Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
84a1d34cbfe2538c391341ce426deb2e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
84a1d34cbfe2538c391341ce426deb2e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
84a1d34cbfe2538c391341ce426deb2e_JaffaCakes118.html
-
Size
694B
-
MD5
84a1d34cbfe2538c391341ce426deb2e
-
SHA1
b34e078ef94847e5c137a5741f6352ef9fe57bd0
-
SHA256
cb81c7a7ca150257778546b97b6fd5279a2dc165c175b9c647a2b2604b5b3925
-
SHA512
0ae84bdcfd162913040cb35f5e2f861d2a156dbc036ac49cc7bd5a902f9ed723f026cdd306d6d0ac17dfee8b62141c8b099d756c7760f226cc023b5893c32dd4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 902e7d62a5b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000042d2b8abfdd6e44784bbcdcaef7d40af0000000002000000000010660000000100002000000030daeb1ad845d1b2da1a3e00eace93d495d045f13b0409e563409e85bd37e2d7000000000e800000000200002000000069eb0762d6279853769d8764edb4d7cc843b591ea42271a012eeca78ccbc3ce220000000f69337362fcbed48adc5a1bb42ec40272e4ab9345f89013bb8d825519bc1564c40000000d01d9b986bf5bb252b027c0044d1d478e48e958fad5f640ba9e5c36a5449c5f0ac78f8df2004c2a1a6b6b71f38cd65c827ac857b00ff86e64f928a458967a391 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F0194F1-1E98-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423244500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2100 2784 iexplore.exe 28 PID 2784 wrote to memory of 2100 2784 iexplore.exe 28 PID 2784 wrote to memory of 2100 2784 iexplore.exe 28 PID 2784 wrote to memory of 2100 2784 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84a1d34cbfe2538c391341ce426deb2e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a49deeec323a025d7ab03d5ed7f3a5c5
SHA1a0a14283a3c24be94ed6d513339379314c8f7c15
SHA256fba7e686d1135e4bad98ceb05fce69e85bd3602b832fbf419dda9730590891aa
SHA5122dfefb354bd7205a102c5ec8d015bd31a9274455c227726c18e95806a07ca0f4fc047065006c2f9cc4fac557061f85c82606db1b761a77a5478d2ca373d0e8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa3fdcafbe252c8b64d670280164ce6
SHA1f5d2cefe682dcb9c3060376a2a1f7caeba54fc8c
SHA25654e6b50d48f710290ec04d0846388a36fe3247d1d545ca8b0d92c42791e6704c
SHA51206a6ca94acd7fcb1b62d9a7d1d8361efd4c07a0e049c299086754bfb4e843619109d34945f9303287d7271b51d9e335b9630070ee552f94984b48633b29b6283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5862e2452f04a4f2c5061ac44b73ca133
SHA19adcb7c07b47a23ff0cfebb9f0547bba4df0a49c
SHA256c0755b53490cba30cfad84b16fc0eef3c7660911169fce9116fa90136e779bce
SHA5128e9270f1d8d7e13cd1aca0391b8a5ede88b3d3aecf63649af7f49596d33c21c5e58c8cf055648a5eaade957f04e5d556d134b4cf35c5ef0d228349f3008532d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fa77b586d406ff00018125cef5c6139
SHA1841df471de6f071bfa7df5fad6298001b515706d
SHA256090724d38146ec3e993a0e2769c70624e47355954495008cbe4938208820fa55
SHA512518271175c9074b380413f34a73d7a779002de4965b7fb92e4db6042465119c558f9b300a92977ea00051032f7bf700df3a8716f0ed9e1fe084e3d2f3e5a26aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a837b4e7e6ac4957efac96ea0a168b
SHA1a3169554723548db813eccbee92ef41bf7046a3e
SHA2560aba6e97f0b19508843145d1a3d3470753d87f610c6a126cc7cad3050add24b4
SHA512a2750bbb6c9c96c55e8cc9adb63677fff65a38a7279fb4065c1f6e009534223d54b74679e3db1426ae32d27923abf6ba6da16ff3d1e7829dba8a7a5a672f211d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5156422473d02d83b97533856bf795e7e
SHA1390aa619b5c205550c20135b97e59b638f2537fe
SHA256ca0a19aa30c338dcb43d46201ab5add010b3fff40e62767ca7cb94eedd6afde8
SHA512713cc72e36108c707a84a5937e12cbf05904f4d673e54dda98d2b373f18d2e51e05171d4a2303fcec4658dd49627da2a0823ba8c3ff093feff010fdd9de81561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ccf941648c8f112adee7e987e541f8d
SHA113e01f2c427f5083aa04dd24554643e57a913dee
SHA256539df49f95a05f44e44a3bcab01f0f4ef11e17c784c3dedb67c7d51c40165be1
SHA512019126bb697a1e16be1279fff89d98ac2c59beb7b8e04e9545d8e3aae542d5569cbcd1011c5e2cc730de413b740b8a7f7be20b2025df55f4d0ac67264ee34fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c441d7ff89a070ec553d162bd9a94a1
SHA178ac2cf8c87774275fb9746712513f45d17e9823
SHA2562b993678d26f664e867e3185b33feac44801797da4425af46d2ea5ce4ecb9046
SHA512d4231e0bbc014664348d3587a54dfee1deeffb100f489f6bafcfaeb4721da28e05b8088b6a724870e33bb22920597a00a5c31431fb790bfc6a83bf974d9fd3b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8a4922c2b80258a416bce498b1b2b08
SHA1093c7ab47b31b68f0d3a60b256e8daddaf9ebfc3
SHA2567f9b88e0911f2e84da3e389b658ca93712d8b2f3ca22ad72263452c625d284f7
SHA512b6b56baaa0aa385d18739a7ed33806aaaace6dedb1699c2ce4870492776304787268a2a7319473a1e1a3cb9b26401df67b998aef8141670d17d1b6a358ea6e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4ea4abd8e09718c3fac71fd1980f8f8
SHA1af6d5d440b979501211a9ae439adcfd99ff690ee
SHA25602cc95006ccf27d2ef7b435d41f0bba5e180a48cd83efe39f25af2574dd4ce25
SHA5124ba93e8f780f0b5d116f7c6bcd06b3d7652889398690c87ae8cb662f3f74cfe9023bb0436f640aa6b9c111b93e08baed3013a9a2ddc7a8436c629efbe3733dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dadd42cc66a0ff8482ee826440eeb779
SHA13d8e6d84134d9ef6c51e19cf60b7b2137d90eeed
SHA256e60911f502ace3810b488c45310532d7d693e73d1ecaeafd5c4b51f33e16a8a5
SHA5122f9fd5cefc9ee05de11c1e016f5e80ebb2fffbf0fcfedb8e4e716afc84b0609c0d7328ab754bff9056db1039c4cbaff42f4fbda77a88a298bafe53eeb5b25079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510464bcd272508d25d6c274cf43d19a3
SHA19751950dcd3d10d85cb21ff2bc200acb3debbe0f
SHA2561294d9f68ccb124172cea04708f9b6be140eb994d15560045164d94c6ff1e32b
SHA51273c52527439ccd9e9e2d455032c87ef309c2d87ddc417933156a22ec736483dd9a1a0d80d21e3d4be4093201ef5a4bc1f8961dca6d4a5eaf6ac18a55e2e9f9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5774d3e235b7a765656ee2d47b76ed266
SHA12a1bce21500118b215558f24777994fbddbdefff
SHA256da872eda07dd2c1fda3be0d090de828fb012fc6349444ee08c0da85bb7f25641
SHA51299ef66071c031e768832a1462b27365a6293948a4d1278fc6c90df438d6f1d0c30c09fb36e25387cd0e193d7333688c512dbc0f33a555e4adfb2f4637602747c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f2b2a3a472c2376128da0ccbed2e4a
SHA11fff9ace11c19edf3bc8f9f7c21fd88ff6855020
SHA256656d0b771df490abe511848547fe42c576eb7b3642745e3b52f816a0f3bd0475
SHA512ad31d327557ae2e2041e469cbce8795993c00abb9d2fd3b7de59337392694bc2c144c4e27895286477b9bb44fee6a6f5533d6bf22c6a28804e404e78e9804ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e773fd522c43235978aca2209b39801f
SHA149c7f90651cb16b1db9fa6c763e423990423f8cb
SHA256c41a6fd78fcce31685ad1447424c5a037a350ce27240faac0e2a2d927d949bde
SHA512e68e3d62a2e2c52798eca076dfb4319bed1be667a9278ace08a0e85a3f0bd80744abcfa6499d1cd3e0ed2957f794bb9995066ebdccb5ca1e09902fac0bd612af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e02771d723c4075b77890c70f0b155f2
SHA106ffdcc7f8f675c038876cfd920a6c2f22002443
SHA256830999ee1952ca3eb8294817f99f57a4957321594808a2bc31e8f2e74df534c9
SHA512aadd2807ed2891dc2500987688356f111c9989a9da8e88e8fc847e937529ad61f933f70a15c7ec45cda77982b5cd9412d32baed85a9b4e78970b7cbe2bcafcbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f001396e4139ed5426280e15cafac6a1
SHA1c282789a37ca6023aac7e85f2b512a9d4dc197f3
SHA25614c48ae24aa55f44b4dbb7519db14415e4d70c8d4e35e6c82e83cdd6aebda7d4
SHA512e64ce05966322678aa65d71b3f1cd02754c89818730f920e42ccee5119564c326a17a526c1c77f457b905f84b6b96bd18ceeafbd9474482ea6085b2662db7c1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0154907078f03bbb3183ffe75f5294
SHA1ee629071d2a546aa638f81c3d455dd3ed7a93639
SHA2566e3a365e792223aa93d873334a4a5cc13a2003f9bb3e3630442e75a1fc692d3a
SHA5121ab3a4ee5b71823c3445e054b97adcb38c188c25793f75f669aba7a54c733ef2bbf8bda6ffc9a4a1b7319741e23a1ddb01e9f52e50301342148e93b0537736f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59090b0d9f28f9856868191de06eb3334
SHA14553ad99c04d27b03458685cd3258199b35fac04
SHA256aacef230bf3faa156b566bbd71087c57a88d5e24d9d675759eea95d5fcb1a7ce
SHA51209d516150531f866eff75fae8d705f9658a4afa3afaf1c732f27e34df7de8416fdc08f31c84813fd72bc9fc29fcbc0ad4b9575474a050f0a69e580863e62377f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b