Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
90ffd68676f5ce2a78523a92ce02894d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
90ffd68676f5ce2a78523a92ce02894d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
90ffd68676f5ce2a78523a92ce02894d_JaffaCakes118.html
-
Size
3KB
-
MD5
90ffd68676f5ce2a78523a92ce02894d
-
SHA1
f9e576ca9399b9bc25407369c230dddd29b3629b
-
SHA256
b4d87bc0cd32d962087954e43411a7847c43c2a92439be70d38fd3c155a8bc94
-
SHA512
1542b390efbe5cb0ee4b212c0938ed667e9b15a963ebb4b8b3fecbef5e9801d4eb04b2e4eed940f89d8733018d228d7dcfdcb3100a7d203d39aa4fc67d556cd9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ab48c79f13da424ebf8d65a20b85a489000000000200000000001066000000010000200000004f03f4c8ec3136d93e9c30e62beac24ab2b1b6eb9df653bb2b5bd3dda23012f5000000000e80000000020000200000004bfd7fc584ba97da7317e208fb5b3f478e606dc6ef710474e21a730cdf4bb35c2000000092a01a018364600308fe8885f097dcda4f446099449617a93bada575a420a8ea400000002bbbb76a22ba16d894a49c5416f69f1733a03e445e26e95cbbca71bba10fa956ddf49f0be026e69d371732bc3e9057f933bdf46d1714133836e73f6e67b88118 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606ac03f8ab5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B1789A1-217D-11EF-92E0-EA483E0BCDAF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423562670" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2768 1728 iexplore.exe 28 PID 1728 wrote to memory of 2768 1728 iexplore.exe 28 PID 1728 wrote to memory of 2768 1728 iexplore.exe 28 PID 1728 wrote to memory of 2768 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\90ffd68676f5ce2a78523a92ce02894d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52613b33b5e090e429f321a63360a7bb3
SHA19a4b48eee606edc65704c71a828a47cc6d2d0728
SHA25620e30d61ff78d1abaa39dcdcf374936b9119b76c9d120d077240ff963db73923
SHA51249472ea22b9538d4604bf1536350c7867833c0546baebf2fff2105ac7d7b4aef3383e4c184b049578c8643a8fed5bae74e6d7e570ba2a4e54dd59c08a663841d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a80bb2e39b88ae35523b9083861d49
SHA1bcbdbb928279e30293bae1e7fa9ab4d67d7d0ef1
SHA2562487a0f34d99de1268ef2e3e50f4aa683378c0819efcf0601830a33e15c93b9f
SHA5126ef17230971b0c4f2e43d16c1986709ebb830134728e94a01c370194dfe0003eeccef778a8d022576a428ddf054e28e08868935c00d8cec9912da0f30ed05885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1acbf222f41278db8fe7cb24fb144e0
SHA107dbc8f7a8df126e1cf4064ef74981a1a3dd5712
SHA25692acaa8ee9e47d9f741f7fc7d7537a60c2aa1ee6a76d54dfa3968ce42bdc5407
SHA5129f7b76671b6b72bd6bf2b56c673112f4b8510130ad13bd7840657305f41b6bb578049c4f1a2bd35eb5201c7228515e56618d6c4b82251a97ae4dcf3386809411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d8d8bb026246dfbd239419dd8b22f1b
SHA18d9fc943652de6e3b25d9937deed7b7fd592ec9f
SHA256745cacb629ed8c9cac7e71a3a50e50913b43d5d04b88afd521bebaa3ddf347c1
SHA512786a4cbb282434118b49eba802bb037de6e8be6cb75a9189cfb93579e89eaac5d749754a7f210348ab8a485cb528b6f9392eedf00f36eb3f6ce69bc8b55de9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef86c5da1048901bd0a68de584853858
SHA19370cf8eba7754fc155da31a2548d3aa72597611
SHA256cde1b04f43828a81a7c9fff59f37adeb18608b34a74567ced51fe69d25924e11
SHA512adcd59b6c04f9e95dc98903f2c0f5912c5551928c8774e718339574213c76cfe536277c592024f628a22756a9ca649884654e1ec3b1e8f2348b5277d17bda426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5255b84d7866a69704350a703cf2f3629
SHA1383d3745cb1d87e9484003fd243ffa96e3c13a03
SHA256f481f8d3fb5a69009ed8660ff0fd4d9edd8c75a6c89e74b0375605eea7ced565
SHA5123c3daee92527cd51d628923039385f84f71fc7c49b20cdc602d4a48edaaa99f6d47f1b6e681e830086ab20e7b5c52228fa20e190bff9fa66add330ec04b3b477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c2e52c23bd00a22ba348f343aa333c
SHA14c049fb463a5d9b81f143e5da279eb10430e32ad
SHA256934f4c5ecd63db9c449f7bcd5aced8822bb8361945ba51c722e5d7502002d23b
SHA512f2ad3377d8d4bcdad603c67427852519c2d0e311918a8c079d131481499c3e6fecff76f5fddf53b940c5b37497a7f12c014c5a217e31a5dbc416b26198f082d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8cfc540aa115e468fd36a19f523f65f
SHA1a7c5396621fe1153a249662c1bdccb3d3c490c5d
SHA2564b63b4f02d12557c4ee945558baaf97b08cee39984a1234190e08fad4da44687
SHA51258a35815b24770ea2eab680a7a081b0ef88891d9cdca660915de7c633fee97c368fb8a0e09cd076b4644020202ed781d910f8f96224de911eca3e8e356219b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b92f88d081bdb9206f744e10fd5e301
SHA15eb40cfdf66cb8652389623f757ec5ae637c46bd
SHA256149fb9d0129a05206059fc59c6612b10d8c93ca8be405f31579d326044d7ea4d
SHA512686c623c25489b30ff502755cb5b6a20fb8f186c66cb05c9a95382ca8512a79bd7914976d1e9ca99a89a75e0c390abb9191669cf91c1437349ee4fca93b0eeb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc961d1a495ea8851235c51a5574441d
SHA10ac1162d56796628384f6025e5cc2fc984b1f706
SHA2568a7f848bd18c9bf555523e88663234802231dff6b29bcf0dc54a0245dc708d42
SHA51278ad5357d568f78eeb1a2067175936aa218930dd5fe710f4d07d3d7cb9754bd874b6e3991b3fe7e46847ca45e5ad4eef0ef34ed85579ac35e31297ea94e74d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57effcc74f8b2a072305fb686ac5a4752
SHA1f995c7397ed86163f906fd331d05ff41a9851023
SHA2562f463e29105352acc28e0df232266a761d445a6e6856d6572b80454402c8cd4f
SHA512b75372513eecc085f6e43c9f4af02f9d3a120403e7d450db8520f6b7623be01a30739824b866457b1c56441a4412e09eb35bf08212e7c6dbfa289ab42291a546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a9827b80cd0040dee907b86e01af220
SHA10ed7812a1ec60dd47193a5e58bbd26487dfcde06
SHA25655d633c7b0118787bdb365a50e96e386a36b813ab0eb4dd6ef368ff2ed35cc79
SHA512a25d72cfe174570c8b1bccf6b76591d344e5f7c682df577db7737764edbe8b3bd645161105dcd9010b087d4f763885bc74a3d2a61316146c95cba8b77c922893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7a39a47efd596ae8e2a09ea9768336a
SHA174324a36b7ae8694a406c0e75091ce78559451c6
SHA256d50baf6cfc2e6fb152a4e7d9d9fddcf01aefaf6da160998536765b5c0030e541
SHA5124af8b0605836159d3c5f135d34ccb3a183c7b8ec3fbf4eeea34103495b8f7154cd5a11a000df5de67527b809c97f0cb141dd4ad5517367e652636a71f1082047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5553733a4541be71405375d140ecb5d93
SHA183a18d7fb7e23c2ca5d266b00ae95c43e76bc70c
SHA2569dbee6a7fd5c374311d1c7a1dc41d5e1bb68290a58b3233160d5e08f7ec08038
SHA5122494cc1d1b9c0b644588dd2401221fa156e44ee2117b1562aad72e8b894af9796baa62b62d7b009088d329c09fbd44f5f7224f54f0ae484d893a967a61d4ec14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ac3280b8e73a74d3ee6ec6737fcef2c
SHA12396487ed1b14f033b490b6625511901c0f53d39
SHA256afa3dda1c3bcfbc69399f71717c224418509c0944253c4ac05b9c72126c98e91
SHA512fbcd13d70846a1afe45fe0dd70b924c6d16f33ba09889d91bd3d560335af5259e9046a20ada96ca9283c57762e52f1779c1dc58d9661dca3a6747c279eda1474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b683e089af47e0153d0381148549f97
SHA1e5b85123bde9775ac1adcb4c7d776fe15fd398a8
SHA25642baecc15ede0e76ab07b346bf7f84b3d3a83949b8243a83c55ab707fdf82ac0
SHA512821161c6d3bbcffcdc48a770c21b517b4a42198f94dd9e18ead8793d60ab63a58ae64a0ea8477d7a1ccdac006567a0d1d328c834c7a492b98d3750231b8ade29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c29b4a620db945ba7421f7dd2ac831
SHA19d16ded863397968302dce28c8f34f5f7ee60035
SHA256d97fd449b66ff481c431af3d51b5a39bc549173251e360a73a3447b1f2ae2ef4
SHA51251282c683d440e3708c2dc393a7fefb8afe70bbcd887f2b4750fbf29fa96d4a17e1ff38cd877c021b76ef999a9a75abf428928b56b99c42755fb4d64435fe8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56953e1dc0dacede221a7f6b23f4c9f04
SHA1172ba6166e20ac9fb875285b9336c51ea050a174
SHA256f1a666ab98133875e3a8c9b5ba846dada65c4b1a5de324709f0a60542e49252f
SHA5124262558e7edfdf85973dc75ab06a38ba63351307feaacc7a554a54d9bf905f39225aee0281894e5066faf58d314f7e905f51c1316b04ba2ebcedfae2d4fc8823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d32c0cedd9d7cbdf21c5722d48b0ef
SHA1c930aa2fb427b304ac07e0ece1306383ff226975
SHA2562ca9ce5e3bbfb78aa62186f764dee9e0019943755ca10e258a59bb4ce2639c8a
SHA51286030cc065ec2e20d344ff6de7209b21ab8400dabcdadbc916a0d1c11a833030d3b9e1ceb0ffce074eab08d5b0e4e7419a04a74ec32c0f65682fe32a02f23c38
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b