Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
a39a6b1f57b226d884b27e2c9a921300_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a39a6b1f57b226d884b27e2c9a921300_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a39a6b1f57b226d884b27e2c9a921300_JaffaCakes118.html
-
Size
3KB
-
MD5
a39a6b1f57b226d884b27e2c9a921300
-
SHA1
d42cc79aa5562ddc6d7efd19b827b817d665a92b
-
SHA256
494fdffaa96af66d75ce817340e76e171808f0459ed72dc88b06ab0fb11bc653
-
SHA512
6cea41287bb46336ce582b9a56e98bec9e342225546596c0d75ff2148170364072bacb2ea109eb482c5ad667d5e1777c0367b16944603cfa5f1d49c39054cc24
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424409324" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0355161-2930-11EF-9680-DA96D1126947} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000736ac7d963e3648b1ebdcb8da4a0a9000000000020000000000106600000001000020000000d12ba495b23ff00e59dffb075c9ff96043786bf17f0b878d4eb9bbc6bfac327d000000000e800000000200002000000078265c1e48c9859010fa75ef174c11f6ba7ad6de03ccd5b9dc2b29a2508bf92820000000ef2267b67393d3a1d00bed1c1c68a129f0512cd955ad17f6a3de1e854006dce64000000049a96aab0e5a4200510005992be8cc86212b34a4c76bc940795db938afac2d3bc50ae001b52f083a6d198c398202f2a12e7241e2ed0cb579089cd3c1b9b5f375 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e070f8843dbdda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2604 iexplore.exe 2604 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2540 2604 iexplore.exe 28 PID 2604 wrote to memory of 2540 2604 iexplore.exe 28 PID 2604 wrote to memory of 2540 2604 iexplore.exe 28 PID 2604 wrote to memory of 2540 2604 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a39a6b1f57b226d884b27e2c9a921300_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd199989460746dad98f85c7f9aaa2e4
SHA168991d7fbb0922d4fced3ed1210448b7507e8f12
SHA25662bdacfd3687eb849976b90630bdfb7f31e5d3f67bc9aa1c98fe8db70122d860
SHA5121dc07873faa986530f958f0bac3cfe9ab23bf41b00cdd5ec5be30c17c64d549835dd826e4e6c5e16b262764e4cccc2941fb74ff127e486ff4ce7311ce27fde27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d514577a808121de349d4c0fbdadcd3
SHA17bf4e6ef980e1f123931e6a1be4ec3a3ba1f13fd
SHA2562a8befbe7864418234197470f98e7a397e82475ed439ed3be0dcdb06956401bb
SHA512025a0a1fdc7aa53adac83b006b2e82ab98677082a2aff8455fe1678c0fb8b647a79e8b57ddc16fd7f2aebb44b655601340a4309bdc460ce0c965b2fb3efc540b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5159fe8abe0efc68c0731970748bb02a0
SHA1e8d31a4547ac95fd2d76c339ac5412bcf991b65a
SHA256b5b94dff564181b34b0167c2bf6d660ce0bdfd88e3690f288bf731e1832ec8e4
SHA512dea4da66713d74e6bc9991a6993033d29fc5515451b01f948e0e9156529de30bf374914907f3cb8019e70786bae79eba4e9008d76033f8a67ebe5011885ce6e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53410511484c5f3dbaeba77e79a86300c
SHA1e4877c1af0d1f74ade77f34c3fa28cf9191027fe
SHA256f4ef36a371145170489d6c750bcdd58c83d97467bc5c2e08ecaa0ace634bb17a
SHA5126322f471c1f88033bdcd5b6dce9e4d3396afdbf0ba20577d2c94cb651abf615563c06885a987c5ebf7e60fafeb31fa15793311244f1cc9b73ffb7ee51e15d2b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a216b9eaf4dc8ef308bfe07bdffc1b1
SHA12545bea8e0e7f4a38045eaca15be51793ec819f7
SHA256c08c45a2ceeafc4be8b7922f5573c83ac247c0ea1daf9da544fca7cc7835d4aa
SHA512696cb4d34990abe7d286af52866686b4d43e7000aabbac942f3618e33111aa60650c51c457202e649a7cb964a018e707c3a96b451879b8173105cd484f8db92d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58497a8d9334e830db4ea5b0e803ea5d1
SHA1988d3852f279ba113ca26ffd69416b2dbb2c1e19
SHA256cca62b7b05fcf3080d90ea39354e42fe2108c5f3b1cb61563c7b7998880a778a
SHA512cc7086adec3c2d31256cc7fc8d0763109cd412ecd66a72c2fcd5974692b559caacf6b9da84fea2eb1238ee98b3f25eea5c331445a72ca39b1be01e91e6fb4b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5797037a59669906a7b23e014497f7f22
SHA15750d01804f63288c02c852227de1d03e4a38290
SHA256702481cbf30436e3b76078fd41e8a5ad9765172c09e82b9e5fae2685af06034a
SHA5120aed344bf82c71b893912318af16296545b82afb23e9efe6a44ddf074269b8558cd42d0ed02ba6e62e10b38af8331cc58e12cb4fb6ff9016b682814f21ac22ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d69fb15011f1d180482650596b7782c
SHA196ad4dc64e42d7eb27d638f4369bd4331bdd0273
SHA25612740dd07c8594b071f13da0f56547a32aee22611f123f3014da5e8f3ee47d90
SHA512361e280d93151da068dd4e4e73a0f84c6bf292a6fd88aa1a339705cc725e61e523e36344aff9a8d0c9f1cc7373c1d54142d392d15499fdd0ab5c1ab3e2df29d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5676ce2a0c8e2135868e8e727bca18847
SHA13e6767f075068a13c2649cf84ca731aac6e9cebe
SHA25650dce3998d56f7c4437bb6cd62cd43e519bb069813acbe3bbd6c546a9ac591ff
SHA512598e982006af3637fc08964c166419bcc5d03213c8675032082d4ed5c3a05548da76343d5bc0a81922a9b0cfa4214418d5a4a3ee4703cb1009ccf4889369a536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f0015696a7943af80fe671289c10e09
SHA149f86e4bbc1587cccd51a1e3ed719b876c000751
SHA2568fd3e3cf2e1c72cab2d28859124d23d0cc05a570902905555b2f4960f4217a94
SHA5122c9050f478df54d41ea134311d0ed29d57eaaa8b0e7ad18260a77baa1d1cddf4048acacd7ae517dc14effa40600a7fba56ea1b97c4f6c3cf55bc4252645f0a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54960943ac973edf74d5175ebfa92b694
SHA120fb597ffc1e638d99380884776022e7f0e60814
SHA256fb20aab8cf405fe4dad324282b3a59b183be6add2ae985cc71b94e458c5ed899
SHA512c96e04932fda613d5cdae45a5e2cafe7b573d25651d0b56947d7f820e27625a3b5719ecc68bc1ad34e6f4e4c6b757365e055b92e3422d483b1f7b5b20229d646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea6edfa3fdb61983e85c31dd4b54852d
SHA18fc4328d32d7838634eea49acb5b1983cb7a7a34
SHA256c3d0bef6f0dd1cffa7cc8e74a7a33b38c31b1026e00b8459cb7b15a26a6bfc13
SHA51202f1f736c7a2a56d4c7f206eac3e6e19b01f254b76d4d83a8470b56dc90158cc3a467e81d2bdf5ddc9d6ecf737f5e048204ee9c6e72851ed8f3a908e74dbf116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da095e1165c9c15ed85a6566ba3bba57
SHA113cc03d9a47a1f470ebcb1212bdd7ea61f66aa60
SHA2563050cb2247b909e6ae2794858884712588351397ba97793bad1b6b751121fc8c
SHA51221b7880b448fb6fb6e5045a5481c5fb64f38e424e9001a161e4ade4f7ab2d219343764945441f2c3d7cbb5d15300e5d472b4d29c7373550ca69d51d9741283ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560525b2490f595c8a1b1580742b1978b
SHA1d48db758ffca17a34555e8964d964a5f69ef9d99
SHA25666c54730ddb41918c2685c3947700733eac859f614f989371f5882b9ba2de223
SHA5122bd7b21153c680144fd1c9a30a3a030be236f5088b383b05faab9d9b44f1c71e5a0dc1dded97be8f2d3b0e9d59397fda632be0e2a7bc6f379742a26089935492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e605c798a2ef49378b79917e87c255
SHA1c79371837a161f5a5c175ddb6a6c6e44cc279252
SHA256b46b72f5cbbb7fec6cc2fe26e5a82ba17ef691abe67278f672f3686b6574d31b
SHA5126f38acc84b3244865479258a275f4e3654b06e55d6e6cc2f4f72a98f4db7318d483ce1c28124efe26874978ff127476e86cb7764ebd61ed54f21d0b4f33226ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdf3a15696ba476fbec0b02470a19f65
SHA18362e013e04026b180349149a92182db9880a80d
SHA25607db29d234eef0473362e5ac26a1da00e5513c359c10e56bbbaf112deea82eef
SHA5126e154bd98a3ada76143b1bf73b0891aadcccdab7d7c56bc85a1e594d75cd0e9a941734b443bfd080bbd8b412155ba14545774ee1d6bf0c0023357ddb613de5f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d51eb2a601d505196ad87c898e1077
SHA1a09ec0c345f060372e333675450fefa94b0272ef
SHA256ccac548c6786da25943ab1534686a63b6a392235b0abd0d6c0c5b36fd3fdb656
SHA5129c888aed816ba817c484909e596930138ea73dda3f502c6039c8eae86ba138f6ce422c8e075c11c5d338ec7714a768cacb4a06303e229652d7fd5fd4415d778c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d19fb6ed61c97c75d77deb98142612
SHA1fd5536d81f0371b5763b11551a8ac8f8f2ccc0a5
SHA2568b1c184eb1829595af57957a899f2fd33eaec656a46d0109acd6ac514ccd48c8
SHA5120fdf4dbc681f63037e9a0cde1c40410a2b8900c9f72cba849420c86b43bc6d18b25e856719ad18c9c3f829f9ca84a3b0fa217e62e8ead94e0844d8324b7d8402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa2c5cce6e6cff0bbdc3a1bcb50b042d
SHA160d7eb0f63bbfab1423a4b339b1b6a33048f9291
SHA256e73fa4b9c4244b18d164394dffb0468b6a78dbac053e8a54973dc1afbe756aff
SHA5125186589e87a5e2a318256f6ec76a2b22d2aab7454c4a8826be497f23d39e858ef2629401c6620e75b76bf97802e98604a1db96887878602e79191245821718d5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b