Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
17da44f32ed50d37e228bfd9c2318f9a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
17da44f32ed50d37e228bfd9c2318f9a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
17da44f32ed50d37e228bfd9c2318f9a_JaffaCakes118.html
-
Size
95B
-
MD5
17da44f32ed50d37e228bfd9c2318f9a
-
SHA1
2a51e8eaa4cb4198f699a95f6bcc75f59933e776
-
SHA256
d4d77340e64e1451a363c90139c7952886d6151858b56a329b95b37590aed2c3
-
SHA512
6c3b0165d2c1ba3d8d6354df23339afbe583c221fb7ba0d6a5ccccf3013003b83daf58bc76be863d6731feae878ec7cda26a48895c40e4949267b639abb19c76
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9249CE01-34DA-11EF-BAEF-F2F7F00EEB0D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000006539b92d8514f8ca172f5a4972855a8168a74073429777b86569cd5a96e35182000000000e8000000002000020000000e2bb44c4bbab8e16a3d511f1ac012299ef57bdfb347f497b1b91e452ef69d4c420000000db657c81561f507114e0458d7a2244e601d09571c4cce0e1cf263b6049175197400000004e68536b712df9f34b88d5134a22b9f02a1e829ccf156dd95b75244cb6f4b935a897e0f03577c9e70c98d49c26e4e370fcdabd10df46bec148fa823d60dc846e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06bcd66e7c8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425691786" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1988 iexplore.exe 1988 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2068 1988 iexplore.exe 28 PID 1988 wrote to memory of 2068 1988 iexplore.exe 28 PID 1988 wrote to memory of 2068 1988 iexplore.exe 28 PID 1988 wrote to memory of 2068 1988 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\17da44f32ed50d37e228bfd9c2318f9a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9f2cf9938a769cd618b98a2c2cddaf7
SHA15b7e66c3eb1fece3a908062d088fd78a875fb597
SHA25653a242262314c2a98be9cc5e2d3e091813e5b6151473a112fe08d0dc646b5b73
SHA512d56e522ea656db71cf33a75e242dc1f5d0bfd920acccb43d98dd911eb01a3609d4f75875e2295f0cf55b4ac1c4ace81743b81ced9f2ac2b5e8b55fd1241e6fb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3738875fd6a4556fdb34ca966ee4809
SHA141152288dc310d09078a4196ceb44a1469804344
SHA256782e0443b42081eaaeb19b3994d14d7d95d0197688aa79c65ff1427b0b2fe669
SHA512067ea86dae337c42b77cefe67156fb00053028728511d8f24a6536f8d7420384fbf419398fdfdcdeb957563a197c922a6886d9951192df127c59dd8fe06703cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599dfb0d3ccf2b2cc0e01f12ea38f56b0
SHA16a934729a91bbd838af33256eb9e05000da6a7f1
SHA256cf73325ca937f3dde658fdd8a58616278383d2c881f89c3ecc2616f70c9ea37f
SHA512ec7ebac10cf09084a98700c1ab1bbe36ceea6b8f7634a6d39bbd6d7b6473ad6adf3e5e7fcb53d25a442e2923d9a0063ed5c99259ee5ad196cb3d857418e3fd93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d00df4e48d1260011f71ff658020d859
SHA1dcd0053d51ed3aafe720973be7f4f9aefa6d5432
SHA2565ac742b1f96405966df8cc7e17d35ca0631dc293ea598e95a667f4fba11f7d70
SHA5122499df89ba2e113c65a7e1c3fc422e03f33f4139885bbb2ff5cf1aeb81ead0c5f11e05a2616f0dddf1a5c9c9041e2ca3eddac749ddcd38015bc518c0db8d3ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b232e086598194ea28037fcf52b694b5
SHA170b5b858ab3d54ef860eb4103946ba00606cb75d
SHA25619eff212233477c2cd04de2852d6f04a13d2dd7e8fc020d509f143cf949ee091
SHA512ea62cdbf0b29efa6216c7da422e96017237d94c0494339c2daef6b3b88937bdad710c29fba60078b36b3bbeb991d5dd1b9b6cff41b02bd92dd05073ee7de324e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2aa2b297a084dadd57beb655f45ba0b
SHA13f8e4eb52e808c99d17276b92d09bd39df97e2c5
SHA25611481c59508ae302d4682695706a18935885b2a321544e559160bfb701596c15
SHA51263cf1137231e7bb0bdcf9a70c8bdc017cf039b3fb12f861ea10c05cadb0001926e9dad9b9cdf99cde8d3f02b19ca8120d45e98522ece98a9a7c2c147e318cbbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ed3a8cc0ea9583cf3b5c82d575b151b
SHA1d99113ec4835bd59cc824e3e51719e5cf20b16b3
SHA25656863d84d7742645326e671b886557389b2858d443cf57e60acbe75003be8b24
SHA5127ea35470d9bf05325998f52203e4945408614e8022f9262cad3d28716b92c2a539c350d64b0c7a1426582192c0ac253919ff2a016f03c0c2834ea46c8e429078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e4febadc16ee50823219c53fd00f11b
SHA1889544140e4a72645430597289ea36371cc77629
SHA25623fa4485b0b83c9b9f04d1eb177d2a87d266c391187b064770406025323a0a72
SHA51276b7208f64de67c68359db48bebd08df1cc739f0802ac5cf1f3eeb335d2007c2dc74f0e910c51c641d92bf03d4f2e980b5bee2ddba7e9a2a4266aa58622e507c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5508512a0f962b73c665ed4f48e37de
SHA138b3d9bfab26e3c930df18b48e5add03bf354125
SHA256bdc24984389cdbc1ca22f79e8e5ddf512fc0ca9bd7d45279867156c5d1230edb
SHA5124ccb5ebb1403d8decb965c08fd54750fd0e6408fd2dc2997810fd17b5997d6ec971084ea98de5f0ae389d3154f12b3b3a643e25574e5ae865763b0bf3009dd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57484cab2378f77020a47c94282c5219b
SHA1f8a8bbdb2c7dca5690f0e3f0e9a7983c275d968a
SHA25692d1f340fa2375f9a0349e31b6a8139a59cc2cff8270319914cc59eaf719f8d1
SHA5121059f6ee371d6ae6aaca1d09bf71f1d0d40946c20a3ee94b4bb8f76d6ee0f6443dbd35bd3699703647a19de318a1c29d9feeca1cd132e9caea0188ce77a3c8ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a52af542e4ca2579976db26e343ee707
SHA1163bfbcbe0fa17cc941f79de17cf5ee99c44ea77
SHA2564f09003667322e6a24d17dbdadf80550c5739e40439f228f1d4748774a052aa8
SHA512d319df6b05404f9f330e87558c252004c2c45b75dd83e52146c771bcdfef70739e6b7044082bffd396907c6b0ce94cc8148b35c8296f5e0a363f679a3b3adf59
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b