Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
94c7bbfa073ec77aba054a7b997c400c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
94c7bbfa073ec77aba054a7b997c400c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
94c7bbfa073ec77aba054a7b997c400c_JaffaCakes118.html
-
Size
1KB
-
MD5
94c7bbfa073ec77aba054a7b997c400c
-
SHA1
8a62a220621521d13f3a39aa3012eef4fe9a06c7
-
SHA256
6c09a86355d2c346ae2f8261fea47be5ad127830382d10c236fdeb3dfb9918e7
-
SHA512
658bc9acf4cc3a1d6926a341f9b2277160d83d7091c05f4840d859a051746f9d1f061d602384deea05f7405a394324f3978702b2f807021c229020504d9de11e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423664693" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5894AE1-226A-11EF-91A4-56D57A935C49} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e4c3ca77b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000750119167f37c5428f7737713e5784bd00000000020000000000106600000001000020000000d644d932911ae9b08f3ee02dcfcf7e33c18db7e84caeebd11c211a25224b4074000000000e8000000002000020000000c219efde3da92e8b53d04a7289b07514ff585e3c1c67229335b0ece03c85117420000000a3524f268d9a1907d6649872636f7820b5765a602a8235cd239aa827ef5cab2b40000000fe3d3a2cb9e537ce3cc2386596a04dc7c4b89c36005587012c649a6323247d7192fe1ed5bdb51d0f42790eaea716363173fc80c0d715304b816b22b651f8aa37 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2944 iexplore.exe 2944 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2172 2944 iexplore.exe 28 PID 2944 wrote to memory of 2172 2944 iexplore.exe 28 PID 2944 wrote to memory of 2172 2944 iexplore.exe 28 PID 2944 wrote to memory of 2172 2944 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\94c7bbfa073ec77aba054a7b997c400c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aea9c4d6e5c9a6f5021c5cc6b0d496f
SHA180d90063c53a8cb4da69782928abc0b24f692730
SHA256af2dbcd052c45a4903e18334d7d13a870457234edbba75548607ee560af7faa5
SHA512e47c46993eced959f5c73f15b43fac3e21c74b01c5f5c989e1a1133cbf797bd59f709bbef61278ff6ceb53aeb454ae853758d41b4fec216164a778839a96cdc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf716d5d7418fbdce75757a3ea58ba5e
SHA1434612156f3fefad9bcaf3197de71590cccd48fc
SHA2567cc237d012a167064b911ad376c9f2c8d30a83c95265c204f070067d3d50a399
SHA512cf828cad069e3ae41787a775a99329a39183fdb9bb065d4a89336132d9f7dc7d33cb94fbbd600831b84ce039f53db9ca8a88998f5c711f7afde55a57903ec71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5580161a3933662ff155a57fa69b42fcd
SHA17ce63b952adbbbac4b3732b45f52f0f6c58c030f
SHA2565e1dcd7bc8ba19ec8ea9f58df880a30c2ce9f5a58f781b67178aa56a93f1dd7a
SHA512c50169b6e9bfa636e7b26b606b0a5bee58440df0f376b401518719a1b79aeb2861a28747851e1b2dac7bb1ee5eed1d42b72f03bee0f4c53f5f5257a44d3d13dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58177a5240f34f35f3c69586b256188f8
SHA1c81e91a04e6f0069b92daefe3c633cf9598e40fe
SHA256a7d8fa0b77a14cee7ae4a95e0cbd00a770f38ecc92980c29d90347a42673847e
SHA512992482775995709dea7c62ef71fa7b7b754fbdecf940d4b930f25c6030b76a5742850ee0c605b47721bf5d94a7184ddc2bb0a824cb68087da9bf1187a3bec942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e3ef0696b7fa4e1c9ebe62ae68638e5
SHA1c137b98c37cf79a3cce1e722a383e9531d58b839
SHA2566d04c771a39762a6385a76d8f506545ae7945154a6df068100433f8492d2cdd4
SHA51205de09f179dfc9a54bc59c43c6e520c4292f2cd30477c091c8f8f03ebab3f23d1c1abf6f211c40777e8202d8fa877c014a81e5470f8328e5c372df83165db9b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a13115a2a236dcef2ea3c05da9f4f543
SHA1eb351b75fd414edb2c029e51adad89783d2ba2fa
SHA2565601bfaf11519418cb2401f6f6fecf518d44350f52a4b34afe9bac7eaddfc341
SHA512486506ee7b465091dddd68d55a62fd31b1c26b3481ab9101b05d6a2245f0aff3f92a594b5f5e9d889b81133659afcf5af1f105df18a39197951513a74f3b3dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533d070f574dc0da63a2ae74246908377
SHA1c1d4c0deabb94434e4e9c621898d0c1c5fd98782
SHA256a750b8b709058e190fba01274136698b9439184fec50d4b5e025e6fbd3953dc1
SHA5125680c541d1ed199409d30d8e7693346780cefcd421b4a5b1b23243f63ca857b8f98051c16094ac5e84b70d5a54493878fee30e4bbc7389acf68121a3a62a8881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a574b237a9af08edb0c4825ddafaaf6b
SHA1eeb3b7ae845cf9d4c973e6c251d0338c11f84c93
SHA2561d7bee9a19138841c90e5efdc2b39fa96009c6437a25391689c5d6a10a5edc8d
SHA5126279bde4c920369204a40084f0808d4444cfef76b0b38c8d7d6fbc586e738bafcd5ebf5d68c39154247e6199c795a0659f7ad4b88bd51b19d40cfeb8b095fa3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562f88552012312969e03a9fa0b53d638
SHA1a0c33aed664d2bccf0ff16011a0128a755ab9b53
SHA25683a033599ccf338dd2ea9c6516f28e6f99f4fcaa49630c6a71b2cda4cb809358
SHA512b88cf75842771cb4460204c2a276a615ce5d50a31bb876cee6c4bbe25636405e5ffa43b215bdba4a531915a13f9df042ebb294a08f23ad45902ded5486062191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c978bc3b524affceb7966d3a8166742
SHA16a0583a3d196962c3c8cea1db75b0ff1ae235c0b
SHA256ca143767bc0115218994ffdadc1fb9d234c73a2a35590bcb88c1bc7c518c16b1
SHA512b5e4a94012e556627a1be957f97e01bc129f22ced2665b3f061afd176e9ff4a6105d5a383b1de16ba2116b2760e0f91eb25ffaa8ede9ec3a374529edc26b321b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5993fc328b424dd2a0cf923117fcd9550
SHA14fccb0b1f1cecc370982e45ccf72c5db95d500cf
SHA256e86dafed0d30c58748386ba67daf4ec6e01a5d9c50c846ab4a2d808c42c555dc
SHA512566c446867a52a1b04568a7e04eb6e9c00d0bc1707007689b8d1eac2e62f77f7d0862e75f034bfdb380034da98a1da4bb8aa11685efa527502b85f02665cbba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c5e91d665decb54eeb7b48c1a3679d8
SHA10264169529115d95348f9c5941310d1e550d22d0
SHA2569bd7b49fe95654809880c5b40001cffb8e0f46786c0ce88c49f808cbac441425
SHA5121ba9a1fe4b1961f71ec85d919bd73c2e867761f853721b5f3219b832f0b36c231c714a4d71d6b2e564fd35c99a8fab34d22fccf4b9bc79a57bf1ed03952bc94c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5cbaaa55163049531cc31c19d94ea9
SHA1566db5851faadd1de9a73684a522972495ed3f23
SHA256b0950932c1ba85f5a1532df20b0b502c8ac9d7cca8ef2e6ea020eca59883718e
SHA51247b7e7acc734c7a9895a5248ebc07e5a1f8da490198fde52f3fdf4555e4251c828312d5cb153a1e23b6544f8053dd8ec2f7204715c27969691fc9764fade836b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bad07a901724ff690f43629c2a88c911
SHA1c67a61250756f21a0ae92e5c4cbb045875a4b5b5
SHA256f4b99098cb98f3efd1698fadd9a99e812df92bcd2a9d9fa9b684e24f2fb2170f
SHA512d3df3c6f003c4ed2426e3034dc468b3f6f65354ac45d6e181337645673cb81755f8b868c2c9b922d23c732631933668c081d461bc6b3edb3e5354b6f9f4e30ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b254c650b0010b6d302dff65606e9808
SHA1b64a7e79efab07b1092be3c30cddc1d707c8c2de
SHA25695f341a62b8ac67743252c8c4ec08b63345baed4fd96ee101e24b777079107dc
SHA5120c0a200eebf219125f01a64bc7a505240adb3df295bb67d16aad811422888c7c4948ca8ed5a79ec5c647d08209d93666a45d83e912449a04ec50cfa0088cbea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b330360b6e2a8e0ee10811f9d4283ba4
SHA17dc3f6bfa3fc85c5d24d5854d072fe4b0b8b5704
SHA256efa6262026601e20a75104d324d0bb9d1a40494518260e428f59be5bbdbf58fe
SHA512c3933afe6a3690731e7c89191d34fa0ce6355c697975e71bac6c277329c8ae13173a9e1234ef5a2e0ad4c64ef0837915b48619b14f696ca6d00d5b02d20cd44c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b6e9c54c8294093367785027fec258
SHA11bf26de753f98719ec6030741e1e263f167c6efe
SHA256fdc097519499fa84b8574a3fd0ae6e34c55525db3a80a795e8b7181b77267585
SHA51276563b72cedfcb64074f9f5ae971096f0d2beb4ff7913cf65a3dccb72de2066ae1174e63bede889de172a6af3d7160f3380e2ea51ab7694082c71a68e9ff88ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff94e6e55ab29c9bd998fc1b06c7585
SHA14175d6ea72bf83da9377ab1868c33fc94bc7716a
SHA256a2f69a6207d545b075a98caae1480671692003303b0faf2bf008a933ba916e4d
SHA51224737a419b972fc5ed1072e73a0f8c2dbb3aba4902447a8ca9e30875321816984acd8edee681e886bf8ea76d87c684b96e220c641c5c770d50f4f756b21c125c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597920b2d6da988a0dd9ce3feb5c4ace3
SHA19ea36cc68b0262b97d8f5e993c2592d9025887f4
SHA2562510c8478bfc83f2ae1849bd165cdd5f4b54d22801f533cc70480f994051fb5a
SHA512c8cc48e6ab8ce0d40f3d14428049511dd6cbe5edbcc9c455b3b5c9c8dc996bf6e8532dcdcc59301d3abf6e4d24e72b83aa94eddd30b77d254dd95ddb5b6a390a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b