Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 11:21
Static task
static1
Behavioral task
behavioral1
Sample
86d2b6f3e23ece5bb93b3eb2127bef82_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
86d2b6f3e23ece5bb93b3eb2127bef82_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
86d2b6f3e23ece5bb93b3eb2127bef82_JaffaCakes118.html
-
Size
656B
-
MD5
86d2b6f3e23ece5bb93b3eb2127bef82
-
SHA1
5f067e5ebe5088c5344832cc8444cb69b7d29c3e
-
SHA256
68ec1b084bc7ddfe50b2170be4baf8f6da67816800ef91c8fa92fed33534be0a
-
SHA512
027de04b63fdaab685de9d523a14b8c572c5473a69c9ab1f26e5eab674450305381d2c774523c0325d0f48d67708ef0b5593f8c96833ce466f62d463c67e96d9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dc356767ba182743bb58a2b7b213629700000000020000000000106600000001000020000000fac0170b843952fb702a48d48f3f4dfdc79189d0d634d08adbf6993ce506716e000000000e800000000200002000000069c1c90963fd7a11f49ec592412a77b3dcfd3b9ead218f9a44b8f600b701d2e22000000006e556fa2c7992f4ffa76853b5893519af6c4f9228665a662afde17ea6ae8c80400000008c448db11e06db89fd07aed08546e5bc0409785897908d63a2a01cc871059cd19be327ce7a8ff1e173c53861b3dbce48bee60fbde8e159893633763bfca0efe9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 609acdbf4cb3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423316378" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F99FB201-1F3F-11EF-8A7C-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1904 iexplore.exe 1904 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2868 1904 iexplore.exe 28 PID 1904 wrote to memory of 2868 1904 iexplore.exe 28 PID 1904 wrote to memory of 2868 1904 iexplore.exe 28 PID 1904 wrote to memory of 2868 1904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86d2b6f3e23ece5bb93b3eb2127bef82_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51702351af3447b8a8dcc61e34d60c015
SHA141cb8231bbfb8d648439329cb314bf0add3897fe
SHA256eb9e38688064a40e59862bcd09a7ab1b8a7816471caf896194a05e6253e2c514
SHA512c40851cc7e9d8dffe92c542d595aaed4c47b5ee9b7353167a1252822d1bfb83f0651f8d23fde864b0d8984635872fd2a3bb3b79895bff2c0d0ee76ed9b871339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cd9aff4bd3fbe0f420015f155a3b6cf
SHA1412b6429246f7554d41962d05fa9644e0f7f6a8a
SHA2566ebb276f19fca54f65cdb55283856469b828079424837e7ef686602dc97bd006
SHA512799a53509f119dab628b81ca872df8d5db779c29394c7d248d732f03f8450d2d4b9a203cbd8fa1cc4f59aead451621a8abc2380e8f989b76847925a0ae06faa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d37ed03867f15aa93b94eece39966fa8
SHA18894f0df671a689ec0a41bee4e7a1cfa66c7a575
SHA256c8dd37bd926915e131250ee1cc98852f2d7397d61489d01af8ff2a7592508afc
SHA512bf5039ee5c7220fbea655fbface54433c462013a09a19d0608b34bf4dd46d187d9c78d893903833c1569795a2e6b5ff7029182b8ecebf22816f8f3a083f73453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ff806d8676cea1639d0410ae88e6080
SHA1f0bc1563e9a9d11a704ab8f39e306c8ac8baa1e8
SHA256ec8c02ce7ee69beec8e5bb877d561ee275f5ff99d5a8ad9b1b1867b1ed23cc8e
SHA512278d4aff6f8c10c5b9e75eb0b8960226b94793168a798f4a2e63b7c14e4b721f60d3fc8b3f7329b7f460adb85e4a5cf14bdb5c4e5628d5243e0450ad70e5d516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8b17eea5075b7cf68518ea20b2f47aa
SHA10080e741b1cf038122b98aa1406c2be7ebe97de8
SHA256083390ce1db92248f493a1c70ccd3d74fb38735cc1d94e9455f46b037576508e
SHA512ea5fc87b005841cedae37e71000ce1b58ef8714c0417d169725373784e6c28f85ba7ba120b5e4c140d805c903bd0db8bfda23cd1bc06a88aaf1d137347878644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb25f87a99a65a63a80093f1ec4e345b
SHA12bb82b1f00d2cc9caa262f449a0cc6bce100c2c2
SHA25616d3c3b92b5317ffd66c522f47e7e6abbbf77285679fdf2caa4d576b6899db2a
SHA51293d854451b84e73f0f96adfa2665b94977872f4cad56b8266a651d711cfd0971eaa6c85c6e8860f88f2afde6d06f40553ac6dd8a56691b6da4486bb12e85723d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d7c964bd52a29b66f0f5cd783c98489
SHA18b0ace156931612ef08238ed64f132d70859f764
SHA256e86597b8cdccbc525f360a56b82423655c86575092473d2d3d5308510bffe36c
SHA5128fa734da77360f0c4886680dd2f2ed66fc57bcbbf3ca8795e73f978ede6da0c38592a9e4172e7cfeac85b1f0f9e8fe9a3143cec0b16f7e86c92c3b851fc56d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556b01630f39bd834d9a7ec057725e17f
SHA15186698559ebda00eb8e53c2f272e867fed991f0
SHA256f3c1b95a5f0f9f131853ee7336b4c642b2f2b1cd09e834842adab27ed65fb8f7
SHA512f65562318ce7560afbe5424ea6f58136d2e704f1facadc1718f745555d48110b831c02a38959128f416f732a95d40c86046b9f8a6c21d0f282f88d9c6c8ab3e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca29cc9489e3c8edfc5d16085dd6720
SHA10f82474f314665aeae6a5824e8d2eb0a82c35b3e
SHA2568fd2d284b1dc9be1e24a8822af75e7e3ea2a9e1954c7d9dbe221a738bd7ace71
SHA5122b2f339d96f4852b13227e8d6a6128173b1766bb2bcf06d0ee0bda9cfd71cf6044f6c13d8156fd738a034047529747c3cd6f513afee17cd3b63b01b128664b91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dace4f03132ec32e9476e8ef4aebb5e
SHA1580c9abbcc1feb5c69722fe99dbc6ad818cc7abd
SHA256b85fd1b7113745bdbc56f7d1fdea66ba3b311da893a371c1307dffb523ccc670
SHA5125b2f6f7c59f28b8352705c0f9d1433f16a7c22a1a9ae7cc43f84fee3302f9e0b63fe98981653865fc8596a1a9a9127445e9d8556a8ce2de1e36aac51cd31617f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5748ab94bfed2ce6f7a5df29b8939775e
SHA194adf9810dde4a187bcce2bdd9bc51063b657e5d
SHA256691d765125cf332bf307b1ed4100fb5dbe20e665f8d0c71ff9043f4a55497b6c
SHA512d0fe115da3def6962040bcf22ef5fcf09a2d09c82c40e12a46c3d27b6c67eed842281cb68b948b50daf332c55d2f13dc0e1307882282b4e1bc3678a83924d6b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56240c91b68925e389b9694d8b6d1c2e4
SHA1d3cad23ff533d706aaac7e953bcc9e7d0d928fa9
SHA256fe7ff266ea42706444aa66b4d140b815b43bddfd1bc5bb508e3b5b857063b1e0
SHA5122cd0bc7bb04b14a250ce877e7b20cba59988b0b2e4f7b164aa785abd3f383b245bf415179b11ea3229f645146301a17201dd533c701c2d085adc52d67870d60d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5894cb3211ee3e3089107f55ed2f585f9
SHA181121714493d9df44042dfd6501c628f044c1841
SHA256830cc6d3251a16f8d8a8f8b45037a3f593bda32d812de5a119c122cf837c128a
SHA512e0495010d8a178a2dae0c9973dae96945a4bb536822cfd46cb3c9856e57d06f609bb51a12225d2f1e60f859684bbb53bc6287676d19c6c6f4027dcec2f0a7769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b74bcd89a51a2988975bd56253329ae
SHA1f3f2a24ee82c144af53d527845f2711aeb16ffae
SHA256e1c219e9ce8370fd7b15458c5a5fcf4cfd83d9c7f4b26fa4f618a4f5019d638a
SHA512d2033a91af5cbbfe306278a6ee28995be78841f34d2cdd967cb499e24fdf965f20727d8a08ef1a44b3a2b8a53aacfdeb1e81ad23cb5179e77434f7bb48cd6076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539cda7ff08ce61fb2dbb5b3f41b69faf
SHA1f8abc4a0fefcf75c8a59582085fbf0decdc36203
SHA256abb3ac855aa326e6e903bae77e6a5c0ea487909e6f50716c3b26c581f935ec0c
SHA51293734ec841f02cccbbd5fccee02b599ec0664840323ac18a7b49fc02a449be7ebf0231dac19371eca83055d9ff562c73bb36d61b373f307aa17f067cd3c58883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5191c3f9d588dc1d3c573beb50d555761
SHA1849c918c17bfe2b6a3fda75d31d6f667ee6e7cb4
SHA256a9ef3fc999b1112a8df5240c67f693958cdd87807599a42c829a90c10aaf1b2c
SHA512e7ec5c50a234cbf28cd48e23ff3cd530954ebe6b85f71094d7e3ab32b5de721d8cad5ff8c2a4c8cff83c49c4d97a5d7f8b5b38e11b6683105810d4fbe4d8ab92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71f894eb409438c5132e8f3f4ce7e16
SHA190c63738689700b8ad05a8a49d20fe5f31ca40c3
SHA25654ed1b4fd85716b00d4792f03fe4ebf365e588fe630407a17551c082f0ad8c7f
SHA512c7657e9ebe51f4afde166a25f4f962dd4a310900af7c195669ae9f6089927591e0fcf40cc6c76d048183450a1965340964528b6c0c18f8e4302e0c7ea4b8ce09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb2aa04474cd5a653c30cb1a688cd8d
SHA1adc40883a5bb92f2bfa5c2031980e480b320c612
SHA256958ab81da730786fde25be53975ee1e86d5d0af2420ba3bd430f31fc451f96e1
SHA512ef7de5508ff072d7df18b6b459fe2dd8e44978cf6cda7b9dcd1997f005a6e2e2f932265ce319b3cdec5b44baa19a827d21afbe6b24b593a6b230f97da7bea0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5188f7f3b8079871bc639fd0db1b7d9
SHA169bc43d64791220d171dee0ac7f85dd4db235988
SHA256f76ea61ea81a608fdb2af4ec6c6fbca6801060e3ceb2baa669f489fe66c1f086
SHA512a10ca74ea9f453473f9ec6c9534fec3706a7166dfb812f4e117aaef7c8d582c3328b210d9178768b3073f80fc8591960f784af022092fd87b951798f73d1e615
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b