Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
7e3cec1c45a37adf2ae902e949499356_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7e3cec1c45a37adf2ae902e949499356_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7e3cec1c45a37adf2ae902e949499356_JaffaCakes118.html
-
Size
2KB
-
MD5
7e3cec1c45a37adf2ae902e949499356
-
SHA1
b990cc66afe01105f7adcfa51edfd0778c1d5882
-
SHA256
6ef677b0b01ed97484aefe9d02dedfe6fd3ba7d708dbc9542fc76817e00a5ef4
-
SHA512
5b43d00dd3b3815903756fde76ceae2f402301a760f2728fcce8ea00f763d6be462d3368829d9a18255efe93acae0ebf0a2f8d767dc51faa0515b333dc8f0a96
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01131cf3ab1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA78EED1-1D2D-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000018f8765b7523e34d9c5d5abb13436a81000000000200000000001066000000010000200000009733619d3d6c89ad9b7f2c697f3826194ed5f3c4cedb8f3b8dbfc775540e6bf7000000000e8000000002000020000000f83ef38407e49154978b80fd77c3749e9b5bd02d2cfb5fa9683d6a7617fd1eaf20000000ed16bb3e1ccd222515add4d9fe5faa592bc35384c22cef8c652eba185f7c53404000000073ec5815cfc8b18d35c4259df2e9e87d3367582542d186feeca9a12bfcdd0726d7aab2d08df07d09a9835f4ab1f097fb4994b0f847610e1b1e2f628ce4884783 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423088746" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1160 2336 iexplore.exe 28 PID 2336 wrote to memory of 1160 2336 iexplore.exe 28 PID 2336 wrote to memory of 1160 2336 iexplore.exe 28 PID 2336 wrote to memory of 1160 2336 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e3cec1c45a37adf2ae902e949499356_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5a04855e581521981a475382e59a2ae
SHA133c5f3448a75448cafb89568aa4b3963a050dcb7
SHA25668a25b0d646e5a0e99a71f349e15800c7f49230c9c6710282ab364825b2955c7
SHA5121329009f7f4546be1624e4fd4fec41e5b89b81ebf31e259cac0d173ab1d5781fbf0edf4df4faff9ad6d0c1c333a47ecd89910c708dd765603f63585787de900d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55754ec8b9673a0e9279648ad1655e2bf
SHA1ad8909ac5fbc00ab2973de36ac9f83233a4cd31d
SHA256f2991b5e5d4a2815bff380893e838f305ba3e87237303215845c2ebf80386998
SHA51222114e148adcd74cb65d1e639770badabc0ab88cfddc800f70753477533cfa81f9e9690c31a5ed0a3519c7c49567244e8ea77b62e2f86f144b5be0cc971cdc83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bf567ab49487db59da6d84a1c6a86cf
SHA194de9d9d2e48019d50177db20ea4414a300d8665
SHA256dce3f06616dc443e57914aba0f257a09f57ad1544f6442dbce08e07f7974f103
SHA5126bad52ca66b5a590c1f1eba567df40e7e724a0f90cf29ba1322b7f110d9b3965135a443675244c0dd2717871c49b1d4b2297a2e4c8c4647adca0aa7afe7846d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaf2f982828ea196645327a773861cfc
SHA15a6f15f89d0370d0f7845eab417ee14b4cad1178
SHA25605014e5f8a9ad7be42efbb7d5480b8b8c04789a9156be71e13a36de2628f6c5a
SHA512c8719dd7565b34287e057a7b65db8518b2132341c4eac792ec62849930f6b13bb31da74ca475e71ae784c4fb7ae8475d9059dfcba05fd47922768a10622a4dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5631dab3639c63b9b559c66d3eb67995d
SHA1ba6e642c2fc978cb0ee5b7864648d91a0faf15da
SHA25657a68c5405d5a2087c3fcf22be4c456f8074daa8507bdb28be3232e5754bfea2
SHA512a97ed166969b0270f27316ba6075794ce44af1ddfff0cda17f1208ebc9497ef5fd9bac7ee329b3a179437cff9713aec1a51b4834ce66eb010cc80c41775b1f3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e6c826fb522a04d483a2a6909e4612a
SHA199411e66794e148c5eb9010ca68dc6c68d1a046e
SHA256e038e2999f6b2e3d34c15025ab47e661740bfa1df40039954cf5588233506c34
SHA512282e96a40ac0f86ffae40fcf4fcaaf550f951b666e364ab1929c9c0b2f9d0a7d3421c592aef99b40d83575fa2f5431ce0ce7934ca998cc6edb88b3b359e2b7a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e812cb7399e7ca1a45548ec2aaea094
SHA19d428248da06342834af01d899db50217a9e9eb0
SHA256071c2750ba3557b599b43fcdc2344c5049dad87431048b5225070fac48bdc8ec
SHA512269851083bf026f56e511e8cce5b1d6b50b5905963f87d41e4bb8e71ee6ba2a09009418539c7faf7c71b185b8e1211a676731480634b82f296b4b9ad15435c8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d8b36087b13ff17aad40720c21e0e99
SHA193361d7f38e6bd26d42de35ce516b53cd9178189
SHA256be06b3dab8338257d919075e561503061eaf1618d72f017fc1d806c0e267cb2e
SHA512aa9e203c49320513825ab1ef5a7c3f1d7424f22df49eade153360af849dbfa297e12d852c657a64d9e6718bf616ef1f981c97229c4490455b98f03f14a2a868d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e8ce1734360e82f4b63495b035b93d9
SHA133d143cca42482ec1d9172a696e9a387fcd932cb
SHA2568b33b615fd0743db1aa79d1d35209e479a3c4c2b86856c565fc0940a0ef8a388
SHA5122c6371e3de02c2988f2996e8590d7d13fad928c1e7c2e4e183b5cfc6e4e3b3747902e9c2b0e28d9a772aa7b1cca13d07d69b5a045b79eb89b24015c0c20be9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b57de4f79ca479c571c0e24555c07de9
SHA17c836b8cbe63e58ab244d3516503df00b6ffa137
SHA256e47a5df8dfafdf0f69301b51b256e8561e6728876f06b1760abfb6da8978c7d5
SHA512f16473ff6d80b7d43ab548d0edcc1abe1ff381c767460fc3c305ec0a1f624b10a8900035f3a2f1c63927a39138229fd16c9a1a4a71e4edc06fa6185f4fefd558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e05978436c8e9e3dd19be26499409f0e
SHA192ec4ed09d84581f1df3aaad3f97de018d541948
SHA25677f3e5be8dcc8d0cab94490e26c96ded980410c06d6304d09c7631978b94f79f
SHA5120e1dc502b7e82d3fe3e0acfef8a534d99241bb3487579c8c4b53b1fd8ad6088ae974dc59d7e565c88b7231d4bced3874ab82fa429d0edd6bacff5f3fe3579e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f30a78e87ced742dff7aa5f6e53f51f6
SHA1e5169a22fcdac4cc06be446713b28695f8b62cc0
SHA25634b32a35e8dcb5791f3fec0ac897ed2a2c9b9eec3135d49011a0d64504e299f2
SHA512b1fa5d701dc3077e2a8b4ad3601cb9aa7de3a6bc6e7fa652eb767e3109942294c92159a9e8c01a3b4071596d7e1d909f3cee9529b140bfe00dda0e2758aa7464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b0eff4679a7bcae354a92950fa19ab7
SHA14a9f70fee248a479f9bd3110311d79a77b98091c
SHA2566d080f73096a0d4a82c0b29a299888812394970074ef2e960371b96992d03261
SHA51228f6a24114051496799dd3f75e7f2f5b7b3d396511f2153667e3924eb362029b97508ec09607e489fbc9ab6f5d24a20439c451a1173633ef62be701680eae096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e888860cf413ed17580afcc1f777116
SHA160c1a336db4747256013d364ded33a1d6ba50b2e
SHA256865dd3b995cff22d7569c4495a5ccf519570628e69e890dbd248dd6390ec13d5
SHA5129cd59ee24749672332110961f624c988c25c6a2d8b24a4ef82c02433cc03062155b36d20b2ab339659c9b09cae810ca7679f34744e03dbc2664d0687c0f81451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500a7296626e1aa42feccbd9bcfa558ed
SHA1abc4725b591fe3bbb1f1bc8e428e10909dc2cf2f
SHA25641efc9f4d8d85162aa4f13813360fb7cf8856bcadc7fb7e1fab4945aec9f0411
SHA5126cc92615aeb07e89a4361fd1d35a04ed4aa38f13e389ae93a8ad4d895498d868dc2d88597b3336a847ae5d80a3fa26ffdf2f2e314a16924e93ee8bdad1a60b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5020e295fab7bd2b8c1193d5db6fcf2df
SHA174db9bff3243c9fe391fd6e28b87bff518915496
SHA2564f46f5ee3e51dc90792e42b1b44616259fe7fff8272957efeb3d3c600b7b569b
SHA512be6662e36eda5c7a4ad64aa26c8d13703d72b55a7de96b3f213b0683e3e7802e334fda29009ba61793f43fee7875456b29f96f4716dab2afaa9e7f87bf9e86ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5201b2999da710cc06b4421774827bb9d
SHA10694f8371df50822c34d8373a15cd4254c8655c5
SHA25642a9452b3bfdaa7d2c52fdb4aab4916e2cfd578ce18a27f14504cb3b39c70b52
SHA51247e79d7581e885f86d080afd59716cbea521bc0f651a18a51a1d416c86c497406ad5361235e3ab0f4e55d5b0be856eaca5f1ed46465a8f165f351b35c9e207c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4d775f498baebc4120cd903269c3c8c
SHA139e28449e945ebd84a7d1b1be7802760eaf5fb12
SHA256851d381e92c9fd544d7c1c9b1f0fa453a7cf48a121cb7461132927c963509ced
SHA512d930de1c556c11081634d143d949bd4235025be7e3b635282dcbe4617ee768b9ac959ece595ca3a705e7036dd879a2c4d634b86907cf10bea0ca4a94690a20d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f215757fa561bda705b7fddef431c35b
SHA1fc9f0cc5f874529eb55802f582ff780a74fc7f81
SHA2569c5586ea704e34f0e00e20db1e0a07d32a3636357460ba0be666060894bf5a38
SHA512174970fe16fcf91f4cb55fbaa47395749a6fda4f0a456064e534307e5340b668c75e632815ff86d8c849718f0e25e87ad5a7a5d5f67370207c5f6287ae4af624
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a