Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
2179e21476808bd662cea13ee4dc60f6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2179e21476808bd662cea13ee4dc60f6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2179e21476808bd662cea13ee4dc60f6_JaffaCakes118.html
-
Size
95B
-
MD5
2179e21476808bd662cea13ee4dc60f6
-
SHA1
aed2d778da98b966cb7bef4da172566f9b6721a3
-
SHA256
bda14af1b9bf299c85eac5965f82804454360d7fccdd4788de8bb2c9f6448455
-
SHA512
4d3cbe7f535345c83ce168720b8be1f21c78571474de4ae3db050c0cc64256f3366dc087211bef7f7147bd5fb3b37185dd99bef9989d89eab1ade5b8ee133e7e
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66790C81-390A-11EF-8F47-7A4B76010719} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000015763a7cf85166cfbb28e21a2e974d1d53139a9f52b96d97a79110326b241f38000000000e8000000002000020000000af0a341b63458dd279dfa719189925f2dc92305bc114c8c603200c4e5843a91920000000ac130dcb27988d385a55729502850d262f3ee52c2c40ff76bf6e238d216a022840000000394083240df54c9b457929b0b4a625318f6d6f0badd9393fda497daa24cbde813aaf1fb62316b8b5dc24a966d1fc88466dba9a9228fa5de22cf9e6d31fb5617e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426152097" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bbfd3a17cdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2144 1700 iexplore.exe 28 PID 1700 wrote to memory of 2144 1700 iexplore.exe 28 PID 1700 wrote to memory of 2144 1700 iexplore.exe 28 PID 1700 wrote to memory of 2144 1700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2179e21476808bd662cea13ee4dc60f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541f5d16619041bbd64630814e1d36367
SHA11d4b21eef6e0ef6ffdd0ae481a64095632be5bfa
SHA2569bed939e2705334475ac2e9ba1f50fd2fd0294e0ea34a3013375b85e922db8a5
SHA512e2654725a2c3bda2e2fb1f052e7f0c71e7b37e7384dbee96efd67ea8a14e94d0432302ac27d2ced8793290acd02af49589ae5763aa5ae9f7a84f16c7cbb188d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57203526b8e15dc3e5f9fbb3cfec83880
SHA15a855ee157a9d4ce5b4ecc1928a86728f9a2a522
SHA256038b895cda44f3ffdb94a2a9fc5c933053d5e038e13fa9004a3e916fef1af423
SHA512df67ee8e16841e86f9dfb7bb06477bd499dd6a1df293f212d33e9ec41286bc27b97a30a887ae81a3c5e8aa7ae9d93269a4fbff5b5f3ef3a6df94b4b3b284ee23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8fedbf4969f707bd5ae1d813cd44b54
SHA100dbb5e6c08ad44c61f8d779278a5037a04bc1e9
SHA256ac2983964bafc00950b1aef23e7bbf2d1286aae00b2aa16a554cff1592da9e0b
SHA51235853be3fc7cfafc8b312c63611438a431436a9b3b0bb2095dae5eda3c2f7d333a44ba294bf0159e8f4e044f6c9f5d6f74c4fbc78e6b331bf86d3256bd986c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a93c4974cd09ad1df3657d1e998bac29
SHA139238d43399fd15ada916d44db2950b08626e789
SHA2562688298e718a74d5cd3eeff81ecb709950dad9bb01bed98c59f8f002c4b93d1a
SHA512e8d04eb38a2f93910b5a6a6b0d249afc9483c97218fcb95dd520932f846cc399adbbdde2f3f07d4a503f7b8a5e9ddb7a430802b7b4bf6d6a38849c42c0873669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bceb7b4555b03ad99618042b9b8852ad
SHA145b42435c76195d5abba57d02e488c31a0d07851
SHA256af45c89526d2b1f979c565ac9c067f6d23a3a473a7d8a9f8ad0dc625307de1d1
SHA512646c73037a2cab7be270a77069b72dd3d6ad13263a8142b1b0d4ba6599632fd0c9c31ccb55a7a27d1be230eff5c15075850a8ab1b129420d4dc79b6e555d2f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7aa8e267de0923eddd6962f1ab84e04
SHA1c893b618fa1f903a6408a1573bc61574474f3d70
SHA25655922fd3a09f9e7096d5d33e7f55144020c3ba9cc96364a9c297e4b7175020db
SHA512b61966326c2ca2b46107015a703c79ed464694f1b261ea753059a53cea88d116a2c94705b552837cee2beebae270db4b223baad1faa1a13a2a6a150703a007e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5553ce4ca959660e7c55bbb4946c3a5a4
SHA1a0732b679b6999404496cf121b94b2b1b2699cb7
SHA2563667ad12cb2ccd7c994c0c67b2cbe0d68e92cbb8fddef6f261c0d1f0364dc0c8
SHA51248426e453d257103a9aeeca7059ccf4961a9d8cb17b570f1dfad4786ef571f81614345d0ace20f32f4a3d8d275ed688031943328d85a48d36bf9c53661e49846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561033aab782451c06c02a419c5a4b488
SHA10d7782f3f0cb9652b866c3befccb4c76ad6e03bb
SHA2569e1ba0e4084edb7993b74f9aeb1280f0205ec2284566a2ad9d8dae23c6e9f284
SHA5123e5c7f46aba95c88692d8d4fca716eaba26c1733f70e132c035aa1c9fc43df53f847277e63686fd3f49b19ac0e153ffb00e063dbb846249e86e525dd03f759df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9d0ec9f40c153706a2485d381c6301
SHA1fca5871a8c561626d6317bcdbcc77b0ab5ecbbd4
SHA2564b9af384a41baa3586f81acad594379e554b936725eb238a7c6a25857013d010
SHA51240e0a0776d5cda0816e5f662d2ecd8055a20d48f54d51b8b4600583b50f3e2b30e5da7f705dd42548ecc1d9b38d45e9b43e4ad387d790e0a76ef49ffdf1dd870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d9122d198e4c07213b2758e46755db7
SHA192dece6c4c79bc9475213af971bfa0251bf8c12b
SHA25649d4deaaf0fc2b465f2878f9b2a6357c8ac7c09a0cfcf2e540a50222897142d1
SHA512bba7686001f2afbc1fcd849103dcebb91330063f1f5a739eaf9767881bbb64178d25ac681c1999abafc4dc4fd981c8fdf2f41759282445df7c30637aa829307f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c6b1e35392894f497be4fd6d8965def
SHA15a0f70be337e31905cde5027a895d00a1422f6ff
SHA25610722d2f237c269be672284ccdb91516671401205608c4db750a35425ecef124
SHA5120786970bd3331577b0176da30a1bd835a4de5d4bd1650572e875f86b120f21055925c42cda42cf952e4fef40ce25a0f06316eaea05da57d41c2326960c658daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55df7dbd1cf9552827de03dd0a29a0e5d
SHA131b9434413264c2ee88b6785fb46c853813bfe04
SHA256804ec5a242d9c19fb11243202a11de83b8d7b43e5bee9def0f1db7ca7ca508cd
SHA512fe664d3676d70bb11547074321a7b1281e07d0b38124dc8e07f7fdc73f6020d75aa174adeb92e38db007d76002ebc7f827aa47953e23f8fb21f289357674e93d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5798c3ef5d6adaaf463f54e3a782b01ad
SHA16b266d750b717c1e7623d70aafeb58f7b5511825
SHA256510757087e3cdf23a86da779e448e6925783446bd5600aaaca9b93f000715800
SHA512e33a262aadfef5eb5c3dd9cd97697f7fce2d4a97ec4af9e16002db546f1027151b59467293e57db5364b1b7415ec3f83951cf89cacee5a0bf05ced72c9c39930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726b3647c35cfd86be68b3384eeed6e7
SHA15621cbdb2e0da9c99787ecfedb005dbd29bb6bd0
SHA2563629cf1fc1800d3ae8e2cdb8ce12f0b21de10268db5f4a78ece411a4ca39e48d
SHA5127b52d538c29b4dba471dd5fd9040dc20fadcb15015f935d980dcb4df52b1177a415accd159d459bdd82c3fb1f7b2826a99697a71992467287833dbf17b3a947b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbaba43b8966b24e494a1b7c1ef11b2a
SHA1f12502b57884686add56631473cccc568e9b8242
SHA256003ec010e26c6c70979c664673f8e078a4b222274e99a1578246ce32040edc4f
SHA5120b89d3dcfd47eb68e13ab5f5922da0133ba7e9bc2ad3bfdd0b7d6de1c3f05d1294945c881074b9151ac6996186c9d86b582f0724a9f147547f803c38429831a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef6baf256b8c4374e6e68e8c33281d9e
SHA1aa5ffe9d641d409e115e32e1a8f55ea26c93ea8f
SHA256c034ee1d4a52eb5f06d7d21c861aa0a6ddda6aaf6400e83092c124ba946726fa
SHA5127a2b5cf6392daadf3f1747ba9731d0f74b7ab0712ab1158b24420fef8f8f0b2f02dedda70492f8e11ed67663592628152a34fe008ebf228cb53dab12f0e7ea6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96c25cebd8167a6641ef4dc2696af62
SHA1c45db79a57b0df5f8a154f7a568ab0a76386aba4
SHA2560d6e41fc4d6ba7b2cd6a42d2695bee7810ca70583e4ce0c385bf62335f7ee2f7
SHA512532b5bce000cfd27cdf0c8ef72e3eafa2ad71aefde0ebfe74b326e34dc832577bc5757ac0f37639bc9d529d56f14954aba785306e122f3c262c20c10dc2282c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480bf422e83996ea73b4096d78fce8c4
SHA1f2a66d8c7d10990aac8c2b9b508a4ea080f4fc56
SHA256cdcf19a3f70e03ac21ddc4654a563c71f0b84b396fe70c47c98bffe46ac8ded8
SHA512d4763ac0cde663fe293e36ea46fef701f4084855e15d3152ab5628153c991f85c2332e8abe03a8b78ff526a98a9a6ecd0e598a19485531205e5045ecdcad5487
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b