Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
0e993856c36cd7f7f27eb22877786aa1_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0e993856c36cd7f7f27eb22877786aa1_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
0e993856c36cd7f7f27eb22877786aa1_JaffaCakes118.html
-
Size
25KB
-
MD5
0e993856c36cd7f7f27eb22877786aa1
-
SHA1
dd5fbbfb8cd8a80aa44ecfd787596062acb20bc0
-
SHA256
b480c4963b80c7c4ead7f8e0ba7465bc102a8fce864edd0c0031b6ff16b1c456
-
SHA512
321221ddb3aa3f703576a10510c9c144e7890a1d04beae8ef8f2e7b9d1fe6ec80103176b258a452dd4183813483b9709d5d9761c9fbe3d7e3807eafe0eccce9e
-
SSDEEP
384:enA4ywDOpmQQ9ztvukeKXXTu1wb4COl5tLIWQQ/U4cR1LeeIYECdG55LkuxOk7gO:21B9tWkekuAbg1k90t
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417817476" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000015719ce4ec3c32d6eb79ccec813e2c6fd7e1e85024f0ed331bf6a81451fa2b03000000000e80000000020000200000000ac967dad2155e8b4ae6ecfac6093fae81b86b42f178f6cbdadc04f35653f01220000000a7cad339c7afb4c248478f876b6f0a343ba1f69d65829668fd5d4de65449f3c440000000f974bf45384efe0a7ca65c08ad817a78e2f60641604a059bdd52e403d48e371a2aad89512d728bb42f8f16a48a1e0d8b9c8dda0f1fba7f781baea6faececfd74 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D89F8E21-ED3C-11EE-8840-6600925E2846} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308726ad4981da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1268 iexplore.exe 1268 iexplore.exe 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1668 1268 iexplore.exe 28 PID 1268 wrote to memory of 1668 1268 iexplore.exe 28 PID 1268 wrote to memory of 1668 1268 iexplore.exe 28 PID 1268 wrote to memory of 1668 1268 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e993856c36cd7f7f27eb22877786aa1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2dfa377df51a2ce7e65ead51db08319
SHA145c12be8fb5ec6b74372246d460e1b4e9b4c52f9
SHA256ccf699a1640c6e20229896861a02a82a1fb9acbfa1906135dd708725bf55450f
SHA512a50c8e56bb8a9fda578b45c07975f6399324526f7537885ad3f9443e92b7d1ec78005a074ec6b021c509d5ef4abfb46ce8bcd17443219de9c3217ccb8f29f689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5924bcfe048e02e69a8c2dd250152274f
SHA1d8ff2e70ce0a95312cf35fd6092e06555e811102
SHA25698b3886585c2a9ca053cb444166db009538f45a37150fd35f09ddae0c1669387
SHA5122a51e7b00369022c3160b180b11b576bb30741e8dd5a54f89bab9826133a5373e83a7bf816b2a4510fa1f3bd1e62d643ae1748c1e4cd98db2a192014c28f8367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5043d1eab6df85ed84e45e377f04c2bdd
SHA1e1e0139a3a828060f026398789cc01fd920d9257
SHA256e520da2bbf3d0ac67e215daa3d56ce8b0f95fef9b655f0186329cfc5ed7f3206
SHA5120f5597ad084b1a00244fd39d2b089a40a86929c5c3caab632b472d2771308c6da38c8c94ecb4931fcac566af36ebfb1162c7ea744aea9c46cb8ffeda831dd8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509fba197efddc44bc0284c69205b26a2
SHA167389a410a41812410b896c15fa8159fef655e88
SHA256d505803072c132fcbf0bd662a70517bafad6d69c310a075ca4bc330ff9a99eea
SHA512e9df248b27c1369f84e7bed7ada7405ffc280ef911a59dd42b6e9a049878ccbab59e5fb058abe26786e24e530568250a2a1e5020403c29667b6084de4b1c23bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b11ad3f2331279054d528563858a138
SHA1c091e5e7fb879ffd3a4140d7074de6b91f5dc258
SHA256dada147a7951431f2b1dd78e798e79211aeb29da94c2622a6fa9e694ec9e6778
SHA512128c9b9792c53523e2880b0a04d868b59a200e6275831c9ed4c2e33aed521cab3868a2fda54ec7894f29341cb224e714a4763c0353575378e2230c4f69a8c3b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57013598f970acd5f3abc2ddf221a16ca
SHA1ed57ff7fa8a7ae583a7d6da096ffe371f4799ece
SHA256a10b36459eeff01a0307fe8b61568d2f53c286b5bbac6aa48d9ccc4e0f0dc954
SHA512a1702d48d5547364bdb2fccd75a91464999ddc0abc2e9f4e109b4176fc9804b7a0ba4d16d27bcb7be1e712bf7570aa7add439041b82a32d7d732a56a0adffd1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513c6f1483172a20d32f9119b37a035b1
SHA1150bd1962d10ae6e644435b5abacec8fb1ffc88d
SHA256e6964603922ec5e5569511bbf07cc8b84545605d768a7c984a7d7b5748a14ebb
SHA512bf63f06ebfffd66819903020d33a4c430d478e3db2a0ec9439ba5d6080850ffcfc2f095096116fb318b939e8b64000803a48228b15c3a9391c9f306e004406e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b178bcccebf81428088d9c738c476dd
SHA1db957624990d19fbc274a602920f7f0de7721550
SHA256313283a17858b8ffa625c5b134f8ea585fe0e92d9af623f22677659644b7cb94
SHA51224769adef8fb6f3c0a3257660de395dd31e1c254a3d4d3a484358f5fac499baf4ce6516045c35fa0f3ce139c84a7a9b3b7c84a42dcf2d79ab7c62d04c4f77858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504d11d05dca31ef641eedf4e710333e2
SHA121088a1549c83e443be7444ef416ff446d2d3cc3
SHA256b4f23d369b38e54e17a88af10ddc46e8676814309b09de90c637c50f930c5d31
SHA5129cb49385037d4ad351bdb8a3504e25e28ef2cc6361aa4c8c222896d8b25876ff0d8468be00a04ca3a09cca919b25961a304759e9418c3f7f528744752d0b3dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d579dd5aa8fd5e39a96961facb6e4bfa
SHA12eaa9f50654e8f42de0b991f5bcd878248596cfe
SHA25607c3ec3288d2d86c81490383ce9a73846e2d08d936c087fe0b60a37bb34e9230
SHA512a63f4ddc083a18d6184561f66f3c8f8f72cca96b6be2922bcc1c7dd34bc699d8874b9a4b89fc85fdf9fde3958fcd97e99209205c8d612168d6d7bc3d80be6527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7b26708de19184c3b0aa91ad9abd32d
SHA1be41ef0ec7a86ade60360d53568813fd9742b6fc
SHA256b0a5f1876c56d30abe2269dba57813840c1afcec67dca79f8774e3cdf46b85fb
SHA512aa292ace207d44d1ffa04f20a1e2ed9e83f1d98cc741f7b40cf06121492091f45fe5ef0ac99aa84f42b0cf2835d4156fbb61aa2a3288a30af878e21e1f36057d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558a7c26eb6bdd23fd4ee670ffa9cbba0
SHA156c989fc5b79a3701d179442681598c91a346845
SHA2560b4a08baccc447dc3c82dd5a555519f8ad5717a8c9164cc822e459053aa3095a
SHA512e6f9b87256e5b4d057072c5eb221a6150482a5ca1e90f116328aa34378266f75694266c45a391f4467367d9b7665d381dbc26cbe7b2eb3365ca2bff79d97e7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ae9b87c3335f5eebe10463955068881
SHA1c7c5ae68b0920bae1a722c74bac5e5710c691403
SHA25632d602c9e1b3ec7a1d88319dea8092ab8f02600afb9cc55f8ab56dc110bb73d5
SHA512dc972430f0d8c8aade1d4a653f3c4618e8c259f42a5452f6772f4c9b66aca8f9ff8fc7927496cd36febc04b59730c1826fde80202dde227adf38e3b9a4f240bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9aea2850e335af26bd9915a9caba8f6
SHA16bf821f00e567dc6502e07fd52f2ab8566cdcb82
SHA256c3ec6096f19deea84427a35a7a7a42a72246ab6b8bf2624edc6f09a79164f9b8
SHA512925bd4f4a1fdd30676b4bbdb0a64926541f72a0e98c9cc0761dfbe2cebe862859644271490bae03d05cd3eba0351b4144590c1d9e624a76710f1d3cdee5f87ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2be14b5024db8db09c1f2a14557d312
SHA1279799a54822a3886851caebe28b66a2c2f3b0a9
SHA256e7860e1f24c8b9310eaff74d1c7c1270530810e26822a224bcc30d2937b4e51c
SHA512a6ef8a8280e75bb2958544a65db1d91335e5a4246084c48b033f58d1546867bdf12aacdb770888dbbbd32f2a6d9a9b7799ff03b6abc23f67912ed2521f2641e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba50162bcda11cffca6e9b7f5bc800ee
SHA1d3fd3830678357d11d05deffc0591f66fa6c3a92
SHA2564bd00d83559da9e171119fc4626338cb9931a2dd20b0609a849cccf3ca2d4e35
SHA5125c5f4ef554044fdff972b1b5f6d271821bf6e506291c30869ad1908e908d2a22146e9f8f3c59e67a386981284ce4734950286872744da1028b69d64dcdc8e7be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58985b786aea8fdfe019049d668759930
SHA1330ca12d00db47041f217670aa0437f897bb690e
SHA2560626a84d30015a66b91f9da7ec1b12c7f3e053ec01b60ae07a211741cd866a51
SHA51294098346ef03fa9436b9ae0d508361a461b5c0c3e931477e4395f5bc8d3cb940e1102667737406c797b43c50f8e559e42e6d62b035f2a6664d3cdb3249202b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597ad6d0aa0520ef7ca5af97acd59f95b
SHA1b60250ea933a133e7c90e35b26e2d163ce091ab6
SHA256332c013b17c3a0f9a2db1522c6d58a94f78f86d45a69e69ec13da6a83f13af99
SHA5126925161882c765137bc425c5aa30d259623047937e9e00c3ca34ba11b25adac994eb6cf5f3c1f1fbd476a35736b07a8f9cc3784bece2c62f30309cab7f468908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531aab32f717fcee3c5bd0f08ed4c56ce
SHA1baae372c0bcaad21383d841a9b6daa6c5eeefec4
SHA256697b4c6535a1cd70071ec6580d39e6b93f63e528a130d018975c408a555da500
SHA5122d9720b48ee717d56cb20115ede61d3d211fd5d7af12e9621ed48a8b25129fa60c80edce13b974cd7e1e5e58daadd707832ab401c14a48a7223175f135b3c1cb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a