Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 08:16
Static task
static1
Behavioral task
behavioral1
Sample
154a94241bf2781069e96e571204cc90_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
154a94241bf2781069e96e571204cc90_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
154a94241bf2781069e96e571204cc90_JaffaCakes118.html
-
Size
2KB
-
MD5
154a94241bf2781069e96e571204cc90
-
SHA1
11878f15d95d5ca006197a4c6c8064135992f72f
-
SHA256
628cf349f6b749cd87d13663fc2facdefe9a2fb546873a99f5fab583fdf998e1
-
SHA512
8d60fa4ca66bc8ae6449c6a926930b0b37a1c27276bbf518c5b12a3d632b369199edf3ae702edbba36e27571c8dc7a5ed103a1ddf76b7f8cb77899702edddb18
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000e10fb7e8f79e322673d4f2b7dc9bacc222326bae655271a192c3d85efa84571b000000000e800000000200002000000032debf9f5e36eff612ef0ffdce1b17f6d985b70542c9133fb7e5cf4d8d8c6e0a200000004d8ba181b88b34463dac800983313003b0c4eda1283637e13057cc6a6e8fb81440000000edb68b5057b571de1f745ccc00dbd7ee09f39b4e9f9130647bc03019c38161ea6723967f223b124678d05e38a116ce3a858024b46f7cb1013b044c3b37acf0c9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ac7f676ac8da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425638065" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92E959C1-345D-11EF-9A67-52FD63057C4C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3044 1680 iexplore.exe 28 PID 1680 wrote to memory of 3044 1680 iexplore.exe 28 PID 1680 wrote to memory of 3044 1680 iexplore.exe 28 PID 1680 wrote to memory of 3044 1680 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\154a94241bf2781069e96e571204cc90_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6a499c984a543e197ac52eceb0fd63d
SHA10c06d5e902807e9b1871791c64215cabf05c827d
SHA25626cf7867bb60698c2ee96c3cdb8354329b7a2e581a1fbf0d45c33bdfbb14c537
SHA512c5a2d40eba03003c6376477090341433504d5807fdcf0be3b27043a6a022d702fe74a07df3a23fee7fc0e1d3cb8ff9e9795a7aafa0c44eab40c581edebc47afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6f2d69f7db76b3a8c45fafb17775e1
SHA11b8adabe6604a28d57c183fa7f48cf1a002ce3bb
SHA256614c73e8087d067d85352b4b89a13afcd3efa203709aa1c2b87aa761d12a3b9d
SHA51209a530f140ff4049aa2affa8088aba55ccdf7dfb0c463935a447f1f2e96433a40055e7f673db78271c7730d1f0ee7256e99a9f625f64822c2b68bc8a6c1ea33c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568cf522d29e439bde0cbd409a4c46914
SHA1cc8b2ff0893fc61e96bf88e6250a4cf45a9eaae8
SHA256623d96617313d76dd9f80759503e518bb2b7a7ffa2c7578536851b5d3b97e17d
SHA512814159109fda44039f96d9e6486585e117caf0eb21e986e0d22bc0834c029a74d890a2473855bd7802b49c93e6732ba1012719460a1a0ba2b92e4843c755a4fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bea3ba538554a119efb57c1dca3e459e
SHA10774ed34b49783238477c19688882fa78d95b902
SHA25682365edb6a3307eccfe9292dbe11708f2581950e35b3c174fa2f34d553eaacbe
SHA5129adbb64d07c556467307ccb7456b4f3ef6e6c37a6870be5b9ca3c4f4f6be12976f5ca682febc15351eba30c18e3486938ad76632f4bd0abfc1afb2636025f005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8cdf79aec9222562f723c193b833f28
SHA117e8380ccde569e3a615053ac7bc5ef58fa130d7
SHA256de712602a3b186ecdc54ec616a233e3a88625052f3f00739c391741a0095dbe5
SHA51200bfda03ede40c53080da08835d79625f734bfb9fbb26b682f89199532b0d595646b089ed122ac97fcbdf3ddcd0e3db9ae774519b99dc23c9f65499377edbb0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a83ec86114c7c4925d99cd53504ae98
SHA10d62196d97661b8b086730cf8baf37caff691f41
SHA256b8f3b85060c02530f50db9695ed49c9db9e516ec0d3131de3e7b4c1e61e4b3cd
SHA5120a90f846ed54f2e82fa22eefc6c374cab26cc454242fc5e161718e204d54998124446f176bb0f83ed818dca59501a5ca6881a50a41829c38c3516ea48df7d2e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a855711d5cb4b2270343d237d0f550f
SHA1764db0412bbbf62ee43011c8395db3336e66389c
SHA256454669b0481ed4d78bffaa22704bfc7c2e917a4e7c604f2e508ee89bf0a2a8df
SHA512a22df27914bd74c3e84e519c9bf427e09883b2d0698a1e8212cd1e2fc49908362dd468596b290c0c6a69952cfd04bf9f81e3b5d114a785b5d194be15452dbbbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a90925da6ea19379799a597ee797e45a
SHA1161bf0e4c197d80c88a2e3f89d543599baf61eab
SHA256b354b651ede4106df4509979b2c3bfe4d9f5972b9c0d587afaf6b8e8b5696625
SHA5122d3affa939d1ca908b744f853439b38787bbc0e4a8bef7822b65a5fefb8f5ad4b033ce83fddb0d132101de4d0a32c66fbae93d4cb31f7d5e427789e5ac38c7a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc1205ef258f113b9a4f5e15a132e977
SHA109cfcd947d4c7ca60d39b5d1187f7f8f70997cd2
SHA2568839c50ffe9184b21e4df890c5f1312b415b68d6b6de211e8f19c4a8441ba64c
SHA51261915abfd8fccea3477f95e1e8fb9e9828710f3be3583b46e7abed2d3424807571cf62caebada2903226d3081f26e54ca93cf6b42c03627a31bac96bb888cfa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504967780dd6085c973b8a62255b5992c
SHA1120e98b2e575174b2e8057afbee2396ac64efe12
SHA2567c14b1275ecc34aee6b24dc19ed2d105a8c95d1ec0f3d08d90fb1e2185f74de1
SHA5125dde4b05a8e05e10468899803fccbeb790280d01be070ec06a77b7a60995c17a99962f8cc0596f6ac036bc3e1f6f756f0710d5d93651e2ff1517ece5c3ae214c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5decae4227c1ec517b4fa33a2b7739a7d
SHA152af028f5a245f52e9159aa4ff370c234f491cf5
SHA256ee47b7c2a4268519d3693259571930e5ea56f0b3dd262b0d28d361f3b4262b2f
SHA51265a9390571e1ae85782eefc2fff9c68c970b00e35857e21b858c3622ad8940557a411358059f6cc81d4d8cdb082d001204071c03112026042e7098a337836a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f826a7d6c385fc5846567a5368ed9aad
SHA1929819ac2235b076e33678be6d7e3aa690a9380c
SHA256f9b0ea4eb770c17149ca974fe5630565cda0e2e5e679b2ca4f8fd8edf7ce9d95
SHA512ebde9ddccda1a366322230cb51eae7c8aa1708bab4b25fc9ef669478a95a98ea5f4dcacb2c23ba915e0d89369603596bd9bd912e934a67d140a96f9c38607e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ecdc7a9251352220092df6ad8c48903
SHA15ac00cf6811ebefcd3cd1234525c961efa33a7f9
SHA2561250c4ae97f848143f4d1a68259957979e0dfa8db3bfe48746023eba6d075c62
SHA512676bac961c6c26a5179608df3017e5a24d0fecc5296d5f6f2ef726fb0f702e7ad0fe0ab8e63eca3b9307bb529ca7ac753f1f8078fdb940dae7ccd5e547bfaf0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54459e50d09a3b1856c5b3698f5132e93
SHA189dc8086083203c1afa21a9a3f418f7c5d34dc3c
SHA256cb03d021c2ec270e10289d45c443aff6abfb08ed2babae77f3038b26f31efff2
SHA512f2e1446923fcad3f79ff7d7d9c727f2fd20f3f22f4eb0986889395e7fa4d6cc3c971a053284b557c3d437c4d3ab5b4c0e51ec485260b2d705c1b54466949fb79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fbcc65deb0ddfc199759e8feeeaf958
SHA19702e5f39e08cc98691ab581487e98d5efd65d35
SHA256097aa0b82f46e982b28be2786baa277ccdaef78030123709b71140055a599ede
SHA5127ce0411732d984c17200fc897eeb7d6547c7a21f558bb796c7df9570002596599d1d3b0df0276b318346a406ed4289130974b129d0f7dd993f07e98ce92752f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa58a3e9c61d9e2ab12e70c74e5ae6ec
SHA1714f344070bdeafd8f28f315d28d4fa09dfd73ff
SHA256ea861386caa3b444b27f55248dd4135e844805589b9ea37314e87118c5af17e7
SHA5124307546dbb35739d077f2eae26ba7e7b8c337af7ad7344fc5718340e1b24e15d35a13dcdccd4940efb6950a2fd4d16edd4f24d096754bcde09f58d632d3b2dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdc01aff46e2272f421bf3da04bd731f
SHA18971e8abeaa8f047915efdf90f47da1d875dd341
SHA256edba0682f773a77e174951f642dda641ca4d77bd237440f6bc23758e03d4fec1
SHA5126c7b50fc7b98a33c1922ff5bd4091dd5c24ccd15cc7dbd78339398ba3c6497542cd8d2870b65344272148d56264cfd8788c0b369b21af119e323fe5d33a58f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb3adefdbea857392df7b101654e661
SHA14fd580c5003c3559e93fc9c466a1e3cb689ddecc
SHA256df5533cd92e1b05f606f44996ad463024cdd84addf59c0fdc738391a714302c0
SHA512680ee3f20cc7253e2e1c3bde82f0c0596947f7fcd84cf4eefa9af1952c0fcef202d134f89790e8949165d0c2d80302c7ba355bfad7ed6d273f093fa2533b1526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56931cfd72240c942cb468260051b5a22
SHA19d9dfb44308e70421d697db827101eea6f0437c7
SHA256799d40ed57f636d4f6e4ec13e6fe6acfbe8aba1cdbf8ee9744366fb4d737423b
SHA512c2f0f2a94387f246604d57a39274c7211585c1807b1e152b734588d90089c5790e115c3777772717588e9cefc5e23dfb481d2ddd9ddf3c6f7bda73b6388dd0fb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b