Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
b37725a9f62d6c359835ad35eb14859e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b37725a9f62d6c359835ad35eb14859e_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b37725a9f62d6c359835ad35eb14859e_JaffaCakes118.html
-
Size
2KB
-
MD5
b37725a9f62d6c359835ad35eb14859e
-
SHA1
c32b6b5db1a7706772691dd53f11f0b9ccc992f2
-
SHA256
b2d44fbe43063fcf64c912e8d97e2857090a6d49bec5d1b33868d993cbe26b00
-
SHA512
079cb6461914b1114edebfae42685070958135ca3343e57f17d6d146f4352967481386a894c87b17da846ac80eda24da45c10fb6b6c7d4b80e023a01495a4c09
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424702177" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A3E2481-2BDA-11EF-8A46-EA263619F6CB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004253e2e83ef11640be8a9950260a87b900000000020000000000106600000001000020000000bb85da2ffe60ad8a3ad9b0a3b0e69cba5ab38741bc3f6de7e45680ac9dd2415a000000000e800000000200002000000059cfa26aa934ed6994c0424ac3d4d32bf3ebc16e1bfd993e0deb00b07bf4480f200000002d46bb2fafbf05b8b30fb3ecfe7e38493c749fa31a664b271fe43a5d2bdf325340000000ccc920e55e828bd724ed2ab59e44a424946d7babd03920d56d96cb93b3a0143eecf4ccf7f05f06ca842427549a0f78e6a5290647242eb1b1560c8bcddcd4d926 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e06ded5ee7bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2180 3020 iexplore.exe 28 PID 3020 wrote to memory of 2180 3020 iexplore.exe 28 PID 3020 wrote to memory of 2180 3020 iexplore.exe 28 PID 3020 wrote to memory of 2180 3020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b37725a9f62d6c359835ad35eb14859e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f3f851dd265777bd0f29d7b5a0d00dc
SHA1f383c245a2810aaa0efd96745a23c148a3a991dd
SHA2568312b960584139057825c052cee4f4ccc919ab0c7b2e49dfd10e8c06fccf94b1
SHA5125b7ab6c06e81d6146e34659523e0802ac0cff8173dc63aa3e236045dddbed91326bb9d0b703682fa42c4cb03eba08ce408938185296afdfd9b5af13095371bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509d7d5d9576dcd575e801e2cbf382032
SHA100918a1e550cb210f0ee13205e35ea75acb158b9
SHA256a125c032dc2d44ce39fb5cd8fd3e93500477a926200ea84821ed056507c4b1c4
SHA5124d99c328612357d60eb99a3b993eba7d209dc92026e665589674977f1e5f10994b61d106d5eb6d10cc33262c961143ebe92089323c88a2ed45b7291393600df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daf89aa5e089d4091e8741a5e38e8608
SHA1104be3681f7cc6237cd1ec1adba19bc76f647a94
SHA2567808773fd260d26d246711afd56bc833fcd88a69c94937276b412adc6efba598
SHA5122ada2f8b25e6b9d272e661438f998518cfeda9687904d93ee6980cd833ab5f3982b81277ed420f3a98fcd871081d1e0af20ab33128012750dced51b465c1955f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2fb690a7c4b1d00559b7857bb78b495
SHA1530e1acbea584c1a9539e173a7cf41663b00a63e
SHA25695260ad7fa973da83a57dc521f2ff1b1b0850fb9f81eaf0ebe11d8e53729e426
SHA5127f1ec4420c589e5b253caaac77864db316ba89a656d2b2b12870f7e7f16f50de64f5172ce02b65b85bef52bcd8809c2b84d465a3def9faf402e4b19daa2f3f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d7bc3a7c8465c943e8da0ae1a15327
SHA1dae28a0fcc654651567df31b7d74edc76df0a59d
SHA256c835c0f2665b1cde1525d1925607bbf4507bf41cd9ff4cd9a55622dc342d44b4
SHA512335315b4f2506a81f22ce3210cb1869d3c97e684d7b5b62c0a7f73ff5f3df9f71bdcdafe931243df01c31c27bc0f9b75793cc2f32a1c11e98d0eec61f64b74ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bfeacf282f30e71c1c1ffb492f8d449
SHA134009518871ce7ec54d96d4d39e172e46c532368
SHA2567b1c63f5bec75152f6a4497832ac023daca0a10ab368e63b623f7ab6e6d397af
SHA512aefc72ec33aa0fa02b9768f6e582bcd22bec90ecfcad0325f3774335c7ec207e531df3771872142759bfffe29809724ead944c41bf36b20e3e2fc96b4281fcb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597c9442eff9a2eb8dd0f482314e96133
SHA14cd3dc0bd80ef2ea11836df5177fd0cd94544e1a
SHA2561d23dd236b3accf9bc366fa102ece87ee76857e8a190c6d401ae111074863833
SHA51287cfda55732900d0aaa8284d563f927a6449533922d3ab28778f407a4927dea315e865ff5753a4d7a0ce8c38ab78cacd9cb081b25acc4a46d1aa76130b746590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcd5d3d635f4d5f82ad8d8f08e30d3a5
SHA14d35d3e362aee565acedf2ac99c556a01daefd09
SHA2563ab0086b7df59feff42562eec6896a2469d9500769024fda969d8f2151156923
SHA5127c74ea1236024229f0f64c740977ff1c2ed605e72257f4a44c2add132e37f2db5932adf85e261c43399f043d0e7ec77b5c956aaabf07e94cbc141523651c96c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d8b43f0b1caa9c0a46766a0f74a1d1
SHA133de5b02c4f7eff72c03a3a81d70d10166671d32
SHA256f6c4ddb47d4b224aa5b6801a64d171870fbe2480ff9d82abd333989c290cf6d4
SHA5123cbc9d3a1386d8f77cb92272be89df44f2d2d594b59e9bb96e1d581e2c6788b981d3d138da3ec9011f2ffe57c924b64ad2761e16c0bceb15d9221c65f214c8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff8820f23b282efcbd7c3b45a5ef121
SHA1f819cbcdba88d89af40acb1751de77cc03a51fc8
SHA256703a346968672d959ddf0f95b1918d336770e2af56ea2d6b1670e3ab282f4429
SHA51278c7f5ddb3a94e22416792846cb62324b88ad9822dfb17732e40a4f47ec9cd933f61affbb0b485d3bf645e3194972510625d5b535870a4e9a569a2b4b505249b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55639ff7fb1e56f20aac45d06f3711e72
SHA1ff9f4f11fed22633f05d81b53944b1f979bd8cdd
SHA256a169cf17e7c4e37960db2639c88a55addbc9a62dd32500cf0617e96be5102c8c
SHA5123bbda6597be767ad0fb1616e003b0dcff02d6ad9c22de5a817bd4135922d982e30b8460febf426e1b47078a90811ce11dd00f58ff5bafab32b13b742e9b8ed26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578cdbda72ab63933e35a6e65f7d95e19
SHA11825bed04495a250491f3920a26ecef2e5a317ba
SHA2565e6ef736752ed687e2e3cef82b0666d77f93a7bd1ce93d90eefebc50aec895a5
SHA5122a4339505ef29a351198efa4d282738f0302b841f7d816677a4d3b843b3317d3f888bac44d1a4c4a23b73cdcd17046f7d4ab9048159178a53c3db7eacca8ce2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de7f447046c04b42c9203dcf05a073ce
SHA1a2522b4223816190fd81afe19e4c9e7f2540e1d7
SHA256b3bc2a91e75b66bbb793a3f3017c7155ce6529608fcba4f9423b1f966471d021
SHA5123154d764f89f1f410e70be9d49c25c8ceabfb1b2db732bb2a032c50ff40f262f03147d0bcda366abd56f3b3a601f4cc7ad549e3064e4e420f4c1ca6cfdd13ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653f95e67927bcbaeb895d6d8729ed31
SHA16acca1ff8bc95e57e3e24d71a1485beb830f1962
SHA25622ad465f4a985a30aa3a66f09b98c3044a26562674bdb6de916d137da8abb6c9
SHA5124b396aca7f6354b98be1d73727e868c181168c88663332b5b1fa42b409f4c603a2c473b09e2a506c72f01b03e8f8d6b592c25d3a50cc9ce532f3ad49e81bcd04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150104855002d14abd66e8e064782d5d
SHA1744df5b25793b653399eb13c20e4959bc50dc442
SHA256ba86433c9077b83f1d120f9cc5795b8d82ee4cd0e88ca3e9b49c78ee8c614536
SHA512d9aa7a384e1914f4937f7b218a250eb9c01268f954883f07cec75be2a05c5b228cdaa20b6bf65e8338659ee59dfced1917ba31829288b26882653c244b705bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0fd859182f28c108be14ba816e0fb44
SHA1f7cf3fe5a77ff66615b4fc13c928d0cdfc3f36ac
SHA256071c09b556b1712e98412752f95f74f80a5f0e17f24c6fc635dc7c5c91816267
SHA51261e438586006d42cf94fa4e216acc972a184c867af9d48678298afaed7dc9dc4317196475f018c52e7a7898f835fffb5f67b436849e5f24af1ae181f1941d71e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c06df2b7764e7fa52cc2314835e00dc1
SHA146219baf144c2cd3eeb01ba09b59f58263bac285
SHA25679a3eb41463e980b5b2de57c5d56232910f748cfe9d0cbb2e47c36bfeeb5dd06
SHA51257b2e84b576f04a14c1dbf561bae2c726f2433847d7882bab4dbec5d3b76e698a9e5a9fb8d8e68371a2d73693b2d02d8d1e1c855bce4d180eae52a346e6a9bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516e72090dc90cfa783dfa0ab6330be5e
SHA1e085716e5922799d87730ed123236ebc389dba66
SHA2562b2329f014b102b9c0eed61e7f6f0c31d6c7c146a77b0de0ddc17a194a76274b
SHA512ddcb0bed52949bb50cc9478d50df94759be41709bc2b70f94e4bc98ea349a6afe8027ce2f33a342c43e7d354b223fdb996ae42ddc267af3906e34ff959b6b1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d25480db85e53b8ecc559ebbeab74fe8
SHA1fefbf23ffd89e26657a01342ce63656d1ce96c70
SHA2560ebc9f44496e40259e252ebf37b06e5fc7cf70602eabd05763964ac951196992
SHA5122fd95ba3ff0612e576631b6d520c1fc1b9d76de5624750321246d1a415cb4ba22a45b4e2120214ba16a2872cb3b1763c2c18c45423d6d6f27d20f35586197f56
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b