Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 00:54
Static task
static1
Behavioral task
behavioral1
Sample
4c259e3e6b8e1b64fa3be49253fc41e3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4c259e3e6b8e1b64fa3be49253fc41e3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4c259e3e6b8e1b64fa3be49253fc41e3_JaffaCakes118.html
-
Size
1KB
-
MD5
4c259e3e6b8e1b64fa3be49253fc41e3
-
SHA1
ef9042a12d6824437edee2f22e3012efb39b7586
-
SHA256
a502eb67644d48b0b4b07406e779d08bbe2fce1d321428fd95f505e6a602e7ed
-
SHA512
4eed35781a34d3ed5cb53594c94918e500907fc496aa22a3cbc03eebe692f9cd21c5c6879b7d35f662cc40821a35384000cd229676e67d10cb46c9a3322e15cd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000718933a18695b4710087d1a757556fda9ba969f2b06da8415bdef636575e90ae000000000e8000000002000020000000e617fa006063cbfffbaeae5379ea0d25ba199c61f68afc772609177955f479c620000000ad0b6b663291d2b449f50e0fd224a5c758da55d719eba17eba12eb91a57d32e940000000a4ef61e4db15313d711c9b68a5b66b8451a7b683d3940901c1e9c4fe23f0f255c14db5b1f8d9f5560c1d17016f7809c3feac8c87cdcfa06cb195e630b8c78f1c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605cfbc41ad7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427253128" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F01E34D1-430D-11EF-B49E-DEC97E11E4FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2700 2648 iexplore.exe 30 PID 2648 wrote to memory of 2700 2648 iexplore.exe 30 PID 2648 wrote to memory of 2700 2648 iexplore.exe 30 PID 2648 wrote to memory of 2700 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c259e3e6b8e1b64fa3be49253fc41e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce7b9125e87983f572a4b4ab8f11ce21
SHA15d5a785d42f662550e91e5ae8ac4a721038e82f7
SHA256a5946a5bd8fe24599d2b0b5c96144460e683ff232a252b593216f95d2a6630bb
SHA5123a4a1144038b26b15c947d805eddd149cdb0e4cf094468121b52a9047c98ffb569804b683f27c59a97b458bc30ac6f3bad7d825e612ade9439a7f949cbba8d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b792dfcd7292cb1c254ed4de83d3406
SHA15e76800ab4674105f841b36aabf36ce9ab75ac22
SHA2568d2695c9ce8bfec447ffcbc4d3e1c38318ab25a398a434c9f7e78a854c42fbbe
SHA5127010d58ccc7319d13cdc92d4309edfcf8e6c1ad5e2c258e43f34511a81df8f461de8d096c4319a037216d46607328ed82e3dfe69e6e30147734f0e6d7fb81c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554211255deb9ee15c3a6044568f49399
SHA135954a0798eba36b1735cc986fe5a8d8291794ce
SHA25699006d182b6fb0ade07aa0f428145f570068dee89289c84ec49668649e68d01a
SHA512744e491179826ed907485f0eab76d49b8148ad05ad64f6d953c8e6ab8021edd49b642188d4bc844192d059f05a8d0332897ba12c742536bd47c5771eefc745ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea35b8c5d4b2df631db5b865d10e525d
SHA1c344cc6e456579e54cd56d1d3220dcd21ab8ee99
SHA25671197123c2ded58f8023c22d9442860235a238318b6611a8782cc70a0063b643
SHA51263a599c604f5c0128b6cc08ee2cfc4639920a8aa81b53f8da94f746e9385552cf531c4131ee3f7c0374f2f0ea212763f8a7c756dd93372297652554c42263ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556065dc77006398e73da1a678066a69d
SHA17f7c55fa90c94a72d5db042d605b3ca767b3dd69
SHA2563aad2bfd3e610059af54440671496e0b466e6a35e9081684bcfeb5f24b4e3d64
SHA512fd48a3a22b746a2aafeb470794d150ecf567accc8b14aab4621d922c1382a1ab802bfc1863dce0c941123454243f1479b09b0cb11b4cee19ab37405f3eaea5c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a953ac44eb657cfa549f31dc5db99b
SHA19559936e111597c12de1a6e126dd2b67dfabc3f4
SHA256feb5cdc32af267cb6f06f8acccb9481ec6c9730beec8d90eed3c5c6019a8e440
SHA5120e35d37b24fc7e12d3236e910f3e3a9a04bc00849336c8c9bd4054caed87f3ee9b14e598f562e2a7e149ddfcf4c187cbfd8b816faa71016de5f45042defeac65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7f759544718ee022c32cd6eb0fbf292
SHA10f902c0dd6a778f18e057d88a757f259dcbe9f62
SHA256eaa3889351b5b457e68255c6b1f9d0bcb9d7c408ecc4ae6eb52e846b639f20b0
SHA512eeda2e003fdb819c538a3099075d00f6d323e475413281218d6197069f7872e23384e107bd1b7c1f7ac2d4ff37d3ec427b73c881d5bc6773ede6e37aaffff827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeb250461ef6c3cc4e946afec76f563d
SHA17a7bd5957b22a8f481300e6bffbca9af17fe03a9
SHA2565b5a4caed79d4c5e7dc1d8936b9add0723d90dc6f07526ebf46c244ef9a837e6
SHA512358f26dee06b22a4a0887888f4be0089e34563345f75c38c119ac3aca474ddb75a2c5487b9ecc8247db7ff6440bdc85a5bf64f6419e11097d3838bba2a5f99a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539daa3c731eb423af37434951a44693e
SHA1a777737320296b83c4103e9c7505d2b20fb7248b
SHA256195bb99647576b0d0e484dec6a5c5837205a5034423f72c9e7e13b3dfd825584
SHA512e60344b215df17d7796366a4928626f09f9e6fbe60c349195f45605caddf27bdeb50878dde3616436e8681464aaff205c928952ddc6457937898ce5104942bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3a213f544ec23b1f8627471495c0102
SHA1047a2797625e4e8aa2c19849ca8c0ebf6da3d78d
SHA256860cd224c6faf3ea9e050ccb2785bc731a5f5e9fb7364e8d30a7032c18b2bc88
SHA512a6d7e16109ac535d7b767142ee441ecf35663d94c70a27566d91f8a2a07ff897da79f0507741e30804545bf38278c5d0fe257bdb0fedc8c205f64bf0a5d115a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58505261e37f09bca821dfeda9d84c6b0
SHA10662c62066c013b302ff3eb3710087217d6d1dbf
SHA256ded3da2aab3f9a0cf6c53289c42c5a40bccbf1bcc3fb5233f58571215607ab79
SHA51222123c3851fdabb7eef3be5cc0701e952ebc09c5c401e20f86081d542dccdebab5db85ec35de2dcd27f531615a55cc0277b884ce80ed6e0da79d7938e6a43f14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdc8d0cfb555a30e20c2afb70475f097
SHA1e829a59abe9740aac0ea7970f06ae45bece3fd71
SHA2567c01ada0aa665888de5e75e12f7258e03eac17d911ef0db94ecfbe37ac1a5faf
SHA5128437b65336d9a5276a084a4d66d568b81d1a76dbd5ec0bb70a7870c0e00d800c51bc5f96ba26878614bba59d6543a3c377716d746a4bc2935cc672d6e3e7ab4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3468f33cc9c42d773d5a1b2e062c1a4
SHA16bcd1e2d253582374a22cb91137ecbf1df135a6e
SHA256bf558c214776699e52f870a26a7365a108b407e07f446bf0c05bca7c2cf5c8a8
SHA51270da09f1128882b1bf82d4ab9ddb0fe6e6164ef0e6f111fc5dfeb71c04fd7ae69982033805a5aa14c9eb3b1aebb3d8f7a20195bb84423de43c68805ba4b0f944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1e215af6d45c4341df0d505f2939847
SHA1bc1678929fa4bb1dfb4aaf7a68a59a61c2533094
SHA25635015f0e541d525882acb2e78e700dc8628c0a0caed19330873cad0a21775dbf
SHA5129d712b4c467f9c3b901f4df6feb884cc7d8dfca60223a8d517744d2b6fd2f7b8c2659ff00395a33af40d90156b89f2633c3b2a3ffe88670f563e42a0f176b99f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d5b0732866394b21e6f7f8e100a6cd0
SHA10a56f728f6b570c1e59234e37d48274f07e0f489
SHA256d953a16326728e860daf1ea4d5e9ed093720061e393f4ca411a0d70759ed1eb9
SHA512e9ea872f89dfc414caa8dc9de2025e31437effd66efcb306631503c4d6decc19bfa909a9681d9aa750db6da3d4fb26217f42703ccfedddc2e999c9f756261e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bd7b13084b5d4dc2b926c610cf6c9ed
SHA1d3e1a041c7b3d785c8c9c3d156cad80ba1657c5a
SHA25660bd23cb53b88529ed7fe9ba515d0891cc204c49eac75434dfce510b996dcc9c
SHA5123b06eb3c3fc37371250c8961145c38ef77cc1cecb686085117e02de473d03eeb3ed4f87aaf14e8c814e10de48310f783fe37a47237d15d9bbb753bf2d0252bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d0f2661a2aaed83aeb00e128f39660c
SHA1d555161db629ec3dc6643d6567718182e6857a7b
SHA256bfd7886bfac515ea4fef36f5b483ca791a259b2cea781558cf9d41742b5dfc73
SHA5125c29ab0f714b6f9385881630ed03b82f1305a04f3d6beda05475937062faf000b928dd145bbe578e8ae07a5c54db116567876c235de6a32e7b8ce47c9f585de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54212cdef3a21297135b81038a95030ce
SHA1266c37472a38b2774ff4389f8626d9330adcac96
SHA2560492bf0953b6ee0138450938fdd03b169e39f732fb8efb4c76af101219cfa095
SHA512b5b96b73e5f261079b1158f031c234447c27bc3e1c8a75cba61e71047b0eab8028723de72e329a0f6580eb62bde8eb407a0d343d95b2cdd958e306dead7781f5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b