Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 21:18
Static task
static1
Behavioral task
behavioral1
Sample
81f5a37b313a5d4fb95bf201cfaa26ea_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
81f5a37b313a5d4fb95bf201cfaa26ea_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
81f5a37b313a5d4fb95bf201cfaa26ea_JaffaCakes118.html
-
Size
2KB
-
MD5
81f5a37b313a5d4fb95bf201cfaa26ea
-
SHA1
7074849ab451d1817f9c03a7bf540c0f44585ef8
-
SHA256
5c48b4706a1b5799f0510113df296e06313e2447587d19aacac59849ca86f415
-
SHA512
366f0a8e729a1171c272ba67a8803b2ad980251f8e587639f059f353fdb7ca369f1b40b6277d3d32a9385ac087449338b6822ce21ec4b430a8606bc5123f1ad5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5C46991-1E00-11EF-825B-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000684a20a2e63fa49a59796cb20a7057300000000020000000000106600000001000020000000133840174d0b950ea3ad1f35c2bf5329407b7333bdecee8be4d61b2cc6fdb8ec000000000e8000000002000020000000cda9b665ae6557347be162fee4095cfa8e353fd4373ccbea1ef747c2c4ca785c20000000a28690bae3effb51cf1dd57c87fd6fcbd15f01638097108e7530a789c08fb98b400000009a6b021df96ad8801b3a90dbefbe38b4058850c773ef79c2c9d6c830b42e1de01ab0826385f1bb21103a409d6db0e30e3d6d325f19b306664fa28d96c6d0b2ff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423179365" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809a88ca0db2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 3040 2192 iexplore.exe 28 PID 2192 wrote to memory of 3040 2192 iexplore.exe 28 PID 2192 wrote to memory of 3040 2192 iexplore.exe 28 PID 2192 wrote to memory of 3040 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81f5a37b313a5d4fb95bf201cfaa26ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db1bf7ac9bb750d2e9cd6cc6cae17044
SHA134aa97517c42f5c06c562611e863abd78d5640a9
SHA256286dfc3c3054aa5421d7a784aa48c1fd712037d4c9ac1eaa1aad52da2c026975
SHA512e7567e98034ec3b7eff4618424253c451efcd45f675a275da2bcc922a29f777fa232b17b1ad5e2ca2c3ff857a1fd0a47859e8be85127bf3d6392a9b33f26addc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530044439ebefca0aed12b227d7b9977b
SHA1ae1b5093332b47e8b1c249fa6a8834923454a307
SHA256538090fbab1a10a795c67eafc9176d8d741a98ec4f2ed325ad768f214f0842d0
SHA512d7e7a4927c745092a250ba525a94c2eb7c2ee33518fb4a7e06b9ea7f050547fd196837431e6751050fab3957186a033bb253617bfb779d7713e3ec628efea6b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c134521076a9dd127dbf41468a630ae
SHA1502381109e2a685ff6a5df0acd684e3e02a274fe
SHA256041345299b385d1d5dee937644ace9b652855605f4002ac4fc33235135dcccc7
SHA512645ac6f8f20f764beb944d1f1ce9f28a6c9c376e1d07dc33a5d39128e87c4ec3f62f3a7e99bdba71d18f7db62cd43e6790d0703f87828f68cfbe8cc0b5605c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab052ce8f13d7bd5139f1d4db330824
SHA125c83322879d7120709632288d6973122ba33e10
SHA256fca6388669ab4382a536bdadeb126f718b0b84cdfbde9a4324ba58dad29d98c9
SHA5126457ba3dc36a65ddba6da586efcc4441d28562afa6e2a6f1c9dda5e621114f1209100acbfdd254f31b092b4c0622656bb2db2f67e1a0eb31bbc1bf46e1bc12b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5352afea83c48a20870c72edcc40ec9b9
SHA1486a0c8a7accfe75d7be277d3d54281e848387c8
SHA25624e4feac9ffd3a4b05e2cefc00bc50f06910b504eed44e5fc4fc54f17be8e31f
SHA512b5266ee338178d0938b87e342a70f7f3cf6ab2a5cecf5e5146de3b8dd60679f3155785d92a32e7713ea24547d897e6a67e24e55e6c4753ac806aaa832e6d544d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518bee41ff232dd0ae8a6257340dc4735
SHA10fca10dc78bebd52a5f390c30096f139d4126b6f
SHA256eb2b56e1903d4f3a4077d42876d9afb43eff8649347105036309c2d3d4f3f64b
SHA512f0dd278c116f291a44206313114c0baf183472b06902c6efeb5dac225b427ef65a93f6fc7439650f336bd27c18a162acb98c6e2e0a1bb0257b6d444b10faeecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5795285496ad03f7c134079856827835a
SHA1cc677e5934884d2224d18ffa206fa289b4fa123a
SHA2561acca04c783d03469a70534cff1bafc702ae4e088e00227f246b7b9c34072cbf
SHA512a451ea776e11d15dbd4c08bb1f28b1110ec0b3e512437ad0a3c1468f98fb5c86bbaf10a69386b963d732d81096eba8a22b7042a601e6fc4e73f4c878be6b5609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5633723fd0d1f5b4e380793f4b3a5650e
SHA180d4e7848cfe6b0fdd823dc69448c2466feb1f06
SHA2565508ec9f41493aaaef542bfd09f3c7a4d4be0958ed333abf3d6e3845e06648d2
SHA512154bdbb1d14c59c284d6c785f96fd318e906440f318377894ff891b352e83e661335770adb08862ed51c859485713f28788ce6bc6b1a111cec4a287c8ffa4e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2dd144c64b990a44cbc2d4c9752c4a5
SHA1e7b0326df727e9f3a7a2cab2d446c60a11606317
SHA25610c4ab58aad93700f9ee510e9c22669ff50132dcc6a59ad6ac0feac5e854f880
SHA512327c6eff111c8a6c75235f7a21f9ce5ba9c2882b2a1e24b67c78a255b4ed80210915292805119af152e9ee67d046573296bf32bbf88f94ad3fe45f2a3eba6a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c23abe29b74cd85ba8d92e05b3e7b518
SHA13767358251d5e2ea8c7b781c6a9f10c84e3e24fe
SHA2563dbac4021e9d20c3d7961f4c874a9d834916097d07437afdfcfbe63379286431
SHA512b76ff81de4237c9eb94d63773a3d92c89af015703c0a086be537e39ce9b95d5dc0c5cdce1a322b2375db3763dea580096c10630ce4a6a9da6e19a0f3d50ccef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25167519662f9ac621499a26e99451a
SHA1f3c2573977fe69453bc11b7f75a2eb709536cbc1
SHA2564b7adfdcbb31eaf4aa92ef76cc358f6b6d9e3e2ea7ff266f753d11d59cb65492
SHA512f865454be0936aacbb61aa332fbf0179223ba6412d488a2afbbe153ffceed82230abf0174b496daef5d812e0eed017a4ccaa787d2b80b54c99f87aebf6d02c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5849abb4f23013affc9b2e10fa8f53a
SHA19b08477d51436401e6f3ee2aba72c49b74945484
SHA25627503499c10a17170b0dda36690feae751ebe50f8c22848a275bdb2ba4efe825
SHA512094113c7282f55ea11e6d25bcb3708535af049ae1c6d76c40c9753c779ff5e530dd30185478b60aff071406738cf16bd50b81558fa3b6854ace2211dcac14fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf08f58cf6a87533331d2615992684a
SHA1b03d40c0a3d193391b38afe7e9d536a92089f865
SHA256ff9bc7326ebdb6360507208569025ca5687ea780f8b0b477d00d52c4c6bcff98
SHA51229417ea9036d09444c112fa45dd4ac20454c51bc8e6887f7c4cfc2f53d574583fc659e8c2405505a1374e8d5026354a0f19fdb4f47b74cccd84088029281757c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e765874107aded4a289afed73c77157a
SHA1fc429788bb4a55aa09a8f48fa8232cb569399abc
SHA256bf6f35122154315bed3c3a871258a8cc681cb026845fcd0bbb396a6dd4f30ef7
SHA51217d0fcc723e09ff61ec80a5a36157f2ce989b8ca9db1365f58473d66db1db7bf2a3a8a627abc391faeb53f985422cf62a469a38657982e2d8036365bb82a0301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551edffaa7e6030e569c44032e858c411
SHA1b485ed9aed2662dd4860fc18a89066cefd6c8b41
SHA256167506a41b49068114f6bcb1b60cdb40781943e8b8bb656a4617a3e1b7eb0ba5
SHA5125c2c334b732c523a71ad27cb4b85466466d94c931dd0a267e2fa7490381a6c38810751fe5b6521d6ab99b2a90b00404a2339aeb72b0874452dabaabcf73dff6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04e090ea3706a420edf28ba1bb9c07e
SHA19c9e2d91834a2f7fdeccdb88487102cfc59978cf
SHA25684c43dfd5de8f99f2986f607e1cfd47f66224895cf9c5e2bd4cce81a65ed1f1d
SHA5128008b4184e9f86df399999d4e081d122e11cf85b5a44d30c1698bfd684bcdaecaa5d602bff6372715666e5b3d75fbe208ed1b2b9af0eddea8f7c5d518f54d4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de7b9cfcadf0c38f07d3b7447bc12cb
SHA1edd8e50b38e351a2ff3e1bfaca4e7b6d6c552d72
SHA256a80f39949c37bd7e7096478410c4c45ec9ef73137743bc995245d3d8d5e72504
SHA5127ec65366836e5362863deeedb57a10efc042e16dd54a50b1f01737541030618364625aa971afecb00eaea324876f5c88399789d849900106cc17f48d94e907ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19c33685b6fc5957632f60032e216b4
SHA11b60beecee7d8f2e22081c2d2de76533cba0fc5a
SHA256d9025f567e9db0d425f468625932a7c72ed169fe72c42eb7507e6f9e45b409dd
SHA512bc9075af8a394517ddad7f3d904550b99de7a9e8fdc594e414bc14d43f6f090397bdba9a90de6c891344572679d6464407eb0d2d85f0e3f20176d05dc944e742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5233f1a7e8541fdf032b6247cb2022011
SHA18ab4f1e33d96b0d9dac5bee2c444d629626c5a31
SHA256cb26fab89bc614799bacac04d37dcb6c82bd65c05ddd8991c359b3446a610ecc
SHA51246b6a4016fbb4b1706376ce91ea7b3c1c794fa87c5f67a7607eb3c13d49d682b795226b3e1288e3607c3d24775b99f8e78ef0ef07a3d70798418e1dc44dea57e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b