Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 19:49
Static task
static1
Behavioral task
behavioral1
Sample
960d556c0ffb1f75a69ebd6d44b1ef6e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
960d556c0ffb1f75a69ebd6d44b1ef6e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
960d556c0ffb1f75a69ebd6d44b1ef6e_JaffaCakes118.html
-
Size
204B
-
MD5
960d556c0ffb1f75a69ebd6d44b1ef6e
-
SHA1
52ccec4527079a3ccaacc7385055427150fbae65
-
SHA256
bc94d15091305136fe483a47252df5d42bd4f163aa239064f44d42a0ef9cbb24
-
SHA512
d19fbbf449a83297f3c8a1d51c910b47ff4b5f8958b195d1bd6b81e9947a449ff024ee0d557bb2e54982a6f03e4c2a456a74e22f490d2afa23b5a8798ed55a5f
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5032f75db8b6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000430bd1b749738810b51e3600c218d1ab33ba80ba71373a34b4388ea0da67ca27000000000e80000000020000200000003d86fcbc67dbaac7a74ed3c66d6682057cc4381509e37347d33ebe47d1de176c200000008f82163234e0efde1048b9a3f5fbac1d30b1aa552664c04508ff0d1665a92d73400000001efb86fdb0e3135f741557c9743fe6773a916ff030c69745dab2d8924b9b0b112494ff0c01cc3afe432934f5af0479a63069da4f3c237d8255ee1c1bc767887b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{897B1681-22AB-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423692432" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2576 2368 iexplore.exe 28 PID 2368 wrote to memory of 2576 2368 iexplore.exe 28 PID 2368 wrote to memory of 2576 2368 iexplore.exe 28 PID 2368 wrote to memory of 2576 2368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\960d556c0ffb1f75a69ebd6d44b1ef6e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc432410eb39a5f6d88d63044b80927
SHA158ab04d61fc534b1537ae085aa182c2c6189007a
SHA256064e800b5b53432f4bd3e603a2737ecacda4c39b6efbe0f50b181f806120144e
SHA5126d5ae6ab79b5b06a0314869e7f1512b2e8d8358a17b5f82fefa38b9070519980092aa09a67190223deb2ed19654780ba24f5bf35c136ee1b4879d513061dd073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136674c6d58fa7c42a94bf2d8e625437
SHA1b4f424cc2337c0cb105420d8ed349bc49bcf05f7
SHA256ef24413d4ba5d2962757bcab8c8fdf924da416d313e1e4da092dd2762f4b9ca7
SHA5122eeaf3fdc9132ebfb303c1124d0f6f040a3e353472d1a4dae06a046281f8976288650cb1762f1f75dad6727f51e22bf2342fc302cdf9e98ca72d3be9aadcb6b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d5e176890c2304dee0f32d148aa1069
SHA1bd3544df25699dbc52ef3082434fd57541dee48b
SHA2567a43ae3462d18bcb32debcec5dbf0c34074948f56ec1f8f5605bb3988873bb36
SHA5129e5a346f1dd60226947c68155ab63e81b92c4729e21c4a22c27bd43515640cbc2b7cec49752f580a86231577393c64d2e37ce937649e8d940b8858b4231ca869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bec9696a021d6c9432bb0905c0ffacc4
SHA133fc091d80e29833dedeb2d44552d4e88cee9cf1
SHA256854af85eaa1a78f11c91d53a77147bdb10a33f61ba72ea203b810e4e57ac13b1
SHA512ecbf85c198ef92b89f8817e2d2a03611f0fb516fb41e8b1456c6b52d564ca249091a0eea89eac904853c1f27d74204417cebcea1bc8314bee965842036c1ff55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b436e83914c323d8b3cf8b653c580f2
SHA1c353b75783353c79af6720fe62679d0666762c93
SHA256a6f87f22c7f36e937692ba25b3afd199712741d1783339655d4aeb77980bf7ef
SHA51285236b3eb8000d03a72dba02c91186a3ad274c27b901b183eda625b45ca07f5f82bc0930bfc6cecd0a42b97ac30b2064929e8697faa179eae767db023334d263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155df276ed8dc25825f8a7bd1fa2f77c
SHA1140c5f190aa2354c4dfaa422cf1fc562f02da416
SHA256edbed62feb2172df6a3cc59a613014b8456159a079c35b0f0fc6dd23a1fda712
SHA5120d5a0fe5c91949163845a2fb3d5b1a0162a5ef7642230655a6cef098f8ef0c5046dfacd453fc27c938b0cf24d6966b00780eb62a69445e65a124ad167955e97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b4e954db3ebb84694017d244901fb3
SHA16cecae89c0aba2eb55e792b615d5dcba3e9cef58
SHA2565a0874237380309cdc930c4418469cc7998b399b0bdeae250e66a4a8c07f86a6
SHA512575320d6db81f21c00b3c5acb4f80c0b1bf64b24703f0d56a95458490b3de01b49cd5741f9555bdfb53e12b9fed827e3627f20cec231ab0b7dbeefde90948497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c33d86fdf94524d9103ce4d7d40c6e0f
SHA198f53dbd0d1f690ec5322cb72410cddce6ee1a1b
SHA2560a09967dc5ffee482774798b0aa084c59531675b91941a4bfe5a99bba01c7f24
SHA512891657b42b58933459553ff4eb6283cea05a840011a7120c85c302b625d21a6b786ac2f55f3c48893bfab84f14f6225582a6a3a60c511fc552908ce2391fbeec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e981fb3ee9c076b46175e5184df3449f
SHA1ef4d77770d69343a6ef36a6c129309888651d103
SHA256c3bd12a54499f387f088c780bf9776ae582cd6841e9780ec2becc0d7d445113b
SHA5129dddb24869eb0a083e03108f2e2eba0adaad659784a034f69f6ffbd0dc3618d0d1de98010c4d657c10486234e6db103027eaa6dc5b63c02c0e7bedaf08074739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a18f18fe26b26a76de26b47b20c651f
SHA1ee3c194ca0f702a9e214ff2823dfe869d2f699fa
SHA256a3aeeb61ef76cd13ab632a7ad26cb4a39240985bf9c8750ace809c7b972fec7f
SHA512e8ad0e2a507161f0eee3f36fb38cdd53b934aa68f2ed134bb61c9e65648097d22a6eeaef3b9986894e9fc704f64366ed5fc576cf2569297fc1c775b2fb491935
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b