Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
21f7a1ce2eb29e2e3b869380a67596e3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
21f7a1ce2eb29e2e3b869380a67596e3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
21f7a1ce2eb29e2e3b869380a67596e3_JaffaCakes118.html
-
Size
1KB
-
MD5
21f7a1ce2eb29e2e3b869380a67596e3
-
SHA1
77ed95726d68437add96b4acd39a59f1876e67bc
-
SHA256
54750f74c65224f7e9b18fabf185c0aa300baddee7c6a700239c91d52d5c42d4
-
SHA512
902f6afb8c81b1a22a0d6801bc6489d027863db75f3c0995bc7cfc98bb94d47e0ddaad7a9deac5dd785f3b4d559a6ee3a957bd226c6d827138b0dd897d870f52
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000000aa80b1e658b8ddae60061d6e9764fc24daaa363b3f94d4fcd59f1fc06d964ed000000000e8000000002000020000000dc405aa96c53a741cb94bb67afdb33427f911c237b5f564f00748fe4a3b97f7820000000400c9dd06869c07d5d5d3d143361cac34fc99a2d9b7e673bd239ec1141ccda19400000001e8e434183e444fc0e56dbaba6bd5408d4866f67ecf3a669fbb3b9f74ec186ec5ce2445d996e877d1f61046599b67fcca9b7c01140d618f8037fa5f916963fb7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426163218" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A823D71-3924-11EF-91AC-F2A35BA0AE8D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304a481231cdda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2600 2844 iexplore.exe 28 PID 2844 wrote to memory of 2600 2844 iexplore.exe 28 PID 2844 wrote to memory of 2600 2844 iexplore.exe 28 PID 2844 wrote to memory of 2600 2844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\21f7a1ce2eb29e2e3b869380a67596e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa59302737855760859296474821dd8
SHA16493e820648fed7a3c842a8d7ea4e1a45f5a7b3d
SHA2560cf03cbcb138d52f435ae571cb162ed136845a09651c3f18d75489489e3f4bcc
SHA512cd75b980fe291b7b8843d14976350220ee5607f9bbb83d66ae612248ce6d6d2f0a06372d892c8900ece441ae5635bb52e74c442dd190744d4276ac84a22b350d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f00c0b62ac2eb0720d131b57c353b1
SHA1f422375ee1c870d05a835e0f94e29e9ff13459e9
SHA256ed884aaf67f470aa178ac2abf7208b2616a97bd050f260189c7eed5f13b74b6c
SHA5128c430424fea1470c6b9501570d2407fef16cc55a8ba3f7bcfc0f40722f7da6329b4295de7cdc86da67068f7d5ae2d5381160c345216ea9f394bfecec41d3d471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d9590fce28cf5c1b5f4e14786635ec
SHA1ad8510527310a93749c46b4cd9e88c9bfa4b2353
SHA25671b6a696597b326b9df26febe5b29559c9ecd6a7cd73a094439f6c3aec357d3f
SHA512353bc9ba41e4dafbea9b259f1c84c4b22312bfd701b0149327f92b4d0b283c04526bf5bb0e4a77a3aa05e5af3224936125aaa726934369bf4fb0663650e61536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d83baf3a111b709d0db64f3c85ce73
SHA1650f75918c08ad17b87dbd06dc561b4d9d7f5b44
SHA25635217d6890f3aa666fb7d2585b264065a4848ead7d2c074a9234d22274085a06
SHA5122c85039c187151c0dd180697ba4aedcc54ded6b4e7b96778822ca1ab85f8d626b9eb0bdc4da53477b9b5ecf42ce86c8cfb2d999b56e5b1eafb2f6e015dfad3ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522d2097ecf3970b16c9b89df7dfbc497
SHA19200a7275249bfae6877a1688b329c338b8927ac
SHA256bff3b95116124dd21a88ab745370ba084bace658b1fceafcdc3b8cb0a15226e0
SHA51215543499b51e94c1d702bbdfc6361fe2371ade7a39363d12383e4336168cf4ce61b14239bbe1159ba4360acfd26ca4e5227c504f33b124fb5dcae1afadee431e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c789e25f19ed5f30e20a7ff9a499695
SHA116e0568b3a70b7b0a3fb61d06c47709d08aa54bc
SHA2562625098203b627b1a48509286c4ff7e5d6dbf8850c10bd9af2d49ae70c13b120
SHA512f0ba114a950c984500dd08233f43dbfd13aed244e9dc8a55b6c46efe62088d9f120ef4e320ececa72b08d8ddc262836fad413e02ae61bc19d4ced7f67207121c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aac47faca79167f6ae890367d4d4ba69
SHA147ac6baa608a9b8970db41a619536d41c0e2c33f
SHA256dac1cd32acf3a05b33a11348451ef50e8bad1e97fce7da823fc14a8b16762e03
SHA5125c0b3f15ca8266ada449e2a9ea5b18b49f0bef95944ea369e92d2d4dfc21a70f752d12e86af99eeba9a21dc9231ba4aa8ea42077ad25113d0a3da25a1a9b2d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5470d44270857614b316ec5965346f415
SHA1d4012e1843cff01064f57644064e314d27946d13
SHA2562a7eb90438413134dccd8d2d97b5c398abc3ff36b5fde5d83d3c173df4f57cb5
SHA512cedc790af13e05a04b3557e189a46d6f0b3861487f0d42e24076af2851d213dc5439450f84d0a1d9b3c129082fd962e21c8c30bbd124a25f5356de15cf072145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afb11cebacfc274f28129270f28a55a2
SHA15ef0a99a173a1002b5aac1bbc7dd9484798584e7
SHA256d9b52a2949282ed4edc5047a8fd974ad7c0b748d540645141b8b316075d38649
SHA51238a4044fd1ebcb58312378d1bbdd213286703ee881bacb494795db48c3069243860ae3658bf1ab0ba19472656ad112375500aed7a9fc3ccac79a35969944152f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59554edaacc925601485b0b092a43f4a7
SHA1aeaee7a59dd4503590999e493133e77863503d0b
SHA2565e504a242bbd78a2e271e5e1bbc0bbcec6da7a310d0b49d2e35d96120bbbdea7
SHA512ef42c31d60dfcba35e9c1e529c915422c432c5305211cad79b5e0627bcfd84f76b71968bf4d228b41bd6e274080c4a0bdbd2e03fb07d0acf61f48eaf92f41810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5488d6080e08d9c407da74e695f2340b4
SHA11f78dc1dd1ac242adbee465b2440a8c92b913a3a
SHA256babd53857156d63cde3e6c36d7726a48599cd4b2cb06cc91ed797958d22398e3
SHA51237bbcc58c0f07f39201dfee2eca16fc6b94fe5a21b7e0e1be8354ce7baf5240093dc474cc939c7f68d60e989ca2066a874decc7b4a83432e6a5e0493cee587da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cb61335d3016c0c72bfa676d4346aeb
SHA1cecfc2cbebaf3f43492901bdf8e2d6b7d75bfe00
SHA2567b7f4939358e9bd6c1093b9feb5e47b727034a245a9d7cafff661ebefa13fd4a
SHA51267356f4e64a1d6cbe6708e8920093e4ea39410273ae652a9745232b637676961698271b193faa300c99c83ab5fb1c067fde9821cdd8c96ef73ef9ce42e8d2866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514357c93669aeda1e64a6b4dad8906ec
SHA18da85ae40173d40cced512bdb0d16ad6e248b1fc
SHA256c491fb525015dca7428eabaa9282cbb4cc2e9fa20c091ffae266a80af22cfbf5
SHA5123692b96b6d8fa07f084bb9334b2cb7f0398d11fbbbf61fabc8ddd98d183c0a3497758179edb804cbcbcdfd6c7418ef384b1360da736744b380d7bf544efac8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567499cb19f89103325cc529c3d84133c
SHA1614b66a19678170838c1e44c8cd03ff5059d433c
SHA256e3ba22465e1ba3c4ddc4f230d667aa67e8c60361c1a8f693316134c986718db4
SHA5125ec593b97e7481196ce850a45562d2482ba72caf550e4f7c93091ba2a4f5eab7d3009dbdc592786bba62820a5f563ac0e4acc9311b5cc8c0e21235ccd3155c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be4934db78d2bf0508a61953785a50bb
SHA135e8f18cc0d69ebff5c84ffed9afc4f177be2bae
SHA25693287f57477e49255eb0af2c82b915b5c80fe6dfb8a384d668b65675e242dbbf
SHA512d740a0620bbb8e57bb253dcaccd0acaf4d3018132a6ed7dd523ad2a3632bda953ffcd1dae802a5e5afd20a975a8527ce5e374db5a44dd561de255af97c52461b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acade47cfb744cb6009cfa5db671c928
SHA13484e94db75aa7dc13e19d2fa9b4fbfd2713ba0d
SHA2562150aede6ff867f35d3888069018101bae9ec4f6188bb098c0a1f6b3b6d0fa43
SHA51230add0b4e590d96e44a12bbe6c2cf4ffd88b160b53a180332813dc77ae5b6a6787ea09effc091039d8cd8c9a2b24d7cf77c62b04babc4d379777621fdf15d24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f0af69b183788f2529a9f7282917b7c
SHA106fe4fa1900781d431e376947f1760d05d172c63
SHA256b26093501e7c53cfc365ec2b025a3e94b1d7c4d5bb2065fc083d4f48dc5071df
SHA5122fe8b9b1667fd8bfd58047309e5832afcd05df4023a75ecc3b7e5e76d472856d7d583f547c693d53468895c36d9719126d58befa7d651c8e64cbdf409bec2c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac3b8b0916155cbb3d94ae054dd8b560
SHA1232f2367fa3fae15c758cbeb097296610fa8dfbb
SHA2566eb248df0fd8bed626925ec4f41ff60212938b055c8348073e99cd08eb9ba4cf
SHA5127d5700887f9c271304c6b298095156604ef9b235b5d7947ad74717e39b61e771d5902c46f9dea5f265b344f9b81de02c65028745f85280adaf519c020a7299eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ae4374939fb87e97a183aab0c5df8b7
SHA11d2fe50f62d559f27f3d1d645436352254dfc950
SHA2565ba24d25d9f45111dd8d3a2483f4d24ebb4983240e615ca2fec5c71221cf100b
SHA51262a73abfd69553c90efce2be0db7d436c582aa73baad4bd9e5a627b9eb674b86f01847e23b8738b6e6b90f07961a05d693cd9f2eb5d6995b6393607b4217a401
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b