Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
1497dbb3a218241cd4b5ccb673a950d3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1497dbb3a218241cd4b5ccb673a950d3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
1497dbb3a218241cd4b5ccb673a950d3_JaffaCakes118.html
-
Size
1KB
-
MD5
1497dbb3a218241cd4b5ccb673a950d3
-
SHA1
91745e2437c13bc6748f8b6a546f1a9b096b8f87
-
SHA256
d8979c04d31a6d4c8493e4db46624a59964dab306225d507ba79dbeff127214e
-
SHA512
e761f0665db0bdfd5bd312b974296c8c4d40566d908684996ee5b0046a30d5d49fe74fcc109107e15412c3822d56caf29f23487f9c2958dd0e67c25578e2173b
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425622452" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{396F6A71-3439-11EF-9A67-52FD63057C4C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000d86df33a96953ce2640c23bee1eabe42dd68c394601b318d9d8a17d6de9b104b000000000e8000000002000020000000a87ca9531b3e64e9c8f9e1249a42d14e5f47d14ac257e8fdc55811b1eafae15120000000d32d38d6b294ee0f42e08a7659e2c565df10d0bbcd5de870e312942be9e325fb400000002fae59911f88e7d6f2457b50d10dc7d55725fd8670f4f8ea6a59a7682f40164eb5581f2f9fff3cbdde7fe4302f29113a1d62a0218fd635586fec773ac7bfc755 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ab741346c8da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3028 2424 iexplore.exe 28 PID 2424 wrote to memory of 3028 2424 iexplore.exe 28 PID 2424 wrote to memory of 3028 2424 iexplore.exe 28 PID 2424 wrote to memory of 3028 2424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1497dbb3a218241cd4b5ccb673a950d3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5193a7d925d3dd7c448a6e1939a713c0e
SHA1c67ded41f17b82010f4728131a6ce8056fb6e306
SHA256fce7171b297ba2c93cd3b7e57fc406b872f96eec4d115a9cd358a9e9a434d8c7
SHA5126bb12a9088a47f9acf2ff3efafa29f44094eb5e33e7289c0d2a95faf13402a3727600700dd597ce707776b7c886a0c2f0f9b93140766b405428e7b54a864d190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d89ccc489deb5bc29195516591625120
SHA192e7cdb5f094698bba1bf4b921d723fc416a5276
SHA256bc78e2f935ab510def46457f6e4df22e0a585356278e3d171d3c1dc339892471
SHA51253dad055c4671c86a88c48695a4d57df65d9a6aaf5d55d7d156d5d903ddb22db27b7fef74f79b17af4f418f4d58c3021c6f994d28a967d4af2322f04a89a4a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52abe556c0858559961b98e7502e6b1c9
SHA145864b8fd033824547992b0b5804d1197bffad38
SHA256686bc2a285bb9331e7dee0776efa2c3ae6ecd8166c1990355d81271c7187e943
SHA512443a3beb9edc4f995248aad063be1808f2cda82e6910405ca8429fda8f4e2076f67b496136dcf2e2f73b9a507d10838a1c5ecd7fc10bb225ee377ceac6e9ce24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568351e673ba50178bf42c808b6c2466d
SHA1302d6ab448848748f9638765e39f9411e4cad460
SHA2566785f329e477f50f0f80e7697d81f749d3dbbd4fd39ff70b4bf0d756c72e83f9
SHA5129384d67c045adb80982c335e103e7a3926e9ca8d2675787785ef5a4e7fd28434614f33a0628a75932701dbbdf4bcdf6d5fb3ef9c66bdfa835e3a0026085cabf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a6c68f3d91ee9824ef7ab0534bd766
SHA136df950af983f8e56614179799a770f7fd88c0cb
SHA256fcc81495b025bc3b4268dcee1688c8fd1b4cbd450b68338fa26b6ef8dcd8b366
SHA512bfeaa2efc25539e3d0c21c3decbcbd1095691a9cecdd384bdb100d792ac4b511277379eaacd38a452a0354b3b6c368bbf63a9483da6014979ef733955b4ec8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51492676f2493e284ef6cc7e60a65491e
SHA17c1d98882127160a3d14b3342e708063fd8c453c
SHA256563595535aff480370f90c23f2db96066874f980c51c9569781960381bc8b11e
SHA5124ef1544b19569ad32edc2cd6d86bbee5a8626bf4acbb0fdd7dad1180f4009020a1015a95cf60a497424f1e1450e3dc4ccd253d220f7b6bab15e104d7a78f6fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad8a170f680c29100627c8b8bd19bbc
SHA1faf0058b71f6379d0957761c5bf1160bd11cb1f9
SHA2561ab23e79816b7b02668edc26d862325dcf38a54a329feca11544c762896e5f56
SHA512dd776d3bfc71dfdf61403a953dcbe83e754c39235f31d183563892f5969ab3967f68cbf037809882475cc8b6ef05545cf02c3d8bb22f67003bd4448699ad2258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570ae4ff7148a9a79360336dc353d9570
SHA13e49aa8c5a6933f67a490f1632336e7e4c130161
SHA25649a8ebc2565eda75fab8a3c5b60a20291e9e4ec554334b823c4d86c5274e616c
SHA512e15d8699eb8195cb823928e5eb5c55fac46ede1f6ed580246035dc9ad36dbd4c69e454e72bb3a8186b6009af92e03352bead555e00051fb524bcd73791fd1b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f21345a38281dc2b5cdea8d78b212a4
SHA1865ee0268b34382cb8a7f3f8740fdcab15964e71
SHA256c9cbe3a4b1d8d49c9cc475abe94c01bd9972b7569d993c903ebbe1023eeeb674
SHA5125b935626d97321c0b6d41f03194ceadedcd0f1c2e92b074e84db44b42fe0a1091e39cd51f486ee2900febdae9926a678cabf3b405331653f354787e99925cba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a571b0c6a86ec8b0c0e07509cd9ed73e
SHA1b996a927ac786886b0e1265f5cde6cb04182e945
SHA256d5a6919aef87e4b2742e92270b9e05ccc3ced37807716ff3f7d9527d3cb261d2
SHA5129b6c453d626065ef9196ce8afc613f1cb878f9b4f1fee7c39c04b0d2f25fa22042677fb7d3f4c1b7a3cec1b325eda7136633c5785ba1dbdc800ed1f53cdaa96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5714b36b2af1cbd0640f0fb63a95d955f
SHA134e3465a37fd2e5c893c09fdcd625ea861d41fe5
SHA256c3c9ead1b0cc63080ef60aac8ed9a3bf2501a1b7bdfecdd0b75799e0dbd10d0c
SHA51286fa785dd1c8e8b382899be450240f83877454006cd1e4b85b3833cb71992fadf4cdb0e9222c4f84f045ad8721a509b4690c9f343acf00d309f4cdd471360558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acea59a3438f34a047dc49fa1c491e1b
SHA18304d2da599779109d107b87b2a8d8932a6ebd6c
SHA256bac8aadd1ec924613c452384c283df9df301ba28e401de868bababc51e5f1568
SHA51235599e6f095f485a4766123843cbeda40000effe30f1914588b4a60f4440231ffe91b003bd981f0372c6719dd813e9e62fa6099483afe388e74508b1f121f588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51654be0f235bb8f062ae560c9e67fc24
SHA19b8db91194f6ec6e6d8b6459a3392cf7f7fe84db
SHA256954b4aea1a1b4aa330c534e414938169717be25cb9073243d57f8f9a0ae9958c
SHA5125b846e8d8deeb6434b8e74b86a577dc57620e017e4004afbbf6f5eeffaebad520997dd6aeef5dc319e61f3384cbc4c66e62dd46eee58ef2b90f5f8e2027cea75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57578682817e7ec80f7adbe8439fcb208
SHA1ce3cfac62e7a2c71187ca6d749b0332274717791
SHA2567efe8c4e0e2971e2a6c7f0a5acf32b92f24d0d38b484a90cc642a3d4474fb8cd
SHA512e12662a3c09d535e182765a3bd8bb62205c4c76220f2d366a7d96dbacbbce7a073e2b58e6f2126159bcb3c2f205acd6ca53b3346e4c7c4e216ec1ad606aa0c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574fa67bf6163f5c48079fb990c542872
SHA1d28a14f4c9d1cf8dcd36e328a1a0c519a4961395
SHA25611045e1c4aca2535e60f6f29316443aef8458dfefe570917e3c615c829c82091
SHA51259cd5216845db5cb588c990db2f617e135ee0dadfba31d8459b56b78f92a80d1a7789f93be282e52fe72896a8950c07473ddb64a0c59983ed80c4d920f1acc81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f97622a2e11035d6198994531b0ab6e
SHA1f04005befc38b288d0cda0ac704f21876a94c581
SHA256b65f517aa77a51bae2ccf7026a21b80d848d3500a9f3495cd4f1afc927195fb8
SHA51213e1bf4e04fcead9e9ae0a6afe316a9a6b2a4ac777f693c9f9ecc0b961090246d4306739a90b6f5851b0af5438c9ffe9c2908c544226c78c79b2823b4c483135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5989e229030e2692457b8633b54fa8707
SHA1310fc974a305f478f90c63cb5b7982298f685d77
SHA256a4d13f0630dd52ddd853ea22368f79ffa1bf13f3bfc3e4f5b64056ec2330cdb3
SHA5125fb64663612b7df670ded54e8ac6d8617a22a2c03e6b710387230ad9e0174b639d8ca955e1f84b1b8d51887aa8d0233124a469f70e9c55941907e6644dd8bc67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532123b4bdee9d300cbcba3d3af865607
SHA13085c86706a8e92a7c06d33cb228a03853df757a
SHA256ecc7cc9e8106359404de93caee8932bd597d6c7fef638f1f227d1e080f5034f6
SHA51278b8512c34322be837d7501d5b571593e6f08c1e6e874f7ab2337cc3dce2d9799c388f343ead939d12bac40726e7bdcc17dc76a769978a6a01888bd24260a38b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3750fddd3100402eb44a4480839d174
SHA18d2a3043736285b25d505f991eaa817eaec764a6
SHA256af1359eac27e102fa8d7e8a7f1203f1b7b4c71f1779aadf5bf1d32f33ca7f5fd
SHA512c834563f2243dfc8fe032137d8e05bc3af50962ec00ffdce6820248cb81579134937e1db5914351ea51d4be6977acac3a76339ac50304aadf427acf026eec9b4
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b