Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 21:04
Static task
static1
Behavioral task
behavioral1
Sample
b5328718ba91113db25a89887517eba8_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b5328718ba91113db25a89887517eba8_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b5328718ba91113db25a89887517eba8_JaffaCakes118.html
-
Size
1KB
-
MD5
b5328718ba91113db25a89887517eba8
-
SHA1
e7d512fc7f503e384cb04b71eabd7292a450f6f1
-
SHA256
0939e5e45f5d4fa919cacd40ed484fc48f5edde0a5aa90c9c30041481ca130ff
-
SHA512
f9f07fb9b7aa15af312e81721fe90b1886b943acf6c2458bdaa64bdb5c9bcca31137da77984c630f86ae5ba02da80bced32a93c70a404424d5ab473d71112cae
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ee8180af887b6841a4f688f76cfa6de4000000000200000000001066000000010000200000003d6c1e9ab3aae64b78abf9cc7f225fcc94f0ac40088320e9026db8c7cee498e3000000000e8000000002000020000000a7e6641dfab473a9f5a19eb2a216912f72c57c883cc423b89e853c24ee130186200000008d9362ef2e4e6cd233e42594d82d4df45f3e8e150fe28318b12bbd80b79eb28a400000004d6d1e1cc6a290d16c52ac327108198cc8edbdc8a7a1f89b5177f44fd41892e46c265422c56d9c31336fde5e373afd75956ed50ac8190c19bfa1dd727a70bb18 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424733736" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04D0E311-2C24-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f84dd930c0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2944 3036 iexplore.exe 28 PID 3036 wrote to memory of 2944 3036 iexplore.exe 28 PID 3036 wrote to memory of 2944 3036 iexplore.exe 28 PID 3036 wrote to memory of 2944 3036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b5328718ba91113db25a89887517eba8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bcb05549cf759260913741cb0cbf228
SHA1ebdca1ecd4f8f35abfd59dd345ad8a74d16aa19f
SHA256d8bdad2025ff712c40628050f934a5c7dec5647aa09669d320ccdbde5210b032
SHA51246f3873ee651309b2cb3e82167be120774fce0d83efddec9ab1b46e96877a94b47833bf9f0ace01e81355a325e12c1add607800d7c4eb99b58df88c0f3665a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7d8075dfec5b6c7c60e665c09f960b7
SHA1e8198119dc91da1f8e31350363294fea1b8ce5d1
SHA256db2870a44f77e40d4d741d21dba7b3171f86349a469006489f1daa2fca91f90f
SHA512c552ab7c8cf1efcc295b051b08738993d6bd09fb411b93135fa0bf7abf8443669fe2da961d659960b1043547b3bb99f7e27237fd7d8bff3566606f7591d8007a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e30c77bd8b1926ab0d4bd52140096cb4
SHA1f3fc70f31d14822cc23389d72687deaa78651bdb
SHA256de171db8537a05cabd45636699532f85e510ea37f2588f6ac89228f6e376a3e5
SHA512b1a116dd55303daa24a682ddee1a754360540dd1954561be616888ef4e2d82db6303de9d11a2968fddc2d50cd9cc972510755a5d249925ea94549a222522ab6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e002a33c37d39881f30b7e03042fbcb
SHA1eb0b7ce84a874f439c525660da83897d8afe0ec2
SHA25684cdf463416963f93a86036b74110f7ddfb943d848774c0bef5373ed1dfe3a59
SHA512e8bbeb743eeb506ec463fe09c5b75497f83495d04153cc01cce3eac76c237ac6d4a94552f3efdd61e91730945346c6eb2eb019911a6ae23c7ab269df490a7a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd4214c57ce42893360c11a381bae52
SHA1db57a542d13de3f5f31248d93691e3939c45f2a5
SHA25666bab9cb3469b5f7992b56f97fbeafeefbab8d247a991e9d9bbeb0bec4c0008f
SHA512ec195d9768cbe39633f57c11931a2f759394e807fde3bf63ce6837b531f9e9b85cc7e329d8576320c09a0aa734327d2fa55c4ce059ef0296a27da08772c8ee09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2938bcbdd8b1cbfd4ba3b5f15e0ef7e
SHA12940ac259b7e82818869db2b6620eb050fd048e8
SHA256623172ddc86d2d0398b1492ada7756d636d6b662896a90715fb434d07977fe94
SHA5123498a1126342ea75082ffbfb1953ad06f56014a6ea2243f9cc1e4ce8eaed576187d65796eb23ff1f38cd4556c202c83d1970b4d75005b4271d9d24e65c6a20de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de9de9aa0c65ec611fea349d69582a83
SHA11cd9b032b97416fa77e2252e22d2dd408f1c0cdd
SHA256888f10297e144cb9f64713673a8c120cc5b8e54dc552dc2f38b06ecb2f15d885
SHA5120e2db27a6294669027c1cef72d3b73de1e0f09792eb8891810fbb8a31f051265b53701f0a7caeabc8c5eef322bda1f9bc7ce88300a6b98891db06d42f64a2968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f165dc65075d2c9029b4b18967a0c4e
SHA1b9a88426fb72b0040d1c111559cb73b117cd3968
SHA256717d1a82316e44921efd6750ceac93fe5644c2e4983fa70a89fc03001761f583
SHA512f8c3d1fbf2b5c48a58cb2efd60490818265871d4842d716075250b06f721a6d653bd27a6443bf87916bc0cdbd3c883c2e4f88e567eada61f7bd3f8fd35de489c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5359f5950e9b2247dedae2090d1f96d3b
SHA123b9e89c416244c7edeef82584a6651f156769e6
SHA256c8a08e47c0dd0a42e22594818ced524bb3304a282c02707e7832490e71c824ff
SHA512953656a0007f433bce4483b38ca5af5c92d9bf2cf50922cb0468ead93da5292e29a7bf356d3b6a8944afcf35ec1a715b35ae34b16871cf034e5cba950ad6477f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2d8c61026cc5554cd6f8a6060eaeb44
SHA1897fdc1539c6d48b18f0e91bd5752191bea65553
SHA25600d455d3009ef3e83bdd8dc876bbedc9886da674b36293f11664ce34424b3242
SHA512f85308dabafa3df67a9f2362c3449102ebe479fcf4cf55215e85eec99bfb5543044c3c824f3bc9af9988ef9b43055afeafd995d94bb2101d120decb3a7383c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536d852fc9ad456b785c9a9e365eacb1f
SHA17fa59fae6e8fa8709d2299931acea41b55187f5d
SHA256979fee114a1a47e3f10d23e54e043fb9299f300b640a6d3fe5efb9c96b004ba6
SHA512d2efa03964d0015562004af3ca9e855cef625da60be88ba132f9c3ce6b1ca3091a3cadb7e4b2108ca62f77dc422444a177f85feff3d75d3c7543a8af321838ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c7fc31d924c581eb436b79e703fbbcb
SHA1a2ee7a14484c7aaa2fa6b17f8148af3a58855355
SHA2561d1c7ac2cfa8233169ed2ec1d7fd16c11ea065c2525f27c79e2e369fa5278b65
SHA512fc1ce160773c9fc32791d0bb0aca3e7e3c2ee7618d2e826e9bfb2d4c089c7e38e976875486061153b18e18c431417a10504418d74b8d2075ce948e2d24b90d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e0d74e8cd4e87f98dcd953ddd3087f
SHA1f46e41246b635953609afa7db94685ca37f1eed2
SHA256e8c3f29427488f8eb0deff1206b1b7f0e6b739a4400900ed422192c2fe70e821
SHA5121ba1d747380e856d6872f58fcdfdd1615e5f22b830b47b418b9186c76532c01ff87337c22cb500a0d9cd85068854c1bfb01fab64974df0be9fa1a5d1b1dc639a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54087ae0401f5847ac0efb47661dca11d
SHA1bc7e4f88f9392f03b4362f719ace82483b7df915
SHA2562e926b46c01f36ba601937789b1624beca15fbeabdd974d691500144ead6c9c9
SHA51295282f334f38f9c9ba465d2a54bc6e18ccb80563478b4d34a4821ffadd08accdcdaef6e73bf2ad6f67346aa3ebb45c4767e4e2af00f7c28101686aeb6475e4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9cd15fa782d1d597592a2d7d41b7d00
SHA15b9965bbb60e1d00de7662e6b737365cde05720a
SHA256be2ea675f35fa7dcb727c2c03b08c3838b21d096e0225ef4cda101cc2326961c
SHA5120feb816c58ad779473bba9356ae464003354e153c0606e4cda2ce6e80bf62ccd87fb43da8612f7b5bbc76719680bae90d632c4fd35b1db2b462e8edb160cb153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5329397e4b4bd9c354124723ed6353d29
SHA1442f8bcde30770d582838dc74274f6ee5af73426
SHA256478f72f08cccbbdb84a6886206d88d6f1e92ffdd00b0f33230acc0f67d31f328
SHA512dd2a60b395af3360c66986809f5630f2c10d2264a02289dc945ff3699f71101385d435d78ee3cd0b1255f6b4329a280f92e6ee2fd341af7566f12c9824c69ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c8b6c57059479fd4b98cb93e75b898
SHA161843c18e5336a834fd5c606695cc46c988431a1
SHA256daa611496c5494cc87d7d08a92ca1c138e672d2521aeb0de6e5f221f74be46a7
SHA512a2a3cead3df44e2dac6d043cda04ef228414799c786407c169c2664b01299396e436a31538b2280fb5fde7411a8bb857bcc59fac334dbe6aa6fdfe500a8eb659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557151cdd61f46f6c03a843c44dcb18f4
SHA107d54d6dafab335128d719b82a95e6ad952e72fe
SHA2564fed16c34c2bae040faf165aee4c420772beef71aea45b2200aa9db22145d923
SHA5121570bc71fc8c9649431d87f6010198776b16b3f78c6c33c5fd2e9a1b0c10a434273f24003ad4a464cfe67b28704c119ff9269ce82aabb99f9994b94a630dce28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b4c571085f3831661cb97a3c26f83b9
SHA18ff98f32fb5c2e69c5af377ecbaa0018438cd682
SHA256c0e998f240165bc8dd3fe84bb51eb9866d98caa34cd087da696e1acdb8cf6363
SHA512af919c24b62027406803d808063a14bf5fbdba7358099af510fc1f68d1a60b107d0ec33b761ab946bf89ab60fabc4d38b1354fb44f537c858ff6e2e120885305
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b