Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
912d51fa88c536a85d6ac8317e5b1df5_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
912d51fa88c536a85d6ac8317e5b1df5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
912d51fa88c536a85d6ac8317e5b1df5_JaffaCakes118.html
-
Size
448B
-
MD5
912d51fa88c536a85d6ac8317e5b1df5
-
SHA1
6490a99723822b0c6830cd98b37351b65e86696f
-
SHA256
5707079d1895ce1ec92b5982bf2ca4a531e55318cdb2e470ed915d85262ac3fe
-
SHA512
c18aa8b3f1a4cb4bce3bf4e35a33d486e5c4f05e08e1626f809123a1139b39ae0e91c0345cfcdaece08b6b817d5089e08e94afd1fec728633c175b63875112bf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000427358206c9570468926d5463360f20b0000000002000000000010660000000100002000000021b31492a148ad72cd2b08100aeaeaea15ad87e76c49c1f09d0db91b24b3293d000000000e80000000020000200000003652feb0689d89bd8d2d335eb3851224a8b40202ceb5175de561b418bb3cd30e2000000022b782772ed6370b2c88cd52826b6b54d72cfb3a25db35f47ae275ec06700f7c400000003f1191c20f0ff394663825d143b4566c73059d32eeee2dd94565ba97699d71f88c31eb3d20cee2432576d1cbf871f63d73f6156523c40fbc66f37c96b1938825 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A6F4BF1-2186-11EF-9680-DA96D1126947} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c501ed92b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423566427" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2520 2872 iexplore.exe 28 PID 2872 wrote to memory of 2520 2872 iexplore.exe 28 PID 2872 wrote to memory of 2520 2872 iexplore.exe 28 PID 2872 wrote to memory of 2520 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\912d51fa88c536a85d6ac8317e5b1df5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfc1e0ee9a5bc9a4b56d7d23b222905
SHA1636dabac5bef6fe8c57e15182c9f1b2fc27fb0be
SHA256ff1f3c4a2d14ab2b0868a2dff6a3261d6d26544c7fb9bca80154c859fddc0662
SHA5125fbada1a49e5f429e42c7b4b9e6bdba7d7a3f3d4ab9664186051796613e82454b91ae1522e0668a4b5e533b02e1a23062f5323dfcb3c9a0b105cbe156a38e20a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50694549772807ade1e90a2adf25c4787
SHA190bc272f33410a9dd8c499ced6f3bd46a64a5f43
SHA256d131c6ddcb43797d3cf7ae2b5f2f752dd4cda55d2d8e5f28b251ebc243d8b85d
SHA51205c4ed7b1c7b6045cf75971289293bd0643b3097acc6d2cccbf3191ff08189a022b4dd02bb5aa88715560e510169a57b8a11d4c4c7ea65b99e904a1f3e0511f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c57893a6c724a78331c7f25c90577a
SHA1f3c4b9c2c831851069a0e2dd61a7c5c2cb83a797
SHA256f84fac7c306872ca2255a7b79ca94567e8808c5cf825369f521e23bfc949c649
SHA512c7707e36002b74b004c9a061b15b5cd4187c5f37c73d0da5ca60fb88fad0de4763329373910629417345deeb5ae5ad6d836689542308273f6c5a30bf542af3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351ce998a8e3ecc235082ee82fe0d593
SHA1455dddc30a989b6f465aab6ced4c47f49e42fb59
SHA256eac1c3ce3fd17f295bb3e739f0b9c0f1635cf456695520a385c293e254f678c0
SHA512ad1c462767944faa07374c095032dd231f467519f43291a18dec1b3c2764c70cca943911011fd598a7515906647328cde66bf52c816f0e0888cf9626578988d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514726ef2386915c146eef6779805071d
SHA1e34d97c14b85b20efb7c63e026ca79ffd9f1ef19
SHA256166bca34b93bfa3963a8ff2e74a1af99a2c5134f254f457d071e02fb4385d3a2
SHA512d8162c02c0e4cc5b2ea5a0d1370f2d7cbc45d9ad483023fd7eea2aa7ff0c9a43796ffe350619fcd6b1aa74b5103468bd7c6c948dc44c4fb067e637660249d59b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d326eacc0dc4382438e50525fa6c1a3
SHA11f9d09f267cb5016caa5804453934974442d3a09
SHA256b221c8aba30fdc0186084db7cc90e53157edebef62759c0d95fffc594d6899fb
SHA512c7da92ffbe2f257bd013f231acd9d8d6e3e351606babf0358c8c4b930016257ef64ed4d08300012997c94cbcf9a040d17f5a642f0fc5d5cc158bfa5a32c0113c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74e1e7b58f6191707cd8e26279da434
SHA121370cc2d2c7c578cf38a5c3d58b4ef0239d4181
SHA25687b39b1f0781046ec6b52ef870af58e288b27249116995b0a7fe5b9edeae27f8
SHA512dc440ff145d9d5c2aee12c09a27ebfe4719c9ef5f16cf7167d01f743561a6b92ccab93b344b8186a854de56284d3140d65d2e2854446367f9d0f928de0ed246c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3b06588113c75276e0bd0e70fad4a11
SHA131709736f27f8bad65ea12ab90516aec08b41e41
SHA256789618bcfd8d5dc381c6c9159a1ecb1c35ad79d36e2ab3650c0ee1cfb9ab457e
SHA5126834c1b2837950022906627f351188192f1f1f91c721cf528c15a2b3e4ccd4d1954e342421b89c9cc57d32e466605c17b83be1e0a96897cb86b25d8ef821d918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a39b386337d329f26aba5d4315fd63cf
SHA1e9bf5971fc9f42945f18e63dd06de9308e415dba
SHA25678bb788174a6acb6c81ddf59287b110f18ed2e656fa30196af479b4b09e1e055
SHA512690eecf816f1e7bbc70370fac4067529c6587b763e4a8cfdd8add7d247cf4f9e3db0bad7ef8b7904a8e6874b4a9fe827e954a9f3023e5f29529423625ead0767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a759d144c39db1418883dea9eb924cda
SHA1db202b694ac5e480ebae0c4c03830b321d1583a7
SHA256db5c39d168339022360645e9f0ac2d1cae8cd27fed94df3223d8898855cdd18f
SHA512f5ea6dd8d291b00456fa4434a8c18c429e4be9d8f108e638eb6c1051e6330d1172789ed17f9cf1a19cd563d98d05d1dbb3b29e236f65eae14d2a2e205ee27641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5005eee876fa79884381a4054b6be0655
SHA146a9e8bd58f491239e09de36a6bf32382bd57a5b
SHA256b1c34a79a249a1429a258dac0f1cd4b8b336185fcc0f9331da287a6567518119
SHA512ef0923ec9c2e287daf551cb295d3de399d551bd27f56fcb476a49dad3383046c93da91e33ab35558cfcf9c464d39a456c0db0b526acd88e94e009ca32eb7ec37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588dc0c9fb5d7ec7a1abbbdc05c310932
SHA1144d5ad31d99ecae8a9cd25806c70959be18cba9
SHA2567b19ebce4f98b2c92efea6f9c7b84a2fc95a9de6f81295a9c8fcced51a8a5b59
SHA5122ea73bb38eafe64db4f331bd161197149cf65e58259d39fe9ce41dcb50bd2ba3e998d9b9db4e0b001d2e6abeefba9733174b111da79b9f4fe9bb5e7ac605c79f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa08f3175d70ef0adf3a1c0b608c6d6
SHA13715f6187de8bb2e45e19872f87022d81f1332f9
SHA256b355edd8959e8b11e155b3f60d069ce3cfc4873a504f11eb6ebd3917a7dd09d5
SHA5120e30cdc245c5569b20ce75edacb087bee587eaf0079b8573bf58e16320282e43bda86c080f792a3ab7e6f375fc3f46213fa9e33cc664c407a41e63b23029d159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564803235efd3e220a67adb45cc70a9bb
SHA1ae1a5b06bfe270988b91b631435eaab9ca687b98
SHA2569cc71ee38b2dd0a57f3c17affadeae8a472190016c845bfd759cd3b8c370d06c
SHA51239a3e90558714fb2d70cd30c4f86a0440032d125c34b855477f7c83237c7270977bc8bdd7b3fc5a7a8cca415cc91bf8143b95754cdba1c3e7d44ecc49266f51f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576faa03f2f09af5d06844706310962d1
SHA120c5cad1129f51eeb24d9c9cdd639efffee7354b
SHA2562074843ce1efcb1341546b5b60f4458500ffde0e00f57632606ef15c7134cae0
SHA51291ddc9a28b537c1570d5e6fd206d281429fa45d5802d538abffa412217f908d06febd604ccb4f209cef8d661b1b49fc15d8e0e0c6523ed5f3203bce8c8de2aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cf6cd8d59f94b95ada711cace564ff5
SHA1933fb7c3554b7acdf145d200e051b26fb3cfda00
SHA25672584d3b8da50ebb1f12564695b48b805ff86b59b547ddc3115b788eee553476
SHA512bc864b3383be5724da77388425ca97caf115f9f3f4b19a4b1493b3f52445f1fa218e677a0b6cad51bf17e2c474630b219fe90e5b7869cb1f1b30a74578ec7b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cdb0498f505df1699dce877bf96356f
SHA1515845dec79a99c143e6bd1aae3e49d19d09c525
SHA256d286900c82aef357219b1434968b700baa873355967edeff499558c384a28b77
SHA5128744ad24df89e98796aa0d2ff25fb4a88df8f05c7208cdc91a9e641472c7d879bd9260b80b73e91f10390ed784bd80effe17b6f62b060d219a1a153f83e13c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad803d44268c38b5cdeb07c23217907
SHA19ef976e29961551298980f96db16dd228131c6e1
SHA256ae0bf63cdb5b022a5fa19cd8131c798ff03a500e24b50703771a7013e32bd6d3
SHA512a904c4ff156afdbf239ff33ad72a1e1a8b54c00ed4a8ce1f783869a2bbdb16fdb908f0e69bd821b735685455914aa5d72638e7699010c2b71a9b9e4709f4c896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521b18621ee0a155c6efb23f36078f804
SHA15e6174ffd424ae1adda391135082c09e433463b4
SHA256235be5b7720b7f1f2fd1df6e546e50ee4208bf5a4517501a6dd949da9abc185c
SHA512ab8e897ba5f675b2d8db8eff59d58f8c7ff19d451194b9196484dc73e9ceca859f9bc75373587c88dc723c9262ed0d6745e6bb2f882bc4257401de70d370b6d6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b