Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 16:05
Static task
static1
Behavioral task
behavioral1
Sample
84bf3d44270e35eb60741e00b2de70ae_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
84bf3d44270e35eb60741e00b2de70ae_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
84bf3d44270e35eb60741e00b2de70ae_JaffaCakes118.html
-
Size
3KB
-
MD5
84bf3d44270e35eb60741e00b2de70ae
-
SHA1
f7a24df4cbef1d39df2ff9162280a2144fe0bc8f
-
SHA256
cacab87b871d82f35e5e8a678cebae3a37ab7d75f72d8223b61b6384748b93d6
-
SHA512
389aaab21b8e5e9baa5bea93ac7e896587da141526e38154ba8c822b4861fef57950215ad06ee595042bf74fed4adc7fcc0be91510d6516e7c5dbf292a6c1121
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008be8e4915a214d42a8059123ca810b4800000000020000000000106600000001000020000000120fd479ec8afc5318de92c0b82ef9c41298d594dcc8b1c78ddcddbc2f086283000000000e8000000002000020000000f48e8bee92720a8c6d3c5fbce7f3de6d335433901d69a9baf4037c165f1050d62000000069c6c6587f0f2a671c5e2187b212e2d52c4c8a67c653c523532d3865d55a55fb400000002e26c6f8a9303a235213015c5b21bac3dec67dfe52b31042bb93482fd03f7fd45886f8000ffdeb0b9d9dd63b213806594b3931f705fbf7b97bb0a50067989a92 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e11657abb2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82644C61-1E9E-11EF-8A5C-CE787CD1CA6F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423247029" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2508 1656 iexplore.exe 28 PID 1656 wrote to memory of 2508 1656 iexplore.exe 28 PID 1656 wrote to memory of 2508 1656 iexplore.exe 28 PID 1656 wrote to memory of 2508 1656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84bf3d44270e35eb60741e00b2de70ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57828706f0dcd58d8e5ad7283a70affd8
SHA1db040c5bf15ad9aff3b939afdb5bbf32c9c0864d
SHA2561743ba7686f2aaaf2957a12570d148aff5bfdd9f57ceba53b50a7f6746f47ba2
SHA51286413bab38acc32acee8317e8c14376e0765fb1ea91c80a380b522e6c71ee6f2216fdb4875348259d7fe5c5abc7d3817c50090b97737f76db5038ddf388e0a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec8e8a6ba00e32fea5f67cde22c32226
SHA16ffeccf98ea1c3ba8ce962f22fc5bcad62031a0e
SHA256dd986464477d8b57fae5a1a7fbe1017f388142079497232f96188344e9348323
SHA512c9b2c46d9af14066b73f0da74b725e10f165c786dbe427029935ea6a29fec2561206566494f3b2cac890455d61b7f98f7123b80abec90d2d1804d518b66b33ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564cc2838326b0adf2cea14170bae7e0f
SHA1b026323a3b8ecd4d8918b49a72d25413d72f7623
SHA256a6146cada617fe540089cf296d6d0ecce7648755d26e2d43348d90c3706f60b3
SHA512fb19cc62c2a861554857de7600eb72b462d3f3bc26c542501137458594722b9fe66ad9bc57f8999b3b03715856cc16a80925550c62ade501290fd56173b0c438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c231f452c62d2bee0fb9b578b45f9a25
SHA1b439ec621070ef670c1f7e20bc67452b444071c6
SHA25644ce28e26e2ca9c0a6538f1148dd7a4cb9e09c89cb711f1a37b3ee08bc6d0286
SHA5121db07fef79dc516d0bd3a03e3c46e3eab2b9f5306644ab7bba00025b1f221e9286a91cabcfc056be5d8b770bc2bde45283f7309332a43e6704352a070dcc2c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a19660a50ec6d372c8f611af930b1bee
SHA185313b183b11f16319e76bd35ef7733b50dcbf98
SHA2568805eac0c51bfa13a2eb1c05aa42fae0c26e74ebbc1e61a49b4fb0ded91b437f
SHA5124de1d9e51e4f984c7b93d80a7a82f531f09b4cc4fc9af41e90f39b8f642135670a4e97a65def4e6deee1d05f91465f152b6a7942c950804974afe8de2dff9c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58626a3d48ef8c72f2b8021f055e3b856
SHA179cc6702c1d231f9964bd764cbf5104386df64b2
SHA256c02306b45666a69c8a5c28ee3392ce605f25a05a9705a243ac0009ed42a3bfd3
SHA512d9f0563966d1c645f310be595f97dc76d92b54d29aea57a89d88008473ff0a192cabfa9e7fa0e2a857007fe1ba02852ca3bf7407919cbccf34faeaa355330e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520d87a3e804e74976617b4254430717c
SHA18700431cd795b5bf992475d4bb04a032ffa97ed1
SHA2565b3f77408056620d373eddcdca758244d6e52b4046a86b79f6341de561d04c48
SHA512ca0e2da8357c8e99377da3b136ed03b182598db75a57d9ca0e442b84d84284bd18efc68fffefbd2be284eb2e875b5493fe941070739633e6d3253669e2b4750f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5424203045a075a772ee4b8e4d79de6b7
SHA11dd5d65ac031e877cabff8f059a097231d35e7ae
SHA25646886ab3a7f7a1e39c874d08a6ab3064d25d44750b53ee10f27114932291d6d2
SHA5127ece3d826eb7e4cfb5031091919feaf274697167596a1f4a2d326c343fe9627487415185da7dd27955962b1032f56206f3000a63a0f99a8ffc10a59e4b671eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d3a598f87bf6bb7bcdafd6ebfe80ce1
SHA1530cd0ba640f3acde72b5e755b98ae7de5af2ef8
SHA256478f74597826b9f4c43106032afa4a65509c2ef5168dc9504fc3d5117e53d201
SHA51206ce0e5d44af9f5d3eb86b380e8b39fa3ea721fb86f88abcc20dc1e7af5063f6f5626b0f4a8167be78dc75ed9f69c2bae3d68f9e13313f3a214b4b1a107ef948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5084bd2823d3dfd6c5733a351815fe5a7
SHA191062b726597f4fafacbde37cd5afba9f4699ebc
SHA2567a689c6d512fa1f32e140a1a5fea50fb1b66d29cabec9533504b04b3c5a1fbe7
SHA51214e1f2ff4bff38e6be7149274cd13fefd47668abe167a19fc8662f162df0f378ea7bbfff852f9f3213ff380a69e1d42e533143179492fe637c8ddf146e202338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d982a3b9c98b63a65f5f06a187ebf2d
SHA1db9c560486fb8db6e48e6899960f5c3a781a73ff
SHA25683f90d01947ddf086660aa423ef81617976654ca9895f7a6c2def746a755f236
SHA51211d539b78b227a443112919f1954ff10c26aff8b34f88f307f39bafbe29740b1eec73309623091e8d9ebdcfc07653f16b43434e2385cfcb60d8d6769c8ebd857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5665b1f201f5a539a4c23eb83ce357845
SHA1f863bde16f810a6ca9b3d4bd1aaa75c479dd986f
SHA25606720543015239db31bb232c459aa25109d523b0c80c072277225cc099fea831
SHA512e8309be358e926ebb37eb7f91f27407254f0b531865bfccb73ecc6498c90541be35f5531a4eb08fd408dcb333e90889964c7c65d1bde80453f74c2b9fce2fffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee36ea2a6cbee3423ebd06f506bfb7b6
SHA1b6d7222c10145640173886c1abbd72369090576e
SHA25682dfa1e2faa9819d583c9ab1fe634839d90acdca5e4626a8d539a987cff7adfe
SHA51209753a3a8da2d9f63d75f884dae0d8e6693e31460a33b14fb46e1d1d97add53a0d53c1fec36a06b0c0019c1d74d6c58c835fbd6d532d345f4ec3fbd7f0d272d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd541faee43a030ca6f155491837b8cf
SHA137bf857289f803f9e67b45745973bf7f9ba8c79a
SHA2569a8af4dc5df4ad9a430d321b1b56e088726ca8e4a68a201ffd488336705248ad
SHA51241a3706645c4bdd3897e313d814545e17d421ae50441c7b682f1a641bda65be0d12fb372869cea82677593706ddd25b137ce55d0e373d39254847fbecfba1ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da57019bb888623f331dcaa16ddf42f
SHA13cecaf95482c841c162b81db77c893aff9d790ac
SHA256313c5871384e7e990266922747dafe72987708d06063beb9aa7af9464720fb81
SHA512a689dcfb57c94c74c360baa29f789cf519efdbc99df4531d9fc49d7cf40c4fec9f56b341ff6bc037579461748a8161c1d5a47bd9c95c9faf970ce7c29f3077bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acd4445af716598d5c4a7e1c9a652ede
SHA1979aef481b983bd8271a69a3c9e0b7c86b24b88f
SHA2568bd45119a18a7ef2390897ca7c9498f6fbb6c5f8aae71ac0e56e8f2df9095a37
SHA5120bfd1a106b4f8d3a719da03c30f994cf481cc3a68a92b0bfe79a4c59f8435a6ae15527e2135d3dd0fe05200c380ecced2feaa57db16a2b0fc641566c0d6eb4b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c16ffb560d77c3f4c87db0e2998cd5
SHA1ad493de61f3db983af5be3b446a1146d2606bef9
SHA256afc827077cc1b0057055db00f69dc987349883911e7a5a8c0808a05d31861fed
SHA5120536ecbb6f18ce342d8e51b485e325442dc606576b58a89f6f2aab0fd3f071550959aa61794534bba0d880ff475b268956bd9520a5caf240d3d6922201adea2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579a0cd01c264533b9301a8c376527c7d
SHA1656d438fb49f54b6a13808f333491846002a2dbd
SHA256ef3e7cb57da70a849348bbc1ed1f77ee294dc89d54c4b1bc3814ae1d766e07d5
SHA512ce80970175d56be54e6dc6adf7ed94386dbf15c9e0ce62e210b2dcad031e3f5315686056bfc1804c31daad05ff7b754faee709f0057fdada8e61c29fb06e8089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530633302fad3710e25ecaef77e974afe
SHA126a07b02a2b1082b69d27061f6e1563b4b1650ff
SHA256a74757c7c0a4eec0fcde1400f242021115262d67d54e5ea4af170293d40d1f41
SHA512583749d9788b59f742c9c13963a9a15762771e5d5084e694ac638c44a2563f2fb1345d5022c17b4f5f65812bd0d0fc70af6154f85ddcbdfa9062ba1bf40cfaf0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b