Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
a354953496808cbdccda2ab0ad27dd3d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a354953496808cbdccda2ab0ad27dd3d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a354953496808cbdccda2ab0ad27dd3d_JaffaCakes118.html
-
Size
878B
-
MD5
a354953496808cbdccda2ab0ad27dd3d
-
SHA1
668e8bba01dc882341e7d97e82878ef861d020f7
-
SHA256
d734a1e7168beb8bd0f02e8f856beacdeb908fe661ffca9c58256094cb337f39
-
SHA512
9989662b6c074999a409c89210bfd3f48da0f0d297c29c829be716f9fa00c7e821e12d6a819d8c062ac1c4c54cd217bea34d7df81785197eed72041c3a9a4357
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D951A481-2922-11EF-9891-EEF45767FDFF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000aa2143c316b99447b16c234a66b604e0000000000200000000001066000000010000200000004cec3a811a3e7a17b91eb0f36821601cb89857e64ce732f051d49c32d6e84033000000000e800000000200002000000035e7d8d0d11bb8074b5dc0574cdd0c7d4e34698ae950c1741fb8803329a92ded200000004571d365c0c218626189daec04ca79f68ccbd088c65777695d16bbb332260eba40000000f4022e47841e6c93b3cb863c941aec774f098fe1ca95e8115b82d6ecda3198246aa76a86e5db946c9ee0fd2d7493637bdc34ed9652ab5cb79ba392cce19c074e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f050e09c2fbdda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424403380" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE 2884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2884 2080 iexplore.exe 28 PID 2080 wrote to memory of 2884 2080 iexplore.exe 28 PID 2080 wrote to memory of 2884 2080 iexplore.exe 28 PID 2080 wrote to memory of 2884 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a354953496808cbdccda2ab0ad27dd3d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b9321a9e184df94cefc43a8f4fa19f8
SHA10747bea0da1144916064797a121e5ac245c5864c
SHA256615bc04ce39feb5c0480267b0ef338d99247560831a753f68025ccc17c421bbd
SHA5125bb8df2b892264fe7062f2832885a370af2fecf1f3843052d91a58052e856500a4b2cb920dde7a6e47a095d103b656863d89f5583e53f00270ca85f12dd606ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51151aa72ed07cd6caad55242df4dad14
SHA167867d84509aa887ef99461a49f824c51a0e0dda
SHA25665a61b70f98112cee0e510f7cb9ee6d9580a1b3e7b7e719a3bb0a03f82c56ce7
SHA512e8414f3dd8d2359870dcdb696e5dee3d24aef3641fb754f47fc46e1af4629bbce388d3d0c1b8417069dcfdfaa2e13278e85429ae1bee62aa5d95401fe7be5fb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cb1640ab17c1c51da96f764e230a93d
SHA1f9f525302b07295c3c4a1a18b7360ec5f74f2a27
SHA256b25da1b74b217282ff0259f384e6719bb4104b3d8a5a4e9e61babc3ea5a1e213
SHA5123803626d57ebf5a0733eb26b832f32c8042870cbebcd4938dc772b7e1e5ae9bb34dec4b026c004e5c028ce91782eeac6398208386b326a8659d750b5105bd5d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052746527c76932147fb72a35624161f
SHA1844d3de5cf737f817a28854a411ef12dceb53b89
SHA2562d8ec155d6af2349d154745255caaac552d6f86a914c630250feb84d5f4208a4
SHA51209046c5f9245f748ad0c808513d8300d542a5755217078f06ebdc853e13cc77b753a33e6b4c428dccf01fe2d091893eaa4c145d5fba872351a7adb055d4f4d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6dd99259206faa1654203395a01c6d0
SHA198b7265798d824ac7a5a6868aea4d4de6d32e871
SHA25630e72fc7aea2f462fc23bc7df401e07d26c80d93072d092b980bd39d45036f77
SHA512aab966dbee9a564b94a2f7c97785880c62cf0a1e30698b5f277147e183d63166767ffb81a547598c13239e6b736e897001697d030762a5cd74c8df43bcafa218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55817370578811d64b1793d162a897066
SHA18be4e79b32905963dc5e8b9bc900d5225da94509
SHA2563cefcc8494ab3fab04558d1c259f76a4832bfd4082791870f5c300d8ef23efd0
SHA512a3688547a99fd1879cb1b80402833b426fdf7ec109b44f3fef3f92da663b7407a5ae857b4045779facd66cd5f4ac55ca03143acaa6a31749d439b7a8a5a0dd28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e72e2d69864544bd30bd03add2e425b8
SHA185bd1cee1ad31767f8b1a5fb77441cb3c7e96804
SHA256a3de942b58c0df2004e282c806397bee068b6e240b03e90cbdb1cdcacad40fee
SHA5121fed7d46472a67cfc0ca27c836751d146ec436a446a671b9209533d8a4f14d651e179142a193cfeb92e26ba0f2d1034254d3f4f7514da8a818462167e4ac15ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc15cdfe1d332271c348f4544862e322
SHA1ee811be20677bfc94ceef75d5e7977c61fd92ad8
SHA25660824456c56f75482e891246dc9d3738ea3c2854453c2b8899339ed744c5e966
SHA5120667bef59548a4b59d5dc03ec86e4c92e0e1bf1172e6d67835361c70054debb702caa03ea093772ae8f94d1667e75d34db727270fbb2f623e0891bc15bf56e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5ff46524b9c4e5667888bad896412a4
SHA1cbedeebae55d58b1c41ff6bc69ca5c77843af3d3
SHA256f650eba26c40e5e85ada4d2d58ad7b4a489bc956bc4afc456f7aab8ac398a338
SHA512bee442ead9a27c2264f7fb10fc4a8d6871ab84927bc8f6c10e7b51289db5f5a76abcbb4e89d5d24954d62dd7090c480767e174d899d848cf049fcc7ec2bbad84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c3ac2d7df1c82f0fc9ef7baae4eb0e9
SHA13778cb02ae20f75b14c7b76b8ed486252a4b54da
SHA256013a96211b4954e19bd55763c1c074ab92695f5ccdc242cafbb727aa8cd39427
SHA5121f7bc9737e25fa606c273001952a6fb4d69093d98fdfdf166bb1294a6d21032c649413fbd175231b797a23927fa6612fa635b2193bcb7b0ce6d91e4b7e9e8346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc675e73949994a3b366aa5372efbce
SHA1948a91cc894aaeee398439e19ababdddf8750a26
SHA25675908f5a880d1b62a9daa9a6a14707501b13da8caaf5a20fecad28878c036e52
SHA5127dc603f175c896e11591054cb2d6be1374426494e120afdfe60e42b4db19fd048f4d6efc23c7d2fd18c525314755ed363e88b02a12dc4b781e95aaf63a9f6a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a15458f52d5463544db72633459a3f7
SHA137817acb3ec5970df539cf83e67172a328a87077
SHA2560440a3066bbc60abb2942bfd908eb38b81e6cb51bfac76fd81fe9ec01bf1eda7
SHA512e7b40cb2e5946ea214eec67b90d9dee89c709a4b7f5b21e46c88a75ff698393584be5da613ba089d719d0cb27924e39f79aec1a4b44341afd3de8f5b41d1b991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ad7c859ec8449c435d491dca3fbc78
SHA12b5095cd1fdeb5efe20da0e19bb978febb0f6314
SHA2563887de4ecdec07808b101073b569a2099be8d5a04b19a324b0197d0bbd4e3710
SHA512257af5a444f26ef8917a681348edb27ff9634b155e06c30a099800fc668de697e3b6d06431696df5a1d3a71d17317d121fa161e161e707551401f116c8081819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d9ffab1df926381a2f7ecd33e39e60e
SHA12b5dc1274f1569e6bce6ced366986ed5a1941597
SHA256c09cf731d3065f87b142169df4f407deed160f7cbcdb36006203ec3801901ba2
SHA512be81bcc2d9e702aa5b7f6946ba5aa8a48864d9ece96d03cfbfd3ae7492bb03bd0b02774f521d31fb71847795d1d1771b534c945919b735f2bb93b0bae8a85146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53677be72ff3f813f70a0d8e22f025d36
SHA17ad73214b94b49c81ba86053224e5cde39ce5fd3
SHA25662b290dd30ad38154256955ab1d9fe73112268f8e4587d11af5ffec02a800ee8
SHA512981ef69ba92d841beb3614922961951276c523d37b86877ac70b6aefcc23523e2c0136deae86fa5fa96551e4a7f7856277d58c512ee72a4f6fbb24a9e2337e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b4a89dce1c8443eb64bc7f5ed2fbefc
SHA1e0666cbeacfa1819832250fa11ca8c68f0ef45c2
SHA2563a71ab7ecbf78f498435e3b8b819b6c9ede64082f88fdca5d2c57cb5c1a633e0
SHA512cf00eb622a6a4dd6fccd1b9ca00a4503c68e2ef3cafadc31596298481bced82218841d72cca9d2e55ecbda7f3c70d47ee95433223df62756b6ac52b5f314a42b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50213449a3c343823b69d549e242a37e8
SHA19318f3475c0925cf061615838050871b355bbc78
SHA25608e9ab3cd67b2b287032cd056836a38762b2f9552332fa9eadf859277cbfc45b
SHA512d6fa6ec6920cd389c3c2e1087ace5c7225a62c29990f7022ce608a54840807b07da12f6c21d00d7f02f44fa4983454e8ec1e5cbaa7c1d88b956623e906f458ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb9cd578168a72c74a87c14d911eab3b
SHA1f8dba442ee5bb6e140d293c05b2457ccc1efd609
SHA2561749ce223f0c6bc667fb1034b003a7ccbee70d056fe15036732e8853a0cd5c3a
SHA5128f5aaee9deb6cf5d71b185bb987db3bf6b032b2c7582013103d7d3c817f2fa02ace229924c58dfc362cb70347a356ad3ad170804ee9fec7ebf40690a42d512cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c392e30cb3af9cdcc1cad4c424f64ee
SHA16d0ee5be224b8d45c0d9b42177f67e81a4c304b0
SHA256cedac94fd52ab47dceab3ffe6bd5e598e30ee6689130465fbd0b5f6ad98395e7
SHA512c0ae983cbeb952d40eb60817a0838dc686e664db74c39e1c3f34e18f70c57aca146aed7009e699a0c144337b650e9e94b976f8b9252397390a4bce43c5eb1e00
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b