Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
0a3d8161862b89d2b67e6d5e3b64ff03_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a3d8161862b89d2b67e6d5e3b64ff03_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0a3d8161862b89d2b67e6d5e3b64ff03_JaffaCakes118.html
-
Size
27KB
-
MD5
0a3d8161862b89d2b67e6d5e3b64ff03
-
SHA1
641f8ad4260c0cbb0389396f346155128f921d90
-
SHA256
bc50551356fe153c0ba72046a296ac5d3268c3e976168b99f3754e861d01eacf
-
SHA512
9bb37be45f37841c7ce095ffc5a38c639f0fc8dfd951349a11553f995103a1ec81d507641b1233bbc314207f00aef792de62b253d10c3bc156f3ec621cd0a83d
-
SSDEEP
192:Cyiw5AL+l9vKmB6H6tdEVSNpETT6AxL5lf2t63XgOyBefVuU8uFC2ZMWS+l9t6H+:CyiWE2CpfZ3Xt6lG1P
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB5CA491-0718-11EF-B5E8-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000e1c415e6395e385fd71e8bdbcc4e8561862b5679482d59bb11000a094d4cdf80000000000e800000000200002000000084bf9b966d0acf7729a599141b434a5f552fd8a13aea87e6a373cc961cd3afc620000000dd5c9873e9e7914f44387511bd28a89485162e15f67689e2b24c69c8e9c3a5a9400000006a46fadaadbf2385391dda05e718c20adbac34b82a3a3c622e1b1a1bbacd0b7ab9880b1f9a3863804d8c10db0148471f3c788ec6e2e05c214e7b26d98a8a993a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c033c6b2259bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420660749" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2804 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2804 2200 iexplore.exe 28 PID 2200 wrote to memory of 2804 2200 iexplore.exe 28 PID 2200 wrote to memory of 2804 2200 iexplore.exe 28 PID 2200 wrote to memory of 2804 2200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a3d8161862b89d2b67e6d5e3b64ff03_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3cb3291748e591fa8c1f0532f015a1d
SHA1288524cebfa597330778ba7ecad963ef63b034ff
SHA256deed164bd56d09676e067766b904fe50922157dfa1c7c8cb253ba816251c4ffb
SHA512aadcc67f6815aa8a2d3bbee6a37bb13eec3afc7b4ce52c92e78e066d13f8eac578a9694832fb70575b7bc6895065e03e301f4121bdf6551ff724d0debfb6e466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f100b25e2d5b8f30eab37f177a74dea
SHA1ea24283be4c8fdf10e247887b64dfac47b6e656f
SHA25633733fb9d17e2bbf568989ea46514ac5b529bcdcfa4bece8f7f8c05c90cc0451
SHA5124847b31db5616d7bac353864ca3f2a23541391ecaf0b4a8c3fa5bb97f0685262c16315f715dd0e5837c84cb9fce49b6d345cd0a946ea7dd23a7d18426533eb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5addb6badcdacd0524aa57d6e7888cc
SHA1f1fc3cf380c61d874e03e328c20f64dd66fce381
SHA256af15acc5e55b51876ecd7032fdc8f5ddb7f1b67daf7a3c501d5cca71cc430e15
SHA512f9235c1d0fed73c4c44be8a533ba8daa17b1bbf0e0a12db9b56c2f63f1a72916e0b9f8d803fe1df60560c823fa3d54fbee5b5cd91caabccb20aaca780953106c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea37dc15b826bdcca61519832471a862
SHA149120bffd0e03d185ed412a107b941312e24ff4e
SHA256d033a81bf605a7cc16eaf59c5087f2ce32011c7ad027763aaa48cd58ca5fe85c
SHA512b498d5a08cbeb3ccb3595be3b57709140784e545b00befe8405c43d0d498cd69774aa7d07ac3afee8192e526007f077f79c95cd86497e47d752498aaf106f69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5885552693972509dda0ea287bda3a6ae
SHA1fb99f4a4d3e98c28ffe61af32913d8df8f00f8de
SHA25660f3a93c5ce12e40a42cbd6e708b86e2f3238f305b2365fc55d30e85252c2369
SHA512eea297d48d304c0847227d3a8a01528a0b7b95259773765b849a3915c5ac26094669620a76c96e750ea63b09a5aa4709fa184d6fd945490670572e604be71daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b8de7247ed1c03f3d3389ced8d83108
SHA1ebe7199c1a48a502ba3c977ae190d8aea40e1420
SHA256362f46995958f59e58ee7fc66f8a6e5b8ac2570321a20e275cc97a96e4896dc1
SHA512e5d42577b38ef49fa63c2a4358f7ee63e89369f927ab0f9addee4beafcc40eb9d3a5e7fa175859d7cbebda4645ad5ef7e721dcb2fc5d5fcf7bfdc1f109b8fc12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5448ede66c21464cbcf8594924dff985e
SHA1218bca966e74399d06d1859b7c8f30c78c7baffd
SHA2565d6d12c72cd8209989e65b7d51eb33f1fe8ce45583ae92ca1c7bbfb5ead6326a
SHA512d9c6fcc0051d1a8d58502003c1bb5854d98687b533dc64a72d5109293a15d75413ab46b0a60fa0e79a762e9f1bb13625b45e47046f32f9c30ce2606685344558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bcdfcb3744bced19d1739b00626e18a
SHA12368ccb571c381bc3d20fbb137a655f6954f6a7d
SHA256855db6d59b355225df5c2d80676f48b7483c3483170566ddf841c323bbf5f9a0
SHA5125cf07ea50baa35e2169336faf1abd9396f7e81fa329ea63e826ac781ce8d8d8c4934cefd25ddfa6ada615b6aeb8931e6a67cba18664ec44b6990675b01749ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e26bc20dec4665fb11ccabcf437f324d
SHA1df54f855f45f1e899e6308df045e4e96b48d8340
SHA256004be4e06dd08f1e30f27fcb8b89720fd54ed1418967ca45ccff79f9866fee7e
SHA5121d45181f21967fec171914a3df76e57c5ea4efddb0b2d7d835db1ec91e543ee27d878e78050bbafcf7f8c6eca246859d72b11413f9399ffc15947b37092205ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fce68217962178f3922a918885b13425
SHA16866e820fc642c1f4fdb48f6aabad2866d359fc4
SHA256cc5b0b88fe0851f089ba26d919a59b652d8535459e1990a59b6c94ccc304bdfa
SHA512d70f685b90a63f59beb0220ea8a17b376e8f13a677b16cb348ada30ad42b48db80910eb7d5ef5048abfa54a880545e109f0b83a91a7655d7eada6f7098f519e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c811300b2791d263b031bf96c72e130
SHA19a77e1cc2812a8fc8410a23588323b5c97353a72
SHA256ee5ca4b36a00c6f66c320705bdb6565de6191b7d31e4a752767cb85b948c70c5
SHA512bb58a058a9adff9a97494351ead4579f04d4601beba243ea435f13e614303974ab586ff670e46afa1c61d028466fe28fbeb9279843f8364d294051091a31a4cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50468814832206655bc36abf6ba3eea75
SHA1ab6d8d8481bf7ae5e85db5f5019a74f8553c48db
SHA256ff8d22cace46c7a23cd11f4cd699ad6ac9981d50516975075ddda3833b969fc1
SHA5127260ec4b0d03980479adc34d519fabc81349b3f9f70de2a90a1ae46dba8c9100e80f8cbd2a3fd98902f56c27e456b3c51399449c75a319ad06c29b93f2262d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9e66f29d288422ed97fa84d6200ecb5
SHA14145a58ecf6f6cbe148befbfd2a6df536f2a8978
SHA2568300b7ba4538ed189daff65f85db0689b624a0813f5f5f50c793f1ea9a4289dd
SHA5126f906c009cd29aceb82533231ec8c9995779166cee9506b151ed66225a90806e0f3a6a965c005a33dad3b38fb0e43f071443e397d990cd0a29bd63800dde11d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b154acda0cb3fc190432dd3cf0de5f9f
SHA1238bd1a97383075a7738f1b8c2dce29e264c7732
SHA2562503720cb04ee987bd2c5f759ae3a5ed513d1c8f726dde312dc3657f85f91e51
SHA512201447314cc93c7c6db805c3fb2a5d046f473310ccc621ce33edf1ff11b0ea1141bc177696124508bffa8f110634705066edcc45ab40e357c0cebccea0776a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7610f3a91c7ee8b1f679f14cc03d444
SHA111320fc75311bd331bb0249d2efa71b26e06ae68
SHA2565e9bc890a8babfa615ab96788c59bcdebc754b216a720a07b0e4a37eb3df9a90
SHA5125c6fcfed8e27e28cd4a1bff25238e131c07512c86b961aa7523f359fca42c4594a2f495f1234f1704bbd07b29428fe2a944234865ad095f3b79d5f4da1ba37cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cdba4ef6cd3a497bd60a50475ea91d0
SHA18ef5df6d9f0a983726ce1bc576ea349b0efd568d
SHA2560ffe05bbe608bd54309a7ad67a03b59d5acb6c1a9ad2602c63bf070d27e23b59
SHA5128c70d937c7e16fd76cc83ea952f10e6620bbe0ed0b8fc0e4b8c2f24032604cbdc35d94d1276583f239039a1ee2f7d835c24042f1b29ca852b7fdd52c18a4d50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc5d0d776dfa080e0415c7a5146d94b0
SHA13688050948fcda04628af167ef4055971449504b
SHA256cd8a0bf3649ee26263835cae93618ca97f22fc0abece4f6299ceff2757dd6873
SHA512a7cd58176a736819f74cfcd3b38c5e4f70bf68a48df6a45fc4e594b69117184d5857fc0487515122c8bc820423ea43f62d2ae047fb79115af114364e9cc0e6e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537cbce8209e7c0d4715de0ece781b3e7
SHA1d68cf07300a6c2a3ae21fbdccecd744f76229470
SHA2562c9ce592344c12b03c660f9ac2dbca010d7279b6308a75720bf8eb74f7beeeff
SHA5125abc4461514e45db4ae60a0e6a8c80947f02e5c05f92952dcc18b1d9d564b36bd04527c4293b582e4f11052abf6edf976013cb4a69f7f7edf71c63da2971e52b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fffae5fe05b3644072510282a4ebfabd
SHA1e9892ff224d9dc07a0ac92d7a4b179f4b67462c4
SHA2567a28b3378a8c5774b1158ddc74e7c40f8850e9cad11b53475491a073141e7439
SHA51213be8ee3a734680fc0fdffc862646a3840c3bd13a43805aafa47eff07854da3446c2cb5dcdeda4369879163bfe94779af2ae3030237ddc5d1c62f5a2e8205f63
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a