Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
47c500d7b164afee2413c72bb061739d_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
47c500d7b164afee2413c72bb061739d_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
47c500d7b164afee2413c72bb061739d_JaffaCakes118.html
-
Size
1KB
-
MD5
47c500d7b164afee2413c72bb061739d
-
SHA1
8ed6b214d8014f870bc72305e84d8aeece10b7c7
-
SHA256
cf9b2ef109c9ead2ba515e78043a5c61e00bb3a4d8c40ebbfa8f5f16207ef19d
-
SHA512
1cdf3473e4ddaadd88719d33332b29789472456b2930cf9253335faaee01fc9d5d67274d07265202e207b253f3e1485a6da5a9a8a6df84c2450180233cbe0104
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000006d348a6d861f4f39f3253a0d009b1c76078bee222ce341018eb4108b95818e17000000000e800000000200002000000076c2693ed3f6473a417b2ddde5855cbb699e1a81461d0f6891884e0591ed16f220000000197b38ac4d123d68b09c78bc214dfc41ddbc94285802dd44cb33ac4e225d968b400000009a08305d29c25c113c480dc4cafd05681975d9e0b06aeb652255c8e6676594b3d17bf1001fe3b77f91143d7511dab6a5224fe483c57bea122a7b01b58f0d09a4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1AE1FB1-424E-11EF-AA78-6205450442D7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427171070" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03370b85bd6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2572 iexplore.exe 2572 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2544 2572 iexplore.exe 30 PID 2572 wrote to memory of 2544 2572 iexplore.exe 30 PID 2572 wrote to memory of 2544 2572 iexplore.exe 30 PID 2572 wrote to memory of 2544 2572 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\47c500d7b164afee2413c72bb061739d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522debfd133b14015aef62d07025922cf
SHA1b9f90260ccce3e11d787c8f956787cc70491db9a
SHA256281a4546cba46abb6f50f266eee91e1dbdfeaa74931008da1182f5f2e00fd2ff
SHA512c3db4a1573002c80929324ef9987751c00e361d534272175ff5ac76124ac79d82a36449baf5a323301a5195e2be35d1337f7871927f838493df7a319a4fc3f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56322171dc855a1afdd34332741350d1f
SHA157e1ac523f574dc65df07c611c9a8044e20edb58
SHA25653c4e2fe89b87dbc46154d03e91ed4dc10f642b7df0c539284487205fd3e4ce5
SHA512c52525c148f2e55d8ae5bff302ee804ff55beff326b25dae4a40af13cbdb38b3540b2fbc212ef52896c4b0a3d454ece42675ea1049ca3c1bc92be27d0be23c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5897e9ff7b50609abe60459e20104c460
SHA135d44c5c7db14716603400a5634939a23cafdcb2
SHA256775d8706b9e40eb229bb33f7351a051e759fb288a52ac7f6688c7c5535c60dff
SHA512a862ee317f1baa8d13863db72b8fbfb0c9e9320d047778c35772f1ce0f65160bf515360016826fa5de6341bebe5fc2f21711df60aec30f777f6d15074a6f7c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3959789380944a17fd8d7204c920fcd
SHA1d431f158e6d3fe16fabeeaf416ea5434a62370d6
SHA256c9ace9bbaea9fd64f3c8f47221d940785b04781231c90618ee6005090c92ef68
SHA5129aa10c837061fd8e2f65e4455485ae6f558481801985eea3ae0dafa25d35155b33a0739bb510de4b570f7ae38998ab64c3fdb781c1b96e331c16577a3f9b3f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5235c224db0f412f20497563cbe1a3efa
SHA148cec5c0ac0bb2f1387f59fe2c62863b59e66a75
SHA2568db335d6326a2f2358ed1e66ecbef6447fd016ec9e5c37799426b79472f01ed6
SHA512fc4ddc17972b6f8653b495fb7125728e7c9955a6e4d985bb11d09654d0504ca169121e869583bfb5b98488c1dfba78de73f698f08869135d667703d0bbbbdd49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0127822f7ed64948beba149dd162bfa
SHA1a91ccc9b3cf30a181f8fb89623734511c9f5eb32
SHA256065aa0ee8a7949cee0fcaa01b646f39a327c741024814d26e6102375967b22c1
SHA5124ff557c45b976cace9ce50a6125e03ff23a7eaeefc012fa16c3357c5054a76ab798b3c307dfa4a492fbd5939b415490756190be1aad008885d060913789aa4b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575149bcc5da0b3a8481a16cae3be4bd8
SHA151506a1aa54e78f96ee5bdf7c7d37cefc93e3618
SHA256877d89626345a5d2b679922e3acc52a556870001865456673b5c060db468f6b2
SHA512e27c798cdc1ce60c6a75d417f0e6b1cef33e82f357d9ed58ffb888e82737774e9ed37053a95d97054aad01d8046d2184ff5fcbd0576e7f86675ac1c518f5dfb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b1d81d5ac64c838c62dcf03ffeadbb
SHA1c8627adf7a1c6df01ca8eb5d1c66b2a7c6d27be1
SHA256e43c7d34037181d35a1bdd9c994bd7b0275fe24d9b60797be4ad71a3567cd0f9
SHA512c8207d6cdae3801351062da8d83e10093439ad155930672f9f8fccb61309e2a7dbf2d7abc1faa3e03c2c994bd39be61d5dbc9337a8eb616df95c4c0b3bf84826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c7dcece46df952ce0ab2d032271d12d
SHA10a3b7f94d65d96de75eb5a47ff5e4e3bb00cccf8
SHA256faebcb3fce398e926a6f6f4af3428cbe6bfb19150b84b54daf0d7ecb31951649
SHA512c9ee05158944dfb8be441281d19b5e8d4b492742c104c8e43400487a39294cda7379f390b9c379e3b2cf159ea96b95d168df3ef85c7c5e980da2ebe3125882c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7322c5d00f92c57cc0c832122b37bb
SHA1a85437d49421005d4c4629c571e9cbc237c8527e
SHA256440dacd4e39eb0d9c9116482963ba220bb559e8a957eda89b52e306ecf65bfd5
SHA512549991f71af5af2cad8f528e97a14fb78d02072ab78e04a5a6a8bfbee9cd16501700c5d02eb4f17084874b3ff831517271261d4f7a397e992f8fc7145e1c86fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac85d3b25af2555e0d19846d0bb810a2
SHA1be023c7475b48f9990422f6159feda86bf92559f
SHA256a3e2ee05cfaa46c5a40afd6e26dbad7c9996c83aa09ec1bc34a5b7b2a178596a
SHA51245136c8e6d5996286e0082cea74f7747814a5bc114d86168fc551aabaf07c9d9916bd44b3754f219698f0e48ef63a32a3ea1756ac00d3693fb4c7e7d402a7c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e4f391db82ecfc204a2c9f0026a3b12
SHA1fe934a47231d183971b4ad5932b42d1358ae9b5a
SHA2564ea16c6aa49ca49e0e473485fbb8f85ad0934392e15dd83fc7953d36ee813496
SHA512a8f8b0d0bfb7720b4b7294fac7d4d7f019c4547276f2ae227b9fb13de0225314d8b40df42fbb16e7fab75534514aa531b60f809a94a87ebccdef1bb0b63c392f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ca2e395f02590294908341bd3b3b1c
SHA16ef30b103c65b4a145c3e6ebcd0e886eed56b1aa
SHA256512c9a3609b92d4156e3e53b39dd4b5e7aaadd03ac1f88ba12324cccc3d5d162
SHA5127b0e73f164916f0cdd3777857aa3a9fc99c4c8b01623c964b3a31dd884647787ac5cd31c3236831d43b3a27bc185a5ae6121ea13144e87432515d21fbc750af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712e7c441048236c50452510d66dbd41
SHA1e2b5de02cd0781e9f3f25d33dd2f34d3b8f78f2d
SHA256cca37f69e4fc368a77737919f68bac05dbb0ead2f8078f055ecd5bda969fe251
SHA512a87b9ad984e99cc51031c7b7190a8de1dcdda78b6106affde3d6c233d075f8845c4910c0123b7a7193bdfd88b7061c9475495968a419d3c319cbc9ee3641eaf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59022d22f3f24097b34e462053c987b4f
SHA10d63a39d364d2301e164b1337fa0dd2b5aa8d806
SHA2563a3a4b99125e7a196aa99f88d2f008b01ed5cc57615a805ba93325cc0af66681
SHA512af0d96169bda50a9d99cbc2f7cfbfcb76046b7089544e718806d5eb05ca7f47d98ca0ada432fb755c832af2e63e1d272c5eb0e65cd103ad68d0c651173f7de03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f14f00daa1d646f05b22f3443a9c379
SHA1568d61a7fb213aa1c1e85f611d733e03eb20d680
SHA256704455cb65eed3404768f1ef08b58a9341dd5bea432b1c455e8626db1fdeda17
SHA51232cb40f73e918333d3ce13caedfcce2e0b60f60c7b01f1f110fe36acefe5b17f902600f64b9964a19a9367ed1c07dd536c529c8420e2dda31341113f90c28e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b6aee0371653d414318bc00dade13a2
SHA124c2af3626e1dda703bb3a2198262af6bb9465fe
SHA2564dc96a8deb040bb7a5667b5dedf6f61459ac7c83e264cbe27104077f6d1a06d6
SHA512573d7b838a59f1c82bf45f4fdfb0171ee91ea825021535f4f9a9e565db7365b83a66936527424a4588c136f159cc85a48af7ae30ec4310eaa58d985b56614d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568aa5f36ecfb6fef08d3d291ab96cec1
SHA18bc43ad2fc1059acd7eb23fa8167e8e5507fb034
SHA256b53ec4b1e2f389c803afb9e97662d98423bbf7d1841e61537eba65898a67ac46
SHA512941d191a34b7360a844833ad9ed6e9fd3b37a7b478e91d03383e86744a730775eee4327b2c2a19ccc84b29ec31a35c779b09d2cca87027aa01391acd3fc82873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab885126d5b49bb69d1bea5c2720b04a
SHA11bacacf166dddf45f3956cdda85e8200dade6896
SHA256b167debcb8a11a2714d9d9e0132b320166360c277603babe70c2c557cac514a7
SHA512e96ec76052c3dc66ac9515d7dcfa8d3e7f61ba37768c450d97e4d13a796751ef2169d9f63d3bb009cab560894b8fa3094f910f2924bffd1c0cc8813741ae683f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51604b4c721cb59232d594d6aa4296894
SHA1003d093d0988b634f0ed3e1563d1695207da0ee9
SHA256236a9982cd9f226cd8257e4cbd90be7f5e0c8c658b5fe2205c3671efec2427df
SHA5121b8a1d1a645671415026bb14ff82ac70b5d2cf2902b2727e5597bd8cdab2ca0418afe7a410d86d76ef8c1b4a1379d3cd6aabb07ec0028bb0b5a51c712b56f9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bcf98a4d2ee112508be11c2cdd4d893
SHA1c3f21f2884b355b27b8ad3c11878700b4d5f901f
SHA25690d5932f5599bca1698d641621e9b87a882a03afce7493742ab08546aabfbded
SHA5127c8bc44e952b1be560022399bafcff74cae38654a74783f885689c520eaeab1d629975ac3faf0f91429044348852d253aab680c406b28b748c950a0b5a02b570
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b