Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
85e350d1a24d92ad60b070eff83f31d6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
85e350d1a24d92ad60b070eff83f31d6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
85e350d1a24d92ad60b070eff83f31d6_JaffaCakes118.html
-
Size
2KB
-
MD5
85e350d1a24d92ad60b070eff83f31d6
-
SHA1
00ab94e4aa80c484a5299e5292be75ebe73716e3
-
SHA256
0386ac3cd7706ec575d0c9686d65bd2de48179f920e94b18cbf579af6d2bc269
-
SHA512
b3f01a5be2d35efd2fb5db1879070d8120f986f2da4565fc92eee1af764f5572e9ba1aa20673d895b922a9de2e6342290ae21836c1cc683d7c223ed322bf9615
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E249C91-1F00-11EF-A538-5630532AF2EE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000001ee88b544c69a89aeeb5e90255b40d89c833fbfe7f0a52a4e8896e9cf891b9dc000000000e80000000020000200000008cf858bb79fdee2a2550a59ae0901b4d67d9045345b39b4cbdf58032308168ef2000000038aeead8e3178362894a3d86249af8d3a26edd07fd4964699fe1c085213524ee40000000da8cae300e476cf98bbee4e24ec357a649ae7202995fff96247ad05ff76073d35a3a157fa9eb04296f56224e5d5cb2f9f1324a107263a3bb6a938bd931f2be30 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423289032" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c3da220db3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 3060 2164 iexplore.exe 28 PID 2164 wrote to memory of 3060 2164 iexplore.exe 28 PID 2164 wrote to memory of 3060 2164 iexplore.exe 28 PID 2164 wrote to memory of 3060 2164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\85e350d1a24d92ad60b070eff83f31d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd52ff41a94e3f51354c31a50d56d605
SHA1034ff187192f8929904e9024602c566e8f2ba483
SHA25686e0d4f00e7073f0e1b5bd00054282221e711953b73ecb1f04cd2911b775a067
SHA512885e0a7a697ea540a9004f90490cf6aa6f26b59ec08040d889077ae6631f9d42cd806c75603cd7ca3d8a55bc452ed65378599f72edfc2e3a8f846b3fd78d01d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563534b7af522bda4f6ba396240deb3ae
SHA1c857e09ab5a970e5b675c77063a92285a692bd12
SHA256d60db4b6d9f29617299bd1b4c46d298410ff7103e0f31d11666581c0aefa9d5b
SHA51263bdbbceeb1caa72eef606ca0a5435257974665d59b9160df27d8cc98df75849dbc6882cad86a208eb4fd7c3d8a8fbf830688a09d2896374c5294c8792ef4491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552191562fbb76598d9ed2fac2b92abd4
SHA1792983d7f3e55fef3154eb8b0feff15141bf1172
SHA256c52b68c1bedad90dba95833f59e2ae6bf226b1a005ac46fa2b6b4a130c6ddab9
SHA512a2cf5d56a790d4ed576713c62dbaee3c724db763623457e5b3cc2b7de1233eaec06c981424cf9183248ccaf8bcc6d6cb603ae2d6eea39c6c984aa9f9609a1a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff554e4b7171238b4a392f204c406381
SHA168c71c68242ce8126985c8c0ab6bab32792b7a78
SHA256a99dd4b220ccc34f3927006a17bdd9c336a3fa398ad060337ccd62541779070e
SHA51284865422bc8c516305899b35af0fd592f0c504af6c13a186bf58fd0910d8dedc6dc2e2e3ed0cd9cecfd264640396f29dd8b1b98d4e6ea5d68bc2376fc7066dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572affd22e24d331b6fd2cfbce851ef0b
SHA1a7e605d8c735beba00d203d99ae666a1c9f80f37
SHA25604cd91df7777a8f0123f655e37732acb122f5949350a83a4dbefae7be38f1f14
SHA512b3589db4ad5342228c9f6e3aade873bc78e66dd103aea80c5b8cb85885a61b3164bcbf92e117e26e4a8796d17789599d63d4799850152ae9f88340b23318ba07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5561d52f3395e2edf54040d475dcac1e2
SHA17c06c98facbbc20158a04940f9ff46ba0314779f
SHA256e307bf8ce3ddde6a3e7013384820def257e257244e8f1aee1e7ada57cd358295
SHA5129fb3e3c7b97ce534365bd2424a121fccb434b3ae33913e45f998a85cd5fbcec60b48ad4007b8eda5ef495345a65300623011f5f6a705e2abcb8264ee09a0e53a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bea2d16f3a6aad162de44dbd020fa44c
SHA1c8c4b60676fc28c3a32c62c915688c7610a3e457
SHA25602d05537ac8e3b51a5c6eecee615728aa42cb5f794ae4a9d12bf19542c9a3465
SHA512776ece6d15d4e2cb4c8a54d0e0ef50e18cf44d6dc242014b58a59f6444fd11bdbfcd0097ec2a7c10edc23ffb6e77c66bc3f2c96c34a679244f5e540f6a2df74d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6c706145ec5b78c097326dabd50a55c
SHA13f7215a85f706afd3381ad25037550413e5875ad
SHA2562cec9ce2246ae0f53d691c360bb9f502b8b35489efc7ee16b5846f2d3217628e
SHA51200c0b52c87352db68307d1739a8045327d5ab3258f82ad9d9a52bd25a9435d461faacb4211a75141b2429bb877f148b5141e0ab86a9a39985fa02dfa69b5dce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f80c3e84a2319e54708555931657ebdd
SHA1d3c3504fc5a005ad839a845b9a4c161171f8c02f
SHA2568da133fbb8a392170fb4ecb47e59b05c00f5c0a45977c768b3f48850238327de
SHA5121646715f6e4a7a4862670a59c7320c7c28702309de3a6fdc00f7113c907ca01c4579c5c4cbaf12e3ce844d7437502dfc0cabbcdd3b1378c9f43ffe269408e474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546bb40dc70c61604c8c78902b7fb71e8
SHA19c645b7072fb02ca6074b719be9d0a90f305867e
SHA2567c68a2b350748b92e6a27bda9738a34f8bad9f744bb49a1ef41bc30879c1e953
SHA512dc26199694cf9ec8b2a91f73e40d4f29458fa2c9db32e27ff19d0d87a033840ec3310a6075bfd398fc907392362be09647c829d14b8a0f717f0666e0c2d2efc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bec0f12227a169b4a2900514aa993b4c
SHA10482bfcc96a728a7dbb8e7f97c684887fd2378b8
SHA25635ef7270cc55646b7b1a24b44080c190be5d7f50928dc0fce4a7167b8737c612
SHA5121fdcf6196790d618effc200b9906a234b5a29d35cc8effce0272480f9f8101b54dcd56219a86c9b0f4e74b6c363e48fb453cac115c0103389c41b9a9a77f3515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b9768c4c48c915a5f2608294eb1fb8a
SHA1ff7a59f62b6ee44ff6c07d4006e6e97e9ed1eed6
SHA2564ac377264154ddcaba28b6028275f61601b3515db4a90617360b506f17a2aeb8
SHA51280173a31d6391c108d2bb23e93cf7e91d78fb3d7008b2804be42edbe73d8d99c01f33970792038c483e1c6812e3b24b71af7dce85136efa5cc6f6fb5f3bd6426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562d66b16af2ee300bd8c2c1faa9ea0a9
SHA1481ae160398b7f7c2e7e9c3e4fe86f28f5477f08
SHA2567948c6e18e2e6fe9ccba521bdd4e8e0d3be61fba95154ddcd0d005cec65466ce
SHA512ebf36e5c28777fdf161b122af644c42436d2a4ce2c36287e8825f946421dbc0262e6e7b0166212f64560d04883b2934ffbbe568ea89323c18e2ab4df910db6cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51961868ec98add027398b7fdad0ed1c4
SHA1e1bb5a38d227257fb2afb1c7262c0d37c173d190
SHA256ed75501c99145475244b378ce55f1ecb8869cedcff78a8e7d226b18bf808a4b0
SHA5124e1d11a03fecf597bfc467eaec6a20f0aa035aec39e00b7d9e4c8b5ff5fb5cbb5f0f5a8f2c7cbb0a692de218271b9cf43784749274d978181297174c378590b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e1d1e3a75c30cfd6caac2ec27b2928
SHA1332af0d6542979840bc14242c8d288ea5c54d250
SHA2562e67a50ea6830074fd0f248249f1fd2ddf027c1aeb418586b24594daa0363fcf
SHA512a5db1ba262867e60610101259055f5799a6841f8a6585c46a2fba1120be8dbba743569d217b50f647ec33ec748a3af8206eaa1a69b1388469002f7f5e7768e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bb989353a1a03dadebc04b666e08b5f
SHA18f669fb7eee8dc4d3debddccbbf0683b645778a0
SHA2565858b0c2cb90b094c1399c3d82d836081b9172fe76b3a01f1261d36b67f75d3f
SHA512b165c08877654744044e64762dfebf96c70fe2d99a434b29f695dc76a9e4d585d486288445649c52984e2ae57abc85f96e7b74e420ff8eafc3566b5df18997b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ebd3ee67e8ac8b07e4237f94d636d9e
SHA15f0f50ddf342a96a0013cf08dc69aaed3c76a8ab
SHA256c872ef163e1e32c2fb2ee8f5cfc04d661f15da9a002ff55d7ed39e6a56348ef1
SHA51258da72057fa5ddfac79cecb110c5edc88c4cb608e94b79401cbbb9a89ab330889a051de2cbf44e3bcdbc09fcae65c1a50a1cae31c4d840e41ba1dfcc266d3702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53057e60590c6d88e1995508ea0c5afc0
SHA1843d40d4729d72e2d06e595f00317dfb885b3b81
SHA256249a540c03ee259628f26fc932d45fcec931e891249b85c6d5e4bdd7d0eb64d2
SHA51289238424a9560396fed2eba56a9ce589eaa9f4c37ea313a78c0cf0c517359858bf6e56b34e804893586a51578b5677843421f0cb077eb8aa8d1342e126a515ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ed08af2fd3a986f5250b6e19d6c7f26
SHA1f9317f4c2e0d43217abed9cde53e715cfba9128c
SHA2563e77e90472d50988d97b1a91de048781b81ec7436d7363a3c43003690daa3f33
SHA512ee1125bd775a1b3170326af7af5beef39c0a83b8d06b1f48dd5398c8afa0b7d1a0105a6f8e31336a892f9ff550af66874d12370033351a6f54b0c48586a08fb0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b