Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
162e0a7292d1bfbdc06487a7612dbadb_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
162e0a7292d1bfbdc06487a7612dbadb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
162e0a7292d1bfbdc06487a7612dbadb_JaffaCakes118.html
-
Size
3KB
-
MD5
162e0a7292d1bfbdc06487a7612dbadb
-
SHA1
524034d0d0fecf2ff6f190639d8b7e47492939ea
-
SHA256
1cd3b24dceeca9b41c9b6326ceb423737bcb2b2f034b6be079d3d002be0e02b5
-
SHA512
ae7bf068f67a34b066060ffc53724984e0516aa6d4b3b999ad228059947f2956b5ced46c2e0246ab79b5c5239f4bf594c590dadcfa7a94a6d4896979cd69ac3f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002d28e55b44b1c54e9dfb2e0e4b38acba000000000200000000001066000000010000200000002313870f478a57c3fc0138ae4e0991354fc7f0f549ab94875780a8280e0ea4b7000000000e80000000020000200000004c0d711da6e67bfedec8c193d970775fa2fee2ddd48a94cd5c7e5cd7fc0e6efe200000001d493fba002ce03b3925057321914bf918cb71563af415aeb2b3d1e699ccdb3340000000969cb16e2364423771e9a533c72855eeb8f0e0071fe4803e4355cea1e08d4ece7c712fb85884e6f9239610e433609260cb520627744a09135dfe458f442c4fb8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1081e8cc96c8da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425657144" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FEDA5C71-3489-11EF-919D-C273E1627A77} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002d28e55b44b1c54e9dfb2e0e4b38acba000000000200000000001066000000010000200000006f0fa8fe614a8bde3d25f9f4f6e857c62ce204e6b67e1884e84dd694153512fb000000000e8000000002000020000000c0fcbd256fbdb3ed0b8813c4d9c285007fc7fabee79d0de3379d8cf531d301c29000000069577893fe2587bf8d481de924e36e8dcfa706827ff0a003d9e178c704ee53d319925ee8320ee6a60db8fd5de33e2d926684584b944ef97f79ee16b0957a61af430ccab6227d1c86713f5fb23470599dd60f9b84729f451858102f6ddcbd70da4ffe098dfdccad697f985baf8654476f813ed3aa704d7712b0f7f3a82d93577ce8f2b86a224262cf8ab9caa172051e74400000006bc04245efad80ea415ba4f7b11e2ed22e2daeab3b4d5c64b46f8209b79b1dc686cc34b73e0492521c1570cba2849b87bc1a0cb9a3d58214fcaaee81e453b959 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1044 iexplore.exe 1044 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2064 1044 iexplore.exe 28 PID 1044 wrote to memory of 2064 1044 iexplore.exe 28 PID 1044 wrote to memory of 2064 1044 iexplore.exe 28 PID 1044 wrote to memory of 2064 1044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\162e0a7292d1bfbdc06487a7612dbadb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54367d74bb80348d74c6b0ec53a3a0c04
SHA1a3fa76b4ffaffd00c0fcb2df2fa0b755b95ff574
SHA256921add66e8035ad1e14c4a90d36aaddb896cc40055fb02fb6505faa679e4fc02
SHA51238dd342f6c3b2f0f7c80993f1cd895c41cc5785ee68e8983dc3aece8a118b531a2cdf6ed3d69b3528b42a9b53deae3bc8253e7850c3062dcbe9e6bd2f64158a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559bcd91898383523782b55855446763a
SHA1ce40013bc34c17f12475cd5dd6943d2d3ea87b9d
SHA256f891d3f4d898e5d5ae086162fdff75988250ec78adabd2f845389650db38e197
SHA512ebbae049a6335255b245b36c468cc1edd55b4e35e54c74c0f651a19997507279e3b3851e521757792cf6da808940adecb4871b866a9f0df0159d84438a491a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50640a4d4c0d09b5ef5f433f2bbf5850b
SHA121a1fc6211eea03c349178eb3486428884593ab4
SHA25630f81cb00f126f759fc55605d8384cd7f5f437cd6bfb2839c85da22549a0cf7d
SHA512df0397cc1d469d57da4b0f61e58d08ed2f73c306e00d76b770027ac25425b141682029177d5d38519bcf2691c8c98e14539f8ea7c14286014b0c5285af3b5a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53957a873b52b8ae1492d88aca52415b1
SHA1237bc786eca07865229af17c55779200aa91f77a
SHA2567e27b5a228436a5acddb3d29ca389be1104dfb523257d9b55008326158fab867
SHA51237bdf84b6468b17fce7e9e440468aa10c866ea51d05d243fa4cf1368c039ed6b48b0716b58eebc9dd645adea8583ffea2533d7ba78995112cb771f6f3688f033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2cb531636e1b2d858afe368bcdd7c4
SHA1e46df1a9e68b9c81e78d4d5bcf746e6b0142930e
SHA2564bea9af7df3fa722dd9e7e2296fc0e74edad4633bf2d175bc5f8ed54ab5f2400
SHA5120ee8723ee5f99d175760f2a067e233177d3ff77cfa8c5f7010c9a905aeb1afb3356fcc1144d341eb0acd302886cb6985f9818702771a030625243cca57564d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0db93f00ba2c91016ce5cad38650b2b
SHA1d05bbd08ffe4a600490f9f712e2289ea8d71a0a3
SHA256a85efdca293bcfcfd92020deb5c8de4430535d4c6464b553464b14f732616252
SHA512442f25a995d0eeed5c92640303865bb05166a4d2baa6bd0c9f393eff8322a75d0e74ece9629a8931400d0ce14094ba84f3f2a5f6bd6121bb743530baceb48a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b56eab4ab4fd144e92851399c4faf0c
SHA113686a98a8bb70532fc2e68059f463d80912e479
SHA2563ed3ce28ae82439c004c0aa816fbc52236477a95fcc5de3ed8db1df0f1157b30
SHA512b615f592d1038377e5b0f3aa5dc1cbf03854c27173f28e1ad3f04a1efaf7e1ed19ba679fa2788ce4d953d257a42dc54b3bcee6145a9dcb7bb13c0b9e96fad3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b34ee67d6085fefc44900670b4d0b223
SHA1bcd59f95871d2132dedcdf99714a7980ae40e855
SHA256d626fa7a1a474af37d62f4d29d9429d6dde64a686bb3dbaf1bac5dbbd36a0311
SHA512223221419d39c16bfd13889b4603673a4992f9cddf0c0bfecaf933efeeb9f06623dcb73aa8d1a57cd59fae825c701f8f058649d325f6e0fe007f9a26e184cf16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5340aef2ba27bd740d010b1983e9e7190
SHA11b85a2bd1ed6f1f57b807210724ac3910e49ab79
SHA256f0b7311c118d480705703efb67d84ff19b188261c399ce43cf713671c86a2ac8
SHA512c873f51426514484163cb774f046a7488a44ebcbae4a513d06a9ba43481891af1dc6fff6bf4d6a6d51ab92bc77d3ea4a37f9c5b762afa700a81e3c8457e16b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542429d7fbfcda10aca8fa95709abe5ea
SHA1d2f4158cd4cd4ea2e1947f921d54d29793d89921
SHA256921178a03703902cfd6a954bbbc6825ed27febab8d1b0022ab03d76146c3d137
SHA5120fbe4cb65745f751d36abe761e4615622b9e27076ea5e393a8baf70101cb39e7818bacaee8de3dba0226ebb255d8b935578f7a4c5ff98b61defc5f699fbcc243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a6fcd518d246893702bd96ba779a5e9
SHA1198977485c35f95fbde79bad76c218a98e3f31a8
SHA256aeea3fed4f2406ce7dae4975d51845300c1f7ac41acfcda02b6f60345a3caa72
SHA5124d2dff01a3782297725a64b0b93f8f4439a946a96ec84efb57b5b3a09cfb7c51be988a740856909ee9533e6e5fdba41e44e40c274992a4d681a4f385994fc6a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5937134ec263889a2f2089be5c5ea0597
SHA18acc6aa20974b6766d347e955f0af4e2ecf1fbe9
SHA256eb6aa564f65274aea8c675f3dd8a91a52df73b19176c6c9ce4b8f25f12a1be13
SHA512d8b2580d9d292049fc9db532a38bd067a0bf1e7e0e147cc908fa98d82c6f33463c8311ed6982677d6f62cdbf30e9a955d74eb1ac2364b5196719e0df2568a681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce337d9144abd009f7f7eff1421a0c7d
SHA1c346fb5302b2ced36055509636b1a004885e90c0
SHA2567975cfd6f57f2a16d5eebe553e9a4c994aa789d80ce31f0f21f0e44b33a8b142
SHA512eed6e5bf2d7ee26b55ba3101add5b0b604309daa2e325961208d002a3176ac22a213ac8df542f450cc502a91a817eb5044bbc95d6b80df4909600cce46eabf09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e8420cb0655c1fa92b5998b84c209959
SHA13525018ba51828305b6bf9d0065f13580d365642
SHA25664d4e53adc8137d5bb7881ebe06ef2e5058cf644c903c612a9dfe2f7474070af
SHA5120fe7d93ed4e5db5796b3a832f464cc44d6cf5c32336b2fe1d22836135e42e6bec93b5dfdaaeb9c6e29964bfc42aeead484a435d92e1f79afca399626d4b929b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d0116383378b3b276e03fe7fdcbc9a09
SHA1788cd6089d11c32696a44026838040c2d7e6851a
SHA2560f3efb949e56a7a6bb48ac4f2f4e7c5b68ff6691c478713b56f381361a8021d6
SHA5125c32b9628642367a738135679762160f57fad7e089756e60b3e502e5f57786be282813ebbdbcfd603b4335d2cd1c5e626f9aaf63903f1c7de585e6a002bc2ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b