Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 11:19
Static task
static1
Behavioral task
behavioral1
Sample
9197ac1b48b192b4fd329aa9059cd8bf_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9197ac1b48b192b4fd329aa9059cd8bf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9197ac1b48b192b4fd329aa9059cd8bf_JaffaCakes118.html
-
Size
3KB
-
MD5
9197ac1b48b192b4fd329aa9059cd8bf
-
SHA1
d4f23e5fedd0f463c0867541bac9b2bac0b6cf06
-
SHA256
b8708d73cdc6ae11eebc3edf76d85cfe00abacd51d48815e65132c87fa14c139
-
SHA512
136f84d9898ec33c2ddd879fe404cce9981fdbf7dc54b8b47643f91b2e1a5e3690a7ed03756f2aba0c7260b62208cab3275e6701684b59ba1d3d9e459b55559a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C963E11-219B-11EF-AF73-469E18234AA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423575450" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d8a6a48bfe16674ca9ea9cc8f2ec7436000000000200000000001066000000010000200000008bc3b85db066d32b69758032dd1c1b5e762e0797762874c8d43d19351f42afca000000000e800000000200002000000064ed9373c2e674bb5aeaf6a32cdf858c6853312722fbd5358f07e757ecd86d8a200000003066f93c28e3c92d8e82e6da4ab0c1bc35167f46f8b6b2ff2665ae325a7a7d47400000001193ccf437acff4d492d6925e0998a4e93825c2210a520ee3d8bf54502fc51fe7e2547be769d1883529dbc7eec1374f05a9caa89c920e5b5fdab76af19a02cb1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00b74e01a8b5da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2200 2740 iexplore.exe 28 PID 2740 wrote to memory of 2200 2740 iexplore.exe 28 PID 2740 wrote to memory of 2200 2740 iexplore.exe 28 PID 2740 wrote to memory of 2200 2740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9197ac1b48b192b4fd329aa9059cd8bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfb219c9a309d78205217539567aa564
SHA1e594e86c3cc051ea02e5d61c74c2263da3ae698a
SHA2565ed82cd7410a6ae9ccf45c06451a9817d4624795c0fd83a699e7d7a24b3657b9
SHA51278985d8e6d40e6945e48aecee6810b7d2cb3497efd11801c7939491857259c8d8f2b123cd748cffabc3b41696a6a78613216978bf7f07cc33329a374a722ebca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e59f2fc847648f0812183a09e56f338
SHA1cbe5a1cb8594a73c0645bf4b78e163ce103f768e
SHA256870197e43689408e07d32bb31837c04378b47f82145848d0a186074c1a976877
SHA512c64a7f6068ca6259e84348dbb2e1e04e36b40d9815c9b519be29a9e8d96026c2e654e1de8b6cec25cd5112a26fd7ed7accfc8409ff7939b24601915725def282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5050ad756b0e394d5e5170dec8e8355d1
SHA1100445eceda17d39b19796eec0137f8acad076ed
SHA25611b7f100ae40cb95b150c3ffa8ea9570644e4f30ce135754482a77f7f7452913
SHA5124a98e781314d3cb30e44dc5801d00d12a18fc65d973932ad6f32aaf2bbb05a7bd41a144c2be2e5be45a8bcd9e24baa96aae80ca7682064e17ce2f7b34e658479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501fd2bb7919737e628ddb2833de2fa21
SHA1ed8c61e2b0ad0ed93c6be88e0bdb4a6f3ae2c504
SHA2564e93e7dd9b383290029074f2667fc1c9f4ded274141f2b129af1e40aee551596
SHA5127bb97b7678afddd368e593d1d4064b845110bf76b38fd31f444bf5e3c39d909d25f5ad2965fee82d4aa222f67d16c324cfc4513ee2144ae2284553c04803043b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b864a69daee4eeab53d332e06b0403b
SHA141b68fab4b9509abb7359cdd70be2c24c2108076
SHA25624d5ffef69aeee254abce9e7b1b9a523dbf6dbbbeed3437f52f625bb2283063c
SHA5124443dfab2cd4b1a5f37df2a1f1d9a0ab838621d1b2edbe9d6bdab9c5056d618d3ee65f8e26b466edb4989f7114ddb9dcf7c700acf399b85f4d42e72fa65a7b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5235a0adfaf0bb3260e8f0815303bb968
SHA19d3349873eebf8f6ef6b8e8ea1aa5dc0efc98364
SHA2567b1f9c2051e1d7707cdd049ccd4d3c1851a75356fd3a2e1f3907b05333cc28d5
SHA5123e5b5bc9cdd7669991fbd973cce2a994d26421486e80c23a6e9a90fa8a320b35a4bcb5e3cb66f4eb509a8819a1a686bf6528277296decdaf5aa4c72196c608fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531d15f19ebf6bf47a7d576f31f2f9b6d
SHA1c21dfa26c80b0a50e75276903976da50a7be8146
SHA25699fe3ed4649af8180e5305f46bd6a0752adb4f4dabbaa5302e34ffc3eb8ab176
SHA512a5c69efc285ce99da892579c4a9549f11d5b8620c4240c290540e69958384c7f3aed08dc5941b89616cdfa94b86a9af1e63d690ef0024c985e24a3099b2e2460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce2402e1796de0b55e2ec1b494710f0f
SHA19e56f4d0eedb3d721be2e57fb8c666ee4e7253f6
SHA256a960461b7e9b1f13c84eedb2abdeda27e5276cb0ef48208e642469e5ede54e3f
SHA512936b42f8f4d44694ff3cd0dfca71315051e8303540655b3f138a96a1d9078e6f26cea0d5f7b1d2f327d7d4146136a48e38ce93d9ab886254bbad8e9c4e063908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527d1cf238edf656a3a802a9b1405d172
SHA1b957601e16dec86c55973716d492d541791682ad
SHA25603ac58ef94b62243ec58f985d0cbde6a1f92076d32b8962a4fa465ca2b4749cc
SHA5124cd6ef4005ead3232491a9d232bdc3a6aedaa5ae4b19d819230dabba1d72f1d1d993c4d8a251d8ae14cc88e8184517aaff848f610c1a051928669f49b24a5433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596c5345b05114cc33199ea2880059b82
SHA12591df8a9d7eec6747613e5fccd32080cf254abf
SHA2564c84a050aa67b1b0c1f261172d55abd2c57474f0a0f2994511570ddb7a0e6361
SHA512d2d8bf7048fe1b2bd991ce295cf69d1e491671647792f39f0d600c12eaaac8df2e7a3ed30a147c32c8bb637810648704f7b987a07749a982f49ee4ce802241c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594bca1dff678a3ecfa83088b884f150a
SHA1ccf90affb59ed88121844555a9797e77cd070c73
SHA25685936f654855549d61f5a33bab273c6cd0ec51ce086c35f1cf304c76602a5466
SHA5125ade55abbfabac18b4455e48ff38aa19e1d13e1dc0cb5b0d2965c610061871008c048bf5a12c648e023b13bcef4f1bba3817fa45879e4c224c4cf34755e86fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048cfbc666bdcb0d462fde80c33b03ea
SHA1097eb9da50798e66e3d6bf3fda27add9dc00e418
SHA256bf26e9925b13108292ae61c7bf0f26bb0da2c1aae4913b593ae2b34eb1beddb9
SHA5122efe2c65ce4f07b659e9690fc8cda80da6c3ca32fbcba59e50c1f6b6064af6c6d4e65e028664e6d45ef5e4b68bf6618fb969d727ef678fb89af53a84e7255bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2260e81436884bcc23e3806bbf1e024
SHA1bae83383f6a4c836dc5876b117486ff7313de1f6
SHA256a529b58dcd657fee43147a427f39de12660e1af9171cd9a201a7a50fcc31d340
SHA512792fee191d645a092ee9a03dbd4960496a80fd1b5e17bd0389dfbd5ae5d44a08f30d6c474ef7c3507bcb980fb8ff592d64be07515069f9cfd666f17243ba1695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a718a131bef69abdeb4d5b235bc015
SHA10dd83f1d559431ae991117ed61b42cd1c12d286d
SHA2567e21543c8a0c93cae83ec9277d86bf43bfe4661c9635f9fe32d5fe12a290cc4e
SHA51285d567abcc63361d49371af1ae086c1984e7dc191035ce771ef6612c32e827c61bbde435cac3bdfbb68f492f14b99555901fd53e45a1bdaac87267c1b6b5a85f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2cee35cc424019fa7d58849235f171c
SHA1c9d45a1f75a6df5ecbdebb1b4523b136e71a2756
SHA2562aee72ee7a5b5ad286cbfde0cfc6737e95ca45034f29b20219cdab4a7333c6da
SHA5121237e9471735186725f96f60ad3f298b1a26804574a7c417625c4deff873bc275bda785f38198d56d523bb5e918714f85eae4772dafba3ea97482c0eabf18b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581dc57a3306a934668e32336427a6a7d
SHA1c31e88bde3a1cf70a193ce0fd7a1d4cfb7296286
SHA2564dcbba193cc68dd9027574ffe0ed3119b4ee9b560991264ac60b5ebd3d08fb5f
SHA512511f7722e3f1c305fc55532bceade28cd7b1ba0128317263828b8a1c21d7d04fa5b75077f92c4ae47323458610c092e51f973e24310953bdadb2a2bad5919db6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b55207f7455043eaf693642f455f6432
SHA11867e671f630d44bbb9139fedfce8ee47bf4ce07
SHA256686d40f4e2537745c53d8841fd316260d099bb3d29c0a7525328975dad1aef13
SHA51221560f1c6a18183aa71294ab332a923d9349f40e236980719698503677e2c99e75a7e262a2fef77c3cb051e85595f98d0b5f5e143055fc1b5a300d3ec3b73442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf98bf0976fd980222440d82bd0449f5
SHA1e2dc82586cdc19036792ae75c2c914928105f7f0
SHA256e435b26086c2d69f272745bc074aa55f15d7baa39431500716d208ce0f5cdaff
SHA512cdec9cb773590655876c574ab5d6e67af376cde59580a089fd144ec2c91d26a0947a3c1dcda6d8bdb289b21c5953000edb8e8d28a096d12df750afcceadc3038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4b1fd0d1a94c44410bb73bd4e1f61e3
SHA1548f1c660bc3e7707e83ba09cdf114d4eb7acd28
SHA256fb13d6855475796c874df1044fdc91acc1ddff929e0cac457c4aba8d2574ceee
SHA5121cb3888d62db293fa4f304aa38f7d322046f6601387be38f9bb023762dc23c49a0295e72a959e4a4783e72de90160cd59596a15df7b3185c79d11012931681b0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b