Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
805ea22a2d9198f98f1955b7f87d0d5e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
805ea22a2d9198f98f1955b7f87d0d5e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
805ea22a2d9198f98f1955b7f87d0d5e_JaffaCakes118.html
-
Size
2KB
-
MD5
805ea22a2d9198f98f1955b7f87d0d5e
-
SHA1
c0039675331cfa5d146d6be5372ff3c46653b373
-
SHA256
4585604b29bb9c95ac4f84050a26d812f72dd7380d23aafe9d98b56b4c374cca
-
SHA512
4c52baf1ab0e08836a47c061be8ee92c0c3505eaff72255506510f952cd3337131208477e59e898ebef04b646f8cd7525578a6d775886f6e98aba9a9de70ceac
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423139175" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1064703cb0b1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65061191-1DA3-11EF-A9A6-4658C477BD5D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000f4885c563273b51c786f37099b6a7ff9150bc2e613aeea3e26cb76e962309ac4000000000e80000000020000200000009ff4e194ed6b8054c99854a2c0a3b2111208a67c33a7de1a5d1927c77a25881c200000000221fc8c09b0a98104a5cdd7957a6cece1cf9fc454363304091d17969230155540000000ed0aaee93cdcc130756c2060ff95c477f9c5fec8359aeb21de7242d9741bbaadf75b96b9d518dad51e02d19b32d2df5973aa7e4c98d9e00d309f00f4dc00cb0a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 iexplore.exe 1736 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2064 1736 iexplore.exe 28 PID 1736 wrote to memory of 2064 1736 iexplore.exe 28 PID 1736 wrote to memory of 2064 1736 iexplore.exe 28 PID 1736 wrote to memory of 2064 1736 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\805ea22a2d9198f98f1955b7f87d0d5e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5878e14f06c4bb10863c399220745a92a
SHA115f6b09384b68d7233412f681f2a5b44b30eb324
SHA25657ee9abc9c6be4e735ed8d1a10e8f53b520c9ddd5150964f9414689614c58c95
SHA512be3ec0139a20aebef61210c9c019c5e8b5eeafa6f1e7aed86af21804be126281973d07d272dcfb5764aeeacb284197f52636a42ec8c073495f07a2780242d83e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd1ed5b6f7ca771f2ab4f02abee20dc7
SHA1ccfe0cddb24a70e829a843c585730f814c94f3ac
SHA256707b253b115a0c13481eee5a6f3ff55ead1837162447c3ec055cd3135c2d0b31
SHA5126f3b0cf6c66d4bdd10064bbdbd8b16eb1b796e78a4bcc4e27c83763ae7e37af809b6bab2bd1a4ac6e30b39501d7e828af19ee6ec7fb630c7e9f35b3cec97f012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582d6aef5896094840e0d5b696e3b20f8
SHA19ce361d9b509b3e0d8f3f343afa286cc4595d37c
SHA25681d96a33f5b31ec6d8b5020e558bd408d630fe946593a912d90f1d7944c152d2
SHA512ec44bd0878bfe62b09e9450f0c803cf72ad4f3fe37f600bb264d404f3047495564285611ad631baeaa771121f8aa07ee0ee4edf694b3d1fa498c194c7756beea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ebfbbe205fa2804daf72bdffa65dd4
SHA1aa5c43f18f00b4f77f0bd519e2854270856dd51a
SHA2569179bd5fc1ae6553dc25a94a24a7095f98a65fb7cf76e3b33d46da1e3373fd10
SHA512e2398e7134a8d9aa9b5e653fbf91ad85e8ad3740830045308529c0cecaada5a5e04ab8a6e07f6c18b673cd4dddaefc6367fe30d8f34e2626455aa4586b6e34a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b35aba93063f78dff59177392e62bf1
SHA135ffbbcf56b849e8bf9a6eb96bf7231a306ba7e6
SHA256b629d8514c6c3170a1a2500187e8166d901740d1ef7b6c24a8ffcfdef0120748
SHA512de3e22fe2189e08c544df998eed4c3232b9654f30c3ed0eaeea166e63143177ec37f2edcd34ed31b27c094201a54ea174b10bc7c2f1c6ca779f3ab37b2d30a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557a2b3216729024d9a4bb78762b75f42
SHA1bed8c8e45cde396f39ef19cc89172654f0beec3b
SHA25639ee0c14eea4a021f7f0539d692ba4bedafed69b884456b653b185aa7a66282d
SHA512b58e6d6c07678a489cfafb8b10aac21598e02d4346bae86c378a5997dafd88d28e6fb5673df7d493f164798c16c6d625e0df62aebbcf1c31fb315664122003f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a1fc46eec630c9128e2f37148e94a3
SHA17ef8b9abdc3b80754bb457857256d99212ed8f65
SHA256d84bb2a4316cea3705ee6aee7a6d0880c244c464bcb0f7dcefc3f01b0e4c70dd
SHA512f60136e35a0e0aea6d7a017b461788158232c0ac2b545baab224575d2eda0eec94ceea812190d8957011649b247acf1b3cafccb78461b0acc2816ec530d2f3c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ae956901b29f8e3771c6b46a0ce46c
SHA1625b010e86eeae260953e2321fa614870fac2de2
SHA25655531580ffce95cba985aa7558621c2fdf85be7eeceee4cbceaecc2fe4e55317
SHA5121076f49031e365dc733191644f066568405b0d1b9108a08dfa71e46e30f8a938c465eed6c92e89a64120ea3518a776d300e4c8fc69d6ca419ebe11b64d52ad03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5537a898e9bfdd18f3a690b6e6b68fdfc
SHA103df960e33f050c153ae1a83e5c25ab9a2cb5f87
SHA25634c8de212100d1caf48d8173b1540a343d07aab4763831ce43b5c6f78a7de157
SHA512baba119772cfc6d92ac6f8d92a5b643e85f018da3f69ea52aaef308ba2e289f013abf025b5e3193e27c3b813348aaa26929f55beeb6664ca979ad133fcce9fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a222601416720edc673d2c1228f015ce
SHA1bef386cc52350151ffa7559f1fc2362e402c874a
SHA256f8b9358e9458ebd4a5529b6e1f9fc5ba4232d191504ac630ab2af97e4eb7f385
SHA5120ca8806a8649a98e75bc91d7f7f67db9a56b091b22b2b4b002e98368d8182fe7875379c3fdf4bc866bfbb683e9e3f237c1e8fd7f707f8c673de2addcbc71379e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac11c524a8a63c67904e6c2e0f384f57
SHA17617f98a672ca4695bd49139242257374313bfb3
SHA256a4aeff696fb1dd641777930d5aed8f37bbf820e8b9163313d3cb01f1deb9aa37
SHA51272b32f73712db7435a1dc4dfdfeebbfd12867fe4e80211270a82c393ea0f2c4be1c123337924a04838ba01becd3450b08f3f7b4efd934f41a5a80c62f5903925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7aa17af45254963cbdc50b0fe291dc6
SHA1bb644c231258a6f19a1d71ca1dd6c84867f645d6
SHA2560180e571ae8274d16b8eb1c51dfd71becffe3dfe73046fef836ee9b36579b659
SHA512d4d36a4e1398a031a53fb73da9208ad70999011020f1bacb53171bb34bd0a3dac030edf84c29b31a2474bf4f6d481059d1cd8a3fe509ab3c53f48ebec3b2458a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b549002a1e5f3e4842c64e41520ab9
SHA15d82b229c8dd1c131b2c1d44bfe173fe90e5da8c
SHA256f2f3c66a631ce3a449b5a002db90542a74f0411cee7ffe520537323ebfd4d5d8
SHA5120ad7bc2b1be98c783b69a5bef19a35f8711a42951607bce500c3227c7a78a47a604c4e19585c341d0ba5a1db1e7a1db2c3472903b2afb2d4cba69619ac99b2d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb74111bc32be2ec50a89544f6787dd7
SHA159de63b142aab4373fe2644a9636020027883051
SHA256e2e1055514468379b015116fb8df69bdbb34d746af244f800499634aa2848bd0
SHA512672e8210c82c150070b2550c9226f9b9cd5282a29f413ebe95e15ad12d3661705a2c2eb4f73416098e3d594f8a5523c74fd83e7fe7fe37f96291daad74f7c479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb23c8ddde04192a4b7e0c0e69dc7a79
SHA1fc9227b03adeb9ec5589da7d633f08dbe9818139
SHA256c6307050be6d87b51c43494fbdb9c6c3f4e43a4c76e250e38643f522a1e28ed7
SHA512f778b303200ada64ee1fd4509ad3f4f4291545be47ea53a0df7adc4df1b5c07f32f9912f248e0d3b60783c7dce2d58c020823f632276fc92b506fe6248fa4db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55487929b7d7b4be4dc6d17936fff9ce1
SHA18a17e143e82ec0ae8d8659a94e7124544f9d68dc
SHA2567dacf3409e466e7bc49d306392e0462c654bb6727d807534e68bcbaa868df351
SHA51248b9016662551bd18880886874052bb70274475635af1d0082e93eec3572dac1a81f010cd6d28c28abb9632b98390a7466b62b839249c225f03697695c9b5986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fbcf1f8d27fd364fd6c1fd3ca2bae64
SHA1879d6ff36a663ab1ad7a9c13be608c52c8100d00
SHA2566e5e4f3018f93a4c86b7683205e6307f777360d94b50e6f4af37b73de0dbaec0
SHA512c5ace64eae04b922df50e0ca0d8dd9bf0d72ff6f85c88f1da251a85fea07fb02c7f07601884db3f1afd68db89955128ab2bd72ccbcdde65cdd23329d2b7a3b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c47ad37d4fa14134aebe772d0325488
SHA112964d3a99d7d88a04ef1070d79f095d1714ad01
SHA256c00de390ce837aa836836f7f89ef0e1c0bd674de751856234e252023d03dc663
SHA51284c8c610f8e952e13c92fa2aac9f2670a6fd165345b38351cbcc2af3612064ad064ffa1e5bf0bba78aa78bc16193a2cb20351c9ce806c38adebb09f486f51b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c1b4fbe245f5390f956ce9932e62fd4
SHA1e852dc3c0878bc2f0edc2b6e1b0f28a5e2e7c4f9
SHA256f71322511c95141cc71245b3cb8e6d397b6e4c6540df2753eed4d72bb041d67c
SHA512e3847c7e84434010958e90e4a4fc23a276daf49860ebfd54390118158cd1b875bc8ee3456481933ec15cfb364361797a4184f065118679d815eae86043c83158
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b