Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 21:05
Static task
static1
Behavioral task
behavioral1
Sample
007c142892b5dd94d9e9694a96596e57_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
007c142892b5dd94d9e9694a96596e57_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
007c142892b5dd94d9e9694a96596e57_JaffaCakes118.html
-
Size
2KB
-
MD5
007c142892b5dd94d9e9694a96596e57
-
SHA1
8c350dc4ce86e37d8f55548705726b0007b3a14b
-
SHA256
34e11a122378a71eada91505e2db5437358801610ba0a4af53ec565f0502942e
-
SHA512
30680105a8c4f6f045b7ad37737fe0c8ed6f2d967f82a4444bccafac83f3423bea2b2d237894b8f0a9d648d730ab852a57233f5122a373ac1a715409c614d4a8
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dcef878aa199e64e9e871b6fd9b0b9370000000002000000000010660000000100002000000014c3807957d0140ef372b9eb2c3338f5472c4e16f653de242673ff235290c5f2000000000e8000000002000020000000b50c76f8735d22f9004ec53003226a87795514ef8846779809a7de9cf3270b98200000007966ea13e7b7fe8fdb88e4f74443999ec23dac47d36f545fb36c6f3a5444b38140000000c1d41fb01d5bf058744f0f043ec1a53261dd2bfa8b0a17a1407864049139b1ccdb78a4674d11ba950ecf7a39d0647c7638fa78bd12e902796bc65a206cd73d95 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dcef878aa199e64e9e871b6fd9b0b93700000000020000000000106600000001000020000000b0d617a7e51d46cfaa99d20172299fd6d3f610b018e54e8735822c2d80676900000000000e800000000200002000000057baca3ea5767c581d52d942c209c12066e0eae6bc3c987c631d1b5c6e47d0d390000000eeb7aefe3a2fb0d73ab96e42c6aa719f8981b24de45f7906f33e115b816ac63d41fa1dfb1a22b7b58550546046647480306dbed846f012af041d7bb93544799aa816c9cd4c25f9ad8d6fd0bd441186dee7a87998765b469aa771439800d7dce07124adf95098d0a3d0983963d547bfce47a9b655d2998249f6e574c7f784da071164e6c64bfb46b1225175f13af4983d40000000496cebb3fe87b3d277fff3e1089d11a00b5115b951dec3075a75c503593f83b5a3285a271e9fbf009a8fbd88e66d05b59c8395a0ac5a2864ff1a4a3e65cdcf02 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424993008" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408206848cc2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AF8D73B1-2E7F-11EF-A3F8-62949D229D16} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2948 1976 iexplore.exe 28 PID 1976 wrote to memory of 2948 1976 iexplore.exe 28 PID 1976 wrote to memory of 2948 1976 iexplore.exe 28 PID 1976 wrote to memory of 2948 1976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\007c142892b5dd94d9e9694a96596e57_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535003856b3a73dcf1b9c065902aebe59
SHA1442141a4c018e4628d8e551ebb8b6022772bf3c4
SHA256d00c3db9bc39f59d892204edd2f2f95fa80a02c1ac5b9a3ff130733fd192702b
SHA512039cc2e61f7c7f9e69b731d03b3d5ff35fd15f3527ece01e16b7a71aa15ec597d588030f3e8a27d857c374d386f788484437b11f92636cc98167bf8b02e96dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca8b022ba1a75ada9d8dfc0f99c7aa48
SHA13ac826275444a9e192bb650cce3942e754c2150c
SHA25695e06f5ff7c1f9fbbeedab892c08fb48422f727db634faef7eea9c94f88659e6
SHA512d802182ab8c383f79a809f1e33620b18dc372fcf350aab00518ac48fcf040b94756d413aee2d09e8d47ad1d490f6c48e59bd66bba2b9a8c2c2d0b235fbf61d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b881845b5af8017046dfae7e776640
SHA15d849aef1cbddbb7f85f9cdf64a1a2f94ca9305b
SHA25689fa96912fa86153ea00c5a6ab744812188a5c8e3e4fd8985b1e9f0a19dc1fa6
SHA5127da60f2d647d487a78d58fb1be2920bc94ef7d0c396a004dabbbf50db36893906c88770a3a317965cb1b160bdc31926000664cb094211f76ac39601effa246f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57965a62b80a5aae31b9785bc200b0b16
SHA1f9c3b16678be45fe94d15784b47fb9fe3a8507dc
SHA256417a58c79a3b5b1fecb256932016db71328a091d157ca4ae0d0601ca95554eba
SHA51245956818d782f4d657553bb02122bea9bfb8ae893879a458734226c20a05ad4c7e88424c87c91a45716a0a3512476ae1ca1c5aa720dd7741c3a60a4b76fa3875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5455e13a3e706885f55cc37fab16bca51
SHA125487b3c36685bdf4b43065afeb8b3b3cabc745d
SHA256e1a4d2b9c47513f972266db60f08203ddcb01755d852a6ee46ff1a16ae872fd0
SHA512a4d8489536feacf6ebd0e7a1b8ccd7c24da27952a3c03a0b466ab903cecb3a9b39156394115375505cff6413b904a4f9149dc81d231803c42da16325f3c59881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5748349e6a2056ca67ca6d04584894ff3
SHA1b0e5d140a1eebb2412308b782a8e738314359098
SHA25610bec423caa36fd80fc7ebb354530ef470721acd4d310f83a8c61a7602238358
SHA5128506992fbbb525df58cc8bb6f5c2de6e30055504fc0f092d44d127a8deedee81037af7161b89080a53b2e5f38ea0792e4aced1dfb5965d9eda17609596d32d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b367aa43c225c4774b1151cd2062425
SHA13ffa2d1e740dba757aa0a82207691fa1854bc635
SHA256595deeff34c302469d748426218d8c09086d0b5dae05114245b62dad2bfef533
SHA512e55534efadd06a7b278a35b2a5e4e9e49a1e51105de9472032b767ee47efde89bdaaadec7996a6ee4da5c048c6f1f7abcf375bf4cc2475045946e4e71c7a4d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c67eb34c8c5bc910391427c305c8b66
SHA180979875ef301903e04a25beef3904b922db39bf
SHA256380037667224f843e7e748a9d070ab61263726e656b6e65363c305db2760d4d4
SHA5128d46a53068bde8d38b79807e466a1f515b0f66e0f50bc80692f28c5be9d468e90b98e1a0b65279e82a5aade92a54cc2ea14468bc3fddd2d0f3231146d930e407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5590804cb141e50e3c38e9111bb4e7874
SHA11f4afea3b672b9557ef13bd66c648bbc43fd5100
SHA25623096143e886f34baaa006b50e2168396b629493a67e63cd4548f66dc79c2943
SHA512f116ac71bd6dc26e681e025e0c28bd9d56124e15c78bc996efaf008c19aa00384dd3f8d74e89d40b0ee7fa11940549ef1ddcc848de03f37f9e07212160e06bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7de41fc6ba1f2e73a10944d198fe8d3
SHA18e7cf6c4f00ebf1e1f587cf17e83c4133dfcfb4b
SHA256e63be8db836044d12408fa29471d36e11591f2c41a7667be3f1bf6ce27011a0e
SHA51254b789e3657ce3322dc314d910215ff9af28d78fb26742270c0a3ca0ea696bcf66b3bc2a2268c4ee8151f51e7c756b95d0f247a5d99e2c8f182a025e3703b534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579746a924d0005c24733eea96eef5e2b
SHA11dfa558c36a8c62d785f52618d30e9697ce38cb6
SHA2568a9349395115df22e085af4a55aa4fe0a471bfc29b4bd0eff45d21652b4e70e9
SHA512e062e77477cafdabafafe84780ec14354c92b91e70a4565285b2ccf58c3e8854f8e9b441a790650fefb6d106e7128ab1e91062815622d35f9336f54d2530e005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea7211997db79b61c2f80c5f361e2257
SHA158943474c9488fa8f92479b86c8adb612d8d752b
SHA2560a41c832846585d3caf06ce276690481b54c42990b14ad068491766ccdb7a83b
SHA512ac36f0306d55bb183eba77947c93d537c368657633a467e958159abe60199bf69b026fefdb0db95047d5eb3f3f67a6d261ded0835fe8abdbd12566371cde9fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3e0a412f9481eaf6f2b8ed5fa63f3b
SHA1b4de9ad03b23fdfb5cd2806b1ec8c02ca7ad5f39
SHA256380116192dfe5e430304f3ff403cf1829467f337159b10aa5e1fcebad6a4bf49
SHA5128d3ce8006c7fdcdac9548510a313e21f50374dc6cdfb2676805992802add113fc9da9491a9ecb7b4daa38291076c2b0daeb49c8c862c573c845ba8bd7b5785e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5708018a0ade47f1c020dc488d193f2e7
SHA1770bf5474b53ec2d9c8faf1cd66a23b8d131f4c4
SHA2566e77de0331dbfaa167ccc41c36cec0090a11a124ecaa6ee3196208f843ed9666
SHA512155509b52cb4e354eba8a204662b286e78c0b7b912afd810255128841d2b785c45420bf4607115c6f297a4b42cd13d6d360afd39e168adc92e09d14b3f8301f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542293d4a8a3bab05c444cba4e3a7053a
SHA111421c88c5b9462b8b42cf2d9b898a48280af3cb
SHA2562ec599b47631646e355661b50b42e75024d5a348bd55ba8f72504e7fb035e6b2
SHA512880e72657d32ec11f4838bb6d6701fb722d23d0e2bc71dde55ef80caf6a01202dde4fe603f53215744f5221b3388378312158d61aaa58cc9fea32b362c8d13c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f09fba6e56194b9d1a57bfecd81edcf
SHA142014378d7603b3baa17991120b550a58ef6b196
SHA2561673fb2a5006d75a0e02af840babaf021d8fa6decc1ad2c2651de3bf99f7d775
SHA512ce750222edef90d6c037e79755c55dfc2ff19f0b4c3aa0ad940f83408ea27b5eb8e1685f47a8e89e1130a5a599ec4084e6ccb23f127e1c17f49a9e20df75d2a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a21540cdb4b5f7df49289dde8b4f45f
SHA173ae1726e5fa9c557e7eb80fb54e5f067cd6b826
SHA2566cc73724143ae2e6cdf277317d5c76eaf54d5b08fbc72f362942bad9354b9dd8
SHA512f920bc4a8e1c09daa62c6bb783e7e6e732382b172da5c4eeb8d08b04610fe65be0126a763ae42e8d6b6759f8fddf2a30086ffb2c7809d903d428634209ff0b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5520f3756902e3135c328605ae423e8f2
SHA1bef4bd46ad868519bbe1f2c70f05c8447e9d2ee6
SHA2569d92b77b3ed568a93423905cd3a00997780131ac12935927f8cf003330ae5272
SHA512644077714d2732be1bf93d19c35741f6edd1e863a2a4d8f302d2a429eaef7a74476ace07431249906b91c61f17515949312befce6d9a5865c875fc02e8b4b757
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b