Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 02:03
Static task
static1
Behavioral task
behavioral1
Sample
7f2b2773a63e59c7bfa61c2b1cc443b6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7f2b2773a63e59c7bfa61c2b1cc443b6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7f2b2773a63e59c7bfa61c2b1cc443b6_JaffaCakes118.html
-
Size
332B
-
MD5
7f2b2773a63e59c7bfa61c2b1cc443b6
-
SHA1
51776c79910d807384400f983d1f58e2545c14fe
-
SHA256
45a9d6a8afcebf80e5cf83720f247fd0b1b56f26251a9776b988817098d52056
-
SHA512
ee8469f64dcf635562e729964d50039baec332b0d688f61d3226187b7e032209d82fc22b5bfd5767daf8245169d42ab025d682dc7cef473fad334805e78954ac
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423110101" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000a9b49497314e9a88d60b2607153243ce4d946e394cf98a646df787c76d57c1a2000000000e8000000002000020000000fea33301f43183c832cc16e40a0e27ec6fdf624b103394cb4b4bb7280e0f938420000000638ecda34e5d332192ab80344ad080d03e6a719100542900fa7b8996bcf7101d40000000062410334f79b1e89999a3c02ca4b3aa49182b0c2a64b77fe7c04949209dcb6a1a0734984dab219ce0e152e35b452e7137f5579aa6a1612df6608cd1baa6b387 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2F814A1-1D5F-11EF-ADEA-C2931B856BB4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204e8d876cb1da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2176 2756 iexplore.exe 28 PID 2756 wrote to memory of 2176 2756 iexplore.exe 28 PID 2756 wrote to memory of 2176 2756 iexplore.exe 28 PID 2756 wrote to memory of 2176 2756 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f2b2773a63e59c7bfa61c2b1cc443b6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d7661d8da141213e0fe1c5080647f1
SHA11529414642282536632f6ec7915bf662eb7fa3fe
SHA25616be87ca9a2a429d3e70694ccbc14f7d5450f52c4e558708ca98d3bbd463c37b
SHA512ce4ede30a79f73590543a4ac0d6f7a9ec28428a666b0af0f06ec62d7e65533cf360bcff26eee0ee0ffd5d66c7b15f3a3536b2f472e8f7b79e0011387f15fa032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0f0906165724450272f60fc67f2ffc
SHA1f5432115ea3486da4128454feb84e3e7b971f323
SHA2566720c09a0ccce718f91e43b5ad6faff5d5ea456254b884aeb7a3716f25fc5046
SHA512ab90b077c7077114589eea4321d9a65364c4d4dc85c4a081f3b55df0458f734fc51239eaca3059c8fe4b02373b748291415582660c585d209ce411566428216a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c76e8795b7266b15f23a19d0fc719c94
SHA143c1691008f7ba88f6be172e94faacbcd7712355
SHA2564f4c942c857aa858cc0754236da5e688b1c959c486160b777f928f7b467bc740
SHA512815804bf3067d796146b65b326be53018c0e12b6e2a4706aa87b755530947479471aba4152464d2631cf41e1f527f4fe72256d59da8077e164473c349604de03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5729d2e7599db2b915ec8cdf1c43bc78a
SHA19a027f562065a3b026f034ed9abfe676787a9a55
SHA2564c02110e87b2872b6b8c5796d3ed6f2b46d5977408b38fc7c03d705084b94cbd
SHA512e98e02b571841b9ee67280915e051d3f47ab8b46c2904a550df76b7e5635609bc235224ac9fd5812e483104ee8ec5b0cb286d1f822d201fd48960647c39e6e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b0cb330c0d7f70ab47da873b9c6f6e
SHA12997b6baa4a206c2db18b4fa23eb85e3f192e25a
SHA2566dc3c4a5ecfdf543e3e71bd350f958a0a879f3197e9bb0360d63e10667d65203
SHA512740313445ffee678dd7f97a8711d61b9ff3b4506eef2d0b869dcbb1cd72f7f9142009efc48b349dec112b72778ac68f31f656ab1461cfa27471fa56a629e8dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552976be1cce4eab2b8906cae19c0d253
SHA1503e55f82cb7d9bb38b3e5948295bdc11017564b
SHA2562537dd62b147d33da5b9a201e99f2934136457768754c65ab0297690a7c1caf5
SHA5123da66b15cb2188b1c1a6bdb850fd7849d584710ca55d5fb8b3909483630f4b28a9716f0a14c3f74b56d0b2ebf0acd59b9e3c07744f49d8087ad71f858abad880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b3a2e2328e6fa1e891c526c2b95fef6
SHA124518e68f33e999ec99997ae7c23fbc058360018
SHA256e0e1671403f61c969cb1de8914b9f54fb7a01f83703ee320c4078dd5f1c91b55
SHA512ed3198945ee3643dc447fb636d1dfe090019a47e317256acb15b22cd67ec6589a5a1c068e06cde006ea5ff71d1492df0266087c4f48e132190425682bfcddf22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef9307ade0af542eca643be71e078eee
SHA10fde3f1d3eb01404fb641114ecee2d5fe14a4662
SHA256daa7b685cdd2b1b6bdeecd53a19ced4fe3cd7d89551b20f26abd2a5689261cef
SHA5129114e7a60972318ab61e6b578a3357753b05ef3f00cb28f9ede6afa9f8af71b028b8f6cf7c388bde44df48122797af8de9a14261b3244ac387cff0f53972dd92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be8c9b79af0449edcfdb47b15985d0df
SHA1424b647cbbce50873a12826ad6f4691ca71cc1a0
SHA2560644008f311272098849bf25cdbd8f5c8068eb67c8e767ad5f9b4e38a8a41f0e
SHA512089d834c2f8fb1187f556ad1932abcd510968a65c9fd0c160f6cacd2083436effe75bab1f80343ca0c5fbc811525b572ee77bc82ffe8026fb2f15bafe9acedb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf5f6caaa4f13d5623b1f0f8e04e7767
SHA1d839f9a35cacd59038c9138f6de9106779fb742d
SHA256c3751519797c2b79a664b8fc2d172b821506af262357e2f117147596aeac1c0a
SHA512f458e6f70bb7645d72cb44e9d64f1c975b870bb52456038d79c879acd7735d4a885d247bdb47c4230e169a4a7a3372ddfbab0448d1a1e7e5817113315cd11024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a0488dd1a38752668ef4024e01cc5fb
SHA1fb544473b56c9f9b77930780e727e75e85de5050
SHA2567650d3dad84ba7f6756817d854dcd81f1f60f0b20c780bc4757bed21ec03bc34
SHA512ee77ef34da91e4194db92e48af7e85e6b5e3b1b3144c1bc5424825406293e5aef7af388a96fb796f3e629909b7b7fc3ac98f4882e70b346fb9c626ab2618e516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580b758aa45f6cfa603a3bafdbd48d96a
SHA1a492fd33549facebff01d53d7ad25bb115cdaa99
SHA25616eff1f64a46bcdda73ce9e8ae6f12cec666a7c821464fd33307741a95289e72
SHA512c89ec82846524202278ba2da7d7292dee6fd64423f214172ed021afb70420ad8bfb8b68f654c82b9d01ec8421dbe146ae4691212004519335682746b1395295a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509fb4a126ffa7e5184c913ee3c1f0bc7
SHA16e2e734f907d84645ea3838b1dfbfacca4952b39
SHA25618eb8bd526375fa090aeb32a35dc95f4209fb51735c1df9c7253efcc7c6895d0
SHA5124f419f75ec32e82fd564decd4bbd10a65357f09f62dd40604a080c97e5aba884150062c1648dd91232ec810224f399e4b7cd4ee41052cc8d165270a1802dea5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7f4e59be7942658b8f908f7a0938f35
SHA13b498c7d32ec5f1e03310758919f1699e52c1541
SHA256728adcbdcb0561c66ab812c165386748fa9649f4053a1c92ea5d0e31db55d026
SHA5126d9b6f4c9a1979729a30b0dad49232846d8677a6fd23d29ad0f283e70d4ae337dbe7accf9c86cbbc1b38e11dabf4090fd007cbbe813a131fd2e3f63287c50a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d94c8ec8b8fa59a08e194deb2c401fb
SHA112da5a680394f3ab7a44550ba7788046014331bb
SHA256bda4907d47da049540e3f6ff11ec571b9d342d747338f45842e48f9d7ba55fc6
SHA512ac0cecf624594141a3417c6e6cde8bd6ea4213c8b8c399bf613c169395b0bd2cf42fd6ef9313c4060c4637077fa260e42d6b606ba6a21981debb239d5f598baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdc174f8b996f2943b9d0f437176a5f4
SHA133a2bd7ae4d710d400be9592cfcd580bf6279ad4
SHA2566844b9174c16f98e9e22d548e52bb105a5468855359b38221e6a150eaa9c07e0
SHA5122a232f58c3f25223691e285bdd0342b7c22dc377dfd37a707887ef01884b571455180b1d43d93b9616a3a31a8ce9e69cae1a23e2374491f5268e93fd0134541b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5041e331d3844fe90bebd2b3886181864
SHA165f9ead038f4af2bd6becb29ef57c4a0b89ba484
SHA256595b7063feb7d9eb14f7577b0da6a9fba78567d7aa854167640a608f052fa84d
SHA512b84d370b424333d842f58ea1b2fbbd3210f4a6fdf39a27551b6f39fc724701b30fbd7e5b1b257d4667ce97df8bf68c0ccd530f15d195670d22e8576184880c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2a2dac511bcf9162b7afb1a1dcec96f
SHA196eba36b89237714eaf00f3e33bac9a9a97640e6
SHA25603bcbbd449af57dc3a3e381c9166e9ac2f0d73cd819e8bfa4178c6e2d22cf20d
SHA5128672dca8c0ca936c8cbc5494dd5c2060bd775f699b5eaecf823ac82e27ea6ac9c263017e803c8710f060fa801e46655592b1dd2b5ac9ab069932dec293705095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fdd0ff856f9b91300a2ae240709e60b
SHA170906be925b2829feb6ac9541524c9983f51856b
SHA25677f4dd515fdc412ffaea507f9cd2bb0ade55a3658d8fb8cb9b591842ec04fb08
SHA51279a3a3222c0bf6b083388226ddb7d6d0d44ee632ad3a84b93a0746145f96cf3d7a8bc4db6cbcb853c007e5b863f42823bdbc7ee45229c4f530b3133989ac8682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560e6a52391da5e2f7ff72eb9da4ff53a
SHA15002c51451cfdd5c6de6771b8708978f9b81958d
SHA25644106293ad666903b9ed2c91042799c9dc6659ab36d1d0f728cf98e9571b201c
SHA512ce59b58ed1feeb59ac44e581b6077f90f0b41116ffa98e4c452ce84b856dc7a178ec36ff48508d94eea615a07fc2bc2d20812e1c0076c0d84068eb4ed14baa41
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b