Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
1bc9a5b16c4630a3349928af7be75464_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1bc9a5b16c4630a3349928af7be75464_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
1bc9a5b16c4630a3349928af7be75464_JaffaCakes118.html
-
Size
125B
-
MD5
1bc9a5b16c4630a3349928af7be75464
-
SHA1
b450f972134ca021b6f4168ffbb96f7644f8ccaa
-
SHA256
00ca18ffa1266772cb7323b1be5fe9f607ae5678b8dae38ded2e21e3e8c1bb10
-
SHA512
6b0b76fc44596b82ca04bd80b0dce64a4e39dcafa5fe6dd685f35da4df60e969fa78afba2e3d04e2e565be15ef9e0dd770175cd8501edcb837223666f6ee142a
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c43031dc906089ac07e635903db47770654d960e1b1468365d8826a267aa775b000000000e800000000200002000000080bf1236a7ef7a30c80d3ddfe95c406b45621b110fd70081642e5deefd31424320000000311250eb3d3c30bc59a9641e152ef550f226801cd7e7c953c2422ee614194e0a40000000039283e1e47ef1fa817ff1d177f5ab54cd70d03fa8df8d5a2be9aac8d6f2fcef3914ca1ca1c6e4962d693c997537047338fc4ead67760bf20565f0308ac4098c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 002f3c19d8cbda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426015032" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44C23DE1-37CB-11EF-BB1B-4658C477BD5D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2948 1724 iexplore.exe 28 PID 1724 wrote to memory of 2948 1724 iexplore.exe 28 PID 1724 wrote to memory of 2948 1724 iexplore.exe 28 PID 1724 wrote to memory of 2948 1724 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1bc9a5b16c4630a3349928af7be75464_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2c3684506d031df47a560255d640c43
SHA1fac4f12a2c7195b2f446636946e6409c4e29c939
SHA25609a5281f3bb8ce243d0e9d0ec13e7c02f9feebb0caa5ef8b45b99d86cbbdc429
SHA512c09ef2c727ecf768d0ea32d3fc9ee1518ea9f44b9c3503e89d084ff681783fac7ae5a8beb6f290f4e83814722485b5ae81e09f1f171ed08f64e1dca3bc037d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50acfda2306c7f65b29fa9d377fb602ee
SHA1a4cd43225ae4490be3ba92e0c2423df2fb43a8b7
SHA2566b9656d7577355c5b70d89af42b7bf2179020ea4c41390051df0abad002299d1
SHA512a0927ccc9a56b3575eb8f1a3864fef356c24fcd2765039ddf0419ddb0c63ae0d373df541f4de3ce857b5cc591fa2c1ef3eba6c362886ca6dfa4261e9f66f1733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f730b576640546b0791fbb01f2cb28
SHA1a26f30b33dd836392ce1c0af6e587bb3d47d62a8
SHA256a0841ee1fd820a97e1300b18a902d8586ec16ad005c99b01187abb40a1f74008
SHA51288b5955674aba2e6c88a785fdd8be9b463e8f52c0ed993602ba48b5cff0b060afc9189098e40d3f77487efe4aa67802934fcc2b1df513eba7a7dffd77918e7a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d79bdc5b8ebd7293dbc47305e093d3fd
SHA1047ab8d17fcc81c46c45084406280433b8feacb6
SHA256c974d8bf0a3a716cb0e382ecf111062cfe53e94e9a360e97bdc218f0adb964b3
SHA5129e2f16f8cbad0ed13936f8bdca010f9db4de15f13a90dd45d507c37514ee64a76d97228dac5843b907250684d291063ee81fe2ae187b27686e80567bff3f39e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3e9a6ce5a9a77f3b5f38a4a8da6a205
SHA1948bf4409ffc84a84240d719ab8330cfb42c1cf2
SHA256615931ca6fdd8f05954042e8c9dfc566c73c79f160060681aeedf1e75ee3a0d9
SHA5121a629697515a254807cc196f7c9aeefeb58016e3de52be2ad6415850e4d5349a8041fb04f56d267347a8907bbda8cabc84c198e5977a2b1879d4639ebf33f3e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec8467cd2a2f96074a4498a747e64d65
SHA1210fd78aec6d1a265034fdb12dc2aab69635f7af
SHA2561d01333a67951cfb4fab8268184417ce26c35474f33d5b8547aa66e87d3a0a54
SHA512afa3745a858c6953dcc048f62e85fadef252b6a3d15002750c6e0de06abf8e6c475bf2229e0258e35b8761279f581bf45ccb02efc7fe92d52589da6562bd5a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d130111bb640b7a82569f616137d9905
SHA151401d6ac0d7c6cf95059c347a2cc59c1ade032a
SHA25632033b374ebabc141642bd910683fab6285fe0cc37fcc2e2d9451439076b31e6
SHA512bbf98b59070c8027ab15c8a7a676614d8ee3f7ce9eb9561a5acb4fe87f1be4fae80487aaed65686f81865346dc0de503cd79473f204586a3388546079842c890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e395371ecda70e28e2404cbaa8f68b7
SHA1a5c15fad2258ae5892175f8ebcda8d2d8bda6731
SHA256761a30af93d6b36453b060111c405e698b72cd925579a067aa51e0525479268a
SHA51266ddc64a6856d508f96390a16e795c11088396ca2a4874fe0eb02bf7687673e4e91173dd12fbacee05575b368614075f108c494afb07a9cbe9fe63556dd819ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d6ddffde70a893fa781e5994b9f3bf0
SHA130ac5fadd5c8019ec6b15d481126c396e9a08833
SHA256a6d3461c8a81176f44d5c930824f694e4670ef66e4da6bf8a0bf4c7a5f68883f
SHA5121ee44885121fc96e49a5afad106a4b7fc77088bce561fe1baedc486d42081cd9f710f12df35be766b9c4beccec54536945126e7c731538972c706dc147d59c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb3f865a50be0a614c0e752431ed982b
SHA147068d23a8adce145a531916ce8e7f0b08ffad70
SHA25656beeadd1b3aa5414ad0f3db5c17f4e99c7776b25e73cef3b65a974d4978b5d6
SHA512b75a6bcc8d50f0582d8c7060cd1da5fead81cd359068ab6d45f02a7c09007e94138373795ac22c2e725cd019e9b540474e2247d7d04860bc9963e6ec23c388e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c11715726ce4393f07aea7609d1f7b6c
SHA1aae3e2cafb85181b1702d97096cb1fb9fedcfa21
SHA256b833dfd7b4b46b697c3cf6c9a21f169cf67b5169692087d182e68fa937376182
SHA51218d16ea0b5b86e03ea46a6a6df4480569a2199c58d207b570d953048c55d2b5741d687c920a15dd34a9f8cefd8de3038e508c466060eaa72414e643aeb9a0c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f151f78dd81b3a4ed6fcae44ce3dec8
SHA12e68be04a25b2ed1a02d05aba54339492ef70284
SHA25658ce262d28b68311aa6ab319276942f5d75819cc66106ec0b94eb29a9476a707
SHA512278c8689e30dedc5102877b39e6795ce38237e2bd27b8a325ebc8c3b806c621703d0d188ced206264becf07f83ecd89ed421fab5413c3c79f77f706f58e3cd8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb52dbeeb8c98e6097bb8ecf5eeeb4b
SHA139b521adc1d06d720512a247ed572b5b3628c579
SHA2564bf0c457bcd4212333113d0353582471623cf7a8cb3b85ee5e56ff4646152401
SHA512fdf4376b9c2e77914b3b096a22f90aacccf149c5f170447cd08e7ec383629bddcef97b252eaa90c75c633752fbead4d31fefcd431656c2930c8da65ca49ce51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c0b0294575e29bbf63ced713336e77
SHA183c9d024c6568850918a3fbcdd6201df39383e7c
SHA256298952175f7c5dba67c827c12f1e0a55007bb4438c10b766a00ddccfbfa2a510
SHA51202506bab1d6eeed0053178dde9cd0dd358cc131717827365f432a80b78bf0e1196294979afe671ae2aa1822f4cfaf54fc6853cb31f975507fc67a0933587dfdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5100bc2820cfe6ca7135c7659c43f2b15
SHA1ff78dd921cdb86397ea2d8af8b51bc2c94e2e3dd
SHA2563a91a4913024daecca39edf4be316d8c509a02bc87b11583c9d49749e8120fa8
SHA512b7d60d58a2a0cd69d5ed703e6b0fc00830d761ad5614aaf683060a2c8043b852bc00db6e8c6f99c1207a8729fe455a5b5ea4b8982cdc5cb97ed2bf7f5837b71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525b30ef41d7688fb17ee693085be461d
SHA16918c69d1fb148c8baa06ff3ff94f40040e915b9
SHA256be1272090422d4152db387c8cef29909e9718ae8e077462ca5ff05f64e0bd693
SHA5128d12af81b5f9e45119d26dcd1e9b5ffbc491c782a5ed9da8a9bf49422d968b4dc274d665b1e51d65285069566dd6494f297c746bdfc9ac6b3057acf442c7713b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b163fa6fc8e63568bec2443676e9cbe1
SHA1b28d35b0fe1b314266ca9a22f70727b2a178526b
SHA256227b7c9426058e270bca60cc096f704e224b2ec84b9372ac71c972e69ccc24dd
SHA51271f5104b9631c501a7195a957c0b93c3027c53bca06b254fa1f9b16536f210162ffffd3ebf15139e3d4961728ba2e7a1981fc0a9d0b9ea25f9a511b1dbcad874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08a16b66edc0f4e2146227b8a4711ca
SHA1720737edd66be81d2557f8ac9ab1fa0481e71dd8
SHA256e952550d59334bfd9c93ddf272104b4366c1dd94690e43b794df762de59aeb29
SHA512d2c426aac87b77a954551ec4d3a942fccf28585f29f5de05bf3b32918d72ab2e56a15a6839e290d588a4c71f4a7c4926e81ae5462e67004831ca7aa7c8798a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a309dec269277e5031e1c35fe7685a8f
SHA12e03e71a51a3a04ab0d9a1605cb4e774f88ab4ec
SHA25650d3bed785a8db154c88d0573e530eff6a6ca772c30220024cd375cab7e7265b
SHA51202a3842794008154a601868e3f3afbaaee9f99fcab360ab15b1cf3de6cf5990c96a4cad1d8812785aeb16f3229ce8b377e31c58f5d663f6f12cad23d55dcf93e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b