Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
0a00b9f52c18cfbee67efa92ba2c50c9_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0a00b9f52c18cfbee67efa92ba2c50c9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0a00b9f52c18cfbee67efa92ba2c50c9_JaffaCakes118.html
-
Size
27KB
-
MD5
0a00b9f52c18cfbee67efa92ba2c50c9
-
SHA1
3b561f35b97f1b852e0b4d66e02986b7252e7f30
-
SHA256
4d456013134d67ac290333b5b7ae4386e118b7ac5d6759e26ffcdfca7f6cecec
-
SHA512
b8a17285648d3f025c300f7ece33b1d4c767c0367eadb12ad972753a059fa835c90fca380e41091e84d8211bc84f6b63fa867808a71577baa52338b29a34dcbb
-
SSDEEP
768:SdN3YLYsY9EmVNqx5WNxiLib0E+a8qXjVXNH1lTXF:SdN3YLYsY9EmVNqx5WNxeibr8CXNH1lR
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ADBBA3E1-0701-11EF-8F92-565622222C98} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0018da50e9bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420650794" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000a0158d552e24cde0deb1d656acceb57b81ccf992dee26f52424419f68d35c79c000000000e8000000002000020000000d4b1037837efd84132b921fa6fda4b6972e562256e228533ddd2ab256a2e0d3620000000d2693601fe4f448ba2335f81ee9e0bb5f62843abaffa27fa4d76ae8eddbe994340000000665aa6b8de890f76276f824c3a93daaf5ed94553977f876edacf8bc54b383f1ea5c171e7e1cc8d21b6407696f9e718fd34c13dc3c907d74d1c562089edc5d65c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2492 2912 iexplore.exe 28 PID 2912 wrote to memory of 2492 2912 iexplore.exe 28 PID 2912 wrote to memory of 2492 2912 iexplore.exe 28 PID 2912 wrote to memory of 2492 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a00b9f52c18cfbee67efa92ba2c50c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD597bd24dad1b07ca494b156efba320f3b
SHA17d08ccdb57a023cfd87e2a0cd6d06167da700de9
SHA256346b20ef756240aad7711a115ca574d09e7463f1d17a246ece35180c773fb727
SHA512a5457a4c8a1b034252a1c0150b4cca7262962d24b0467daf55bbd8f2a7496d79af2d084b1f3a5664b6b182b98b4c710bbb3a2a9e0ef21680feacf03b9606a42e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bd4470eb454990d26b6764092f87628
SHA18da2c13746d0fff9613c3ce0e5317670818b6a7c
SHA256368e1485981b0cf3ce9c76d7e0fb9d06633919eebd9776a4db6b346783254d84
SHA512366a86095172badda2d9306de9e7f5ea0db188128bca41c47d5b406c1e70012f0b615cb9fccc88440fc47e60df2852e83e83eccb212a38911230e510626494cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53144e6d72004d2ebd87bc5288a2c97f3
SHA1719210a36c7fa36adaa41dc92c6c58e1845fdd54
SHA256ef39b51da813bf03e06ea48376a6635bf7bace879a7555435ddfd48665aa8774
SHA5125ede068416bfac322a895119a2266300d543a331cea124dad08fcb2c3dc4349963a57c82c64496f5b3617a08b55578fbc8c76365f9fce339724f99a4684a8738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592ee9e37a58ccb048bbebf05cf76237d
SHA1b28f9447585555f282e2e368605c19adce257ee1
SHA25644150491b67ead78552c45445dd91a4196b01fa3ae3edea783e6899902244228
SHA512f93605947755330ee451e68f67d86cf66fc9704b3576d2248929826d3fcd56575a6c94211264a099595eb88559da3a1780b1508c1199c34da065e65ee0ecce26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7f13b8643fa2b762bedb6e3958aff51
SHA142968d9b4d50978da342e0c276e0b604c0df4958
SHA256bb89039bd316611f33fcdea4b82232b64861f52ae68a56a03c8fa345872f5b84
SHA512107506c8c955bc35ae697e963cf4603ab7682bd504769e5dc7c3512832a616f6adea5b3fc33dc0a29650ffe90a32eca9ea3377c18dbce68e7d5f9097f393a015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a83e50da2051b10fe87758a6b84ef585
SHA192748f3f9a50c48775e65849961510e670072554
SHA256591497cc63b105eae560e810324c05951eb8c33e5a85eceefa5e2dbbcb49d26f
SHA512ea241504edc87c5de3193039329603e691f8784c5dcbe6ae6bddd9e5a91776b47c4ec8a512d3530afecdd823a9512abf5c7c6f28621ed3ef9c4a00868dc12b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530d0662a25306129e3990c1d1851e737
SHA18815d3cc1e144cad084882d8eb0724293199efba
SHA256a3c7b37e679f1824c8017093b324e88eb5b7b2a89aa8338fe67cc6be5577dedf
SHA512d7f80fa43b49de3beb68f67055b4f26dd4b891acd7388d61ac2a6c8ad89382b491e6934429448cf6ccde99f90b2e4286b672fbbb4a052590747e5ad0cf97476a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cdd58f86ed511b13ad2c748d6957275
SHA145380807cd663132bd0c87d4972f9577949505ae
SHA256b37d8af2c06f52a2083b2ee07863cdf625c4c91286c19f7fb98a9e7e211c8325
SHA512ea15a3ba0e294538e3f36941bb3acb39f6743ecc9423b1799e9166c7bdbafd8b93bee5243dfc42c0a0fff52c4a281abefabae56d250a72c2ef16158be1b1c1ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e5fc628a3c66dcf5247f198b2dcead4
SHA1910c8348ac2537ab9c2dbcd86d93609ccd785c8a
SHA256a81f315e1182e679c2bc716d50bb37da974dd3cc6ab96785287141c7f6e032fa
SHA512c6eb8c4a4ae6607f36c6bf3387ee6466d49f8209c279e0c53f619c49e27102c9ba4a2b8f1683b3e15c4c78d87756714fd64c3db9ac3c1b6973b7a19759dc4fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be45cc35dcfdc945126a74219066e713
SHA12657a0dee78fb9b44750fa1d6cfa99604c4f5cb5
SHA25659421ed920d839001b2c46587b59bc5d8aa930c4b4572dcb24df9996afd99feb
SHA5121c1d4d2f7273f9caeacc3931dc7decee83b6dd655504b2ca701c38d097097f9dc7ea170bf7d2d4ceb38ea68ef6da01dfbeb64ce1d470ec0509baf3878a63a751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecfea22a3f8ac84400ef3b1f7d5511f4
SHA1270ef8e61febdd9f1f8e9ee82b0c37e48a1a3171
SHA2566a343b2fef88311d3b20f7de8719e9fc0324cfef53f084b3c2345530ee158241
SHA512bd0b06785411997fa321e75dc3b71bb37f57ccfdf2f650f161f0d45f88dafde7a5fb0d002246ec5acb82e6e7542dcbc68eefd0e113e8bea33233a042029137c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a76a44cc3427fdce4069550367367a9
SHA1336dad8ed5843d85f0ad39f5fe68616eb513733b
SHA2562f4d2db77d46c246e2147aaf0466436e4dcceff012d0207a1bbe7f04bcdefefa
SHA5124f7ced5c00b8f985c8acf034229604d5a4218587849ff56d1cd134cc1bd130f4ec02a6d9d4afcafc03f9d4c0d50ce3cadad1b1e97ba1e6ebe8e49f42ebce6344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598e949c9082d65c5196f06d2a0d9300e
SHA1ff9870a119b0421887150f3b71e190703e0a805e
SHA256afb033cda9edbef92b9981d6fb4bd33731142fbf5756938c947a3aae5282cbd2
SHA51203f099cda143a7a73f5eda66697e4404926efba4a14e1e5802dab43517aabf0e4e63c911459b59142cc28d76722d24c11fe3050ae1107c50e569c8aab140ebea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527eb7d9dfac90830eafd444614e790e8
SHA1ad9f98c31f15cd3d9c22e2463564be7da5eaf4ec
SHA25615c40512fbc4a429f9d9c9297fb0b59836ca40329bce3f79eb997f1f7014cd96
SHA5129b62d2374217104f649124b75a78d2a673175eb53b180bf4dfdd5c8042f4db4743ba7b21145147f5356b4237502f67a2948f845f6e8db9cc5bb5b8eff605ce98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b7b842ee677c7128919daa15365e5b3
SHA14d113d7c9af6608e4540ff1657895377f7e7c418
SHA2567a83a1dded07754cbe1de3d571fa7bc660d2b40a85b102b7f3acca85355014e1
SHA5123246863d4bae32bc6b4ceabc1daa483c4778c0dd1cc719f612b6daf807ff4eb786270f95fb79eaee0dc66e2e6114e70f5e28dab3d6b210b088ee3d0c362711a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fe0a91e0ed01ea0fe92cbe8d1864d5d
SHA163f94b28f6067dbd596f9d0fcc98ea9551273baf
SHA2560dedcb09ef5cb2db19dc7346eca395afb3ea79ef0ad3ffd21d396f9f10243af1
SHA512b4179be15477d7ba89b9e26268fd2cfcf0e29e7c29c5c80bea49a8fba21ff7d225f21fcd85494ad745f04c4bbb366aadb89cc615f030f33b47c5a50335b62905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5660e55ff0914a62d3c44fb38b623f8ab
SHA1851e9b0df37f2e08e7d1899388e2ed5a6dc6b84e
SHA256846caae208f0c1aba50ed80711ae8189569f5b21305d5b78b94cce45bd3f741a
SHA512d3b7aa35bce7558472d8898a7bf5bbef171cf664e1dea4010e8e4b17a982c2a6aa8e76893db77b95929b343f15915fd03628e59adb494f66039af34025811d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b2743ecbb1026f711d50bb00c60a60be
SHA1a7b34cf77e92d5c47e00dff25ba59766805c837a
SHA256f33308e78098f3b43ead406624d5351951144d1ed330ed06e3db5854a4d13f4c
SHA51233f9934812b062b4bd33a6f77caf8b354a818d074b7c521f7e97a46515ae438d93e9567f2ab38324e091c7495a27bc2a5385343084167ff3470a621cf3420c66
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a