Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 18:16
Static task
static1
Behavioral task
behavioral1
Sample
1c04701300d3079164c89088ff832269_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1c04701300d3079164c89088ff832269_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
1c04701300d3079164c89088ff832269_JaffaCakes118.html
-
Size
2KB
-
MD5
1c04701300d3079164c89088ff832269
-
SHA1
cab7b2c45bc8c4b855116e581823a65a0f21af0c
-
SHA256
f31a811c4462d7a9c557a67138c1c68fded44fc5a631e125b343915fea0ce01c
-
SHA512
d279f999ad123c158c7cf76f0e493c5c27c4aacd7be595b094ab46ddf8d4e4abd2f927e46e6ca95eb14451e3558f2816a39445f4fe108ccd5896075e96558775
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000001b3087427991e3ead013580dca7affca2fed51b5067295fe6abebcb36664ae63000000000e8000000002000020000000219d94ce59509badde148181c4a79a46eb9495bd6ab95570c87fbebfff6bfb37200000000bf700d3d9cbe7a5367a9be68bc9d4d19d7d46529de7997a8e15925989790ce44000000053e2cd58f4b590d54cf72bb5d8c5ff492101087130650640532f915fafc6d4b52f59b72252b3849c73591f930b38b30561b34775f149001a217b6292da66e084 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1827FE91-37D6-11EF-A8D3-D2DB9F9EC2A6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50820506e3cbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426019683" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE 1532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1532 2192 iexplore.exe 28 PID 2192 wrote to memory of 1532 2192 iexplore.exe 28 PID 2192 wrote to memory of 1532 2192 iexplore.exe 28 PID 2192 wrote to memory of 1532 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1c04701300d3079164c89088ff832269_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515bc7bc6faa1ed26fd1ced2d1fef17b7
SHA1cd52a7bb9dfbf6cd766f8aac9a7fe909f076f7de
SHA2562eb1e0ca4bfa41db878c92e618b8dcdefe81cb43505a1e3278ee426b12da4836
SHA512cbcbb4f59e5fb8b08ad64d889a0d3c51a7a2a5bfc00b0b247a5053ee0b79b408c7ba5d5e13503f50e02aadddbab9dc5243d0a6b60d4bb21886aba453354ef43d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575a2d6a0fe7757375294c9a659519bc8
SHA102c07f7aa6eacbea0f29da4e3b02afdf42b0eb5f
SHA25612fcaca7763668a921670e175fca66f1bb4cd0c27233a3e6ea99842ec3c5593a
SHA5122a887b54e4535d88d77451c7ee8e59e8b0d99ef70f9ed02566b89e0034bc8aea665223a361c764e9868f714ea127d4f5ccb458fb2224f9665558cc87a8bd52b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a585f3e59c3577bc9dfee138bfdcb21
SHA17157cc90a7fcb1cef934d7cf883267dbfa60bb85
SHA2565581f9eeabdbb0e5d9a23e4c71cdf4b640b78878eb5141d3607243ba87f21d42
SHA512f8802bf913aa4a52e6532903b153f8237a061e5e99db06c710cd654a324fcc6a274d764cdf7e2283734c99410afe5cad2ba35da53870d2dfe79a1b701411f8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5255f87d7e08f38dcfd7771b839b7040e
SHA1b53122b021378dfc297d53eb682248ab400d5fc1
SHA256c40f6929870916f7034482d457194fa877fa554506bda097596e52e6970f81c4
SHA512e63e46deeadc035317d8df218e4fb976f1a1f74c5cb7bf03c9822b5c38fdd26e303dd10b29ab40c4454866bb0c9e24f2ef0ce9d0067805b471c8bab1aa281ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591429d9023a574087fdd5d8270202708
SHA14960f7ced7e0dfc1efaf44522692c9359c46aca8
SHA2561768a3b5bf01d752de3d444dd0d877144db2d084d133f2fc72dfcbfff47563ae
SHA512a3b03e667ef6942142955dd4ad2612f6f74b404ed32ac61e04e5b85b36318a397205fbf6ff2dfd01675358e98a24cb13f2fd9590ffddc5e065e6e6624eea6393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bd2f3f1fc0ce06d685ea7421ac54207
SHA189225a437c7bdfaddd032631b97dfddcafcc7319
SHA256108eb3921ac74546b831223dbec87e6af2be425a280c960ff0aac4e985540714
SHA51281e09b7fb671b1dd8bf525ecde9a49187f97a05dbbf853f7b4a7b22fcd3439dab19500c385be102ab78af656ec43ebe879ad05fb1e1fd9d15496c15ac92e8cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b610113e04a77368bfa3a6c2a45ad1
SHA16ec8bd4d618d2a3b34d1a078a646577acee93764
SHA2563cb6e517d9cf8764ad25ffa4de23cfd85439458794f64a9c4f702cd14b231d72
SHA51282f6e9574df335cc669d4f6409120928d486d96dde964d83b41ce8778454d8ef3ab1f059789f4e9fdfef0479eaa533c69e5546d87513f733910366df10aeebf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e3081e3036ce6771d516274d875db7a
SHA1f736b208718abe59ad97c29ed7d2d9c74a174b08
SHA256988894f9f8772e9e35f3b9dbf57ec1ffceee6bded609bea3e49de41aaeaf7a69
SHA51249c1c39558a9358460fc5da7a9dbc2733fb50304bc6867944631460e6352048ce9cfe73ff22f61b65facfb9e027abe5ce9de3ce70b57a8bca1d4ac88f74da057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e54fef0b193cac18380f986007f53dc
SHA1a8f590b6b136053368fdc1f492b66e782ddee98c
SHA256209796feb98b7f74063f436b1dc6a10dba49b7b9ded75a017a517ce433702f79
SHA512edfe76ecd8dd35f7213fa8ae8be2519d8005bfff8484511be91a2c010f2393e6693461333eab5e8b8d0ddad5ed6387017a56a9a99cf341ad0d5bf544e506a974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59721ebb993bfd4e3b3b633362c538920
SHA17f99d7850980e41071d5f572503f34bf0b078156
SHA25623c42649d70c812da8914cbcd24a0381d1ca9a9199cf161597147086690bbb83
SHA512f6173d800f84330f238bc803a7593a42455184eba09b4cf0ebcafc4e0023a32ef9bce9182603c04b0576b10488dc600a8f627f1dc24b18b299fe17718433e693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5468f4d7e9d802a1469807220e6d4583a
SHA15961a9202d337494aef78b4aa283a6f7c02ec3ec
SHA256ad09b117b7cfd1c9e6d5c992dab85e4662435927951df164e2c4ac8b7f36470c
SHA512d2b9357ddf6b5c86b22c21dbc67385522a7578365695eb59062b18941cd1c6510233e83fc74bb080aa3d4c2bbadfbe8ae58eba72988b6f8263b62474a0373502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54401f8a0820f77e0898dac981c241334
SHA1b79e5e9cb409b15ee0ee9fe5243365cd9573d437
SHA2562685352fdebf2a73eecfbab01b23c617bae3f18bcd2d96e0217ff49c2be45d0c
SHA512da159417d43e3bd8c0372bc4eb97c3681fbdc0dfd55c2308542fd37434e4654ee156db8d7086de1ed96156bc4a9a12ad1e1c937c0767d4afd55b6d3384de1072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d160e04c858ee744acaf50817b8d4b1
SHA17fdef91d8fb36f33a3fe916d79f23d961ab73c68
SHA256d87c73ae5fb41239e9fa6c4382379a8ba1ad5bc251843c9bd8309376a3a050d9
SHA51288168064687753a7902d9ba137dd5ab6dc8378bba9f56a76debf73f831de0517db116134cd99fee8d92d9dd8a432b4c71d1a824aa086febab7bf3c9c7c9aff00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5727e69705ac97571c6603f5aa8f101fe
SHA12644a1c96d68391159a15659313b99523b200840
SHA2561841b2ea80e3ec71f801bd46eb897109796789187c0681df70948ed376e73d26
SHA512fa4912df7c1ab87e487392ba50e02fc66801db083e67601967d48e19d234a91716779a1ecd5395c1bfd2cab19d81fc6e601404bc271140a27d3ddd6c86eda85c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500d602370f93a5331d07bd1b2e40f21b
SHA1d0bf5e924d0eaa67724117299b79e73c1ebfb392
SHA256428605f537d466a0ddc7b59d3a677a77624979c695d8e2b12219079710568555
SHA5126fdaaafe60cc17cf15a78be52fcda4f575ad5c7672307e0ce38a394b3543c3f28b619bbca40f8bcc9c6973c1c91e72a29603975e04a1b07262d916d39bedf09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbc840d858daf759c91b5a19232fe1e6
SHA1b3eefffaa013ec316e23de16a2788087fb468b05
SHA256d165abc8e4c3c5054d67e29de5e7f7aa161af8941f08287428ad5f72a2cfc2b3
SHA51262a4921c7cc0295616bb82a82df5408d942837a9b256b5a462c3964eda9cc3390db65796dc1073052e992d5907be5509e3fafb2196fe7c1491e9d06fc47de1a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c06cdb7ea2e0beced3b50aed46f65ca
SHA1c2ea3d961c64b50a7bcffbeb737eed195857da6e
SHA256b111d32d2acccea165c1fcbfcc28fa13fb334ce94bc409a1ec8a8a90b24253e9
SHA512a3643d221704073b508abdf0ddb003fa554c11349cab7808398ba1af62e8c7b3ce4961bdeb639e5016cc22ba18d79109704982fe0da7463ee56411d57858e480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d75130d0f78c4dd4c7830de15bebf93d
SHA1a2d0d3f52da4f4bdc4d661da76e352860027a645
SHA2567c8c716b9c7a2f283a0159968836ba91357251568c572971bc6b702313b59567
SHA512c358bd790fe3f3650bc8a33f6ef5c745699ea8d40becdae418ddfb83f9482af87594b336face4e4f486733309e3efbcfc468854ad40ca0ce62ceb2bc4c69aed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9847fa77319317e43c2d9434aed9730
SHA16f68e5582b2449eab368783fefe359335ed105c6
SHA2565d8314fb1506ad0f0e7dfb63b46c2c1a56bde72aea2b2beb36d6d4404c47311e
SHA512236557814ddaf8a8c175e91b76c21d0188a0d28b3f6b3890cc8c6310bc892b1c113c54ac4939bfa54217675a3d0683ef178f8b1d2ebead9611555fb9690d29c4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b