Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
1af3049b23f2a064da8a95e5fdc35803_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1af3049b23f2a064da8a95e5fdc35803_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
1af3049b23f2a064da8a95e5fdc35803_JaffaCakes118.html
-
Size
1KB
-
MD5
1af3049b23f2a064da8a95e5fdc35803
-
SHA1
47dc9eaa10bc5e1cd3f919b45fdf8888f532cce9
-
SHA256
4042b1664d0e9f0a3a43f53543fe056777ea6a6d07f74baa3b0ab82ab506bc22
-
SHA512
a1ccd22fd4d84d8ceb1b38315e75a79cd2929e26fc98e5b0d210f0dc0e1771b218510e88c3be2c915bb8ba41d336cd0c557df0bf283a8cfee31a357fe3182e6b
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4041cbd2a1cbda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FDB955E1-3794-11EF-99B2-4A4123AE786E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425991719" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000027befc17fd02319fb7425528af7c5c01ae20d11e9e12464e0e4b60f1616e252f000000000e80000000020000200000003989d111362ea115638e3c100177416e4056e9165c5596a8913b02454b8a3ad220000000fafd9f6077d594aa6117acaee74d741cebcd9473b7fecd38e79549d76939029f40000000656e58aa6f8edea9aea4cf320e6cdc42eaa111aa5be33f35041ad5cc4734ad2f95cf515180769308a4fb2ab58bf8c057a95eb92c05499950c89d42610ff75255 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1276 2392 iexplore.exe 28 PID 2392 wrote to memory of 1276 2392 iexplore.exe 28 PID 2392 wrote to memory of 1276 2392 iexplore.exe 28 PID 2392 wrote to memory of 1276 2392 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1af3049b23f2a064da8a95e5fdc35803_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551820b2006b3c76210ec710382ce51bc
SHA1f8b27f8949ae790a10c887951a269fb12f7877c5
SHA256f910ff79cd108a88ac5f9009341f38771edd8c25225431e4288e358e129573cf
SHA51211633a9835263a5543363dc045a514b69e09386755c6356bf5e8916fd9c5c40bd7524381bd59a1a0e61a8923586c52a18d0635ff855acd01005e721ef4b1a8ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557580f493dcb71979489cb62f0c433bf
SHA13767591e330a33706de4818790ffc1fad1add9b1
SHA2568e6284dfed1ea1b2117c9245a78afa3ced86d8a4a47bf1fbe073865e5cb62b93
SHA51214952eff9bc149a20c830702f9efc0e012d6ee2213ad0a0aa419fd4f6ab39805c4df9d1572904a678d1166f7ff5338a388140648c2e071c486dbffac0528541c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e164c7f23f8c43aedd05b7ed4a1ce797
SHA18c0b94c2fa0e18c958610d0fcaecbfea7c4e1d17
SHA2566ab47ebcad2d71658fad42fd18fca1c78086e77adc0d08363eff6ed74a4d303b
SHA5126c8fa639dec86970a22c71f43cf6ad532039b2a9429f0d7e5f42b775fd08177b0f4c2b61f2df986716fb20a9c256ff5734366413daa3ebe6bc4eb4f7c2f9fed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b9d57791fbdbe683bfe4a5ce2ca8fc
SHA10c5216b6269ef16da19f56edb997144b717a5d6a
SHA256d483de9e6be2cfb79bb91bb4777f6ca03f3326ef2b4bbbf799218b2437e5c9c1
SHA512f9f63c1533f7efd56fc88928ad8ba665823a32132797eb1b40b96c945f52d64f3268dfcde806671001b5ad7959088aba0469f7ff9677e1f49f2ceac70544cab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56057f476255e2df774de3b50f39242c9
SHA1a9f0714adec10b5fde679677bad4766541616c21
SHA2563b1328ff5cfb14fe8018c7a6670d6e8eb602546277ac437457bbb97ed4e77259
SHA51273696be797d29a661339353826f4e2027ba3e92803210508ba1d4e9addc4e4218a0ef67dd6a279a880d103b129743b767bbf475893ef9f362e86edad4f2fce6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d9a88cbc873c0e5c286f43f8ace658
SHA19f86d9b246e9cde450e532ac02b77ea9123ee8fb
SHA2565c5fda7dfad04bdd24ae3dfadafcb1bc8290d10d93820d760415192e6bed5216
SHA512e59c42afb3c03dafcf72256ba0f82c3d3e6b898525c2eb5eaa27039b43311e52758fb62b14f29f6dcca768bf423bb820ad895c27ceb1e8743942bfa2c1d824d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef99dffdea863bce9b34f89a1e2594d5
SHA12de8023f8fe2439d964bb2f18bd63c96443bf52e
SHA256c0e90ac5e6937adae0ff101e2eabbc816831aeec6e550d805c8c721c4eb22a30
SHA51222349ef7e6e0ffdf34aa742fc7efe1f8946f1459dda19489047d84fbc8d6d517eff803eadb4a5ad4773a0a4f7db41de4158103d63be46b99091f5b9978498c11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520dd4a336e1a5e4cddb32218c470654d
SHA16d7a1407fe2458fe5ce593b3bd9989309cfe1101
SHA256451cb90fc723f4d81d2cec9d6884a97252d050972974360e2b8b6aee44d2790c
SHA5123ca0bdc2d1b278f8831ddee5be34ad85bd3c7c9858f92edacccf8efc2fbff02bce058884eaa36741a0debb5799d93c6360fc43f57a6c6f1506be8e9033f35a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5521038cd1359f6b1653a5a39f0a37028
SHA10224730ec9a38e0d65f38192e048cf40a6d348bd
SHA25662e4332449a0c019048229a6ec26f05ecc74a978cdc60b4e18c92ce6f909869a
SHA512e77079d5136d6282fc3598e27fb948130800a65535ed06eae2e8727515ab9eff34f67ed40e3ad80e3cff71f7b3faa86ec00844b4358512dae2f6cbb9491db8ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8c3af4bde38cd4abcda56b9ca405400
SHA18ceac4c01ffbd7e50234c3a200543b86a18c8268
SHA256d3dfdf5488ca16cf35852def88c8a089886431c5d6ad6255c8f71e89957a170e
SHA512c8fbfcfb4498f378fc2c2c63b21b810e9297fa642dafd3b5a9ebaf51a59715cda84984936af2f4e05f7481ccbeb6a0557a9012376dd849e2b9ea4c032c18446b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d3e46cd40b8bfec00681a8e3b22f871
SHA199b729a0f53821eff654da437e0e8e8b1aa7eb94
SHA25639bb60b5adf4241e40b3bc5bbc8c296d80a174f76356b19be9a8263e74ea3b6c
SHA5122f492d128bcbf482f2be1bd4241cbc723ca947409f8de6ea3baf787c2617608380d17c07a74c64cdf514695eb45571ae26467a5f74222c6585007bd159cfd1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5959efba24d07f0982bed225d5a0bd490
SHA11e475c804c322042ebfcf9e2e367093f3b6ba5e5
SHA2565e6e3d29fbd75af9d0c2a96d3cd7d1730593c5de89f180017792b1e8910b5067
SHA512a5cf97737016173dd8d2e5baa214f8045f2560e9cc1db1e7ee571173e5a4831bdd5c6c143d58ad0191d76e8b907fbd372263ba605e25e8ede9075d3cbf77930d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50650bb219d5c61f65bf38641ed650b47
SHA161b1c7ff893a2005e024a97d5bae0b77a9187458
SHA256272550bf7e5d31d16d4b37d5ff95c1595b8566c94a0347a036a24e660fe2bfd4
SHA512035621c6f0114a7b628ee123f7d814b6674af63fb99d52aea513ee1b70a0371102de30ea20837313de4e59afa74043865cfb5fdbcf8f142daec6dae2658fc73e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e360342e2e605c7ac54b77797238f925
SHA1e6ab8f67563c7ffe2a48f974c2a4eca81273fa8d
SHA256c320092d0b024649fe28b460a82444af93e4b52ef48bfeb79c1caac8724e8210
SHA51235f0360f6e98c2450cafcb4bec2ff9faa7517b57347e34b8c88d35ff79454c8c46c2681b1c750d82e67d2dc9994af002ca811159a6872c02bab0cd40061c470b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b49085ed823905eec3996bb2ac8701d7
SHA1ac5fdbab9642cc777d502a46f1b08bb468669d4b
SHA25613dfd4ca6a165892197f50756caa4d5ac543c54dfb2115237636dc3cbd1b28c5
SHA5121db883f7fc058e1a249b792509cccfdbcd8c8291089ebfefafbeb5c7b7f332b230383268ffcdacb0ff7367a2ef6ca0213eb24bbdd9f47bec50871b28ba4e025a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c1859759717203c8bd2bc95be7388f
SHA11b32264a5a03dfb041771c7d29e8bfb46ba2bbf6
SHA256d0bba3016efe463359848357c759ad9cbd5b2f35f7fd546d7749e45eabe9d3b3
SHA512ecbaa31572400357ec6c109f446823d3556b29dc6e54593eab5b409626d045354374f9487c6bab5b6ad050e7972ab0af2333da39dfaf70608ba7a2b78d6ee402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee3cdfcf91b328b23c81657460aa57e1
SHA1cf1d355e9a39a3257bceb99b7cdb163bd110ee7c
SHA25666bdc5bdb6fcfb2fc32ad919c4f39d856b0a904410184b8bcae1bf8ef99aaa20
SHA5126696a1845e5cb941371e67cb610e6051f48b874deb69fc7d81bfb4de296ca176e59ed63e06a92d55069e98cdcf2d334c96dda9df31da32eb06eef21185a79d86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d7f5b5187cfc71caadbe1e622a81dbb
SHA11066776bd84ee091e82a8216347baf90e9f57896
SHA25622e9041d8427ec3e14c100e6902a0c44007c861547d39bf8db980f219c402e62
SHA512ffdbea7f5597a93504216087fbb8d783beb68a4fbb1014265c8b62ea796cbfa2cc7f4c6d66f8652dfe912b70234bc35c6013e3dfb097432ed61e6507143ea81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319a5b32526abe0b7694bda5817043cf
SHA1895068dd03cebc1cacbe0aaf3d032d87d49884cb
SHA256d59a2be505cf0f068d940fca33e3d1276bbcd41d88ff74e6b9fc540e206a74c5
SHA5122d00241f60904537d159c59b74d11e44c874ea487a8edcbad5d2ab1128c92e3a2e6a3dd2b1cf8bc9f60eb1215bc6f500dd851fce0fe3a741d48d2a1fb46918dd
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b