Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 17:48
Static task
static1
Behavioral task
behavioral1
Sample
84f680db9a20468ea2c6b912a8d142df_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
84f680db9a20468ea2c6b912a8d142df_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
84f680db9a20468ea2c6b912a8d142df_JaffaCakes118.html
-
Size
3KB
-
MD5
84f680db9a20468ea2c6b912a8d142df
-
SHA1
9ea7fdbf62419730f9aef9594abba62c6fcf4635
-
SHA256
1093f76322fdea33c3c2185e8db98585b4fb1f67b856bddeb86389a86b7e67ac
-
SHA512
4c2c51a3bbdd7d894a5c6c425c0fbcd844644c86d8fa3b478a829073c99ff8895b4f3246198814b06959cc9254fa9245e773ba43bf81c94701db2779e9585fe8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8DC2141-1EAC-11EF-A538-5630532AF2EE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04e73adb9b2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000008ab9bada045e00d40a64172e716418a0f9151d912f3bb92df8b9307c94b8ff7f000000000e80000000020000200000009dfed4267df976a452049abfb05aed18761f3fef538b4e58bd98ab5596f5f9c32000000001d6e2dac54cbaead1e14ef5179d711e954e2e477dcbd4bbb672de91f36a7ec840000000a82c6902e8eb8bb8d3f3ea83ae4b2e88ee52d6e171b9d4c3aaeb3333753718bccd1460e33852d6d276d89eb4abc537fb3072405efb7eb8ae8d073dafca059ec7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423253187" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2412 2152 iexplore.exe 28 PID 2152 wrote to memory of 2412 2152 iexplore.exe 28 PID 2152 wrote to memory of 2412 2152 iexplore.exe 28 PID 2152 wrote to memory of 2412 2152 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\84f680db9a20468ea2c6b912a8d142df_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee52332aa96e1dd7b8adec82fa31acdf
SHA1a24a3aa1014b9a70854785976c80a28861eaf9b3
SHA25601f0e04584cfec715bd661b2df441d0fabf85296dcb7821563620c00ea4802e0
SHA5124241a2c9c1438bf75316b10b5d8df9bfbdbe87f5bc466b5f9fe515700dac817b751313933bf42964a1f6dc1cb5e89a99236c4f458d03413fbf15d5d75e6e9c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb51ef69089077b7746b159e78e4d1cc
SHA16fb35d83ae039988973cf19e7138abd9615d7f92
SHA256b762254691834d45a2b2c4d03ad6e36d85c4bda320dbac8296ddcbc88a8f639c
SHA512ad27a7adfea905f7bb8fb53bdd73a4b8b52e911e7ae16058951a600009491aa6bca5331d443148ff38022f17124a36dd5b21f3d9d46a39f7ac372bfc1714575c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407ee1eb088302ccc5d39567b7878aeb
SHA1ed6c27dd9469a032e6a2cfaca326153eed537b30
SHA256cd1075449e57bdfc21f44f0a1a915dc4b27f917f478cd1797508592384c8d307
SHA5127d2ff84412325f91c7c539ce1a5a17a937acc5b446cabc4d02703462cbd6f4fcd6da00fe739090fac52f7659ef2e601125765493888c066ba885b7d8f6cd411e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8aeccd68c48a66699e8d93663b781de
SHA1ac93004b56ece2ff782c245e17e8c6cbe52fd310
SHA2568b15f05007491e0d16e82d7721b43295b48f2b90ce6664bf770a464af8cf01a3
SHA512d309648f4c7fd6ea1f6b50be49567b44786eff7a465960e223c26fc0ef687887132ed9ccf5ed0dd759deb928709566e3f1c4acccf1909b7c6d688e28b346a122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b2bb3a19c642645bab660314010f4c
SHA10185fdc8562e2c17034a913c032e14a6a87c41b9
SHA256450063774fe0e5d3fce12d17ed38e172c31a0eaad069eb2b8942caea555d1fa4
SHA51284f3fe06750886dcb7c8acc673148e9af68e1d4dad1bb199fa8e3eb12ffd503fea561ca684b5f971799d5f3ebeef26d242c38142e389aa4fd98b56163e6dc1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f84b1d4b9aaad26364dae6ff9128bd69
SHA1a20bdc9261707ee20cb5b701ff92456e2d840610
SHA256bf9f189ffb1ac3005a8b58a2ddb3060d04e6f464046b13bb0a5a998bd601bbcc
SHA5126abf9453c18698a40f92c60d7bed9d94441e1dbb4ea33b18b2ac57b2fbd88b4d034e3c0f7f4dd61974d79a43d2f90cfc6c7aa48dfb1f2052079bac47f307347e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508b2dd4b2cd880ceb3613be99e4de523
SHA192504944fcc2e6ba77095b2506c93ade5b652518
SHA25608f5c1a85bc4de2c93174526c8f0f924fdd2abbf86443efb42315541a1b15675
SHA5125f2b19bbf7037bde24a1cb85a7b73252a31053d20517d0a8dd2c1e95c2d37b09c6083b852bc79ba30066a457b8421ed07607f54cbf7779676aafcc7d9996cacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa64c18cb50b659b219e6f5290418fd
SHA1385c61e8bc6586b4d85ff08b56ce59ac405b5d33
SHA2567c7717337bac2b3fb2feb325c6b887dcf5d1d72f047334ce7b4da1fd24fad384
SHA5122eb595a56a67268410c90f10fefa02bd99879475063573bc91a476b9c5180c189031325d169d8e82ab00389a5c65aecf43529576042d513e53ded1590f7538a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b814311da15769db3c646fdb125b008
SHA1af19c11f7c0836d969746f857b80337ed7c4a9f7
SHA25652ce4a59a2a4c0c120e2855c86daeab3942ee870f6dda5b9179be62c2e3b41a5
SHA512a2b05c7391543eedb55a1d0b817dc39c48e8b5b748b475dbd5aaccc27a38592aeea2a6285177763bca475a3b639de72db75e62afe14eca4d02cf317e437723a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecdd2cf084f6c3bcc8ddc2b9ecca9b84
SHA1d01182e52c3210ade0e19748a4ea5debbb81bb2b
SHA256a84c6d7c460306d4773196bacfd9afc79ec3d9b6c8c07d24ffc808ac026fcfe2
SHA512b72d8c8ba8b323fdd5a6e805b5d9cdb83048b57fe53e668989f211ce722ac30d1c21f9f4a7d49f2f99e626e46cd360db5e75a372fa59b3d6c4add694c8a0e428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54659f3e5298b8191e55a4b4cba35d80b
SHA1dcea5d96277071ce1edb24b3348eb9e3416fdec8
SHA2569df077ff3186fe935842dd24a4be2069881018d498708a8c32bd50e6d50ebb62
SHA512c088a3c8d5850a3d9e3639b7b1e6a6ba8c550eac00dd32605223ca45d3f267bba0c2e51e07064268f6a8dfc91206eabd4f31d8fde4342859498eb8dfb97f27e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcc5daf1a0688decf1ff32f75e6d71c6
SHA14bc8d62d6fe95323a2d8fb09c459bafb169f0da0
SHA256dd9b282b4e207a6e1fbd2f114c8f277dfc606d8d87e016e068a105d3685f338e
SHA512dbd37c4c1a97f17560a7b68b62d053bfe3a6d0d983ed50b7576c31895a3b43e829e9c4ae25c661926abe3fd9137fda20bdffbd7ad47f5fcfbabec718c9b10241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56609a8ad9b677a1d38ed7e059b85b33f
SHA1d3138718bb0ca81317bc34fe0a5c9e9ec23a6018
SHA2565465d8a0d4d23a4068e6f7a618b0f573d9f7cbab88a30e3375dd6d20365cbaef
SHA51281837eac819b118b5e5478dc40e08e63810606f1d881d61de2e4aa26615a8ac383c031d01eb354342720424b40e2449a27728b79dcc273540b087a2f04dd6172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd8e1a700490405a2658aad16163f4ef
SHA171f89868904fa3f78850c09004c0551139171f2d
SHA256e3514a2079f7f8dacb2e326c68295dd2db4857cd606b8e8400e06ff559ccf46d
SHA51270ba361f6c2cd210d13ec63d50a23e7835063b51041cd154530432150276ec865001100b58bac81acc908eea0ffa51c5fcc98949b571e3780834b0bd3e58d21c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a524e0afea470fa116ef52498ce5181f
SHA1d07fd19abf878eac00fa231cb41283efd0c77211
SHA2568b57857d91653460bfdd478f143b953dcd20de728f010200648707dfdb9b22d8
SHA51211ca687e3c3f9a8e7723f885c981e32417d794ee937ec63eade8ff66ba734657fd9ded4da611bd5483ac7381e175d4fbd67b515bc2b87b14df2a55dc7cda60ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6738a43c73c53238a5c2f8934cc9668
SHA17e59ffb7ca3ff920276f1102965d82c3134f41dc
SHA256bac04b1d9f53bbdbdce0e94ebbe7f95dc090fb1a4f1e195d4fdbfd122cea3cc3
SHA512e5ca3daf5b5c273624f2801161504b225db233424691544426500bb0c8f861871aad5b2e66d06528431a899d4f7e15ed5bcdb3229dd3e2231911284552f67b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea8da51235cdd0392187852e7ec9b11c
SHA1b04f3aa4434b63e9b057d11d396e8a611be2d402
SHA256a1c83ba56f3cc4f86b5130d15aa6063320212279f5a962f5aaf376fd0388e72a
SHA51219769accba220f5b4851de2955c72d6dfb1cf2f1c7c55966c2ef67281006b3bd1d5a2371ae19d99f80af23ec1c98a512b4a4c210f4be5dd435cdf9572a6da7b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f39101aca7af13f8acfdfd70b7bdb517
SHA13e8e97e1fbbc735316a36ce0eaa81f057949a175
SHA256c96ba9793696529022c48a206ef9e24c89b6abe6eecc2b6597a34a749914df91
SHA51299d44bc79f67925b9a69cd41c9217fe5f83d1a95c30d7b1248ef1110eb01fbb85bdfe4e10d9ae263878bdeeafa1ee350e553c01990ec0212aeca9f46cff36acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568fae0b5b603d125f9dce4a17dbfb632
SHA168946b9f7ed4ee89849604dc18295bf3a02a4c63
SHA2562965ea4f8c54b2e99f22d09b5a5759b00b30ea8243f1930c97fab213bedc5cb9
SHA5122c360a1325613123c5199aad1e2b42560ec7da80fda3c4d126308dc7bf4ae9ee0782c2550b0f1d54d48b82e7b20dbb9e292ab48486c9887cdb7c0c146f5fe16f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b