Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 17:05
Static task
static1
Behavioral task
behavioral1
Sample
7db7dd566c6639c0908af0079e073b1a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7db7dd566c6639c0908af0079e073b1a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7db7dd566c6639c0908af0079e073b1a_JaffaCakes118.html
-
Size
3KB
-
MD5
7db7dd566c6639c0908af0079e073b1a
-
SHA1
cf94644757979490ab90e9688357e0b99087f69b
-
SHA256
773d33e2551ea367230b77e6aeea2fced0b5a539a54cf96d3ca5367c9b8dee87
-
SHA512
fad354cd0141551112ec1b4f6226fd13c02494f66656f5741b52d338d4d79990549f148f5d32ee46b681dec83ec3ffb1fab872dc7a091ccf877d3a05f0aa983b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423077803" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FCF9A31-1D14-11EF-8FBA-CEEE273A2359} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008e2c3bb1828f52418efef6b9f69967510000000002000000000010660000000100002000000095a572d77781b376e0256595ceb99f1540df18774955acca2b30acaa4829fc21000000000e80000000020000200000000c5ebd9a082773279c66b6676b9bfc677c77966c46a1edbe32207a6590ae1610200000004fe7b105d7f63906e55a8884528b8aaf6796e5149d5b9c22fb2a6f2499df74174000000033d1c6b945f65d4b9d5a382091787db08410bc7dac269287a4b8e517175b6f28bee480f5f175c8b5117d134822672e2b03905b3d079e1aada29f812ce4a18940 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0686e5421b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1884 1984 iexplore.exe 28 PID 1984 wrote to memory of 1884 1984 iexplore.exe 28 PID 1984 wrote to memory of 1884 1984 iexplore.exe 28 PID 1984 wrote to memory of 1884 1984 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7db7dd566c6639c0908af0079e073b1a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524ba769f71a5a55fd3bf601babd8cc8a
SHA12b9f8018614ce94078ab5d694d97f2432f19ab50
SHA256142dfbb1d4a3f30b452f997543a2f82636a9c0067fff6bcf22ea05f8af05e096
SHA51284367f99ca9ebf4d7986944de6330184b95deeb5adbbdfb36fecbc5f4cda441b6353ae867b81d961cb851f2588025083accfbaf033ad53cf570e4d0973c70715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5763f9027510f2a59c3f02ce1b0f16d79
SHA11dd70dda7f1c48964f33884f6b0c29447af1bfca
SHA25663d7702f43a3e9ca5b867410cebbcd48b131e298faf361946fd18caba7c7b597
SHA51201abf54c2e2fbe0479bbcff8d87e38b622fc32950476ed048f6576267613f902093923fdc72deea570901941919443e8f6daf000153f3270802f78c818bebd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523818cf2b52ad82466b9e87154199347
SHA18b7736891b5d6e7a54adcd02f38217b5ee1ff02e
SHA256984dba5483006c2a7778367ad6315b616be5000f24264d64adb27842f94fdac8
SHA512fd20218a5a06b6472732e072814e126fbf1fc9d8a6c7b397ff747ffae459166bc6a81c4273f1dfd844d9de6e8702418b75946e4efd26869fffd64f52b8aca080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e60c133a3df8a5e27b9d5658ccfb2122
SHA1ea28f9527bed83bdc6d68f15648a9146dadb9bb3
SHA2562ffc3c2fa61613c1574e88e9e5c257a5e2777008c837fd75c592627c2a6cb24a
SHA5129f0fad5428d5594eb047194497eb2a271e12580af5515099e81887d3ab19ea013633f9a0f7cdb1cd3ba699d871510cc6fe43df10191b491689d27ff1b33bdb44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548f0420115dcac91f6238d2d6d753c61
SHA1b81b1bf0c647ff49e6084087e87930a6207db54a
SHA256e18a6c6fc7299038bb2dd8a06ee7344222e93c9b8355089e32be0619a48cdd40
SHA5124c7d160cc492099fe296d79d2dc7515976e2a51310b534ed8538a532e644d4d2c405768eb080204af4b89ab88f7c3d6f111dc6a540c5aa77e175d1385ee91218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509b5a4396659a88243788acaadc533db
SHA172542323eb7188e414d026ae816b3a0e4d4c5dde
SHA2564894e780e4da8eb17f5764d120b5eb0cb567bf219bb635b14d1c26a9e52a1425
SHA512c38aad84e9b58a7231808b92dad3a245b6be43fc5a819f1ce1908d034ca5381506e01f66a8540a02760987c0486085fa1526127260ec46c50b396d93a35a1281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b5d3323390a30f749d4d32a3c44c3dd
SHA11ba887d5230bf79450b5ed0fe4d35876077042d2
SHA256f1ad46c6cee152aded8317e87ccbfe3cf43631afe1f3ef8c8ac55cbc0720b9a2
SHA512db486e0e84ebbf43925bb98b8fad612201168b4e70d966022940fd1f64126ce66c786b66bdaa7d14a95685b78c4d69c86c988d26a25235afca518b68a41607c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5557f2fa6cdb5b907400dde9840d5636c
SHA1cad75f6dbcae78d097366dc35213f2a01f928244
SHA256b38cc790581c943f75531e2bf74cfc585d0dacc290ce4edda735bded3af0367b
SHA512a9dbe42150c35b9e60cef3eb675aa5380ca77e33851a01198176cbc35f39b940de485902ac12446b09fd953614dc31938998487c7e6f94bcf2753b04a4e3843c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b16142645cf4ef1dbc6ce9039ed8d563
SHA125f93e12b075b24264b6d309afe86088bd91918a
SHA256c71fffe2c563b4544107dacbe4adf757b27ddc08c14f104fe135f0c103240da9
SHA51285e7bf672e52e655eab884ef2916b40a8f9831cf8534633bf58dfefc96d419e909bbdc9dc67ce35dcca0e5ad68a0e5d90df77614eed7d4959ca2abe373c714f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e429b5cee1c9ed6d310453fc4a8a4fb2
SHA10b045aa9eb202a18f50a5a0092cb5eb7c23cbc99
SHA256cf8ef7b80c1ff457039429e5f39363f892c413388c6ddd761df2a2261f86da73
SHA51254e2c58d166943668bb2c5148b1a9daafd0801471aefb7945956d846e67ffdf6a05234aaee2daa7dc35a5f3340787626ba9e1607a13acf50c3c291936c818730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc505c5667b593b5c304d1e3f361cc1c
SHA10b8feb7cdb386524ccb6c3b524b55185e864fd56
SHA256e25442b2ddfcc81b2288c391d053106875a1844994588e3a651fd6075fe89d4d
SHA51211d18783b124c6d15ae29b95790c3d760831e926ea2b434ceaa0957b21dd77e9a7ae055ccd3119b278c4496eed9cce490389bfa52ff50f6825d0541d630dc234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac9b72ad6c1be3378544f8c3faef4f9b
SHA1f4ae3a73840a001bdb81d7a5e99625e96cdec199
SHA256cc02eda05349ddca48186b52b318029d0815d07b51a4bcf35d2b91ed69af8d05
SHA5126841b9e824cfaf3acc69a539305bf9b9a06f820e6e4f4f0b89ae60c178db7faace91b4c5f35a74c10f108285f4384c98b0dc32bfe7572148572e931aaefb1022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58465bfae9afbc203be9b2351541f40c4
SHA10840c5fb652ac25536aee20fa101c809fc8e0409
SHA2569f5bf345f9719ab97222a49b564bfc3e649512f6c2336b2df5de2a594cd6d1e4
SHA5128ace2286878e16ce89b62dc65739d67d4262e46bacc885dbee02335cc6f6b2e8a87930acf33043cae1b94d6d69ef777243e8175b87395cad33b5e1558c38d035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebfdb272ebc1ef6dd6b412a275abe403
SHA1b486bf3b83900bbd890a8c5c9fc016a532e26845
SHA2560616d93de35552bcad7e04b557bfdba4ccf4445f92c6e40fbc66796b17e833a9
SHA5129cec86c58f4e83a47c4b8ede7918388cd2b9f9c6985544341bb567d16a2a1c6d714f8a784c1fffcdbf8aaa6204fe7fac34700880d20ac618fa8f42489625854b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c12b90523e610c4d20ef58c0f74e301
SHA11b9279518305ad26da5161c2597a60cdda1fbe8c
SHA25659e32721a7fcb63ade26a5daa9cfec10b3ae2524da879778965b7432f3e3991a
SHA512d9a4adeb8d8748ad3db0566bc7f857279cb3172c0a45db863e74cf5e7b4a14dab8144efff351ed8f6359b6ee86eb04cdd0b7c4eb1a6c698ced0fad383b6f9421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57baf4217582162fb2ca2cc96d08b5085
SHA1a5920ec7414d82ea65396cc1ae147c8cfca60e38
SHA2561344adf8d652195dfbfc6ad54d500bf9846d143938beed49517af827baf317f3
SHA512c21b9edafa07f6eb06d4a3e4938d2854cc3dc1aa9676864e55260009990ece338cdc26d70b6a80c24d30f938c7a0d232b1896e876325740699907903f58f4bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5820cb753269e80af29fdadf9b21091a2
SHA160b6fffaa8200c02ebf4889e892b430a114c1ef7
SHA256a174520018d335245c78a7cd1c118449f6a178853f0cc74d8242a251e0b1b784
SHA5120b374eed43371affe76dc88661af977b49c14011060b84290e38dc1f754462c3ab97a923512b48d8fd6711b840e10bde9ca29a56dabdd771706c5bf5e7e88851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdc5b0b1d85591eb041c69984949fd1f
SHA11b36e72a3e561156b4752cfe759613a96882bc98
SHA256881d1cdb3c8aa1d7b6a62791c02c798c2bf2ccbf774b45d991e0910b6d18315b
SHA512e7c2e42626b831d229669c47ece7b5b571e6454afe0372f118eeb1b5196805d3b4f98cddc01682ab19864054a35d9a8bbf29e70d0a8603b67869c732b3347165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521de573616f0af3b745283c1c99b590e
SHA1f6de0a8f1ef727778daf6618725d0fa9172d6398
SHA256a508823f55bdff5e430aff82bbbddf00275fc1051a337b9744c693298f5db706
SHA512beb55c5e3b8d6e5b9a1dcf32c930c52dbdcf5947ffde356838a15a08a893926bbceca73cc09099ffb57add136bc57e1a03224957218571a455c54b74a70307ac
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a