Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
2243d7a3b0e58831de44c09751981d23_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2243d7a3b0e58831de44c09751981d23_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
2243d7a3b0e58831de44c09751981d23_JaffaCakes118.html
-
Size
87B
-
MD5
2243d7a3b0e58831de44c09751981d23
-
SHA1
29c876aed7545ddb7df081b32796c041155fa4fb
-
SHA256
badfb047e4a056ab2bf37c52c9e2207df6770dfa51a4b44ce47afd993de40c3d
-
SHA512
cd9d6b058c4af8e546b0d964e21d6bd29b6a51eedd8f66a2e083f4e6031cc704386653225d031c64dbf3cd08931ebd6d79563ab54738315431ed685b7c99c8cc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D1BBF01-3931-11EF-9A72-56DE4A60B18F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426168778" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e2d76d165172645977514224a641ed50000000002000000000010660000000100002000000082ebfada94dfbe487b681910e00467d57d301cd4127cbc79b1d154f5edd50fb1000000000e8000000002000020000000f62428fa80b1c446f04ff4888f773b413e7eff1ece326fc95ab91b73a027362120000000391ec94eb9e165065edf1bc7581cf81f40c7bdd6817e08c401428916cf753091400000004c975b9907af8c8814ff82c31e4900a1820cd16400c840b0a6da3dbf75883839333120d8bbc07e3e6a6bc70a2aeaa9c96f8f7332b02276a1b7cfb8a41403af45 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e386113ecdda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 840 iexplore.exe 840 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 840 wrote to memory of 3028 840 iexplore.exe 28 PID 840 wrote to memory of 3028 840 iexplore.exe 28 PID 840 wrote to memory of 3028 840 iexplore.exe 28 PID 840 wrote to memory of 3028 840 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2243d7a3b0e58831de44c09751981d23_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD500c1fd882088fbab3fdbbba7167458b0
SHA1d713c434e98b74dc83d3dd4746a59460ee44068f
SHA25632140d8591da43c31c4dfea7c933d3e4b92a7fe8ec30b7ab3b89db55e27e94dd
SHA512dc3e1d7ed187156abac9c6835c6abf8c3a6480dff1ef7daba9f36cd2a5bbd01543eecfb7d18a95b315b236f98d9707b114d111ad869e721b7b4cc4a1608d12d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a71c30a4478ad838892f5914fceb486b
SHA1fa7e7e2fad947f893901ffe69d3797643df6b304
SHA25659d3a810f9a30228b1d375dd14b5ee50a1a01d33142dcead0ad4fedd31626705
SHA51269d8beb3f6976dad396ca108b77bb4a86afc0232956df65fce1778808d935edce872276d2182355c77631f250722a99f2fe7d873eafafd4ae3511d6847d5dd9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5887963ccb55ad6aa987f6d1c06d0070d
SHA140a01092ef55cbfdba893e85bf4e395afce87e2a
SHA2565238371e7e2f6006de101ca9016027d39f794a550a6adf28078a896fbbd46ba2
SHA51289e51d15c55906992e99106b71a398839c1875b22fb9bc29b797877588696005a2ae8837ddc9aacc6d10f35f2f07aff8e6bd6bbe0d26eb39efffe17a9d8d38c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db5e109c6e4855cb8471656ac5fc65ce
SHA1f5bc3291e3c8cd4fca0dfb7226ec21222852c4d6
SHA25621218d7e3891dab145e4bcba8fa0a561199b56f68882bd4acab328cf98d10bfa
SHA512be8d886c24c2a0fbdb9deee32a73eb9e882c634aa3e0868e00a786c460be937fc28dbffc499df5a7f33a6ba7cdd348540a3a04c05c834ba986d4990ebf95d122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c845a1103c85688fa2df6979b241a193
SHA172a89c5d57f371003e886b0f91a9f60aaa9c5783
SHA256cff6649cf32c0d33fc97352c80b34bab25dcf331ff46aae30b8754430388c01e
SHA5122dd8611d1bbe4925a4fe6c27df54180f41cf673db59a4af642d086bc3481a4500473b80fb2af0464a743467dcb697cbe833cee93f142efe16f904a244bc3214d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e8ad668a7853138a91fcba902c0ab7e8
SHA1595250555c40c978b4875d08967eaedb10bf7794
SHA2566d0557b1b1847bcd5d1f3aff0b62dda9286898e6320afb2755b8a39fa8f12cc6
SHA51214632b77ea3ded3675fe818483e45e8bc72dd9fc2e54c55592f7b5ae614af0f7c033533a29d59fe4227edb38a3e41689d42648b9fd72acbe7f040253168b8f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51e12763d113c7529d35f8ac7297438ef
SHA17add93fab3018a787ae697073b9108578858f969
SHA256458c404a1b4bc921f9f5aa0660099930b193a8acf7301e36ffb0035812c5e47c
SHA5121b0f38951c223073998cfdac6a45aeb3aa05c29e0aee2e237b556f10ff93328775150d427257bb476e679d0e1328aafacfc9cfe4f6d241344f18cdf737ec3ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56487f721ac13302198454ec334cf55ec
SHA105082d33bf0ddf9cf393b6ea2a52650f53f78194
SHA256e85516b0b66395bdec3249dd0fa4fe4ddd5dd5d0a0ba08dabf4b0deec1909b8e
SHA51248ec33473c2b840c5bbf5d7bb37708c27bc70f16ab1570a2abf0ab118936287d0c955f08246a68efde6e14d0e1a14be1b727877c777baccd4af95b00418127ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD583605f6b6e9e876d5566ef677c2edf26
SHA164f537aeb032d7686bf1fe59aeec1d1a29bc89ca
SHA256e2037b3d45b26b95bf3ea8765993284d63e7a4c78c695f1cdd8b49e1aef19380
SHA51292f2bed3fab5e8853bc787b362ef1c38435d88809577d41ca503678ae7e6dc0ea5694d10e64d3123447e531a197095ba277601bcbd9b7fdcdd318e2752c51fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5434b170354c1959e466579a313bfcf1b
SHA195dc4c0aafd126c5c10f67f9df0ea28bb0906447
SHA2568037a0adaac72d76516f95cd2dd6fdf86ad812af4f8a8871ca88b5c2c2b7f6b7
SHA512d03928b2d816d44488b7841c2be25b545de85221745dba4ece66c836283cea31e1e20ecfd192d137fffb67e3446b12f2a45e503f9bffe4219183c164c32575c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50780430bc89130652b449e3c773bb1d4
SHA1f36d32d21c31421a6bd0f278031a083ec2da4c57
SHA2562b01db5c0041546b495441ec4fc2b6370ef765e3d0c5bde3ccc90d6afc398b57
SHA512a4b1397e6dd9be493a7fe64fbe65c18b534d0c2ce6fcec21875bf7eed7ab1ae509c615a3c6881ae383a515bd19d334b2fe5b976f773db6e684d40fd6a0fdc250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fc6039598f8eb025cc2b51340edeeb94
SHA1bb2a7de5058184280733773f76b4901b3c9f0e95
SHA2567fee696a105b2eb2513875126d3271682f43ae092887c7d7733af1cb6b8e3fc1
SHA512efa2849b6861cd2db8098988ccfbbc8e646a0a4d6c65af0b0df83f5971f56d96c9c2b12d53e7767a8874b9f60616ca117da9a20984e06c91c8443163b8d72704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53fa40d1bd774353c5c21b90a1eb82ff9
SHA167bfeff7b207e8c0ba0d257e8dae08e9cbdb3f03
SHA2566a5c69e2bef29812e2dd094fc34b70a400f8e2bfa2e9d76352b0275851324c86
SHA5129801d077ccf886faa3a16758968dd6b28b31772f40987cc601b182e47a1472f20c79bd7e476b785762a491894c7ab9bb4a4fe30c2b217d4879db567b62705070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a3828ade141bdc93540594e9ab29f6ea
SHA1e9371adf436a8b00ccc1d635810535becf6377c6
SHA2567f3529e7ca8af2c966660d8dea8d9bdc87d1bafa52b83d109bcb8135d4dcf9fa
SHA512475b4dffd4b3c4b15731f7e1f1dce7d814a08e5c9c2db6c8b89057df9c65935f6f6a5143e5472b81c994cf40759116e178e4b95c91d6b9d636c7a679c1620993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD502b3268dbfe64528fcb6300c2f3d5d88
SHA1c93c2d89f7c7870b809dc2a6244dd36d3af93948
SHA2569f575402854f6f918748432e1150c6b231c0c2c5b345e6e95f78d410a2fe5c68
SHA512378571bd8e8b34758d7d6ab1f4a8d4ab81369db2c43fcbc66e9337688fa93d4b7eb00657ccb914b725b0725d2eae5876a0864e7e81a86449b40e6d969cee19d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD586daabbb2f6edc54918b4b776a69009f
SHA1a395c50421b6213b545c82f64630420e26b08b51
SHA2568e218729956de59f427a6da45e8a2e448dd4751e3dab1f287bcabceca116abff
SHA512134e732185ec4f8948f8049fdf15619f6b5a1fd8cd0724ba470cda7899d5af2c45c0f1635f5b80a2aa3b0e14a4c6996c4e2a8cb35ed7a4c5c0325cadeddd34e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52204a58b93a7e055cd11d4c5537d2e68
SHA1674952fcc0acda3ed123976b691861af21ec0aa6
SHA256de2272aca94979447c656a602455058444091c9b7af6bb31a8c0702fec5d8037
SHA51225725462ae54036233555f83a31a8e46f581064a1c18838371e44b187a848256ebcd34fd1abe7954f6993ca4a93828ac00da5d81514d1d433693dcef57bfb829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58cfdd66d7a1186785b3688ff2b258e4e
SHA1801ca066abc48328594309ee761ad9279dfe5d72
SHA2563fefad627750d1839168b55d47255acdcb92927c883a2412e48d5f8948f7abb9
SHA51226053bfc6d5ab4973cd426c3952ed129de0382a07698135da6692616a0ccdbe0498ca741001dd57477fb94752c31fff54295f3b835f78dc2204a642468f05127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a066d03bbde11e26ffa931a822ee3b20
SHA1dd6457684a0dc72e817b8f760299c7d41326d3f5
SHA2560ce7b1c1ff987ac0ea60936f5ab91601bfc096f2457c3965426098aba4d14627
SHA512f42f28cde12beab05c663a2aac0d471839d41881a89f6e728b88496302179bc7f416d309fe8bda13ca07362b738a159cea3ba3f39b03ffd88f5daa9b7c98d4a3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b