Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 11:26
Static task
static1
Behavioral task
behavioral1
Sample
4994371e1f0a8f3b8ec5575af5fac814_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4994371e1f0a8f3b8ec5575af5fac814_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4994371e1f0a8f3b8ec5575af5fac814_JaffaCakes118.html
-
Size
87B
-
MD5
4994371e1f0a8f3b8ec5575af5fac814
-
SHA1
c3583699c2ac21811e4b101840d223b8f3de0bda
-
SHA256
91098915a1422dd1347261978b84a669a9d08ef3788def3ab04d4d1c624f8991
-
SHA512
99a5d9aab04fa779c66a5196805e2fc32994eaf454a93a36dae99706848fca8e5c418fa7fab1837771e14ac49ff45d451eb7c7a8ca664bfa3f789a0decd6dc04
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26FCD811-429D-11EF-90E9-F64010A3169C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000004e8e1c25cefe8a9b4bffcd48b15022157eb0837d8733ab7e44236b8d758a56b1000000000e800000000200002000000075305bbe4c551eb0b4066ea88f87d20d55edbed3619e09163b47d036067cdf05900000009def275a2b0f5818aec44cb45a280f0c5020ca8138506f5bbe242410f2c89c2a72402f25cf9b7359b7b7436713c70163f774b012a484e6df65ebd696f617c3a8c860cf60e8fa30af3b7d739b177f5edc48fa11b0086afccf76878e62e62e92b453a008c26f38d25f60483a45cac50b72641a1186e69c24382c83e3bc69955e411ff515884624a73a54f6a566329c09e8400000004610867f39d2f6b7c95faaea4254fb0399137a8f39e5d7316c5f33e12e39c79166da1c1f226efa32b6cd47e56c64d57c3fd2c875425171840f2a6e0cf7f3efd5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104c69fba9d6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427204687" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000007e596798ae0238e2f5f45e1b529985bb4439a4f56ffde6625bf51cb7e0f032ae000000000e8000000002000020000000f40c080daa283bb51946baaccd40f862a840d72a94bcd97f630c7804cd1f227020000000326de0a4bd5533dde12cff52a960156864b7e9491ebd9e463e91520d15528fd04000000096e6cf9f80b1ce21dbb3212dc08551a051eb90a4b56695952b3376be9e51d80cfca4d5e84e009c4c264303ddfe512ab9d6db1eb0d86d2739a04865e62af9f494 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1408 2088 iexplore.exe 31 PID 2088 wrote to memory of 1408 2088 iexplore.exe 31 PID 2088 wrote to memory of 1408 2088 iexplore.exe 31 PID 2088 wrote to memory of 1408 2088 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4994371e1f0a8f3b8ec5575af5fac814_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530fddb094048943225ae8a801760fed4
SHA1bbadf102fb72001847ffa3f53938d5c0ac005f3c
SHA25674c202a9a7fa2642c540f870c1eadf56524f12f36194c1d5d7a407153ed3da1f
SHA512eed559986b6ae361ea61acb44da168563e89ed841a4f3ff354e7495814b8462a8eb36e2735ee9263ffa97bbc8024fb13a488c8607d9acc387b85c68edf2c9ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe2672cd8bc1daebacdae5707ddad7f3
SHA16e9d993de9072ccaffbc4693b3a516d193b6c1b0
SHA256532f928718b4c0006c82f8f182ceed0c4bd4c05f0884ad3307e6223c77b42b3a
SHA512821af5b775f1b5126c4707e87b88af44817466dcb3fabd9f4ed666ed5f2aeb28c848be9328b3f37c914089b29438dffd0bc3c2ea04ca043e0475918ce1875d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550be10b074253a198df94cdba9029da0
SHA1daa4679dfacbbd3240ce27f2f80f27464f21d75b
SHA2565adce4282f946ef268eea65dde20e12601758ead0fb001a96a2c6158ce2e39a1
SHA5127b55199085d23164587dc21bf459016108736bd1603643c6950a46c4bc21313ec539cdee3ee919001da010ed258d6dffae231cde4f27b42697c043bafefddb54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ba9138832409546e443cc0e354eaa3
SHA161f85a2544bce53e3738c9055632f38361aced47
SHA256f7661a7d0c63810ddbf4c2e29a02d6d5fdd5dfdc04e81f7a129a9b012245496c
SHA5123325db99eb619543875c526098b0f0a66b3576371107eb90428eee1839c27d6778ab87c665e13dfdfb7a7c2f2f191ae103609a1291098f578523c5d283bdf503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b86c28681f1308bc38590dd5a297c35
SHA199cb10f4e989e780f568d3b5c4c2f285347fed6b
SHA256271935756e6af21d8c569b6bf041ea56bf2b1d461fcb15d3294ee3c730c166bc
SHA512094ad12def473e4e16daca4dd1542aa7b9bd7536b30ffadeaa5b4d7333b79ddd4f0478b2907b58c978fd87eb285ca33019d9bca4d87b252d49d292b27a9a3b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af49a58a8a0d477a1b705b80f0b726c
SHA113b73cf7818b9fedf4f6a874370037c11be143e7
SHA256ca853cd3689fdfdb9eb68b6d3763245300c0e7cf3c681df69dead65780c1ab19
SHA5121e97d0d9b7d1667df108a40589c5d53aad4a001ae493c2e796e982c26d7f8f5deeaf7df14c927ed2d9adc5eb9a376bff509cfa1c75f4f74806f219b7380e7934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dc8769a1dc1b7258b67ce03725350a7
SHA17dd8383023bcda35005ba2494c7752a314c87848
SHA256ab95b500c0a40ca754a08ba32da32b33ac5d9ee54c7a02258232e30499406f81
SHA512be3e72de1e7b2029ddbf45e2a3caed18d8245baaf98e3436eb5b156095e1dbd2802cddb7b0692ab247e8c84d8c9ef90055fcc53c94c96e6ebde93aa6172bbd9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f814b4c7f39202d25c20fa924bc0391c
SHA19ba78d25965eba7935d4f20d63b9bb2da3db95c3
SHA2565a7c4661d95c2499935a99f01204a0ad9d4f36101ac4fa367811dbd3c5c10a70
SHA51282b51170fad8c03bff20538e3949207e1db70cb68fceae81992b7c5e524e1c56bfcae682d6bd03a5931cbc8d96748247eb9df05d4412164ddc40924599adb9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5896f3ad1f5c49e12c77fa6f1f495c22f
SHA185fc07c07e507e0fa3b6d019d92d243c5b27d632
SHA25662e269eb5cbd2f7aefc00a6c9014d475d356c56e0f294b30f83d6b5da2bd57a3
SHA5121f135b0f42e4b1f9f4fd7cc9396b193225b3f219a5f3fc674d847325a1c503227145dab0920643a68773cd9152a972d04e619639f760a0f624fcbbd8df6ff74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4d0bd5feef91f07556fb189c7ed0647
SHA13e944e129793c9e78d332a2e6cab8def2dde4450
SHA256f7f1931ece835b915dede51283532bbfbb5dd8e172a12b5c80dbf22797b9d113
SHA51299424ea2216c5b8a46342ac208682c47fc1c89bf1a40e4ccdd55fe80b52715026b1ac5e3afbe1e006121daedbbb5016960910a9049f2faa7d7ae5822d6518ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c9504f5ac3fb5cb08d2c04ab998f56
SHA13bbf586f518b5b0922c50fbe80f6c4b9f093946a
SHA2567a32264305358dc5f941156fb624561f229fadded60cf1f545f24ecb419bf24c
SHA5122e1e063815eb5f3f3040fc557c42f99f27ef33cc6ebf4932af33ce0e7e6fef95d29f1c6bb1b1096226fdd3358723449ae10e9ee1d9fc78c75782a4bd6dd26e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5817dcce7e582f7352f4b1d083aaa3e57
SHA1733dcd50eab2a54b4f8cf932e3079067d08d6af8
SHA25617e030839adcde504c8d0c379469145ff65dae26dba588f2f2087bbbcb8045fc
SHA512581ebd0c327d51493d7aa0ae98c8c8d6565442181d328b4e8223d5722167b2056086be40194dc027b15ff2d76218b4857644528d9dfa154f819a0c5c948af25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dd2c9fddda41b6588265b3447f95366
SHA108749608a9ed45507e85df31e785f718e2806f17
SHA256404bce939f821b21e698d559f50d2aeb72b6a6917527a5299edd0a9f253f51a7
SHA5129f9aaab5be9a79cda6fc785b2c7bf8488b4e8fadebc80a62548b86c6f09785bca83a00dcc76ec8d2053b7bcca17c0f4c9451bb59652717c23f212c6ba79b9846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f39f14a693ef7936a0b26fc0ac694572
SHA150e282a763bcbee5cb13234839a88bc274303044
SHA2560f040eb827c38dee8f044d3fa87d5b7092cc26deeaa010f29cfc7db820173fe0
SHA512032b52c7f49cf49481e30653c441fe2265dcd1e43f3d7d117335a9a880112cb016c726bf607170bf94400a504c522f6da8405645d502eae8aba7b0d6f33a436d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554e429cce5075223768140a7b78ac119
SHA11d61d803267a65760270bc6334dcef9097a66089
SHA2563cc62d3e0428a47da4f642ffad1486e55d081de64e5019aa4e72d6b3b11eff5e
SHA512fcab11c003d6010c36310e783789bfd070332e3d739cb73ce1afcde8afd1d53f6dfc5a6fc88d0b4970dea6403554e3237ba4d9111f14fca3aa21847212db410a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee391a26a73de474a4bea6a74f0ac3c
SHA1a11d9c4b0a98bdf5f832ca92a8ddcda9ebd4229f
SHA2564e2a85772a024b5824253ee0da036166e330da7c7bb0c7ab618f3de4d7c7fc16
SHA5120e834519912806687ffa57b5fe3aac15d72bd2fc316cb1ca6a064209d21971f29407d5535fa71ecaf94b5f6e23fe671bfc77247c61eee7ac1df9f2434101bbed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f260d948ed0a4844be88b55e3d52fe6
SHA1e5a76250ac2af34afeb874e21f720b064324a8e9
SHA2561baff9116c21312257848aba234b2f69bf69313f3d46e030ada01488a46c808d
SHA512e6e790d9d20a7d16c42dbc960fd8615ab4c55cc2d1e6881dd6429b8d744345cb153ea84e5ccefc6c8367dd892f81b164c51367d569c98621b9ef1bb3230f1e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bac953bc0898d88eb7524318b89b5dcb
SHA17db99f5517ffc6618eff9d0fe59d030fd639dd64
SHA256ac5da868f0d72cb2d778c52b3aa68db16a41d0182671f1682e308afe370d68b3
SHA512fe39efaca1881885b38d65852813f8db8f7be8ad56c6634d1f3b5e2ba90eec84bb86b1e5b8e4aa074d310a53b8da73eb03a18008ee592516e980b8a588b833ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5498c28fff8fd112828b544bf47631dd9
SHA10ea289332de8d1c7c779f9bf6ef2220e9aa2ce88
SHA256d058ac1cdbb3066ad39fb32d4268c7944624b65be47652e56015d89ec9963ce1
SHA512242eb1706d408268f7a4b5affeb2879245766e6adde69006b060c0892312b3a09b3e4d71e8beb5a058433de9bee228e1df0c756834dcd2abee6cc4fd71d4a74a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b