Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 09:00
Static task
static1
Behavioral task
behavioral1
Sample
a01cf6b2c30b88a11cc77d7ab3c2f993_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a01cf6b2c30b88a11cc77d7ab3c2f993_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a01cf6b2c30b88a11cc77d7ab3c2f993_JaffaCakes118.html
-
Size
775B
-
MD5
a01cf6b2c30b88a11cc77d7ab3c2f993
-
SHA1
a32a480b767a0cb32bdaf2a23a3b0a37a44bdc53
-
SHA256
25d65840e8045a056e85d668a2fa93d7ae0f8cf6ad8354db495ca5e04e215659
-
SHA512
bfed536bf5be9d5495bf81ccaeb66fa260c19e674e427650a06d799ca52efa9a064ece83d2d78b211b79b1652a88758fb625a76ec1116efdc243ba1c1e144dfd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a445f0a6bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000002a4ae88ddbea98de148a264686e92b21f1396d9ee0da67a62c4cd699f6b6b410000000000e800000000200002000000079517e90128e8311d58390d0806659bda4b7e9c5c8e1207d7bed738c35dd089d20000000a68d59bd3e41dd4b94715e2943b104e7ae68c3fb5632c9884c595a48ba68ea6e4000000038c15258b8d14d104c6c6b14fbf7e463809cac9e22a7ef0819bba891f87aff492a378e4ca287fe45bb1c09c17f3672e01457192c8c78a0d60a89d4745b169644 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CC76391-289A-11EF-B9E1-7E2A7D203091} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424344679" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 iexplore.exe 2484 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2304 2484 iexplore.exe 28 PID 2484 wrote to memory of 2304 2484 iexplore.exe 28 PID 2484 wrote to memory of 2304 2484 iexplore.exe 28 PID 2484 wrote to memory of 2304 2484 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a01cf6b2c30b88a11cc77d7ab3c2f993_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e83048012b15fe1ab21f5e38789eaa
SHA1ca8463779d1c88ea84d02a041e859658d16c6ead
SHA2566befd71a4c3e9f46fd68f96ba47352e0bc53efa9cf0bb582c87f5e53e4da6e99
SHA5123903b836adc59cf4bb664e4f07525010459066c536ee311514633a82c0675a827eed02c278a1be0e4a7d838a590ee265ca0e2149439ca38e315d88b14ba9e90f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5801bfce570c86f6c0df8b371b9c27c64
SHA12aa74c4e7818efd30e960bb5ef32a5abbd155015
SHA256a9da4e9db85e278c63d6cf7fb99bfc37c4e31a9311ba06fbc4bc87e955a87fba
SHA512ae5933a114a5040128fb822ff5488ea6fb280a91d675cbb5bcdd3346b3869d36c791eb012b3bf506708416046b4a24f255cec2560a21d972f5952f4038e2afb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b20b5760633cc8f8d75ec696c1a2be56
SHA117a3ef2e10b7bda0f52f790c2deafe720c7f240d
SHA256e70ad739bbd1d575f558f114572e985d7bfd4412e3ef9ea50fdefc26fb3c7608
SHA5124b1c276394163b47e0afa2f85a9e0bff1c0abda2b004e5a1cb28caa8e9b2ea47e665387c9e4fa128155fe8106d2f5a4740a72d283dc30776c5e76c01cfae932b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1882b70e760d751e02a5181f3cf4f31
SHA1aa700c17c18d605847412149bde092143dd9db1e
SHA2560230e767b2152b3243ee5906aefb4441c5424199cf396ccc9983462b8b536917
SHA512be9bae40f5b5a44e08fdeeb0d4618a103be57f121da6cd33bb18f656627e25d8e8be6b97ee78d44e5db140dac50b7819b4e5e268a7d5f744541199dca80f097a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27a3eec764b02fad7b93556f43ef154
SHA1e6d0e62fcc5cc07913dc85683b53dd31bce521a2
SHA2567decfef469274d13f3e48f0a4a51327c40e64924f7b62a06f71b81c0dd7cc66c
SHA51225a7ea19c823adf522a8af5a4414a83a00c731aa73faf77a797918408f2c63db200fa7234faeaa81d36c5ae4d4f17b903a9b27da020c001394f8eeb9de7f24c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d841278ba4ffd9168ebc967b5da629dc
SHA169231dec1887c72619f8d6396d3d021d6aac7bb2
SHA256405ca464e516a327e46c6ab62e1832ecbc69c2167c22f85a07fa4a70b8231042
SHA5129e73abb59d1849a3918eb57e1e1cf584187d61577929dd99053bc0133ee23985f44bf0e20facd02376f023862170145cac14d56fd015f19eef3c6a755c5b3daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546c2f00e5f64240688a10edd5518bed5
SHA1ae2db866c1ea1bebff37a0fc3b83cc217ccd5194
SHA256c7d37052692525f15ebe6ca821d061620dba9eb516e11a59afe0aa16535c1efa
SHA512c43ec88ea0baaa7cc6af1565614564e76e49528f8c489cb1cf3a62459163e09d01e8fed292b7567e5cf740b4fb4893d4ddda79b294af369550024fb181b39b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5629c4fbdb427a3689ae13d519373a664
SHA10093fcec91f495b0d3faed56038e0c6f1815b0df
SHA256a404b09167877cebf5e05ad57cf92ba570125387590d3b130e0d9f13ba2787f1
SHA512702501c93b3e731a27d5ccaf0e7460608de91e0fa52f695b1b6ca662db69bb0c06e9b6e3fcdccdceb64bccdcbd54ef8baa2d9a7e8cfe461f7f2ddc49e895388c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a46076178fb4f4d1a4d6303a358de9
SHA1102e0ffa0249509c5ec86781e43ae050e68c63e8
SHA256b04fe30f06ebd8bc2b3528a57f4cc334142992894ac13fbb8352f7b861164405
SHA512b40c46115888445b2284b46b99c37b9f969f2f937b91e383e5b99d1c9cefa74959f03b9d28b9407b4428585f504b72bfc0ba89b046f6747f6c715396764f56d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f57c408fca68137d457b0727ee89443b
SHA136ff1251b857dde98f3b25384297cdd43421f9fe
SHA256b2b3170062afdae374a19a2547f70b31e2519724bf53787a4677f367d331e4b6
SHA512d6fdbf8d52fafbba66aa14c8bc0745627c0de32bdb6babe6b82d3d568c6c79579d3ec72e491eb1b8e572c45f6c536a73f76be56d810eeb52bc4ad686bcf81ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f561cdacf45e81da2f1670c024b8e4a
SHA1bb3a4a982ae3af2f5b1aa6ba0a799b0085e6f7b3
SHA256ecec0658df3b2cd6c989ab2d064a27b3aea22b333afcebc548f4f145d1c5eb33
SHA5126ea79b280b12d5caadb0eb887719037ba0d63aba7ea7294e6033005f831c2270235b8bc3d780a782989f883ae2ca41e0803b90e8e61405f855fb883588fc70af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530748ee4dcfaeb589bdbcd5a4145a6bd
SHA19995512e1efe240535e65f8356f63efa84c876b3
SHA2560fa7747d0f4cf0426a2b44a444ff79847b36f859b090e7dbeae33dd05903f5f5
SHA51218b3bc565d01df1e0d4047e7358f03b4abf436012118e09f3403e7286ec7a2dfc9a3fab4d2e3432a8d2103d7274e2219ef8c44fbbb8392ce77322b41c432100f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b522648b29bb0beab0ae4f051047bb01
SHA18b29928d7f99aebf2c5035b84f7b9e454112d069
SHA2566545d1f919694bca799943976997867c8d03965c8f00e111ad18c81ec6090577
SHA512d7b84ae7458ec1e1bd1d690384bef2aa0f3e9b81d048d00d589531c1d369ffa0deb6bb369340f50cb3d9cd891db188b2eb35a684b94104dc649eeee18ca4bc04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f2cae488499ce9501a626b46a95cc76
SHA1a732bd080c07b9ea407cc81c7670fa154241db71
SHA25683786fc750467c82a84ea4fca44da38eb4e5651568bc8e65f0913d7846eaa08b
SHA5126a198dc4dc96a5a0a3bfc078ef8a10c17ab0e01df8189f3d486fbdd217c347c95d411830a7733af563d8b249e901cdefbe193cb92e67bd673570bfc51c9d0b45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f45ac0709943493b3704bcf38aa9e41
SHA1495bade68ba82a602f8ce11c9e692e5cc07364ef
SHA2566e8e0ee2ca1e137176937fa126641c7f85f5222ba07958b4b7dab2516611babd
SHA5125a825f474414e6332b91f3b8b1066335cc46f36131c68ebdce67d0293ba8ea127d25e8a2d068a09f8a3c2f89745f27539089a2c636c24b25a8426750550a2ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51544723668fb3216a22399c42bb3e21c
SHA163572f8d0831df05073bdd2269c9cf220966fdf3
SHA2568ce20699cc4cbe26b8e9102114ebc83f20981b9fd80d152f66cbe3f0ed992bcc
SHA512d6fcdacbe25950b8c6ed74e49203c44e303032f1ad294edd01ba60fb3af5fa86139c025477273b7e28378f0052933717c186ac17f18269817706956b7fd21254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74400baa70015124e5b4ff9f99cd527
SHA1548936b5279faea90d90d3cd97d820f3f6e0a0ec
SHA25692c900a0e15ed3a47a5ce763c89581c9d9e9bbac4eb5eccaab3af90d85d04c5e
SHA51258773598491e4c6e7d5ffced34b47e489d972b3c5006d6d81a13b3ab589bc8f6f3866cf2a8814ad5d3f4ce727746da85d54fa2bdf72ba09b3b28833a4a3c769f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5862936fcfade7cc50139480724036bbe
SHA1692666cd73abc577da327de16d465003f6fed133
SHA2563edfe916c7f2828ae1a6103a8948a94afc1d28f5a466798ffdcdf684223b83f8
SHA5126bb81640a28a3154fa650d5865c24828447d9ab71c0f13028e2cda148c85a5cd37d1a45d3335bd5603fd606ba0415e1386e6f7a86838c383b4f0de23f284ef89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e201a37684eb28de23952b7c3d9a090
SHA12c606a54f6f558a7c09f6614b13978fee618577b
SHA256379b3e14ff4a2811d6986e6641aa3616f8b3b5efe061ba2a2ad94cf27152df9b
SHA5122f9c9a0e597cd8e0e4838bf81a7be606b6a89c5652baa5c0e0b921e3b8536c1c1a03ebdc2e5db30e1fc69492d56189156d6b35a62c097ec816faaa226c45b904
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b