Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
0ae9ae8e5c9c0ae0f5996de7dc53ef4e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ae9ae8e5c9c0ae0f5996de7dc53ef4e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0ae9ae8e5c9c0ae0f5996de7dc53ef4e_JaffaCakes118.html
-
Size
13KB
-
MD5
0ae9ae8e5c9c0ae0f5996de7dc53ef4e
-
SHA1
946ab9fdcb59465c56774e9aaf925656725cd8ae
-
SHA256
a4539fff168f1d322e976498e577a38003374557990fea188631e4b007166112
-
SHA512
70fc2aa7cddbbbc4639f2cea50a0f700f150a1b970e4a286211351bff22dce88b5f019a66c4b36b778c539be5720e7598cfc13047f37e22bf1ee5c7b9106bd15
-
SSDEEP
384:GIe6Y/lxnUC1xeQ78GSlZlY/lxWd0sEchjqithbhLuVYWU3YpTjP:GD6UlxnUC1xeQ78GSjlUlxWd05cE2hsZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62DC9A21-0763-11EF-825B-FA5112F1BCBF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420692759" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000000d12efc78b73e3dc0ac80393e7df37bf586fa1c7d8e8f77796d0c408c6ee913000000000e8000000002000020000000200426498f90f06c19eebfbf0769b5fb7366c3799d38d82a283d5d242d64305220000000adadfcad66ea1f9e81916e16c030fb5433d969d8d7e5d0fd6fd831f6b8c4ea8440000000664e43f84084d85cceed76109f8e836e36bfab2dcd6cb4501bd5f02a258a5d3a10c05b99ee683b546580ee5253eb66315f3cb7f2cc70f0c0a99b6d51377c774d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90528037709bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2984 2204 iexplore.exe 28 PID 2204 wrote to memory of 2984 2204 iexplore.exe 28 PID 2204 wrote to memory of 2984 2204 iexplore.exe 28 PID 2204 wrote to memory of 2984 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ae9ae8e5c9c0ae0f5996de7dc53ef4e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e7d3c1120da0cd739f0f86f36e9092a
SHA138da67c0c2ab752605c7aebb6f9f91e6ee31bc96
SHA256a51fb7c71d1340ac921318c42470e35ff2314b84a488ec7cc16d6637c9d95774
SHA5121cba2b01c3c946695693a2bd76593c016698f394ddfa436978042edd2cfa71b0f868ab1b144ab8ed8c1a085937e5a40582c3e762264f800ebb4060807847dcad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553b0760daca5e8c9010fe7c97fb2d0a3
SHA1aaaa81a53666757e1342cf4330d2a53dcc7a8aaf
SHA256ced8327fc40dd480644761cdca3965a2cc202ba870c049fa1c5e1da6dbacc9ca
SHA5121c478375868ae6e5e25c5129c580c0134b750e67989671f5745d4faa066a0777d1a8e9b6260c29bfcc7e860360c26edede70b970f3fcf64e520586f8cf5cf3e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bae8793995240ca19e046e27f0b21ec
SHA16856ba5fe80326f5ba667a92db14dcbc433f72ae
SHA25652c3000739d56b6598a3a572b17e6f593dbd9648366d1f6b018e6f1223c6eebd
SHA512dfbc11b1dfe6e40ec9d4cb186c5406e773bc683d8f55b723137c0721b653bec5a641383d0f33fec5cd925181fcdc01f8513822e9c09026c96591288fd6e3be44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bf97472efc1fe312e9e0e6081fad313
SHA11612fb302c33fd10741ab6493fb98fd23cf237c4
SHA256c5aa7dd0dfe72d06052c0329542cb29e5438b1bdf566fa0264a6ddd28ddeeaae
SHA51247d66a7239f68d105c9322a91d140d8bddc89e20e971e616022dc114557baadce964ffe5a04f048d47962ddceb26cea64801a0e29516c736975ee03c00ea8227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2ba5328b929fefed946817503addc0d
SHA1d76c01ce8cd4f661527387e4f183ae8cf1135634
SHA256d7714e1335beeff3ece2b32aa97de9f15ffaafac6ea99a9f5d2b374b2eef41fb
SHA512cc50744113c96488f1b22962121aa7107213a5218a419c690fea74188e67e4aaad06a238b50ad9ce97cb11176518f01b17914d3f1e540468573b694996b97010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501badd18b608405f1417d895b01dd58e
SHA1da20b02a797bf2a14aa81056c32a38f46d915196
SHA256e28fcc9708ce8de1ee7f97ec848259520db9861d604818917c9f4b11c7243eab
SHA51206c91336147d7cf29825161420ddb9bf75c367c6c89b120c36621f4513deefe78d06548e4f3ec2a5630df9b8c8e690b6d527bb2bea28a0184080793ccaa72007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f1b2e154a2a823fc3f1c706b2bb3c92
SHA14cb9a38e03e5da318cb8ff33a5a3c91db01f1510
SHA256d66a3988c0d6f50d97768f681b0c91124b450ca4dd9169aec5645490e40b1531
SHA512cbc9cc7fce0b9a4bee2819302c8b7110561d72999d26b76b36f1a4e34e0f0b5b3ad2dadeb92d815aa4c8d204eedd72d04fc09ce559f5998efc98207cf277a68d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501d58365441e7c0b0a9b20cd31105dde
SHA1d31115a05ce70382a562a63b42f172a0bce687b2
SHA25647f944279159ef0134649d8ba7564318764baafd08bebbc36613677b19aee352
SHA51235fa9af14452e7c25b493b71d35bf1e997ac9dad2fecef576cf660922bf7070146ffe58f58a181639ddcf9d158f20ab2b6365e7f425c5147192493770533aef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588c1f8895503fa920f56b735f014b01c
SHA1dd6146503b42715eff73984857d9239e23672712
SHA256eccfc385cf999f3074b715974667340c3d93b46a2213de0fbcb8cca37493f392
SHA5122a66fc121c6757a24960f16403ae317ab7d2425519bd312fb2db345239e3a7afc7d8c0d33668cfa36206e35b581e7fab0b9255aae70415c8a6d38004c3f29ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d5b6d8d0ea3c79f48bb498dc321e8f2
SHA1c51aba658021e56b38900d214766f36e9108da1d
SHA2565857c1b2cfa4e73ca9b6e5875be3a13ebe0145d650d7809cc555c28c45c1262c
SHA512a9d3a1f008d00194f53207e0f028bb0e043fdd50961b2386740437b6eb4c2e10cb32f75ac22b541e876a44ed82387f31bc6c20792b366f204ec8f77dc84223cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3a7a3b01e47054b81fa94cdc078f877
SHA19f4c2eff9bc50902f71351d26d52a87f037eb260
SHA256cb12c1e7bf0ae6da6b23d9f8e01fce65b4467b8351e88d8a11736d87fecad1a9
SHA512e3a1732d4fc6b4bc0642f25c93c77fd81df5501048c05865233d5e0b55e9e819666199542c66892add73db07bf3244b17c3c9eb1bc7a400554b39214fdbc701a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593488a51ef7ebd79865067d38c5d92d0
SHA1c9609d4b737945ddead952c49ca28e39e24be403
SHA2562bbb9766ccdac82986d80eae0da23b8e37e686714023e48a6a82ebbc68e136f9
SHA51286755e3535d574e05199e9e87fe1dec22bd96dee5564fbbebb63b0c3d9f7d86d0d607947706a7df79f04f717d726f1dd0384e5d3d5e5ff77778dd89ad9b2ca9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ade1aa54c28babcb645b2640c68368a1
SHA1a851851bbbec78e2579f3c3603b03c963c4fc366
SHA2568e168ef20490766268ea1bce703565d7f5dec21c2ee5a65d1401c9eda4b10c22
SHA51262bb57d528cf740c83f1c70fd3c35ec89befa7de478444a01982986c293f4ec4827518bb6133dee9f765c22712658e18425bcb677776cfe7cf33dae040f1f722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a7d30c060bdf359af7d17341cdc3452
SHA11cc82109138d7302c0eb80df91cc12f4cb4e2572
SHA256b8567eff94dca344c48a09baa43a75389ac3e70517d5d951fbe407168d5dca2b
SHA512e9d47a7c8501782effbba128682b795a8f215d38d2289c4472960256503e3edc1af81139e8ff8571c71ed5e911fb2756dc30e7ca4e5de3360ab62ac2cc1872c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50958c7a3d2f8971f34e4ae6ab3a3c25b
SHA129d49f869a7d040432308c6a5f5190babd8273e9
SHA25634ce2d52ea8d4afd779ededfa49d9a78a3f7313bdaa797f3afdecf9bdf9d530a
SHA5127e052e5675f09ec49b4eed848293a17100d22b4258cc8d47303af9aed7bd1e625dd5e8233c38c9587f7b0d5e1cc19c911492420756acc93d267a72972d226ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b3594d32a9519fb0f6c77dedff1cb1a
SHA1322585f32f6c3e5a138ebc6256fb455f200d0dbc
SHA256727d692c6c1e1be750924c1debde36402ca02af0e5a78897b6801ad2daf07be7
SHA512c95de9826181efedf866a7d03fb7cb261ab39778607b53f74e3933bc60496779d72d9168826af67d271f5f61b2d216799bdb842a9ae8b2fc4e4450ec780684e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d7a902269313fe122e43add635c815f
SHA14535928589f10327ccf769f1da51f2735896e74c
SHA2568906eeb7aeaa004b49f185064672a7de96a5ca3afe7bcd0a2aa305180048e2fe
SHA512f19c1687acbc3a090325586d2d579998b46c7724b479da25d3935417a24c5d9c94018487c7be4b15d3d4417ca88ad55167f38f0686712444a5b6ccfd26a8cc7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56911f0610e9cbb26814972a0283543ec
SHA1bd620c4f87bac3ab6d926c0e386a1cbb6bdf278b
SHA256b709f4981f1927d86dc338bf7590b47f68432676eb178a9a7f27f31b6060bd3d
SHA5123df4d6f0a949e2f5d8d3b5f5f4553024e6e7395b32aaa9473cb87dfd92759c3a54b410d0e114026d926c2f582ad7b1003cdcbbc503bf65300083dcbe99a3b670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5506874092e67d57c1d8d6c0ff00e946b
SHA192ce5135dc8369a02b800b72f4aef0a7456fc9e6
SHA2562cd3ed62415b3650da270fb737a48711e4630bc453dd1899f1f05f9e8d05f335
SHA5129f501bdbd669219b19e086db84fffdf91df77de91315c8aea8d9a7ee2b69d8e8afedbf0365fc5fda7031141a355861d3dc5130ee7871a360efc87656028266e1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a