa204f3766edfa2ebefa36a11da06bd7ccca2dd3bab59a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5471bd2d47cee0069327b32d72062a7a1
SHA114a05027f94b02c927f4566bf12ce68c4b612fcd
SHA25692391c1da553634dbad384ad5ed6d1f2f111c2b56fb69de3a7d4ea35b6071b84
SHA51279176f08671e0e61aeae1dc040971214e65f8faa6ab6e722c0df1890872d6764df44367c0f3e66d735fee7d5bc8e6420760542723304ba062d08fa1afce6485d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ccd35125c44ec1d7263c1f4d2e54ab7
SHA18d93031827d6fcdb24a1e3f2a46193984677bc47
SHA2564d10070fab57ca046a6180c95b1841ca2e94b6c7ada7c06f207758c50971e0bc
SHA5121e7a1bd002494cd80de5eac325ed6d312942c37f3444bbfaaf9001825379d748213ac841d5b0175fb56bbc74d07e7d6e0f8612bcb9599dcc719340b14ef54e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f5ed333ae5d166362eb320b823682b9
SHA11cd22f662c8bf8f311a4823d8ba96c0146c054cc
SHA256f30a12081cc6b370b331a609a2e98c1f423fa4137d6249e20b2578bf74125218
SHA512199934f04c912e96370815be946011cfde366093dcac981518c3166ca1f007d807cc4ac09a7a1b4c523b9231642d19f29c87ffeea5dcee39c619feb9c8dcfa09
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a