Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
220cdb1cd05d22003d91b56d9e567674_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
220cdb1cd05d22003d91b56d9e567674_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
220cdb1cd05d22003d91b56d9e567674_JaffaCakes118.html
-
Size
3KB
-
MD5
220cdb1cd05d22003d91b56d9e567674
-
SHA1
7374b1e9d8cbc6214a8269b4425cf58830fbbb79
-
SHA256
b7e377a72dc791f49cc086f17010ce7c8ba226e388d4415463e3b11914bea2eb
-
SHA512
f2793bef3bb884e21c9a1b9d49937f353876c1b0ef1b04af0e3b5552907f58b78de569da0d713d043507130755e005a8058001f132cf169a62e9943e5cb8dce8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8D1CEB1-3927-11EF-A499-62A279F6AF31} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30349ae634cdda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007d89975c080c664599e1accb01b78a7600000000020000000000106600000001000020000000655e2b355e46662643490cbae3f341b4139801f763920a3466045aab3d34c0be000000000e80000000020000200000005acbf29e87e2a5e8257ad02b6d0550b4e6f66500788dfbb0325cf0bbd4fb3c5f200000000a9b1c136fe458b8465922bf274579d5416f0eca15fb3abb062711e9006f53c64000000078dee6dde2e755a1df7b99fd134347d5779567bd8182a0600de4fee9d153465dce4d724c4f82ee397de85841de8be0370f959adfa3424c319893aa1cfb1b8823 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426164799" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2516 2000 iexplore.exe 28 PID 2000 wrote to memory of 2516 2000 iexplore.exe 28 PID 2000 wrote to memory of 2516 2000 iexplore.exe 28 PID 2000 wrote to memory of 2516 2000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\220cdb1cd05d22003d91b56d9e567674_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9104bcc94715e666a92717066b2565d
SHA1cbf3ae43bea93873924846063b76955c12568736
SHA2566db4d674dec2cffd6e276295b75c7666457d1617890a829d9119957b8907d91a
SHA512702be84228fa8be37258be040a94ea624d6445335898990ee2f3741ec5f8ca07fb78f2df0041f4d6e23e257bcb2b7091db378d0a2b03f685ae335d903f6cb04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab3b15e09ae33c88d3d46ee8f04086d
SHA17a5dcc337deeb3a9776d1e973814d525de128150
SHA2562dc5cbb388f4d4f5ba227ab19a9570266880ad921417105c69a57b951729d59d
SHA512d890f570d094f56c50cee977ddcf0d33346f78e6721787ecea9973931d810f2ab876f8bfde56fc5eba50fe20d518c702899fee164f8b7927a4927fd1f13c1c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eefb8430732fc9443c5d57176885c75f
SHA1b45d1d28de0f0503ae5dc091aed7fca7e1069c1e
SHA256c8eeb89e0486ee8e00cec91c032be5b35cd50ca52c6d0eefef9c91ee395a71d4
SHA5124867add486abadf20a7a7e29c446b00bc5e94551e56b861570866b7e859cbe6c7de23250bc64fb9513aa8341f5616cb02ba14721c67485258dd6e0b57520c83f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a7fb991f51a683729505505d958b35e
SHA104200292c3b35eea9f64c783f117cdf637989c6f
SHA2569c49c20eb641b6d1379ff4b590a06160e2ab7571312a30e9f15b767f22e6971a
SHA512a980205ec7226e01d128fbcd409ace7079ccb6419cf8f08b335e111cd4db0d1020045cba2006e06cfc94554d0bb9dea5f89d5c567ceb8ecce856710e21840a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5addae1c30456ca3a1692377452b83140
SHA13f46855767b813ebba56b12839c6e171c3229e6e
SHA2564b722587abb3a69db9e44c9bbde00fc9f8c0a8deded73dc5dd27f62e78f6f9c1
SHA512c0b299f7fa4f9c2b58a1cbf577d1be8934833547640a850e9d1eb80081a20db067f931373cf67b70a1db136843197d7badcff6a1b572871aad9425071ab5878a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546caaacbc0e44798a6c1edae9350495f
SHA15ae0013f9a18bd73671c8d66c1eddeb6cebd697a
SHA256bf1f76ac4de9c1c9ae5fb8761a842ce1f2ebbbc6db610f64aaf0ef1e2490d228
SHA512a57b8cfb8a5d1e7de5c462b9a764667056968de28050a0f08a13792d29499681f48f6e3b5d52cc9a1d7d7359001222cb22b8fee89bfae19eb07ba51d92aca45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf91a03e694e4d2912ada0c453e6912
SHA177522173110c9d26f51e619181e0bcf9de11d7a6
SHA256a432f21b0e0b576e01dc4289ba1f7e2b34523835a98edf3bb946ff2b6e2ea0b5
SHA51226b7aaf7d86558dc6886061b23d07a2dd4bc7aca99ce1085d44c3339b5c439eca4eed4bc5fba17c0118e84905c13f74d1f71bfe4d0e7cb9ec31e992c9ace9683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b0fb9d84a43904299e096e9ef67717f
SHA1969cac0405bceedbf2644d9d1b55182649e5bad6
SHA256b426c32d0633ca7fd305f62c7f3f97c470f66bb9315349bc8bcc5006b219f1a6
SHA51245ff54da05530c2f1004e7cd662d6afca60007a396a29de1d99b05a06d6c06b739d3ce3bf0a11d4d7225293bdb10f10a3a469cb597b94f5ba3a5b3e809912e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d607bd77d06f0a89992d7312258fd5f
SHA170ea151f70b9b6173836a799b985f925a6e14643
SHA25652ad096e73f7f97f9c01c49cce26c94a5aa825192d5ccbe004e0e6cc1a3afdde
SHA5125bfeac75d1cf7ffd2ad65368690ce24aacc99b28c73bbc56f88b630efe70d9e81319f6cc8765cffea07521c642247943834a22155a8a5b7b4ebc96b27e1b35a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52022ddd8dab9153797406a7a70f2cc68
SHA1766718b5d0df3fcbabe2f3e563cbdd84df2e898b
SHA256417a22711916c2d0e81eb63c256f3272a5e839afdadbdcb3163f3482485f2e5a
SHA5126a4ccfbc1364281dd43e01923377383a2a2d855cdea795402df7d1f5fe0e6976d541cca3c117a49fd4a89f577319d36aa04ebff06b3701fae0a9e8aa8821da48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acb1c8276cd0d8540f6922d500e7fd1a
SHA11e4b161b104966940639fad29f84aa11f30d9d8b
SHA25679bf31f02aebcf791ff0b982b2face0ff2a329f3e5733810dba1964e1a681f78
SHA51290124d893c7914ff163b37fa08cc0750bd384672efb03d82d3d055b8b723d66f5373fcfd951bfcb66ee096c3d090d4f49a87d6f96b34a1fea9ae9ec1dce50ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e14cf83ed4e5507a641b3f32d93ddfa
SHA1debfc6344f8eb0dd3367a4249ceb6c8f326c1aaa
SHA25672d9c63af82123726433d038d8be9d00a30f39213e7b1afa4e23b90c88a9d036
SHA5122e75cbd260e030ddc6ffa2c5b001bee5e54fbcafd98be73dcd7280ba62d52443469dae532b8a7f1a450793d7a6c08330c5eb34f07960093273ec95e0bda1bda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521ae34695c1c880380c8492489a97561
SHA19ee08474c04af9f619481bb15a74fd9bd55c4801
SHA256c5ef05383ab3978573eca16523c8b48d169e839e9891727801eab18760433d60
SHA512a854c9af372121ac64649d33a599527486930e08c6adbfd1082360d8172fe43746a2302697f515d15d7e6e19c3ab88148e7322b523ddcfb1e8a2f20eebafd8ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd7475462c0bda446e02d46ee8a9f91c
SHA19f1b6f9b889175297b5d2f9149cef0b4a099500d
SHA256eb11388a805f8ca7e91c7cd1850c39fcbb07256f1eebe5f04006dc527a5b8498
SHA51266ecd19f9fef00e25fdd1cdf2550daae12a5424079be8e9397cdfd6913eab837264344a209ccf27994f06a16e546238cfd2b78d9dfaed3c5b648c0e973d0bc7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8a6360b63a9052200c28f899579958
SHA108fa0d138d8fb1cef4ac5b2b5ad41491450b6060
SHA25685e8885a8f30e067326a19cae3926e99793a4118de7742c5236c452dd71b4c99
SHA51260b9a4fc59769efbb834ecf39ca5189fcd47dce1a8d230e0f669ed3c0460fd1dde48cf754f195c0e32d346c0606cb5a623aa6c80399d06394452b611100631ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a64b8abe9a5c6b640a74343293467af2
SHA1fff4b86dc789cd516da86c6eec0d09002c7401f5
SHA256900f0b903ffcaeae35bb34fcaf9403c92f0721277dc50b7361d614e9ea943423
SHA512a7b21326763d3cd70678d8fbbe92b05b51149a49a94cdc289e9a9d3eaf6a44edc0b3447bfe34f2c13cbb64a6f3bf26b52696fd0b451b9f65d37111feda6a3206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588035c6ad3bd0be5536c92f08044fbf0
SHA1278c3a45650e7888b571f2f8c2d22467c1b89e80
SHA256cb0ce516038f027eddd5d0f6c1670259ba3b051b522c7260972b71a758afb939
SHA5121f8593fbf6c83c9edecd4a4b2aafa54422f47b64192a3a051096d59b852cbec1ff4baecf1ff596d760c8319a6ba2d4788cc621966aebbc271326f17f353e49dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8305cb7ac11c3b74a4c3bac0eac414
SHA1599c5736b9f2079ab041c0bf745204a723f3edbd
SHA2568a83818be0d03dafa6f7981d0f8a65937c180d412054e5bad37c495996f32f29
SHA5124c1d03e3b1a44ec92fac384990e00937981bd2d7bec8bd50d4c92a50a4aec700fabbd67cad74cbc5cf1bc0a62d6bc3a2c64cae4793f24e11e718fcecd26dd7fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5092bfb59fee04fcc154173ce3a17b4da
SHA11b32ce6c69c025c508483dbfc28738841af68bcf
SHA2566b7d0eab2202cb8965713254f79801c6aa80095f2e3d0bcbd0ddc5964736a109
SHA512eee5fe34080f52b4785beb2589cbb1e90d3b872b728a9045944ec329d7bdf123708900ca4a651d7b3bdfa06c02c6241f2968e53346f9acfe92910e863331dbb6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b