Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 23:48
Static task
static1
Behavioral task
behavioral1
Sample
43c15bef23f35505695bf57b629167b9_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
43c15bef23f35505695bf57b629167b9_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
43c15bef23f35505695bf57b629167b9_JaffaCakes118.html
-
Size
3KB
-
MD5
43c15bef23f35505695bf57b629167b9
-
SHA1
8cf0af10c04311eab449fab5e299e984a3965157
-
SHA256
11d17e9db3718bda10f5dd110ed0bfe0b3ccb375477cb013a98a835a1847d72b
-
SHA512
611e2a90daa95a2793c0e31fb82028db2c7f93c8c7298a49c225680b4e607c65a225df551cfa5dcc6800a4cb15dd0128d267b77910c601a475e04298f5e75327
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{709AE7E1-4172-11EF-BFD1-6A8D92A4B8D0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808a59337fd5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427076392" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000015b8b50fbc845c1b09d1e261ba8cc9c7610ef090d4f7cbaeda537a14e15c7a08000000000e80000000020000200000005b85120d811074925ed03d74ec857640fe87b6d7af641bbb4199ff13a29777b720000000c8355349c6875d1f5b1616c75714a7efae0020d244cdfaa69bb8a5ef639e5035400000000b17ffc265ad89842282fc18318cf00ceabbb9b5a0871da97d6c5341a57a3feb595bf7dd139f98d7f214c45ded114a63e353a7fb17b5e37c2888d8f773f90cc1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1620 2280 iexplore.exe 31 PID 2280 wrote to memory of 1620 2280 iexplore.exe 31 PID 2280 wrote to memory of 1620 2280 iexplore.exe 31 PID 2280 wrote to memory of 1620 2280 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43c15bef23f35505695bf57b629167b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54400d9948d3b847d3667ab590d0fbbd4
SHA168984aa44cf7b875d9af8c308320afe4700e6937
SHA2569b9383ba3d6b246cf3f74610c5b9ca853091b56a3852e39b99734ca3bd1aa3dd
SHA512945c4f20b0b15651a89b8371d3fa1d8f4606f1018a44238c7595835dac508e9c3d4594cc7e47b6d8c1828860acbaf6a62a931fc9fe46569c739be7445d5e08b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba548c3a53ee0c790cd7a647d374a50f
SHA13c935eb57c4bf2e5bfc1f2138ccded06ac8eebd2
SHA256b9f35e35c9c4b103b8d450edce07c929308fc691180a6a13dfb78df17fcbe9de
SHA51236a7100d6c7244c82ca7fa411dcec2ce0ec7f65e1b12742c823eab867cb5f55da6ad046b9be519f35f8894c6f4f134875fb38ba5237b88baaa5c58f273692346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5555b89d7efcab2ba4f3893760b3e990e
SHA17b2b0d5e8e42597f23fcd6fc744a3a6675324bf6
SHA2566b99c75d85cc404c111031c957e0943072c43d3e5f46892614ba648f075e7765
SHA512957a6b9c388f1940971d324af8b8e920cd5ee344bc5755ccbde84dea4f72c2e539a4c792c242214333bdac8d8808ed48d04d211c59d5d8a7a26ecad6cd95e021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54fbd6f3802973dac117510fb50901b6a
SHA1f92891982bfdcc934e2f07602419516c8591ec27
SHA256d2c2e07b0c960cadd6ea29a5450cc7af1c7029fdda45daac985b3cc69e5a34e9
SHA51274d8012e00d16800daf29cf8176a522c546094a0d8e5ef260f8613b5bb902473a20e1ff727a8b3d77e14e05628a0fd0fd8c97f8aa59552f19b3ab30aca6dee5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD545adad4c4183cc0c93c8dd11c9b5482f
SHA1feeb0995ea9743e471f90931e7e1424463bd8522
SHA256e22465058048321912f0222d7ec706567c8ab279df1a50da9b7135430c41c041
SHA51235452ee86ba188fc1a31248e2078f3f6a01e9f53a3c3e055a5f574a75f926bd6b3b8c3c16bd3d2974a431b2f0e9b5da1d8e56b090ef18b7a96dbe2da6fb0f7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b8e02d882a76572eab7ba2821aaad456
SHA13d005eeb5076bdc36917eec6a8815cea08b743b0
SHA256f695c513cdecf514410624e92fbcc1f96ce47cc71f0391023c1a03fce7cf34cc
SHA512626ed971e7be46786814d8cb8ef93b45ae5f66dc9a8e7997f5d0058167f180d16d6ba34b18a338b5df02b579ffb5be8c73729e97cc7bc18979c1a961dde9ae2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b24e6f16de51596838d5e291ced53c0
SHA1652a071d5286ca074569b35d5a103c627fe96215
SHA256d4e916ff4c2e9302c8c06aeacb6e8de61f064fb4e623c610b8b31fb63e551509
SHA5127a0b2f600a586cb6578d420c8d13d0266884971869483be36f8eeb2281abe847ecfdda254745d859088a1f3c86a2c06191f24faf584cbf48264315bae2af337f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD561236b3d8d250e392b78442b63492241
SHA1830cca9bbd8a1653f12eeb5149ee6f237de89186
SHA2562d8e14917be56a1cbc0c2e709725f7b07484ce2679bc5761fc135b1f266b14e3
SHA51288a4ac9adb32c14a59ddb3dd596e56490f39ed048392ace48cb1dc8c38a35b8a8a3c16a690fc48d662d3d5446c3e893febba0dfa6b66239c5bcdb78295ce2ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c80bc25a3e383dd74cf4f4d1f2d231b3
SHA17a10baa82577053ef52a76ed46d374867471034d
SHA25645806b242a39c111c6fdfaae7d42f9ef6d9058d2030865263574572ac1ed480f
SHA5128b930baf81845f3cf1677b6bfe87ea5092ef993b7123f167b01a41c6b02c0638a7e5be9ce010aa0cb1b29577560940bae5d4e3cbb8a71e553966ab147c3d8439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52b1409b4e8027974eec2ada487280da3
SHA145512d9c57a52254b43abe78300e580feae94eab
SHA25613747a9a4a233265fe59a9a743c7a00978993344e5f70dff2d084bdc0e3c552e
SHA5125b663bd43bf75acb2f558ba41ce2f8c848c8e76cdc1f2c276defb5851d42f7d28d38fd03d3a209c5f9e83edd57c2b4cb044c858a246ae94622f76628f6150b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e1e13fc79db65d3b1a57cf4aaea87ec0
SHA1a9b98aa80bb300943bd91d308d85bbbe92454639
SHA256166f0ebd872e651ebcc88acff1b6fd6d77be6e5c63ede6832bd53f1dbc74bf3b
SHA512fad0069da6f2891b5643e96b03e452a2957008c2b15b23fa218ab5b4f6c421649bd6638f38ff7a977fa9ca9285979b407f64879877fb17c74199fc980d9a0ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD570227f7f84325737cd44aa2896643930
SHA1da418c1d77342a9ad660f63c692279f0e361dfe4
SHA2568f7e4b4f9a14f0d955eaec366f036b4bf57ea3193839acfaed19d3ccdb97ea95
SHA512a07d6e7173299b939d5876d203c511865710e2484a3325fbf48f79663bc4db81ddcf51dd05c9b8b84dcbd389d9dd2b3a11a424737a2983c716092cb18b7b3a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56723483059faa73adf025c4db4d9a11f
SHA1b7a63ab06cfc1f2b697dac33fbc7c94947d43d1d
SHA256192b8d8251f4eb3dc3f7d204ef6ad628726496e82b200edcbeb294c908f0529c
SHA5127519d5d4e80b1999ed5f83bffdbdf33e00c6ec5e31a33c5a61fdc57ef1798c7c34072cbf0369eabbc3233b3e909da589b49b5d6ce3e7807be4f3adb895d80a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD529220a9bc9a11a1e18ed9f5e015a1ce3
SHA1ba19612f4b33f883c52f185b3433456e2d99b40d
SHA256b6246c67476ce8b2ef9f9f099e3c0114109c636abaf9d478fbcbbb358a5155c7
SHA512d09a90024a7f5880c74ce695983587cd0bbfe65f7244446b5e4bc2278da655c11e7f29572797fcdd58a3c9f37978fe40dce7e91500d4efc7fc81a75039580298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD575030081002ea68945a5f11cc5fedece
SHA1ce5d74f0d0af955f3c4b8456b2ac1adb45bb66ae
SHA2568a7ea364045c8f42238013403a61db6661f4b027ece8f735e709cd1f2dff5adc
SHA51288c45a5fe3c2954737ec287ccc7defe34003655450eb45ba0a27943a39239fda2087db8661dfd5235f30b9aa8383477fe866d5f50e049cf90da8df4be47df48e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f2ba925a0ed1936325fcc7c829a5701f
SHA12f73dcd99ff3c98b8a6b5abf2b7b87fd93ea0345
SHA256795e05e7eed7056a3aaa7c318d29ce9dee4d2e49f4c2bdd4d12188baf2cced24
SHA51295b71aeae98f23c72093f498cf8077ce29f3f834b7fdd9f617ebc57f72532c89961bf4fdf28c5cd76ff3b3596d5d15edace31cbd9d2b3fccfcd2c16f7f061f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d1303d44fbc06913636de6198e331cbc
SHA1224948a038cdf62751129e1d9387c9fd9fa0c356
SHA25697971274fdfdbe22ed536d3717d42327bc06a92ec4618bb5866794d15e6a90c6
SHA5126a6e1f9ecdeb1c846d26d9946d6a91700b3283c16cef318b66e2f507dd19563b3592b54f5f9b6208e0a2e628fac9df3f70bd15e03165c626fbb8ef0e095b83b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5129fbdaae12cca708e8512513190c199
SHA199d84bb9f3890b977967490b9c7f41e708f742d1
SHA256fa487f2f3ce59847b40f01fce3e212fd078ae2431e24131e97bdc7ad4c88c479
SHA51261f425c1f6fbb04b93b8ff457b51b575b3901404b3307d1e3e8e87298c6ff47f85c566175b797aa8cec078a6db6db4c09d3eb29e064deade9c2a49e5f026519f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b