Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
947086c7dd922913beb19006d9ab5417_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
947086c7dd922913beb19006d9ab5417_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
947086c7dd922913beb19006d9ab5417_JaffaCakes118.html
-
Size
814B
-
MD5
947086c7dd922913beb19006d9ab5417
-
SHA1
104cd4e2f63db1775ae05b579a1c14e66931c845
-
SHA256
feed57ce3e820805c2a517c1e1c8d84598483a4aaab812ad178617bb3b41abfb
-
SHA512
1607dcfb45883025bb122dcf66c602eaa0aef94e72b33a15cf5e50ae36ec14779c1207b909a2d125ccaf995358f15dbc646bd00b81116982470a49ab62e7beb4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5FE93231-225A-11EF-88AC-F2AB90EC9A26} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000006a0cbce72a2c7aa820f51270770379e764ac70413a016828509c1102171e758d000000000e8000000002000020000000148604a59c4d68b568a5fdfe344dd9d23493126824eb66188d236384f81d03c4200000008b64cbf850b35735b2892778bd89c49faa447bde5cb8fc810c7fdcfa866d03ed4000000050d75978f0f9da352a0a0ebab7c53c20b14af63d5e29fe3a4060c3504b172db95aacc36061ec849658ce8166b7353725ed8a03826c7cae37cdeb58a146d91249 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40b9823467b6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423657570" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2424 2256 iexplore.exe 28 PID 2256 wrote to memory of 2424 2256 iexplore.exe 28 PID 2256 wrote to memory of 2424 2256 iexplore.exe 28 PID 2256 wrote to memory of 2424 2256 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\947086c7dd922913beb19006d9ab5417_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548e1ed604fb269a83cdb8d1547ad1242
SHA1a5beec23396ac861d3876b238c4817234fb3d439
SHA256334aa1addd0b01124e956eea362f82ad1410ded157f8b8b0cbb6cc356e82c2aa
SHA512618415bbec804a3829cdaa922e861867261206dd714cb9f64ff8c42e9f7aa4fae377536ab9af701cecbc8a76212c33aedffd4f2e07270eb03434c38f5ffb4988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ce2961ff2d4cd8d0061d186c5e4f99
SHA1850f8769910909e94f881c6ea63e825f8a182f0e
SHA2563baa079184350d066b0e1fe3c9a26141aac7b711a55ca69b58b9aa469095103a
SHA5125d0e60d89f536a1e342d85acbb1dc5866cfbc81f6049bc33704f62b907ce6f5cac8f59d4b6e2b5c165ecf70781328d2ec59a82196fe34964eec8cfeda954fcdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ece8466bbcd900170fedb9fdf70291f
SHA1599f5c49ef1c15194a4fe7eddac9251a86bef5b0
SHA256b32963740457de31131b40209efca5de71db7dbbc125e6d0fabc4b69d0f7153c
SHA5126fbc82b60770d417dd019f938e11a16bf999dee89b2b5431ebb6cea75a6d201490e5f882eb6fb2d67b83f7f08e14355c38d5f4931abc9e087f7d85476d106b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a533d74ba006884f42098c186c32d59a
SHA1274614b7fe6f689be999ff13552f569e2a47c14b
SHA256543e964448ea4045aa16b5a07045780f6ad97b192f91e7fa17d13c686aa1e2ab
SHA51232e55dd19c2a88abdbeb8424fe4288f7e03c53dd7dee86b184d2042614c8536f5be1fb072b4db4e2686d92d010191baf1bf705cff5a0643d0bbca93f2008a279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54041147d4a92b146746bb3a3482f568f
SHA10747c223398af309a9c4063232e17c15f22b5db4
SHA256e5b321487bad8a9bfcaf15e3576d8fdd44dcbf4bc6355d17e3a975503c95a900
SHA512e084a37435f5ef217be65a410eb664bcc799ebca500385c534ae21fbb4847ff6de74a75cc190e60731bec6b2b5c658319c6bed905285fd662f373a5402c900c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9f8a9da6ec0f0abcde69cdc9dbb01bd
SHA1459c45cc33c8b18b3ab73973d4dd7f7e9ad8b3eb
SHA256f4260a64186d2ccf41f56a2443a03d6a7d1c8ead021eb8556940020e1a3e48ef
SHA5123c3e204628630dedfabb38cdd4ec205b2250ff0fb19ea0a948cc79ca742f78a2bc091c81bde6cba91e4dbbd89d352d1b155f774aabe60bebde97ed3111c93501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554481dc6e860f7bc06ad50f7827cb274
SHA174c83a90ade2f8c1ed256e975549e2591a48d067
SHA256bea413cf49204f4ae0d95b22cf2eead76509c86a0a9e214bfffb3055e99c5060
SHA512b9bb1a5a27fa48e97ab530f641e793532150e4139c6725822bc2c6c156e0da21fc9fddfb21d20d59e9e814832ad441bf7c5116f2c7e1c54cdcda68ab6127353f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d22c729e113bb481882f0133dd099720
SHA14d6c2fe842df6feefd9ee4fe1ce9943e709649b1
SHA256485f2d16ef6ecbf4441130d2082cd05b91765eda7cd803064b4de2b0e4323875
SHA5126973dee7d86560307e062f7bf92cf25d0a00c59ca3784007c47d50c2e33df4a3fecf668cc0580ec64615e040f8d2bbe37213990f27a4cba5248e476ebd1c0f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551edaa198b0fd9270754b121dd3e95ad
SHA120b1f8eda766c2ab05bfc93381b8b80fb50977a6
SHA256d7c5458cd9fae09e639be5bbf90c6cd79a4e01d0c72e6193d5b00d162e27a27b
SHA512846246ebcbc79968bd30ae012174fc864116abe75ae132d8be745f2a41ef4619f854f46c8059b701d21547ce5e5e455b99e1ff2ccc1d52d478cd471129685c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b26bd5dd3d93fd92869592df585c951f
SHA16fb8139ff93db4e0669c7af9ec26cb82f973fc53
SHA256a690d8c7285c67dff821050c6344c9116e7f7d4bc34dfbab822501d5405494ed
SHA512803ad1099cd0f9252bedcff6c7c5dd6ea3fc88ad71f002f7129d091b62e91cbb3a9ce5fd00b632898fac230dd97e61d448a95dec0fb565021e672f2d5f52bc0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581360d3f8d81e0a26f622b03aa0c8324
SHA1b048eba4d8256568468bfe626b3e927d51c819f6
SHA256fb680d553716fbfd2db35e6e14c9827b27b589b5f274ded619ad9ecb60fa63d4
SHA5122718745330d9e1c01306cb1866cdbdfbf60fb4a1a708a82c7bb85d6334feca6ae33face771a114ef414915386ca28e0106c92bf48524075a05572253be51d536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d160c144833d268ec869152a0b79f5
SHA1222fe58ef8347e0697fdffbad2f930cc3d825e88
SHA2562ad36796e751f25b6ededaa62fd6829ad9be3a61b315d28b2ccc615ccdad2d1d
SHA51244ce552eae23614008625e66ffbc246870b5e24f0721687883f7d5f8eba9437336d439bbf4be2e481685e6ca1023166d47f733f384ee8311da2ab8daec3a819e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ab43734f48a4c9d8b6d99893c1cf25
SHA15cc30598b52e7044c9e44da1911932949df60eb5
SHA25685dc8ad7830d1750f97cf25b8307e264255e5dbf468cb96eed90a83ee586e63a
SHA5127ddc353fb259c300c1324c35742d401a257ee32344cd32c569ab62cc4dcb2f44527a1e15ab81116ceae64fea73b8db855ebb47733252fe7ff293c2bbe0785331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427ca937e31e8db1dc4909a852e54ef5
SHA158407aa68a712603647e9d257a17a0dabe677ebc
SHA2565af78dffe291e1286c58fb8f0e59eaf28ce15291220bd7290deb802b4c2ebf75
SHA5121f94cb41fe570e9d2e0a77852ff1330a6a2550539197568f1ba5db6721754ac4904374bb8a4ae4785591f59a6886785bfaaec55dbfe94217571417e236ba190e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530a01ab37c35ca0a81fe9f2eeb3437bf
SHA1ebaa48c5197fe1321a6d3bb0fc838ee70135ebf7
SHA256a179f092f88d095fe9073599897e428b0966032b3306c1eceec72429d39b3c1f
SHA512dcc3db7eadd13292919e9e9607bee92cf5b688580ea9603b33b6e36138e2b20b10c8e67ad3dffc48c767022c9b8a0a13fa751fb7d90d8cb7a2acb7c7659d0723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d330f151953b79416173a9ebb13c74b
SHA139bdd493db1781ac7a001b1452e647279ef14596
SHA256d0c09cc2d045e1c3eea7a67e877ac141e5ccb9bda28aa03f13b5e926d544dbeb
SHA512c3ab543bb286770f42ab1fa6691a95ed38fa17131547a469b6e5e6a58d072948a6f50effcf21900b60701970bacc01bb3bedf6c0a14a5f60202d54db28254e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee9df770b32d33154775ecbc7d7cb458
SHA1a2a569e49523129bcb9dbc34cfbf9f30425e1ed9
SHA256f876023b1f515e613ddbb70521bd7d07f309bc4e3024ffd7e700a06008185847
SHA512667916d98a3c6dfd29344f30622e24c029437e0597fc80d1a6db8b012c89aaf96402b8a03beae947df265d66523b518ff5d423e096698b8095668b0fe5071921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257087f90dc7d17e9cf81122baa8d35e
SHA17fdb40644e66d64b1c4f3edfcadbf700abdd0439
SHA256a9b366ca8efc0b9d6e4b93ddb39b27b7216028e4584cfc0e7f710232cf589582
SHA5121225535e13f62d2d7d63c8f8331e4cf1ab33bf6a0bc0595e6ef103c29b9e7aecb94d5234d8bf5c2b0cfebaef9aed7d109d4bf4de69fcaa1bf8d24cd0ed8ba6fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532984bd7f6c6d200f5ec3b19704ac271
SHA177c9ac1eb0671368abd50d4953c37fa00f092773
SHA25646324c6971cd1a8f8cc2c96f9bf2e4e39dca4220d19ccbf530ebad44a5549bb6
SHA512b71da63a1b92f6cce9acaef31ae24a529213e2b54689b823a8e28e9eb9e48d94685e2be8abec37fc7b8d0d7ffc7a2582ad63559487f67d94f272e698533a443b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831dcfc88d62b13fe3a2051684c9c873
SHA1b37cbe7f1682248e98025b11500c16f3863a6651
SHA256cdd58ca5bd7cc4cd1a3aed31b13bd963ab0304e2e2f20465e5534bce085d3ffb
SHA51283912b4bbe64d012d69e1a49b366dfa33db4a7cbd1bc6657fbc22c5574d76e66ecb356df614cf44ecafc5c45c48dae1b1a934c554cbacf917a1780009ed69e75
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b