Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
9171c944883cface1850bb0fa95572a6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9171c944883cface1850bb0fa95572a6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9171c944883cface1850bb0fa95572a6_JaffaCakes118.html
-
Size
3KB
-
MD5
9171c944883cface1850bb0fa95572a6
-
SHA1
ec8187b992130597ef9da9a00ad6e3ef13d4e9db
-
SHA256
0a2ffcdb37ee37cb8e43962d4ba21b206d288610d1029fafe03c5a7e9ab4f63d
-
SHA512
26bd7978a51f4a7335c3e8ea794bcbd513cedc8a7b3919f5ac03ba51c71ed140c89b0c24b921483387d6b5c9e6dfd227f1f02d7fe00bb4658d63366677de73b2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001655638e1893e441a954439b38f7461800000000020000000000106600000001000020000000a39760a99b8c02afbc69558102b0102f3d349fda763e18c1bf239e7ebf13b194000000000e8000000002000020000000b79790e5666641889a668e65881b9864fac4971e032e0a06398c1486b34cfa0a200000006244d4cb336e69e924f56ebd95d92fe50e66f73c1e64ed9abef9934e560c6c97400000000266889391dbbd4013fda01fd60bc945c34ceb5628fe138aeb64d9b6a8c4f4baa401c78643870ead0fa64dcd3d2203e6f559a430c7ca1720cc95ab3bfd87d72b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a6979ca0b5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423572273" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7814671-2193-11EF-B0F4-569FD5A164C1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE 2024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2024 2992 iexplore.exe 28 PID 2992 wrote to memory of 2024 2992 iexplore.exe 28 PID 2992 wrote to memory of 2024 2992 iexplore.exe 28 PID 2992 wrote to memory of 2024 2992 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9171c944883cface1850bb0fa95572a6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f8403f3e775459b5906c572fd1552fb
SHA1b575eb76d8e3659773cc9f3fe69e50571c8789f6
SHA25645442e913157c4aa52011c62107e3aa60b06de026e6554b87095f44a32937cf1
SHA5120030e198c8e95d7d94fc2c26a62790b227b9798d4e7d48122aff9804e9fb57209f14a450b52a047ad08e35a1e2182d62acd39e13113cb2ecded74bb40c4ea4e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a0d3b8cd7fcc97929356dda230794dd
SHA122d441588c089ceb94f137f22b63512dd9434187
SHA2564f91a753a5c1b55ed0986f71f8a26755d8f84e831c49a88b6e1b02a9e6671d22
SHA512fc64c7df63c7a2d19c50980ac6e9412f429dda8c3321a08ac9c9be3c0c13fc0e0e26f0255defdf59b1f31722ce2b533741b4d358f9e230c8b2c90d989174dcd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e964dcd4963cf35dc0989b21e1aebf7d
SHA1b8394c6ffb192bf025aa31534ba84be860c4ad31
SHA2566e64cb13324c095f4556f830209407fbf45a0bfe20a5a93deb26697243b0d91c
SHA512228ccb4cde08436c733d84fc7198d06500ce4c1fbb3fffeb89ab985c09fa3383cd69782379d920442c32d62725fbc230081ce9676fed9a094c0a164a42e3300d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513824e0c5b9c898a75b835356ede0065
SHA162f42a92120d9905ed4a977ca2da86ebac2893df
SHA256345441c9c5c32d0a23e167b285ccb6d29ed51f7a8f8b8a2bb80e233c7800a42c
SHA51267203ae238f1b1c4e353ad59c2d3151fd3d61c526f6faa0bf5f34e494438a90c405571e8231c7165397d22c7e4cdd92ad360229e5b191f2a39fbc58e30b67103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f3c880b311b7c343434a5a1b73309e
SHA16b60d4000781c5dae0f3bd0dc081d72656193aae
SHA256cc08b3bfffb19589cda83f83335efb4769358c8661ad10deb6fe1c64429e5812
SHA512afd39064fc417356b714fa5b18f3f0c4835c4bf73c14812296987a95fe2bdd3d5e4ac93456cad98cf583bc82124f19e71a1d858121ce778b77fd40ed2de5b754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54447a8904d83cc29cdaca64fa388b9ed
SHA1ff308203790a1a0123e60509b7863ae16bbb841a
SHA256cd3b5685946589cec1d1c17fd4e489ef097b623c45cbe403fa60118707ad6794
SHA5123116d1880e7daca45b815b0d6601875ff09fc5e6f6dd0978d1d9c2cfd4b54eb97969e602876e665ba650b717eae894a2e3eb7979ba81a1fa2f02d7324c76b53c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2c8bcf30f83842e509be005dad1cfe
SHA118949d47b7fd2bf2d51ea8d3ebaa774c949ac562
SHA256dfe15ad086d71d32e71799970699e0fa04f23a814cf112b875f4adb7da6888c5
SHA512b32545d743c3161e87e3a55be910d464ffaa1e0df7f7bf490c20641c6c667bf87086268b7feb60aff9621be32d5378b57dbd519d49458d9c9d0a5603179f9483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505443e8cd9ed8c482534def69c75931a
SHA1844e7a6d6b0f6b1bc36e30a29be5a0547bae2559
SHA2564df5e349a19265e7fe6e0ce0397d1036bed7c78d11653e43b3288913f3773506
SHA5129e8f922c3d6a2c601202b0ac0a03da0dfbed19514d28e0471a63fe3a6ca3ad31864d62e7d4fbc0de625f8275c58e5bce21ad375f1f41b23673f99964bc3b99bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a84903a39c762b3cb539bbd61c3575c4
SHA1be2949dad739af7b6a3ddf8fa3ae65f100ca90be
SHA256d05cf9ac85391c2292d05e93ebdaaa6e64ca5303352f5b656a89ae8616001093
SHA5126795e0155a1cb58244d6b6884911de766789fa5192686f527f256ac979c90130c7a1e55f3bb83ac7ddbba72e781177a4437791f5b623b7d5e1673e63ec0786a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50957e877c7b4832d8a293fb51c843812
SHA1f02cc8c8c6fc97dd38f6deb340bc0dc60b062af7
SHA256cf58e6eec682aeefe992323030fe88f9f6706b03b5f5f60584a64ab17a94fdbc
SHA5125f95072ca94f092ab2a42a431030a707c0ca88121f4171c0e4b13b1afac5eb47afb43e4013cf5c5e69255f9c767313c330946ce17e04f06407ac4b1ecb2a5fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509df1c0e272fece8d07a32c15f61bfee
SHA1eb47eccdeb9fcd6da7346cc50c9d09650717c015
SHA25627760375ea279069b66773170993d592d59aebd60a0a3ed393fbd9078a679f1e
SHA51212f374ebb05c18f85b1772484c2d79f9e632a4c89bda1b3173fa5efbae891f02e7d890673b582965141fd50f8553ee5807405b92e3117c3199a3ba63c4f74a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565735dcf79c8e7f045c1ed7ba16debb9
SHA1764f54fa5141bfc31283f0a0f8a9a38c46719eb2
SHA25654d67aec2feabe6d56210f512c0a4df8cf229c69ae077788dff4432bd70c10aa
SHA512d6f2f504fa68751aef603cbb7ba59ebcdcbb8ff0536d84a1cf9a0c009e56a0031f45604d7c55e26c304c85570da831cb4d5aa719501820868b978333970e4db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58695205f81d1dc8c4888e02f81591eaf
SHA1fb14c9af4446d72461b3998c954c0bca0f68900c
SHA2567354595591af6d4fd2883b1028bd60fbdfe386b11625313b1ced26b1f48b7847
SHA512214d0649d38f116bc6882bc95b7518555c392dbd55ce2e99b97e22609be55ad75df21de7a77dd1ea3a0c00f7cdffd0298eda192ff58a518cbf8c33799c2a4d91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4830e9cc0367fdb90ccd7d5dafb3b68
SHA16855073d978470027465d0ed544fd674ca1ebe6e
SHA2561d1241a872eeb37f3b205f82850f3b05b3461d2747f20e2d0e3762d495262a69
SHA51202892c2eebbcb61209a98fbe1af9ea575539247020aafa44cfa99ab29d3c93f20cd09b66c0c5fb0365ef081c4b9c07057c7b2a7a517547438a367ee296a21733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf58f998c386770440d778a38f02a75
SHA1d8b04b0a8995bacde92ae38f037b688c72496206
SHA256bbb6891f13b4bcc489d0a8bc21dfb45fff7f6f5c79e83c0e7d30b2a45649bdf6
SHA5127379527f203ff45646c1b30d6c1dc23430b5bfad549508079119a4852c2135c00c9a79754fb9d8d9b9093cd24496589bbab88527b158e29ad1d2c49ce156374a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac3dabfe9af12d09652a4bbde46d989c
SHA111b3ba4a5f213d0912a17ea6f430200379a6176d
SHA25618a690af1f8df8680644aa72efba480157800a85964d2f9077fb6df84607c256
SHA512d6590add80efeedf46196201d7f31673178177e0bc6dc6cce6435e1a09526184f2cb9e9dc469cf2b475c3d49c90fc7f082cacc76873753b3e49115ebd23d9809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712bbbf5f3f01e55378bf2a780373f43
SHA1557053b98cd38227d07364ee28bbe9994feb594c
SHA256b925480bf000afdd40d6b50290e1dec9458d54f541da25fc1e87329565fb690d
SHA512bade0e2a27c2af17b3363d22b5e361329f37554c18f57c8d4f7140bedd2251a4e8890f2e33b9c5245195f20da4dcf709c58b8c872e2aedc5f6435fe019e261d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b11d0e19c54276b3de83e519d6b7b859
SHA1ca7ddc0f40e32b29c13a2c4b5fd79d8844242e0d
SHA256cc448e75bda3b1ec504be7ee68b6068464453b0f6fe66e69b094017a5334db9a
SHA5129b6a6577e7b08e194826934faebb738305c554269fec83a7cf3989d2bacfd86c4359cdc452d187713045db4ab2ae2cef047e95c0e829c29cf40abda5e689c7b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d421190db438b99af47ee17926a7b09b
SHA10e454d21ac10f65f788ae51a2dddf38db3c9e7d5
SHA25613183f36b7ee523cd0c564a4a99b781eaca30b29dfd66e1c83850367a7059d2c
SHA512824f60a9da242098ea59ce79374d5b7bb120b76f80d6333c747b6bc6673f0a66373331165ffd4dc8a47a632f431fd2f9aa8a51713b96c4592ed0cec735ffe4aa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b