Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 22:11
Static task
static1
Behavioral task
behavioral1
Sample
0a88092bf4146dbb56f03f4a0e434f01_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a88092bf4146dbb56f03f4a0e434f01_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0a88092bf4146dbb56f03f4a0e434f01_JaffaCakes118.html
-
Size
21KB
-
MD5
0a88092bf4146dbb56f03f4a0e434f01
-
SHA1
654b840e8ee2675229f9a4891cb15dfdfd24e48d
-
SHA256
299366087b2c1c34f643b8d4a9a1d5d4c0a4a54fe69eb8f086cb176c1e045e55
-
SHA512
68259639099ba7292910295340c252a28e434586e11095a84f743e5955fa570fcabbc1e6f81c991a7c581fef1f584fce94fd586b12ca9ade182fa5fcea7d8e0c
-
SSDEEP
384:zi8KhgefGVBD8cu3RiYJ6ImEfP4ycbp54zVcr7DJZTO6uv:zibfGgcu34YoImGP4yFmJZTO6c
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B052641-073E-11EF-AB07-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705cf75f4b9bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000ca5405b903c433611779899d41aec57bf80e8380d759bb57b4cc749b29dab51a000000000e8000000002000020000000a9245bd72f5a65fbffa2c2938f6fcc6b41b60d840cc45f358ce6fb61a7897274900000006e2bb785926694d0153ff74b9df7f782e2dabbbce57a423a6e21e504df8ee0abe4f3e463b8921b4ee556691763f6dfbf9513fe955883a160d5b3f7af253fd3bc663cbaac7bf58d7e66849273f85a20acdbb95aca9a5172c790ee42d88f66899e5619292455c9fa8e35bf00594da94598a8d49311886d526487fc9e0bef8d1230bed8838dbd22f2bbd2ffebea762fae0840000000c9135726b74abcd5c641260123596227b4d51761cd05fd2a250775c4d934fdf1b44d2aafe98c7e9fd55cdb8821e74b3ff8f2adda3b52e9c69fba2e76e920c7c9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420676935" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000006810d576eff50bb9e68eb5979e79e8cad2c8ff4480c5d746d91117ab8d345653000000000e8000000002000020000000818d36a449d889f2b4c272661d0383aab6f3b22943cc8a6ac119b24ae7ac8a72200000007bd745f817548b1c3edad47de13d5a39084070a7117a58aed948b7707db46d6c40000000187bdb07f9adb383b2104cfe8043530fffbec102ebac3bf3af7d012f3d46824f60ae58d68bf2b845fbc274ae6c324120468526f89068c71fe9038c4c3922ba01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1336 2528 iexplore.exe 28 PID 2528 wrote to memory of 1336 2528 iexplore.exe 28 PID 2528 wrote to memory of 1336 2528 iexplore.exe 28 PID 2528 wrote to memory of 1336 2528 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a88092bf4146dbb56f03f4a0e434f01_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e94b7b79ee2be08204034395019c32c1
SHA1ecae9846200a21c14ae9c56792b4074ecc68ab81
SHA2568dde941f7ff70bffb80d2c054e42976bd45f1cc39ec3aa15549fc8b74221bdc0
SHA5128e7f908ad35fc74abb2480ddab1052088a1da728dfcd0def3b14fc81829c0a7542d0b184525648fe3b73f70a02f34ac8439c9a7950f048c08f915dd2e827572c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5013d650a5c991794d0313bd69c0d7ef3
SHA1d9f793e63192bf0fa61bb5ed6b5f185717bd7e84
SHA25611b133cc587260f4c3881d9ad0246d11f981dc1862432b55d4bf73f7ebcc9a7e
SHA512761a5f3afa168078b0d23fac21baa7d9e1cdab59b43725835bdb2ec5754283bc1c29ed10d9a3ec85d6f15dce9108fc0846a979bcba590ecec0a9a03e62300520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a48ea16cee301c53e39d88605dec523
SHA1847ad3a91cf7329a362f207edaacf63c4879d464
SHA256788b7116c6ed83f1d56fa9ca10d4540980ec50458d32c39329a0fb351ada2287
SHA51201c758dd0c5b5045d1fb088afc5560850c161fc09d20609142d2dcab3c7f93e477a59e93541efa9eeb5dd4ba1a2ef345e5236f7ea797e0bcea0b863b93b365bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcfffad59cb0e8cdedc706c9694ca013
SHA15599fc77edc384a12d3a0fca130c57f1f126f17f
SHA256f8f5fff64dcc3093d99c9eb0db6ee4e5df4a86807ca80d4841b81259de162175
SHA512420f9dbf2a507d2966868c8594f7fccfe15c9fbe3659ac22bfd2f6e918f393c503d4c979086701cafd0c29ad29665baf90040f4b5f420476a55db6168488867c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c150b29fbbd7f130e30bf156b1553f8
SHA14f4366f60ae00b240f4d534faa268aa43f064a45
SHA25608e6698d729033d3f0f7a63b813bb0fc355a72794ccb625c834163636cfeb4dc
SHA512672ceda0d443be6872959b9b4303181bb318526e79d847fff0b4299ec49e38adec89e0febd3e24e37d7b7ea4343819ea741374042b9d8eb117f37ef08d98aab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528de91ab712c4104ac76e38e069b618a
SHA1c77ce5adea0638825041a75290390d562e9b7ece
SHA2565232d3a8baacdae7b399d464f6079ac4ccc6344314ab0c878262e9697b59dc75
SHA5128b978bf91e8600a831715a8b8a3261188a535c38cb0473eff0cd1a45de6a1d80d730cc20b79206a6f6daf7031f1f1a914439b974a2bdafbc3b283304bc6e78e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8ce12aee76cf486d92baddb17a669a6
SHA1eaeb44a77d0942ee117261ffba39a2c244e9a5d4
SHA25694d8effdb72a842335a5a629ec29fcde5c3cf322685dcb8a3fc9763e6c6507d9
SHA5123d10188c553320fe3681620bcd3490a953d49c84c308be6ee806d544dd965e9b950266630fd0de6aa33051e74aa7ef120990a58177d5b9bdf7c659a24feda660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59408951cbbde0f02699c9e500934a240
SHA1e01e8dcaedad4415df7fedd3d3bc9dcab13da9cc
SHA2563df7c15ec296056113c558ccdce34ab239d636c80a1443c25fe08bc0559285b1
SHA51283b296444badc62e377f14e6b568e6fe491f780f8fbe5c6e9dc45ee11eb067ea3699567bcd4ca3353107cd4c0fdb4716e509b54c9777f37318f934c679b6a0be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a04d55f669c96639fa2a9b6e8522ce1f
SHA1280d02d66c25fe19b988659a8734c37f065a787a
SHA256f48cc664540d695854204d721f297d3600b7c846ead09c2e45d4fed2d5bc5316
SHA5129ee691cc1a5ab4d8c7a35627508c4abdf6342526e26d65456ebcbfbf9fd2a6190032da9d29b3fc59497f021740bba123aea4c7d7b1c721cb1234efcb2fa5f3f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dc75a9ccac8128da5f7cea26ea7437e
SHA198343f2ae4a0580d08019f601a4f7c1432b5e4b3
SHA25633d05d24e061832eccbbccb10d3cfe4ce88463d2cbded4da83271700466e328a
SHA512e132697278e596f91272bd26021cfd4a06b896ad6624e7443daa8b16ca9d9ba4401a990cfc3f65d18db7469a055ce32c333fa55eac1f7e6856880c4b42c694a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516fbe817fc1187f27be506c11c2e926e
SHA1c090e1c826207d94e11c0e30dacc49b3bdbefbc3
SHA2563ed37c4084a397cb97a8018208a13b052aab2ec53a1303194b224b30b7ba529d
SHA5124821a51a1c9f5e393c7678a506a429c1acfdb49c27b3292a9dcdcb353fe2199bd87e45b43d33167bd05d1f786c39e24eca2df1130d06933f54a2488117559bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54446df650670d299f54416b8a1628679
SHA1e0d3cf01815e0d780317f3ba0af1520cd8403af0
SHA25670d9668fd520782fc01b4af49a8197f62cf8a5803adbde3582c24009426faae8
SHA5126c2c14b008e72290ee528afaae3d8ffcd8c6f7bbd254a344e53202bddba7cc7f321d6550b758445e3e302bbe2442ad7d652434dbb4b867f227817b8ee2a4f614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558dc0ecfd980fcfccb8afe6639ac453b
SHA16e4e632486aa14a6ec7c86c911de235beecdfa9d
SHA2567970d3facebed8ebf7056593e85cb240f0329e489bf559450227c33364fae84e
SHA512d06bb04d1af132ff6ed6c54526c7edd75ee8ccf13c3788f08e61266d34e3d27c69b402266f07f1d857c41abaaf738bb6ea639368cab0021ce28c6b00caaef33c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f06c88162c6c969e9dac374e90b00ba1
SHA191f151d6c988a608fdb0f979ebe4ff0396501f6a
SHA256880d0515414db599691a312a2dc87678080954b845b88de03c58b8047b026bc8
SHA512c9ccdb3f9bc4bb806463886789362e83cb42b65d52ab26f5a98a1598755118d2407e54ccac1f05bb9cea5eb831298ea241409d096731fe81012490a9074ddf06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512b132cc300a70c9bbc67b66e01a2f2e
SHA1af40dc6e37664eca3f6188165128995e6a41fc43
SHA25660bea09d5db4c9b1192a44d0a9354e65bbf2ffcebc6ead0dcf4aac76e8c71ba2
SHA5123b3a46079bc575565337f81160149803e1974991f990e73a92ab8705d6d70cd54a8faf586013bd05746491522b30412238f999bb37b15ba27a42b82013959ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5741fce94d25943f425138c7c3e7d1582
SHA1cdd3569ad86625d5d075367f3f92f7abadfbdad7
SHA25671ae4d2bfc9a7cbe5c1f2f3bef89c21cf29f4944747be4223ab435e22df1ceb8
SHA512c8891fecebb344ed23345ea6f691a5adfc2b63fc5201f996cf7f69e9d2ae08913b8f307e1cdc744f3900a625e1cfa417f50412c69003543f33e1b7066d24b76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580167107ec13bb420aa38a215cbbc953
SHA1963b54ba1b072b229c4dc4418619c850b78a5e68
SHA256de50da79741f2d13fa68c44a4d0210379ad1eba1a0100d79b042d5482ef57b3e
SHA512e7ae76ad8ea710b7745def6085780cb39e8c1b6b04f25a8177bccf6a889fd17246f7d67a58ebaa12f7f572392d14d25d7691db3a4dadfad8bce5c159695e79e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5103aa967e20f0c9068faf6d5b93b4ff1
SHA11816b575a6c9c51c5ff33b5ca295a49f1f837e85
SHA256a42e54bd34f4977d2675e1b8b46263b56a007506fcc3e37ea937c924eab69e72
SHA512db7def4171fcaddc9429ebb1861aed83fecad39f5c52dcaa7f4f5718ef54d74298c28623977c710eebefae96491c10013633e88c2a1ddcf01dbe862b34617f0f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a