Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
b16880894bccf0a4256d5afee0e26bd6_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b16880894bccf0a4256d5afee0e26bd6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b16880894bccf0a4256d5afee0e26bd6_JaffaCakes118.html
-
Size
448B
-
MD5
b16880894bccf0a4256d5afee0e26bd6
-
SHA1
12570df9a5efab260402d9a298ba4c8f923fc357
-
SHA256
4237ccbb7ef3c665c8529d1107fac9bbba56bde91d26324dfa79cff1df518686
-
SHA512
107ce4f231da1cc7ee4a2427a1d1d48a726dd7ed261a8745c1a28b6e57aac1f029a7e21c0a330256b793afae635d99c18e9b197ed60ca77c50e40c0e4963dce1
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501b549e97bfda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DBAFCEE1-2B8A-11EF-BBA4-D2DB9F9EC2A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000009a33af3fec2624769701cf6587d835d6c708f567dea06e08d59792cbabe54118000000000e8000000002000020000000db2851c32a650e1a8332980a6d7831f40161daf08d609388e5ce88a571828f352000000028ee817c93a4cc62e50581aceaabbab0b322e883db08d4e6997a577c3a8d8bfc4000000003475bd9814042cc8337cfc7064fefb64ea020b3553ee32d4d4534f9b4efc858f260e02fcdd9486744bd29fbf38ecbc5fedf981bd2dfd13a995261d50beef419 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424667953" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2928 2044 iexplore.exe 28 PID 2044 wrote to memory of 2928 2044 iexplore.exe 28 PID 2044 wrote to memory of 2928 2044 iexplore.exe 28 PID 2044 wrote to memory of 2928 2044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b16880894bccf0a4256d5afee0e26bd6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af8b11fea51d3e8c5c8d4d96486c97e6
SHA191c4b27b424de74c29f7be590702344db6a1bef5
SHA2563a58facf91322b0d11bc23a2987359d55c86b5d47f5e189a5c73dcfee56a3bc6
SHA512d2ca852e3185bf08097c03572f0a3e8f49385760ce3faae43514f9b661c4bcf1827c223db82db1f37d324f4dee6cfd43e4dd5dec0a9aa4486a2d1eb0370eab86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f601e7e275bb4cc19093139c7947f1e0
SHA1ba94874de8e36324468b15f692094e3f82abe00e
SHA256600b22e44e26e91bf833569911637f48aa3b568b181a59b576f3b69d5b0d7414
SHA51229cee228274620d390b18afd408555856b53f31a33dad61d2f4fe832cc71a2870111467cc10cf0507d03bd3d9ff990c1b957026d2b1b7b7ec26482b649d91242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec0e2dec4375e5825f5c02a438c1e2cd
SHA1f8ebb02e449420709fd6701324a4ddc985431202
SHA256227826de78ba5c2a5ef3022aea84ede72824c5e4f8c067bfe61e306c784640d1
SHA51281276d3141c2757583f25c1800ff93b393aed476c0321b27c3342c06b94cccf8074e131cdad5cf23e12e18a740f2a86351c2288e0e183d7e030527be3c7301f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cde494413aa799846730a069fe0733e8
SHA197cdea43c4645e384b1ec03e94dd30305516e53a
SHA2566347d60b32e70bf5a462a4a0e825e5d63e8a9e47df6e4edc4f04965c46582fbb
SHA5121470a874b20f297ddac4431838dff9e960795c427a77e7e6d65a0314d192930b918f82497a7d16f98c386ac3dae18feaed3821e410d9ae172c9dbbf35f3bf12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adfda2ab9162a7f40e88a6923167d31c
SHA14881be75ad6c7b7c19dec11023d67a9f1fdf189f
SHA2564789bd268846b71a99ad52db29d902ce47e04b72225fec4f88d07c2a29232688
SHA51298106a36cbd298be31367c14a2c3c3db2fba1bbbc0f5a12fdf34122cae44824cd70e0106bc47bf9bdde0f7ce8029b97052478dfe4389d27c72fe22f615b006d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf74654b9b4bd2dce0ba93744d4c092
SHA11e0e551012623c37533f0df9ecd6d27968c67613
SHA256203fac9f4d7a583d5e0193f204fc1d69b8f0c752eff6d78ee17be7f543c74ee1
SHA5125774181386ebbc9bd32a9bf53366bf4b5de03e23f9d3de35a4e2f4f2e209d418fd1c00a1768bcd72d1f6512a4b2f42d5f77f620cebd1376eb4e49fe3bb5aeb4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51abc9ae8d348efb4fa50eae738511464
SHA1ebe861f90baee55cf77d8c94167bc63f897373ae
SHA256413eb8eaec20eecf32dbda11b28c5e272e1709be956d8f8f39552342b84965d9
SHA5128ea7259272a20f1ef85b2ce1df7a464a0f040da11b56970d8a94de3b654f9526803a583c8bf40b78a87cd9f243a0b1a12d5c06a826fcc67054f66edf62083343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5773f6553348ea51a6294aad667f0fae3
SHA170db38e29e80b979aacc1e3c86bc82af2b03de2a
SHA25682a8060d1dc1cc133bc31bee6d7968cfd5e73fd8f9676289ec6a7bc7b33a8979
SHA5123e4affa0b99f6bd395d8e1288d15b20ec40a9b07c7c005936dc649fc5314ebff404ecb620d028e9f68ab969681c9726fb0df3f0fb95ff7dc26563735712d9645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5649a71f644cc6b35bba92410600d94bb
SHA16e4d58d97b6f10c20eb8ac481f3d964f74d3e1a9
SHA2561c6d2feed0724cbc8b58aa8c96cf6a7bb930d1454e4f10a69d2179c36869bf01
SHA512f60c7126821d9df37b79560b6999b5e7863346650b3d1cd2c98495f9c7da78115288e8490fe44436cd7b4a34a299078545d8535153c2d97c3989edabfe4b6d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d559d6bac7af446bb4762528be27992b
SHA11b487cffe3f370994d1c20d7c918b308c867769d
SHA2566b927a853ba2c3a4274b6eb9c4c1a062c1d6a07a11baccf64c9b63d27b0a8670
SHA5124ca13cf05af2b4742658095890d5bfe4679cbfefccb9cd28936683e0c174024129049d4ab9884470e2ef895e96599acf48f1f2ff4467e9e6bfec04ff1f274cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551bb09ca1871b7bb6da8b748ab850858
SHA1525ea98fa23541cd1f32bbd531072bd435abe706
SHA2566333c6eaf88f7cb181e36c492a4dfb0cc47b8c39cf5c0fdbb467ff67b3c187a9
SHA512e0587e862ef3efc62e5064c67c0fa12fdc3bb1d7a22f5f84ee6dad68e2c37199dd5127113d7bbaec8adb698cc05b37ea301ebaeb43c8a62977bdfb6892b042cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626d6a5c0b3e9adb1175dcb6a4e9b546
SHA1a48c7e7959420b979463c3105fa69d22124f12ca
SHA2565e72bf6ce2412f651019a788ae129db37ddd31428b670fd3c1881eefaedfd6df
SHA512b9b9c9c62e79e48d7c22b385b089dd42e8012a3108fd3f81e8e2723bbe0e3905512480985ad7ea4d1141c67cbc57ee378a0afb8fbac4bc5acb5877bd1dcd85d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca5798436cc25b155d4970f26a32e037
SHA127016e860a0bad74b7c250f5bf778913dcf4caee
SHA25675a2eb06ee7cd6a4ac244662b39ff69979a6cb94eeab2f7e39b57b1075337996
SHA5121cb7a4b9df0e7b37ad4741a529a9ddda113fdf11427023521dc2f695bd4dc07b20b4d9c6b155530e80b64f3d63c0453b7066f36ef7d04c088d2c2ef827711ad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570345db976d30ae8642c313db9e59eab
SHA1e7a23a9167fb4302a07830996de589529fdf7b13
SHA256dc64f7f105e7109d5a07d86968731eb103aa55c5e414b21baf58bfa7ba99b1f5
SHA512f3c94e113c0023c6e31c3ede906ff19ed945fdedba96c7f8e899d4b67ddaace90a37f2696731b518bde63a07ab196acd816e2432cac45bef4ddd1555b82bc76f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad0495a1c84409a834083e60657e9ce
SHA1115ba8f8d74c8c887db9c81ccde81c614407a8a2
SHA256775462cf5cdae1d29582c1ba0edeacac741862caa772f5b1b0ddf83dc8b3a460
SHA51260e14360ba13acd2ea5064b2064ea68566b0c4109004276fef24a9d3497ecf6f287eb563b0b30cf7326287443c70463c286836245fd45fb8abb50cf8306faf1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ef97c8e0cfc5e51fdce9c28ae199a8
SHA1283ef69f71f37eecf214367e791c9af6b1da70b9
SHA256d8b1ef691f6600999ff30a4353ac3d25ba54b6badeb4620f4466667aea29bb33
SHA5128be9ea62cfe3167f41b496eb509fc4c545bd060198b9c6035ab05424dc8762ed378627c76057dc1ca86acde91b5c75fbb8455e21dd302e30b07ae260d35c4723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0cdf65e013dc1f54687e76aca1670d7
SHA1adae08796bed2ea38d2e1143e82f9a2dc1015047
SHA2563aa1141a97f53646f386ecc5dc8c74a41984cd5677981dca34357aaf71c2f4e4
SHA51252e253911109e1ad8d1fb18ea77412770e06076b2f6ff015f77aa4ffac3c19884fdbd37b2d38c8d797a3fff9f0a7d53d2fde3b0c8b7b92b00c41e9006d506d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565114e0b7dcd662d7b76c33a9e68d487
SHA190da0254078b6cc4449938f114aa00e12a566c38
SHA256a39951f4a692a244c3a44efe12a73fa1630167416b4174e3b17a989d35df3c03
SHA5122fdf84ebcdf70b0578fdec25b19928a6c05183a995acbd1a89625684f8f379b5c566058b1047428f57f37ef968fd1a0927264eb12e5bd6267664f2befc3e6ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf33a523f7de6d6e75e6dce5a0f2e403
SHA1f6233baf36e3b388cad27a9b7f7dbf16c980f10b
SHA256701850f5ca23ab377ce1d5341949035e505ebb3873d856dfd5feebd7cbac3198
SHA512107c6107dcf5c1cfa9dbf88e38572450ccafb3ae7769e44f99f9490c1e7b3dfac6f9ae3f76396159e59bf58dfa45ad685e5ee66e25bd3644afab47418fcad210
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b