Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
44ad6dc8dd27fb67853c80f28284232b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44ad6dc8dd27fb67853c80f28284232b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
44ad6dc8dd27fb67853c80f28284232b_JaffaCakes118.html
-
Size
1KB
-
MD5
44ad6dc8dd27fb67853c80f28284232b
-
SHA1
fe8cd35a17e8b6c563d399d8000ae4b9e5dc070a
-
SHA256
479927f997fba95e1c1efd4dde4bc6bb0ec5a23b2c4db9895f65843e82beeb20
-
SHA512
26dddc14594419e5f76cb0c6c767f745cdf82a5f3b95f32153a8923233d495f1609419e702364932ee09f718447113cdb1211dfcbd39d485f598e6b2498c4345
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000001f7473fb55dcf8cbb8dd862e279286efc4ed91463a7bf196db48b57c9d6b7e03000000000e80000000020000200000007060f844b456064b0c624b9073651dabbd476b3ef07c35ffd8082a6da4df982e20000000556430107c17235ac8f09789b0329061de18a993b84eaca1df98652d7aadb76d40000000e01ad88b97d2c0f5767279d47afae36bb7f97a5c364f369dd09b2edf6c60ca8475464e7ea8b93ba4cf6d1c68643e33f22e9f53411e4603007d7e13cfd9301476 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F12D0A51-41A9-11EF-B49E-DEC97E11E4FF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ec2ee6b6d5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427100229" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2700 2648 iexplore.exe 30 PID 2648 wrote to memory of 2700 2648 iexplore.exe 30 PID 2648 wrote to memory of 2700 2648 iexplore.exe 30 PID 2648 wrote to memory of 2700 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44ad6dc8dd27fb67853c80f28284232b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5671881b458ed22682704de34ea62c703
SHA1cd9d5a4ed9cb2ce7ce604222c2939357f134825a
SHA2560894387f14ce51e6adcfa77dbe034dedd00059f87c77bac6d95ef0ed1df2c583
SHA512c2d3ae2181030fa51a772c9366e6cfef16fb519b94569ca895f1df88177ace2694616f16fadd8758ede40177c2b5f3424b785e072ce6912eb963fed60cd11a02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51575d060b37e3802526f7e46065f05d8
SHA12e1f71ea5b85184e6f7330656e2d49877f1f99d6
SHA256abbb7ad83c545245dd0a4c0a29b064585edef9c30cbe2318957850b9879cc93c
SHA5129df7b0455c23418478f43fb66c3576682c8bb74ba78c7759e044dd80fbc730cfd1bcdc6c549850f714e503c737984c47c2a058c46b318a986ca310837555be90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ac573fa3bf01c03ce04e16e92dd826
SHA1440c1549d01dcb7002a884e135fe67d8ccc56ed8
SHA256c29fe7872b00e8ef7d5c239375094f30291a16eb4f6f95819d1a819da25f50a5
SHA512e668cd2a30f175b6093ea7c4163495db47fba547410647c834d1980af7506f6ea7c34339745902989f803c8f11203d08210fe0e9d0e8bc70a9fb23aeeaa32115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e6cc1639b894a569f02267030eb0851
SHA161e7e5fff3ea1106aa3d30879fb3a8999fe62e4c
SHA256bcdfe859283983aace87dd460924de28d42e36d63cfb84d75d4acbb2dfc1d1f7
SHA51249a64815a8344b617c95780f69a87d85d3286457b6c8c49ac026b733e525387df6bd688e3a1c0ec72f6ee54084e585b0c645eb99571804699f1e826d2829792c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5024fa9fb2a1aa306cc52f649d2e55044
SHA185f7640721ba62f7cbeb068011ccee1888d7809b
SHA2568654cfc8cef8886ce43a7159cfcceb7d8f42c778b22ad3865fffea7f6a7d659d
SHA512917c7a9dc45dd93ff563429c8b609b95f034e2b56ac7bf7536e0cf70467c2b427eef50e453c8638bec68c9a42aedd367546b7f2d1d6929bbc9a1e8a4364d95c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51574b07ee36228bbf1d5e43c723c7f41
SHA142d6f878a69044c05744bac42fb3aaf817b47679
SHA25631e28fca065bea8dd04111284177f3eeaff22e5f196c97e2bc56453749258547
SHA512b1d1a8b192a4d1109a1fc1cd0f49117dcd2234071d5824ef12821a6d4b1f80d83c39b9ca48498bba4b85b05334ee45178a7dc65a0b72988e1ff273a7b573a8e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a00b0ab14d62aaa3ecb64a74669a1b
SHA11b076f01cf69fbaab6d1ea645df9c284883ef206
SHA2560c2ee458358d04f98fe28ba54fae6abe31f558a852c512b4585c3b55b87bf085
SHA512d92e6560df74d05657a25ac7b4c42e49376a6c6dfe91d4b6289699c4a1c9d9fb46db2b3c03f7035cfcc72d9b69e7666fc8ffa8b967bf9347f9f8426bd3a27ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51488eeddf30e9e5ea4adb18573a65361
SHA175bead8b87e065431b4bc952bc80ce255063c85d
SHA256c8add83ada22fdd07a9612a72cd51f3506a1bca64479892085f2e5e0507b0a1d
SHA51250fcd249391b95f8a418fd18617568e0692f0fff4e085e932dcf6691b2d255956877a9922622a7e2e196a31d8d5335e98e2c40134e22fa6d22469cbc32cc87ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8643676313c0775a78b0fb26dcb11f
SHA1ab4f812e098cbc9265e1a6841a91ec094977a84b
SHA256eade5aff94b8b508c3c52b26e4d02b7bea79f4f14cfe3f083b9121847e309001
SHA51236723146355e7c2dfbe3e9e41f9b091cb40c2d30247b5ab1af1f1120bbaac90677a6ad73d5ddd392d8c06d963aa8ddf7b41c6a886253330ce50f4e62fdbb7b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2369ed82f9ee75ff4b697e96dc1304c
SHA155e967c3c12d51a667ec6d7ef75cc4ac41dfd66f
SHA256a9318f586fc286f434ec9daa427c5cda954cb0dd7684b59f0a3436da7a8b08dc
SHA512b5487b7847f2996f681ca831f524f5e4f51ba4887272cef51e8d111f7f6a8b8bfabcef156061ee47402de58f1618d8391151e18762acb7fe539a46301d464774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516e5e0c533a69fad5c55ad6e27de226d
SHA16e1e7cb947e9d02f7ea572a2bd8f216c0436061e
SHA256d412855d5504243925ecd5fd65cd656d4ae8353eaaaf62a59b20916fc62d0703
SHA51286e47c093dab210f30d890879562feeaf28a44e2518ce7b85dd9634f0793079d36fc732a44ff2078c1f2f5ebf2e4574f944f3b07df6ab1fbad85d8c4e1f4ff57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b69aaf972f5d575836bfafe9901547b
SHA1bec7865e87c4b6ba1614ecfba5f6325ebfcedfc6
SHA256969cc032fbf72d8f9b29a1e23e93ac92ef77f2f52873fd588d14660c02143f99
SHA512c57fa2d1fc981a431822e9efe3a7226d8c6e954a1819d97884ac99a43318aa4e1d39bac262b453dd5900398060a6eed4ccd6816eec9125078ccc12969956fa6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bbf2221fa15d37d6781296d5b7f7e92
SHA1c362ca49d5ec7255cd0be09f84cb85406fd1cb82
SHA25643e18d8efa96935274902cf28dd44d5ab648800f7102e677babc9dff4fd76e82
SHA5120699f7bec62011fee59705067758a5957cc5a4f21b9bb58e4dc1b8efc708c7ec6682b662c9142b6476387e012d3b8d4c2a714424ef5a43ec6a5fd02eb7722d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7a6dbee52c5b1efc22719ec49b528f
SHA1dee12c91870e59504cef81460cca585e165edb07
SHA256e9e1950dec14628ee0b4ecf3cbc351a6365b6157f34c7b71321a778712ea58ca
SHA51269f42dbe4cb73ecbc4e8cb44bbe6f34cbeabc2992fcf6e31637f60472e8e441b905ab18524ed5a1a5197104ad7cf701f50d3e63a5e5a2e10fa6496161a7416b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f40cdd1a2f52a892ada6eed5893226
SHA1ed67df4e9a90735ae2fe3b6fd7305b24c18af6a3
SHA256c7689feae52f6bde4d54c1a785232b0c23ba2527a045f26165d44457b2ca3674
SHA51227a09867d72b8834eea9cd1ac17327d6862c76bfa66300f6ee447eca7c8ff1e969b8f2757eccf8b83ef9d8f988eed336f0d21b9133c4e332fb508e4a320a98a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ffdef3ec6ee568164015c86e691c99
SHA1989827feba9173f996e777d1911b2beb9211e744
SHA256ec1c3db37c6d0534f97489ac414ac30e904a320fa7af108d9331115f64d310fc
SHA51282aeb7655c104d38ac9a68cc75d334b4caa668bd51729ac9a02693802c9b7b099ebee1ae4e784652cc8cb7a5fd275c3f75db92f9911b676c23e354996546f251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4320775f1185e90f4b17ecc2823c797
SHA1d604b19cd4098367d90d91cc0f8a22bd5367857b
SHA256e4f10ff55a587e2c4dea0344a27820b19bf2a32f31cd18dff7585b77f14dd6c8
SHA512d233aa0e961c42be8bd10ffbf440ddbf39cdcfe2eafdd86907ec879ac6cabfee891b5d3ee91236ca14314d01ca9d357dbd8157f02ccea4c66a70ff691e70504a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0f9a22e5e51f868439844b6a356a0a4
SHA1dfd60e6aa9967b9f94db760b50c79d6c4d526ac5
SHA2568e70aad36e678200e1200528382fea26d21c950f59cc422baf6adc5474af0846
SHA5122e3d4b9cc68b4a8b08cf36f771becfd7a5dd304215b47a5384917d8c47e3a413b81db5ec15d820e0cceb7328ecb721d65445132f733d65c2e59b3f741e203cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5697f66954379a7a4528553ced84e7d0b
SHA14f937d8ccfe948b868682a998098fe2513da2da5
SHA256ba3181b5a5bac88be02bfcd8cc1c84e7f99056076b202e0c56b2047d42c6672a
SHA512f3e19062258fe63ad2151afceeda5248e884370e53dc542bd59406242f903b30b425b1aa66d36f6203bf5b41146888f924366dfb853a28dc55ca80bdab794d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596e92fb756f637ada51348ff188ae014
SHA19cc09f3f8d1678875c87888a6b6eadbbd06995b4
SHA2567f7f76d77c426cea5d4c8bce847a358bec7a86889af1daa2124a0a1ea09f0c82
SHA51220fdd703552fac981f6f59df4858feea59d6e6268f7201e3081b4a75470bac0a6b60124305ec3aeea081f4a7cbfa479f75b12ddedbb07e87281ef361659db1f9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b