Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
226204ec97dccb7eb0937dca6e375cb8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
226204ec97dccb7eb0937dca6e375cb8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
226204ec97dccb7eb0937dca6e375cb8_JaffaCakes118.html
-
Size
2KB
-
MD5
226204ec97dccb7eb0937dca6e375cb8
-
SHA1
4425ba408c409b7324d7ca1be625771458378852
-
SHA256
a45bf0aa0c6a73098975705257d0746d43f759d9162a700fce8f7e1f0e1da25d
-
SHA512
62134d7429cf893012bc13dfdd50055cfbf477183b800964471612413b81f4d1d728d2d28ab3220a8cfaaae6f8fa738233dcb133fc8e15b1d506bc56291bd585
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05170551-3937-11EF-B393-E64BF8A7A69F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d068a5d943cdda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000ffa0157d0e501d0a8383f3a9064b0fb4e3bd0f343f3470f4016ccadc91fb6668000000000e80000000020000200000007f46972236ba242b82ea2105e09fb0309bb58bf91162411e63f48cb6fbdf9db320000000944d00105629d7d3d00ec41aa2e94673ceb1d8c901e931ba9a58af5c83b65875400000002de5f41f978a86aa6d61f7b98a02a799dbc81ff36e9be9efe4c2077c9388dbc398cf46ad1607f6caf3919dcc007da335ec7d11f5116e547486bf7ed5aaa84aca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426171261" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2028 2932 iexplore.exe 28 PID 2932 wrote to memory of 2028 2932 iexplore.exe 28 PID 2932 wrote to memory of 2028 2932 iexplore.exe 28 PID 2932 wrote to memory of 2028 2932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\226204ec97dccb7eb0937dca6e375cb8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f81d6ea351d3f5a837a81fe9bfae40ea
SHA1afb8d3f3308b707a2f45c1d1c2312798d5ec81ba
SHA2563de45e35cf6d57d5c5e930bcdfbada7d84d2ab387f9fd804affb61ac9c1bd6da
SHA5128235ad7949b08f78b7f6cf869197e77c22a6dd1b7ba677b40ce38c061d195cc7a8f717f3eb4c3da55b63b14cce4ca42c7f46bb720e9520d9861913e8a9ac7b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD559225bf8afc41a224ad964f5200d1f9e
SHA125f5ae5137bc21c0821c1868a29c392445b86e2c
SHA256e1d7a03e0eca6b0fbad0ce22bcd051a6449d233c255dc94bf910517de2ef5e34
SHA51225c5a5afe47f1568eabb6a302ec4172aac39e81bf9fcc05b7fc3e8b42951959ed4272d5aef55a8079e87343c95fb5801f6e7dc4cfa3f90856a6b83bca1025b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d3dcb78a303da99ef7e16309594fd72a
SHA1cd243875ab061a4855058065e1242620d97f5e4b
SHA256736d71ba8f232301f5cfa229e26e5e164946a7a4d83dd884230e320f119f5974
SHA512b494fd4d178ca1b0e363c54131a497ece593769490636f05b5cf5611d3b0f7af93b256e7147b13ee6e3ba424fa7cf9b01723d8c5cb4b9dcc7c5598689bfb97fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52ef1e3d071f4bdb1337cb5fa7b35239c
SHA1b9a9e87ee50559277c74294de3f26aab75671cba
SHA2568fb287f7be34fafd3592b8c4a5e30aa07d067737331d04015d40572e3e532a2c
SHA512418404b160ae3c6d8fbc6a99fadab8a18f75d28ae3a396389cd141e919a41147a02a9bcd23461a215884a268907ca8b9b7b491e9e2eab47ad1c108f351881bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5662276e91eb36cfae2830a3098b02517
SHA151b31ce8c3a355880f88620d72473f7077e57323
SHA256099a0176e3dbf73298f719b7ee5208cf05473c832fae261c55af54244d7fd5c1
SHA512365ad9c605ff7cad372cb458b5ed81cb93948b471ded818645eb4bb44eaeb4c06f37b08b0c63e4dcd0ee01fc626a7c234104989ad0da38253438c3b05d97c170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b70f7c50e6e9532ca638c1f552341037
SHA1d1fc9ffbd206e5161250e263df47c55c21948ac5
SHA25698fe106b0744c7298fbcb93865d930f2cf6ef15f68072a50ef5e6e6e849afac2
SHA512f54c568af3f617e534930e7b9715d980b14459d7fa2522f97a569aecb26c611a5f6e9e65b9288033326d922dfb88ecf6e0284201a4048458d1bafa8c29f30b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51e955fa83d85e312aa12dea40710b5b8
SHA1fd6d3a4ea8147e678f4f40380a151f6b3f0b7602
SHA256b6e093ac2449b2fbbac316c9209a1c820b2c5312fc306b0e43b6720f6b58c6c8
SHA51267051656235612d10491401d5f58b04cf8f2b89e30f2f3a05515f6b03f24eb881c9d813a5f497fe708a105b163aa32e86fb208c738a70cec01edfff1802a6d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54d5fc14e6347fadb26cb191288cc69da
SHA1025adae47e2a05580ac1ae47e68b3d68bf4259c8
SHA25632d1ee77d158bed5e8479bc83b1a539fd406121fef75b4cee8040d6714e182e0
SHA512a901390a399d40f202a373b5b8a0ebb12081b2294ad8ad524dd05d44af06cbb6f6cdd25cba9f5e84742867a50339176c8a77ceaccfa48e5b5f87f8b01b4862ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50b76425dfe1ae77cb44142319d566208
SHA15a19decefb6c92f65f4b3f7f2a9db18f6a9414f5
SHA256263be36d0dddc569bcaebadd272b224a45eca778dd5b02ce1b404c5cf5bcab78
SHA512e9f5ad6d90a0fe18cac5e537b22284e0253444e231e12af83e04108967afd58119e6c42987b602503c3ed7b8300a7ed4887b8a71289f0b433091fc3bc3cbf62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5312ab85ddbf70a8e84663a0dabbe109e
SHA1885fc0597ceddb4c1451526710636488ec809ea6
SHA2565e6a3d335cfd007777d85157a480a605e9103c5d811d57dea23fa98772644a98
SHA5120bb87e1ea266408e322f6c56f9915869ab0341d3946c1e8136cffa9c06d7d589872550b4a6fc8627ef971c388590965d1ec66b1a85243dc2fcf37c9153bebb6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD512702f55281c476882b5c2b882529bdd
SHA1f630d2b6f98e77c7d92527fc02f4faaee6787b1e
SHA256cd2119e8b0f6fc84615012994aaffba4149fc83a52046d31743f009a4b833623
SHA5122b5587ac495310ffd6b760511beea0dbc13f3f2b034e30f132308b704784566df2e474b53c473fd6e4ca5861db73a3465529fa1f666b93627d3be7fa0e64469a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50cab14c06b9b945a80eac646ee205625
SHA11072f5f4527a25983365794cd1cc2bb0e51272db
SHA256d1a252707cd32e961048516582f493a5c0715974e84d9fe44da80ddd8b5e0c62
SHA5125734bf5fa56affe49dc8129c7cd6c055235986fe266c7deb87dce877f97c28dd6d415be197eecb61a2fcbf1d7437ab15d1b6fc27ffdfa7701a9d05757b0e785b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55f34f061832d7c867e7e68d0410298c9
SHA13633c9dd39b29a07e4bf72a33919f3f50573cb59
SHA2565955d68978deaadc800b331b1dcffc5b156e55ab6e9c07c3e87911b9af1bc281
SHA512a49371d43b21533c8cea4b17d4c521b48f250cb1961cd538b9f800ef624f5db8c87e05d6173f2ed123e353e4f973ce81870391864c1ea2e9cb0b5ea27681c07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a0ed74325e3b354a89ebb348c5ea4080
SHA18e82c3197f3859aad36eea9663884e266f6c2dee
SHA2564e7ce01db43f823e18467b1f87ae8f0828382934efb14d2bb3a621cf84bb8a60
SHA512562de459afabc42c1967c57e3c6f19f32498f7fe63ca7e33052d978e1be385e423e99fb7b460be0c7689365e011bc6c4c8804efd1a7cb55606880238d951061e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD523a347fcf5e99e283ebf34382183c5a0
SHA1b74f32aa05441859d93df01174f54470a0574749
SHA25641449d5fe3a5204f4735998060b70e98dc0ce60d1d5f0e4e40e341bd486079a8
SHA512511e807c28a50035e0d22eced89554c261551668602fb23740d1e497dd173e535dc3a48e8f5794f34e4830b352777aac6d1a3b0a1a0e9d1415a49618fbd2f7ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf5c14132f85586d2540971f8213e3d1
SHA16e7899feb255a81c7b067430c783006fbbcf037c
SHA256bbdd40edc746c14798b4295cac82072de8e29a58f2532527c78e526e2a93292c
SHA51239e666e4fe8877dc12eb467b7809daf15edea8ebfa563b4a158e1fb5d1746afd29cea21241ef5a241479fc00596db604e4805cc11e5f826907df22e2b86a12d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e82f75ccabde61688db7d7de64bfab79
SHA16824221e5dbee311e1af6250953ccebfdbf551c4
SHA2561ca1ed6115badb097d422bbd18a3331bb070cd3ec1c6297cb1ebabe9cf1e1750
SHA51242b9feb1b078c16e562d9ca16265f7bb14a466a67c6b123ada08f8e42080dccfb355974a3c9e47c143d95de0e1be5c7a48623e926298564eafc057a7eecd9b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD598ba20a31cdb643f187d72d5c685a7fd
SHA14a2d5c125c17be46fd6c6c9724447d22cfbea529
SHA256cef2135d92e55cf6ce112bc0be526d820001e27212855b92e0e6cbafed1e82c5
SHA5129a75a483930d9e38d327ee334b6ad5733c0a3246b773a0d91a7ce6fa78b05522bc82310b8a36d0ffbab32e351852b374a443e55fc3423e52fb48159e9db7d650
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b