Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
2493136aeb03b1331fd86c9ba2592198_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2493136aeb03b1331fd86c9ba2592198_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
2493136aeb03b1331fd86c9ba2592198_JaffaCakes118.html
-
Size
1KB
-
MD5
2493136aeb03b1331fd86c9ba2592198
-
SHA1
f9f976e4a77a3b85058753bd33afe4df898cde79
-
SHA256
a81d599dbe64717dbdcde5638b27cf08b7a0921054507c646f7c7561043de7c6
-
SHA512
f71784b7883ef737d80d8b92892844c79a2863b867c3895476b41d2dffa164b495db21a5a04e4fb67bf7d1df9693eb462aa37d7f5b0d33c9f3ad40c0a038f959
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C20F1F71-39BA-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426227844" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000019bf3bef8a6fc34784254758a398ac0d00000000020000000000106600000001000020000000e0d66a5e9de003327369acffce7392c2afcfdb10a2d2d328022bbaaab849c3b8000000000e80000000020000200000009718f342277356f52d6dfac3a3c5a9ab6120e9dac93765493a144e911243700a20000000c3d0236e56fcf894fc4da40c9ddaa5fe945ba4d078abaac002862c6b740c20664000000000bf4a7b11ccb437e81a185fda85aa6fcc2e279803fa4228099e036824b51436e67acbdb5127eb06d4158346d6c2fdb6f786468edde341d8452279a5f9efdb05 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40025097c7cdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2092 2352 iexplore.exe 28 PID 2352 wrote to memory of 2092 2352 iexplore.exe 28 PID 2352 wrote to memory of 2092 2352 iexplore.exe 28 PID 2352 wrote to memory of 2092 2352 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2493136aeb03b1331fd86c9ba2592198_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a91bdd6f67cc476a8b6a8777b0067a99
SHA179911e2578e60cc49b71da54e5892ccee8b23ebc
SHA2569e692c76add934d710b351d2b8f2b4526caca8949a1f1d3b257d825379d99754
SHA5123ed66ba698d2d5a7f5ff0005191e0763d0309a97f7fed54bb0f77696455adc83fbfadf2572d72a48b1208517a40b3f4d5a3427f1468249b4957c58034aff9fd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5202fea8ec2fdb4a4c670592517d382ce
SHA166401f986557e50563a60e877fe06b528ee7ca6d
SHA256f03c2819806a4cd3ad9149de071b560a97c5e783e820d291cbf89569bb2c4dc1
SHA512b7f242c41c9467b955b76596ff4dc581f82b46cbf78fe5dffcf0bce0fb1a42e8857de4ab52f43aa420574ce537d7b80aaaa68a32cfd2a421dd5fe28582524de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc6771dcdff60c77f94880b2b0cc8d6
SHA183234d84ace40bfc861d6a096a22090598ac0a67
SHA2566c4b1569d3035eb87be2c2526c3f3c9a22830ddbd854f1495ca828ef0b1a64c2
SHA5125d0ab12dab934eaca2dc779604391a68f9a22d6b28f88163041cb0d06ce82565c55f705def39b11595012ca92f3ed8ac552c2d2ce50c926a98b8bf52be8cbabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5322f8f664ec5fbb325552767bb5c45f3
SHA1e4fff82b4ff1dc6725186cf34ee040d258c7b7cb
SHA2567fa533d2bbe40ba65a8fddebe0c94e14e7dc3071b3298cca88f6f0b03d082ddf
SHA512d8286a68ad10102d37f71fc6c947e31b6b6fbae4fe539739b74055275cefa7e10244324ca73e75d0550d8e41fc0b676ccb9f86f8cabf6a3a054a95d2d1246d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a05bbf8ce9ec2253b4f426d91c1252c
SHA15a6d74fbcb68ddf386427888349261f7a258e8a3
SHA256e0dff6b2a2c79e6ae89283679d6a74a269e5a3ef5a4376306d4e056d1f0eeaf0
SHA5122ea1bcb76836174367e1db4657390264bb03fecf571ef8e705679e47bee61b841be010f70dfa485f7bd96a4b54909c75431cfb33a4bd77ef2567ff4f6dd9a22a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029a76f353b02db42cfa99f4c012c434
SHA113c0bc42291eaf288513a72329e82ea87969c6ea
SHA256cc47e3432274b1256f867859646faa71c6413efd16bf206ac5c6ec854b808075
SHA51231f80d1d29db37740b6c8aded2d25478e94be4b5b69d984e99b33b2799637d9b8a28167c280dfabdb0dc4bb9c1afb7cd45b68cd703c6813c17e92a6dcb8fb984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d954ec82f44de31732c130a730a9fe
SHA1884f3e12dfbbace038ed1cbb15d507929e1297c5
SHA256fb404c37e4cc8f66f9eab2c94bacfa6024002afe409792323e346a377a001036
SHA5122efa57f36e510f9fda2ea50c88588db2340af05e1625393418f15508d8ce2f09d26ae27041c0f517539e97a088e69526c410a200d373f72bb97283c72c8f57e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d828cfb18740b8cb78bcd8d55d4d8d3
SHA1aa71dade9a819fa74d1fb541639fe5c97fb057bc
SHA2569ed75eb4cc4bbc9a0cd9a99f5029daa16b9f5f53e538d98367a91a6b6060ad72
SHA51204b3e6ff43681e5da20ffcdd563d5d61b2d45e3642d9fb8e9c322ff28d9e44b8442d6cd45f98713267879c015446e9db35ee541d0e5c76f6e98c250cc4218fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584cae00fc1e8a0cb0f3f88bc5f7cd39b
SHA135299cfff61739bd2f496a51f7404a06649d2464
SHA2568ce0421578c00735441de27f03d5afae173f089eedb5a7da1ab3e95423b0f4e5
SHA512f85f7f64d378fbcf418e2e4e5e0e01a8021dbdd2468cf114ff8ac63d8288f7f6747bcfcf31ebc5ae41056beac2d3535f987967a2fbf23506cc7dbbc855d0063e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f1dc4d6bef3a6fe2486e71bfe2133c
SHA18a0c06bf589fd76b8c548d89a3a60a3eb24677e5
SHA256869322ab49d9ce416d5910f9b160ff00753302ca7776ab4ced3d081b7fdd4da5
SHA5125b9e92421eb0d8a20b7e092ad780b33f4e20e6ecd28e2d8cbedaab8abff7d2b05f0b2f39dd317d49f46ad771217307f56f02f29f97ff154b3c3bd50fd2cfc0a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0265eb44d765e5f101f78ab21075cd9
SHA12522e7d6e3388ada25f16bbeee7ab47fddbdcb26
SHA2566d184888b37099636b98d24918ba0b078ad4372aed398a853d0b7e0f4239db86
SHA512c8dbcd3784b5da2ff71154af174db3b9d53da8f351aca992ac517ba982a93a8d5c2a3b11dd9148b74abc7317836bdb7e843cd02b8c40ef8bf75281ba2f1d0d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3395c1bbb5acfd01883f6d2d613e8e3
SHA1cc51365ecad3da90f54c21502d36f6bc3c1bbf86
SHA256679c3de62f7e41ce298e9d307e197cf1c85912f126c1ef188a13b3d516e87333
SHA512df089619190da4f71c3138bfe36b03711b9ba9d7efd385b5c710a762091de273705ea45353d78e80790bbe93a8bedaaacb1a03ec5a73dcd06f9dd709beb23036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516388b9c77a30717dccfadff2b68b717
SHA14243ac6579af7a9f93b6b3efc8a8123e929a8bb6
SHA256af83351f62ad9a3e5935e00e394697680a78382301fd4e243f2a4b2723039e76
SHA51288e01edb04b803f885db6fbab4eece5f6438ea4ddfdd18a552b4b6bd8274870b68b38b32e0ed4474dfc768269eeb52a57b53c7aa4f6096fe86abff39c8dc5894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f9fa97db9411fa5db0969a385e8899
SHA123ec00dfad9c0f24f3676b6514109690839bd887
SHA256ec689e9e31337abe54ee0f58599469f288a07470c09b19079cdd6f0230ccd9a6
SHA512837b9f7b7a2d9f0bc31d1c6dc66a482785c8039568fd98f8c5288bed3375dbb2fd0cc0a475223f4b9cafbea0bc473fcd0c97a23ae67a86f696a22f4dca317d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5976ab7760360e702902f81b19c6fbd
SHA1c7c983cf4791d5e568b4934ee08062ebfbd6e57b
SHA25656134d2c606b525bd210e2c386e8445b5872ec1537281a1891ba81d628d86674
SHA51205892be4c88382e280ace6bb6393b9676cf90f3b5efe4cf31e0c66abe8d483fc546234edc3cc65534e26e2924cdb190722abf87d82e029b57bd6e6eb6719914c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510de4bb93e30a8e5bdd4717d39c04118
SHA1c77a4b742098a2055f060af4524b7326c9d59087
SHA2566e6e2ae844e01748d36c506c7b2f2536cc8e854fea89dd4304c2b8bcad5beb8a
SHA512f7f28ed4a4be2d477e5f43b2d5dc7e80777518e518a31d4d4174d39c9cadea71aed29271216b2ffc995152180d13713c8f028d6050ea225ea23dc2e5774ea7c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519c7b6245bcb15be86cf13847410af07
SHA11a2cd9db51bf08df3e1ebe38ce0a2fec87903779
SHA2564e7b35ea296ee0493189b8df8fc59c1141c93898c5b101cca4ab1c3aaaaa7e9b
SHA512f731a1f6863bceba0a92fdd57e2df5b115699c80ba0a108ad75099835ed685189f241412fa4a3a10d05e9146caa1f34d063d847fe3cc7fd6493eeeddac39b51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fbebde4448bb10a2d3cc3b6a49788d0
SHA1687f3d509834117bb9346544cf6d326ed0497e6b
SHA25617ecf044fe4e4a28001ce2acf7654314b3fd3901f4b3309555c7b5871a49003d
SHA512d51789ea96a22f2ed4bbe0506460a2015eac8c8eabdd414038822c90bcf0665071e861cb3d8b0183b75a69489552f4177abc98dbc618d4f06584da8b98414719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b515f5592d91e89ad4b59d44468cde11
SHA1d83b4a572473108c339513cd1c8408e7bb98cb0d
SHA256b63fda11dba41c71ab44e09a6db709f6ecfb61d56899d6577ce6d863d097eabc
SHA5123f9633609abfe66a38129934bd08339d765bb14860d28851cd66a0cedc3d64bf4126a5765135fd30d03d424f9d8f9fab5dd24405d720ea1ac16c3369472f7e18
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b