Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
8018142d7ccc454f05dc704ebb90d505_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8018142d7ccc454f05dc704ebb90d505_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8018142d7ccc454f05dc704ebb90d505_JaffaCakes118.html
-
Size
940B
-
MD5
8018142d7ccc454f05dc704ebb90d505
-
SHA1
76b6e0b7b125c06d591d374746b7acbff968bd2a
-
SHA256
bfc8ca496e73686480b84d7d6015f4695ff8d075f727323fb9dbd0cae63c53e2
-
SHA512
1209d1b61492b49f67b8c746d6ced753253108a931b3ee50ec17e778ae4158bcc729f64c34219943bc95511d7c40a627ea089a5a35cf6fe03b3e88c4e28e0b24
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dc7ca65b9b73a5478ccb4c1fcfb1e13e000000000200000000001066000000010000200000002c152911eeca86efbcc6f7ccfefd39c39fc21652858b3efabcac2ba8f8795803000000000e8000000002000020000000e4291e1824a6df2e58a6387ee9964759c76c6088ac0c41c4efd7d37a73ded32620000000b737064646a9318e41cce503fe293f0c7d15e45cf269c0ce1c6847b024e4f17b40000000e2e968bcdd882a554266d7e0988b24dc45c8d2746b930a97b312be4afb9b5eb1e5701a21942de87e2dc8a14b441c603a890d5984498a94fd62672d9cb2eb9656 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00ecac7a1b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F32E2661-1D94-11EF-8414-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423132972" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2200 3000 iexplore.exe 28 PID 3000 wrote to memory of 2200 3000 iexplore.exe 28 PID 3000 wrote to memory of 2200 3000 iexplore.exe 28 PID 3000 wrote to memory of 2200 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8018142d7ccc454f05dc704ebb90d505_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e832e68b2fe5f6b3929ff04486da4e
SHA1b7897f733208769861ad4070084cfd403d8ec91f
SHA256016b9d10ba7feb5c5200a895ac3ad7600753bdf574020c94bef3ec411a1f2b70
SHA5127999a54c7783914a75e9ba2078ea7f094a80ac07c4bc91cd4c243e4ad2e8e4c7c110dac02e9f99025232d6285624fc0a96007dc13f01ea3c98c19a609725481b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551916fd5dcdedafe2e5b4f22b28c0eb4
SHA151fb3a1e21f84e57af81dba66af40a0d65dfb9b5
SHA25601046da283294498ecd7365c24d0aabb89dba6383696d9459f78533cfdd74b22
SHA512d3824c6399cf0e8cd067c623cf652b787d55b9e87d277fa6669e5f9f60de7330a9dc89e3fb91ca4742fc111f9ff498c7ec06e489a1e8d2492dff8a2ed5735873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b708e22987037e46ea503f34a52c39a6
SHA1cb29bd702b09e14092a8d809fd5abe066a4941e7
SHA256b0b66f8f6f8b8193d81b92816abeabbc3dc92ef024aa65746fb700e159159d7f
SHA512c7c81297a0dae309adca84a3139137f3232c2143ee1cd3c8467d787924575f8842d4ff200088df217ba0ee52a31997464c1d176cec67666c78ed5570fffa9703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5465916e1de60961abdd264afd2aa8d0e
SHA14c5bb4e5af75bc1751b9c7054e6835bc4169989d
SHA256dfae43eb8fdf09a9cf4c223db09ad128761b38c37edcf3da03e5a0e261aa4646
SHA512a34041c97e6c54536f7432e8f448b46533c10b95587f97e22dc274465d39b5f8e9d0196476178aa8b646b8614a27374bff215ce12675279231a6263a35bf6565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78112b6c7531e732de22176eaa10bcd
SHA1d1f1992b710c65e8b4cac1a443ad39ebd0820938
SHA2563963d5c97c66071a9c95c5d636421abaa9f8d476742204279a3daef61b018eea
SHA5120d024b4f2ea731af829d446862d119a19eb57279978c4ae7e08ee739c87ad2711f224c8485913ac222c4ede077b4dd2a3eb1ce2d801153475861604d97eac28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bb630266c13f9cd4e8ad945156ff369
SHA19288bcc72ecf421e6e6ae2c02a59bb76fea92c2a
SHA256683fec494fe46915bc82403fe4c5a682f9cda134e6336f0dc0e86d0ea9470e26
SHA512f90267951947d924c21c97aba569ead50e4d8e4e25176371dfaaa4afdd10d64c0779c5c08f1b1be71942e746a5b2de966c8a008579052642de9870f9827b5a96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed643858a37a0a2ae64a87fcc28a58f2
SHA1d0580a016f342574a8cf727651163a76016c133a
SHA256e205c31a984f6b658516d56b6c77158a6106411c1269a67c9507ad33212f7282
SHA512ff4c886f5d32d299b11478ef59b9a8dfd11c3886e4bc09e56c7dc41c2caccb48cc6a56158c04d8f20dacc939b282fd4f03655745869cc0845805ddf9501a3dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fbc550f467d6a9bea478ce5663fb6e0
SHA11b075ddd17df8d1bcb7ce90f012d2758fdd35972
SHA256bb222910bf1fd1e0fce9da4352e98ba9b6ce3ad93053af1d056b7baf11a46437
SHA512e5b2c3d26ca46ccb63d32fbac676b4dcec2228d2e2283ea61777f8543f48fa8d29ee7f714a4dfb833c21370603322c4d927be2d34da3a325e919880fbbb31ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a1abbb40bb4b312a071b4527e9ec77
SHA1c0c7d45efe54b09c17abee0a2db508b90544ccf3
SHA25681301bb91874c469194067b0227811927efe0ce06e0158d81fd21580d66bd4a9
SHA512f034d1524e38dd16ae19f6918c964badfe72d504b959d09d9892be5dfd66fa7b431ab6be9f9eabf65387670628fee4359733a1106796be7928a2dcb56325cfc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5717ec3b98f1f56a3f4c0c6ab5a5fb7b3
SHA1bb0abbd82e801ee2ff4c9b091501e4b5e4a1d252
SHA2566766cba1c69467331d3f74c608ff428cd83b6d5759e63114c5c275370bfd8e67
SHA512466cb7e92b78ac661d2849a0cbecc70c065110d78e382ccf4ec7958cec7f108ed8096afbcb1d9f6adf50cb7cdcaedbc8919354b407832e10b54358522da990b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f09f6eea4660f0cbdd053d68d0b1ea9c
SHA128c13d7f50265b5acc3d296eb25f8a3de36f6015
SHA256e1adccf59c4f8a9647c1948f8ad09535105f8f21b56fb1c747e33ebcbbaceebf
SHA51229a6b75ca312206723329f27ffa7034f1b1a69b746bddbb54ce6c98fe80c96cd7bbf8657a7ada40df2f2cd22ca0b2526eff5413f58940c625ae81096335874a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a33addc2408d6ec6eebda95a6418743a
SHA132279bece5129124f173cd592f97a518dd3c8a69
SHA2567d95ec2caa67b69c850f1d9ba85f4704ac36f3ee1927bbbbcb7e4fe51a5dd545
SHA5128948a67771401528d8fa78aa9536146532c7b25cd1afb30da8932828fb95c322138ea2116bf416bd7ee8e111d9df805e4125682766dec5061dfaccaae0174c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f125ffa6d61dee01807a2f4182c6c5e
SHA12b4f79b0028133ba9c8be4acb430bc00ed3b607e
SHA256d5fc933a4dc7191f95051c04cb7f5dc51db619d07f991f43abb3f90f23d79d2a
SHA51275426e0f92e8734570d1b9191b3c3c89309b7bfbb807b688e43c4b312173db3a812492ed332be92351fd51e5501969782585b1e60904f90dd9eda543b1ed6191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538782de1d8ce814eb968cb289f0128ae
SHA14056b5962cd7a3a2edd97a163751fb4243dc0f1f
SHA256b1f3844c913bb5cb8fb1ba2737634d2287b1deddedc4542a99de5b57f14e3b53
SHA51201ec9714fb781212fb43ab71f90a296bb6587aea956f5adc46b6651f6c0be1006796b17acacaf52b08631bb1550050cca78185c851e525e0a6e66c706a6b4265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb9e94740e2f6be4b41638ca0d96a9c
SHA1af86c1e425f99ee7886934567f048147083127f4
SHA2566a9e43093d4e0e6c5220399f7165789c2c48f6dea15a0bd8791dbbfb0d7e6013
SHA51291e8737aef93d10fac8ddb96a61474bfdbdb146884788b216b4714aa118055a396adcafb614aa228b2d153e2458e01c1d121aae5ab91d4b50d493bee0a7889e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5292f3b242bae4fad9dd868cd4bc69c12
SHA14b0115e05deff51f16ff525f2cf706a970546559
SHA256e4d29208da2dae5961d269e438a1bb42a349898bc79e52c0ccce55be8e38cb95
SHA51223e173d2f0df2206d789f8ae2d32c0ec3632b9a266e79554ea8d6e4c26b090bc9472fd636a416069488abeda64edd70b6cab189753318b65b2c36a1d0e298326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c3dea4783c0a3a415909c3fce862c2e
SHA171fac635f45f69167c43ba64f25c2d5bea5b3189
SHA2566b0c03bd9dd1ce20b279e8f734af3f3bf53cea00379f17d8470f041aa2d5c68b
SHA5121788cec293a53879df3619a89066782bcd007a2e2543d27de0a6c57563ca312da04ca23ae39d834ccd2fe9bda5c7a6edc44c3b92ac2f324e070b12f66aff8f58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ffb2db27e8d8be87fb7b773b18e95fe
SHA1580cb9f48b0ccb1c5a539fd742c706f4b6c8ab60
SHA25602bb4abd8841eb94c5377ed6e2dd59a6ae962e0acabf293432b543258b6fdfa1
SHA512c372c17c59ae90b81bc4c8b14884982bad31f28ebc5893913b8f2022329e76baafc8f614734382bee185c563f59fde3f3fc798724ba0cf11714287730301672b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5424024a317a33ec2c8e7fc0f604cb35d
SHA1662611faff8fac851e7ff7c8bb4f5aad5ea6f2f3
SHA256701de4770e5811e370535bf0cf35982ee032a71df6e89d32c7b4ff6c22f99b25
SHA512066412aec73bcf718ba370fb9d1b65f15c2c809f46f812372020bb1a939b4101f752630e88c1dbdd9ced3c58f0eba339cf13e5f49bf7836ba8bae4b49cb55794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564cd00e418aa1302785f475fbf23a9b6
SHA1cd5fe9d0671ae926541a32d986f31144a777dbdd
SHA25698f511bece5dd7bd3d98436c691826589ccf61aaab4566246188f128074faacb
SHA5123f1c736dac254353e339ece09f45f9a35e171294b643205aa1071e3e41f0084b0fb9edf4799c584a4c7806388d0a61b68c48db7f8be0b350e26efbadf5acb6d1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b