Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
308f7e42a031a2afdd4bfd5a319545ac_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
308f7e42a031a2afdd4bfd5a319545ac_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
308f7e42a031a2afdd4bfd5a319545ac_JaffaCakes118.html
-
Size
1KB
-
MD5
308f7e42a031a2afdd4bfd5a319545ac
-
SHA1
42c1f516dfa4c4dae1359109a62c180cb8087407
-
SHA256
3e993f88564f83f52a1eef966a05030be8b6ba8957d4dddcdd7021d8e5f7d0cc
-
SHA512
4bd2923b9d6670cc90c17e5d773406a390c2112233bc107a37abaf4102a8fa7b5ce84e3759996dd1ad3b5c372bffa4e57123f1e36e7b00434667ac435648a33e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000cc1fef06208c6b31bf4218acaa8779ded7ab0484d1e88507e9fefa71d2995439000000000e80000000020000200000008ee463198a34a46ed98d99c80db0edaf29d90454b2938d996c503370ce8a6feb200000008871d0a737248c6fcea8acd2903c77cc9252ad34c3a35c7a656591b49cc09316400000000b947cd651428e6f4796e45efb841a5cac76a1f65b805901a8dca127bbc522133d85bc01d4adcaa3c63a53a03f641abe003ad1474fa4bf75abea398578fd02b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426698592" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CE450061-3E02-11EF-9CBD-4625F4E6DDF6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2086ffa50fd2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2688 1628 iexplore.exe 30 PID 1628 wrote to memory of 2688 1628 iexplore.exe 30 PID 1628 wrote to memory of 2688 1628 iexplore.exe 30 PID 1628 wrote to memory of 2688 1628 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\308f7e42a031a2afdd4bfd5a319545ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5533ce687f1a11c236860b6ff319c2e1c
SHA1ac54ba438f65b1978d93d4a6e8da7258c203981b
SHA2564451c3ad82ff795da3a7fbd1a201c9cfadf1e1595ba7c3914b280894ce014cb2
SHA512e5918f3e432970e1b4fb85e6fe4d70e92e0c25727d8b2597dc9c459586332afc87078d324b03e45f521ac1c03abf89b12f1fa5addbf986d2ae70449001ce1cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b21e7cf5e800dc828e2cefca15de2441
SHA131c39be496273596b32539235954fea1073aac50
SHA256c9cafa81676dabf98ecfabc96d831054b371d01e70a1c45e7ef875a1cfb80d6d
SHA512a6d14c1395336da2c6ecc8c5279985f01bdf6703b81489e3c0c1a6a46a39eeece3d0aef4b25b6f0ecd3410143cbe0bc14cc96b0b07f9cced633ca9e6510d78ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c92af1ad21f1c04877218b184dcef3a1
SHA135fb426be203ae5a4d15a657303280ad2ebdca4c
SHA2564545ef04e9a2f9871e50073f4d2fe461d7ea7b9702b20994e2f144fc51e00e6e
SHA512b9d1bf182b9d989563ce9c6f71a9ac074ccaa4c7a7cf4373a7eacb29b9887a606f8050f20c5f876d4804689d6a1ef87cfbb4ab2b8aeb9e2cd8120a5ee553d884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba0946ee25a7671c399ec73626c45f0
SHA155f81d5105d31ce1a53e72d5b3669bf7f99245d6
SHA2564d0dd036a022009f1da03e3eaa843419961bb2ecba692309ad8551373630979a
SHA512dc3c94af10d809ca32c36e95f788df72a8a329b008e969c61d9a4568f8fdb95c1e817e347d5f89a3224c11aac7aa4c1cb73f516ad4360912ff912e867a439f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ffce71a1021d8697699c79c30f3394
SHA1bddb2f179be9af697bd582e95e4e31da28d63c26
SHA256a5056e05b557cae86c823e695e28c2d7047e960a69d2b2c5a9ae7e12d4908dd3
SHA51280cf781976874a1389ae78d47a0657a1c890213bc2a855764269b753cb2d210c0a280548bb6fc8f16a4e80aa2d5d7b73c55cda8854c38c0aff76e10008d2753a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d58b7dd152d9ee292eefe092036e5c0
SHA12f5a9221ef98405f1ac0fa58c6db4fcfb87e8658
SHA256f2c43eceecaf874939b19610cc97956918eaf08e8fd698d7c933846591778c07
SHA51219eb11cfea00b5b15b6aca115701781bac50104056f4561294075179d7e226f84bbde37a2da64c251ceb30e0a282be98579a9fe90f58498e4a1b22fdadec440e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee3633727154cb2baa2101611af7f0b
SHA1f4c56be5b25a6aa9390a115ddfa42df2268dc4f6
SHA256c4d651554a4db57e9db9386cf7773a17ca3035d0afdd91a77c2ce4dca0e7e101
SHA512938f83962f00a112f59cd0793b36faa3135229af790c6702c446b8db2b02958ccd4a5b2dcb3b35267823e35771836106122e99c2c21adc403320321516da7387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa60a5ce254a994993830047cc14a195
SHA1c67f361d076164c22c1805244963d487952dc857
SHA25647ab5999b0099f1adcf864e4eecd02c740541911854338a45ccfd96d11672cbd
SHA512dd568066ed1caffc8a26f2c347cbd9aaa46aacb37fd34036ba81b8b05e9818f364a9f4d81303f9cfb48b8679d2d4b8dff66ec4ce2c0537eef8a66bc4792655be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532539920a4dfbf85731f806bf3349da0
SHA1055b4acdc6926fdd1f2c547299793fa6cb732c20
SHA25612fb685c862a6deb034001fa474035fca063961f9cfdbb17d7b93339787abd18
SHA51224ec726a026db0533c8760ad3089932db2fca6945858e2645bc728bcc89fcdec5fec2d2f6e55654b69b7db55e74ba01e37c8cdb8cdfa964377f55e3b3e7b4c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2e48cdbd6f495bc11a3f6a66ab3c156
SHA13c968156cbafc4dde53de743012434f68951ff11
SHA256fd2b6ac7e6bdd1ebd65c86b90597b8b906b4e6a8941618476583ca9660e831c5
SHA512ee50c7181a74ccdeea6b80aefd1664cb25c3c218f161604929d937e26aa7a40f423d31877623c5244014833e73227de87433784f77dd94b8ac328f80630f3a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598d679d24f23e0f8de047fe9fb058657
SHA16fba00415b4f5090489ff78180bad15b3d4e0f5c
SHA2565f2fc050ca721945e91657a5c6d4225457f4bf2c9bca067980b9485c166813e2
SHA51215a17b65e493230f64af270d1dc96e0922da4e7b49cd5e601093f473c6688de8ae50c21928cf87cdd02d007c6a0325bf7bf3ef3578cb49a25da3212cc0c5d5ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539eb3a29dcd64c1d56afb953609928d4
SHA1cdee5d4793f8f45ad90440749ef7e1cb595dc492
SHA256a1d9c3836297b107a23eb97c378ceb52d3bdbacb64aeff45c39d3bb3a872f3d5
SHA512fe017a491b6fef3cdba42a1f537e6327681736985c367a64814ecc974782b0a15041d74e2b04f2229d3cba25e0e9fe9c6907309a57fcffef052a01f21cbfecdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e042a81bfde95d436c4fcab6f76a0b4
SHA167195a3e2a6b80001b517c0e7935832caddbd06d
SHA25651434bc0437318376eb650c4ba81c56bf528f6ae4ff66a94ff04d16f67d2692e
SHA5120f6e780f8fb474bb2f1f92ffc9d15280c4e67921976d7fc6a6b3df83fbd0e66d5dfa44558b5c2b1b56aa85dba694c29d15566f5ade92f9ece938e74b2fc649b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4ad2fc25ef0cb9c6df4e122e8fdbd1b
SHA1e95e0eb5ea6ac6f88dec40f36762f08469eb65dc
SHA256a745d3d25e4ff33666d18cb5fd300976a63b47633514e1a6fe4e829f359eca27
SHA512c0935e91defb9c76f13f491e55d2f6f7347d166dfc1fdfbd1bd549242f807760502933818e967810b52aad41366019f9c3a866b995fa680f48c820e1cd42ae5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da37882c16c3a6d8915e18b94d789f08
SHA1f36e7f6a720f19b4e94e7dbeeeb02d1eba4e3e67
SHA2562b10320510415b875086e9b535e0c8b4e64f4169de4ca6e9389861ef99e3a960
SHA5123ad9bef62e64c2b9cdf90b462fa940315d99c8ab6e964af257c8afdfc32e9850fa3b53a952475d0d7120879c46425d31b541a8db522eb107e7ba2de57236f89a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b4866312bdeb5e5736bdeeac4df5ece
SHA14436d87f10ae37874614cf22da670206ddeaacfe
SHA25659d7af044ec75645f343ddaa949909c6d07c64269072b54974d0fd3d11058aa6
SHA5128565720e3feeea312dadb3126f1a09d01879b77cd7b38ffbe00f07e3ec0e2ae1e6d37ec35f149103f762d5cc6240ab6e08520c5476f06fb9b6a473b90469fc04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513dce2082e26d40790d976b2af754351
SHA115f23490fa27561e075f0400b26b7e9f6ab481ab
SHA25675c7e8d703d41df00c96a8652599a08cd07fc914d1cfc6f8617a2243c552a508
SHA51251870e0bd79f77a9895faf7a4d9feb8b887b273d1d6b1af52d4d4b515970f65233a5709d39f02569786f7fad712a623d75bb94ea84ca8fc88a37dcb4734a5754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ea8cb7c73c60b67f661aa4d0b94cac
SHA173297527f3f2b903100e08830080b825fa2a2434
SHA256bcb2434ba86713f2b7246286dc69884515077abc8f2bcbe7e4b6bbf9521a6730
SHA51269270aa7103a513dfbc2aa320b6f22308cf382e4bd3d6b4c4f5069f992672657849c6843f4dd5cc0216e928596a18a6f168b5ecd6f521ae1d9a0637fe5fe275b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b