Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
7f501c6e23d7e8355d7768e3a235e1ed_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7f501c6e23d7e8355d7768e3a235e1ed_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f501c6e23d7e8355d7768e3a235e1ed_JaffaCakes118.html
-
Size
3KB
-
MD5
7f501c6e23d7e8355d7768e3a235e1ed
-
SHA1
766e79a74b191955401599d2783668e54b9b00d8
-
SHA256
48f61f04bc783ade098024a2f60a56972153471b29ef0dc4dce5e3a9ca88e396
-
SHA512
c137bb52f38a15288eefd86d491fee488643604affd24d0929b06b8741ff9858f45f0af1c9730bd69c856aaffda564176741947f15145fb48f9508b6cd13e5d6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423114086" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA3C5161-1D68-11EF-B54F-5EB6CE0B107A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0cbcece75b1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000df69842893589649b75e9f8391d3b157000000000200000000001066000000010000200000003d4c0250540c2c68bdddd1e024d10fd3390a7338a50d8ce50edb6293906040ec000000000e800000000200002000000005f97fc33ea5c09b16a091be1fc82ea8171a1582ba09aff4e4ded0090191b6ee2000000099897a650aca62280cd9fb6a2c88880a985d3eba90e5e9a7a407c7ca68c5c60740000000fd399f6db39740b9cbb794451a5cfef917cdb8462242e4674b6ddb93a002620d5acc7c3f4a15073b107afbece7e4dcd850e40aca31fdca5a90ab8e4f94011406 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 3044 3056 iexplore.exe 28 PID 3056 wrote to memory of 3044 3056 iexplore.exe 28 PID 3056 wrote to memory of 3044 3056 iexplore.exe 28 PID 3056 wrote to memory of 3044 3056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f501c6e23d7e8355d7768e3a235e1ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6cef39011d76d5fa142ec3162b4b793
SHA14e7f46f826fda7d1e30d798a6c31212de07dec67
SHA2563c567efaa6ea05e2f0915f46115d4ba89c8571d48391e76804d675432e1f4ce9
SHA51222f11b154e16b3399a55f2a3ef2cf0460e56818c31a03c4dc8f7b51ce4b5de8b51f0c269f9458bed201d4a1419409660c23949d585b0138f30dfe0e6eee61aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50989ffe14b12fabdfc2bb02e1799ffbe
SHA10f96e3b1b9d904856c180f339b95557cb15c1b21
SHA256db09fda6fc86498232205fb0e474ca3869ee012a6b68bbec557d09d187dd19fe
SHA512d700bee11d32f31ef0150f0a91f718b9d20220dbf11871586a5e3709eacb5421eff739172896a4082679e319809d15e9826d2c9523aa1e2941ef29594ac986eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5574ab0f301b85bee0ab430c58a101c29
SHA15214fb57e40180b1e8f42c9de722a1bddb26aaa6
SHA2567977336aef8d9600c21023d16f1f1d216682993083c826446372acb65aae31ba
SHA5127ad36d74a698fe4a216e6680930eb9c491c882fbc1c87fe1202031f0a02ce239bd6f58ad63961e6af5500af5a40051d58bcabcceb581934cb5ed00f1f1b755db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c608da15e22e14bb9aaca5ffa0a35451
SHA176daf0ea93242dcef7f1e1b2d2ed60bcfad3cb6f
SHA256b58858986010ac87b871b72fe2593979ace8ce1ca7f81dbe89e0904b843b3c1e
SHA5124fc558dbac40252d021217648e72ef1c2c20fe6d2aebabbecef782927356a8246703619f82003e18376064644e9cc6f0b36975557a9fadf011858c4f48b698e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577df609a8e9e4ef4b16bd8be40e7840a
SHA14eecfdf10d8793457d6924e528550dd05149caa1
SHA256ccc7a43e6f6971c4aedc424c93f45aef12eecbe2a68d79ea7419cef433c06682
SHA5129b5d6da218bc6d572b85eea6acf4e806cd929cc8caf589f37290695f685e1efc86fa2ce22daaa35375b236642adcd4cbfe9d47f092a1d206fe5b5b0cabbc2bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506d0f6b97cb9bf5550922f6b639b4759
SHA1e173bbd809ec3d8bc1aefbe7ad80a786aee63bf0
SHA256d7f2e792ec99eb37b0104104bc56b03e480e3688a85fcb456b7db0e581a5d188
SHA512b0289ea2ef9171d333fcc68d5886ec04c9ef55460ad7047d504e358ffbaef0f2d43a25e60c00138d82f654dcde26b4aba93053f5e8f9cfc7b1526492456985a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ef641b6ee1e6664d528d98acf741b29
SHA1da7376adb7c2d5606183204dc60ad239c932dc5b
SHA256aad3563598e38fa76d2475daf17c1ae6dff59193a26dd2ee2c3243c80efba92d
SHA5122b7039c0aab129d4cbdc57d8b93ca88c28b85c639d3804d939d8bafa8595b79a3a3378e8844f00d38f3cd18e043019a4bbb21b630e36afb1b25f33f1877dd88a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b97eea0b162c3cf72e3e6016c5fd983
SHA1fd165abaa6c836f7af4d3b344987a24495b4e410
SHA25612869e84801e0254a41ce834c2b8db6db5f9351d24666b2961247d1a5def9af9
SHA5121b0d1effe9298d49c7fdae5d3e23353fbd981d7505b77b952b24571921fedb523100f2c5f9909012f7867a4c6e06ed12701cdc69c557e41f6277c39005161dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f95ceb1f742f971e9591b4d925130b10
SHA10f68487e5d11ef3b270500cefe4b5c744c18a102
SHA25600d8df9c29af63032ee2fa4c3057285827793be532a8c0bbd19213d81f88fc72
SHA5121026ba9d3636aa7892982d4557fc088e0e92af778d07facb9756655431582bbbb348962edf0a05f7bb212c8787a82943f6c38d582153dd692ae691440a270bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fceefda7795285e1bcd29c9ff005b78
SHA10f9f08cfd568e1ddb59e9115113dc9e254d8f54b
SHA25654cfe0c1c1749d065d7e3613fc7f5207114a08808249ada81fcc64cf19867a3d
SHA51267ec21c64fd567f0269016e752ef3565554a449d1cad07ea6584b3dcf88efb6c17118ecfd9e4b13b1d444221e4e048268f35ec133c0a8862bab99f01dbae25a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f20b17356bc07e8abf5f15ec787f81
SHA1609b5ffadb67cc3eaf5455b15541c63c658fcf95
SHA256231ca4728aec2ffb321370f8d4dcb7476311a98635c76c79b98db15d7e206859
SHA512b124a3b323faacd9842d6c485b39059ff922aa8fcfe5220eb49c07f62901a910a781f5df16ddaad0276bcfbdbc74b40c0cf2aac1a0d588b5f9474c7dda9e98c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501790dd553a9513a9055a051b3aa6a19
SHA1002068fc09897c0a61c2d9553c2fcdbab40e2fc3
SHA25679c8b9837bfe6dfa6895d03422eadd2fc2a8b8a54da114d6acb134d3fdd8f7c9
SHA512a8bb963937dab8412355e8c5253f9ce85832c8184e6449c59e6ee754c0235bb02f29ae07bd252aa3ef206c50173558ea80dfb3bac4701e19d5f66cd7278234d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5b574435c7eb9ec46c1b76578e27538
SHA1d271c6ed3a80a797d11900e655ae388f4b534669
SHA256a1f843800033c7a5a876789d59003802ce430b0c234c7c998dfaf492a63c3e7f
SHA5122dc1a01b4fb8f1ea3ef4595a742639831c8dbc45e9fe4aa1e77aa7d40d2b629496915a24f6268f68e2d4cca9190bfbb651b1b3b450cbca55b2cfee3060406e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532704fb81967af8a9b531ab291fa7226
SHA1f843f886bb01cb44e45dea4976c46a9f2d7a8309
SHA25663d3f54883875935e2743cd57cdb9bef60e4acb12bc34937f884b7fac630e819
SHA5121fd09295ca1b4b13dd4c301e089f71d761cac18a7a0a67dbb5175cfb04a7249db85b2f03b412eafd449698841307da29fd81e54b3e88a6075f1840ca052d71c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585a68319eeeb93a84fd17640ca298434
SHA13c16e1a1c312f0ead9096675c720284631274d2f
SHA256987a20b06bce4f6a6e77c4e75e6fc58d98b9a39f59499ef60e8d5940544867e3
SHA5120b2a39f048c1b6023b2a7f06796e2216278c5327391acf134854b93ea23f222ca678dfcce798ba65d0cd2e3e191e267459f1674811926ecd9f3ea126f6479bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bdeda891a66bab8e66421829b6d8338
SHA1c9c96d0c7775ba3eb063f1739cd5bd20dbac815f
SHA2568ac527875abfb8d42588cbd776f47094afef0e067b0b65ac04499498ae59aa57
SHA51253a4c430ccd302c5382a22225145ef31b993a088b0d2ed8fb4e39a61542b0f748e829ecaf7128f0d511024077540a4b7046d3aa871717746f96be7776abebeb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1733318bc0bf74bc83f95b9854c3d15
SHA1cd523f69c7710c88dde178b08786ca5090260290
SHA25609fec32156e6b1f77900cf83252a622d61b102ad7865bc35f37cf4197370df4c
SHA5126c82f1f521b85c1a7c90d005d92f298ee6f221d907e0cbcbaa477de0afb16a81af908b14a89ee302766766f3633144fb1796362cb821be6e4723ae4433eefc03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564d7fdaa28e45ca321f1fc907011bf72
SHA1fef39e5cf6ff651df56f5e38ff7acf76eff05f8e
SHA2566c8caac9cf628fdb7b0e9ec1f830b17644f497a88a58ef37171bf06c317d8048
SHA512694bccc57491123b06c4799dacfb2316c044ad52408ddb0760b4af37d3af4886c6ba3af80c746699b7742b86b791f7dc70969e74e3a2d5dbdbc2a65df8addcff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f2084e52c736808b6f4eca6280a8372
SHA11df8af4c4f484d3008ab75095f8b1f0af44c8baa
SHA25623b493ecf2a37d60f49007e4cba54ed4c1d70c3f0d359c3c5928b1f7aa87b999
SHA5123af8ad7def45bb1c199d7c09059b86145da6dbc7625143a7075c2c120ab4a26ecc627023ca60c629a412c97e2f4d09ee46d60bfd9ca41e71ef11f902f208b378
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b