Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
0b1bd7893b182b97f6842cfc01a4b554_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0b1bd7893b182b97f6842cfc01a4b554_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0b1bd7893b182b97f6842cfc01a4b554_JaffaCakes118.html
-
Size
139KB
-
MD5
0b1bd7893b182b97f6842cfc01a4b554
-
SHA1
b523ca6c36eb639bf314c9e304aa0736911bd513
-
SHA256
d1439de17590c646f6e1643574dbe333d5372288e6b72d772a8c407616a93c9d
-
SHA512
fba8389f97b1272412b0ebf3b3ecc3ab145a8260f8a9e00f67373d8de39b72be8d8d0fc116b808ab04b1d8592b7fd30cf6044a0e1780f77997c3db0e20c2d482
-
SSDEEP
1536:SMEvsgSCbUqMIXNptUBJl5TwVyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1Ul:SMExUB+yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000af6e48381b26364807aecda1337eba0d2931683f3ee8f06af324bfaa7af93230000000000e8000000002000020000000ea7be1089832687c5d6395d2c0452f3a734de5ed3bbeb8c06791bef8ab4ed69d90000000dce24ea69c3639a52764b0ab09f125da58912d0c8e5cfcff1b03ba1358d4b57640c74fffbba1dafba7693e0c3cc652ad583b9724f66c5fbcf4f510844da40a46ab6c12e65f370c07ac2c8693955bad8ab04031e27b90d646988cfa75f1ab3d762f1398030f5c272e2cfb41da46444a0198d6b8d92fc9fcebed8d44d0bb6b1cc68145cb3a1079bae7267b88a24de276f040000000caa64d254aec4ef422e179aaba551ed5cac8f233a30537e1b81e5d2dbfbbd088d2e56a9390960c523ed060a2fd95cb3e0d4d1fe2bd3de6dc1a33ac9fc7386ff6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420701550" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DAA93681-0777-11EF-8554-DE288D05BF47} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800131f1849bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000e5caa9d29ede0424f88852fd1d9d8b7bc7741eae622cf3a24b2b59c8a1c65e14000000000e800000000200002000000053a7f60e9fd85e6ec5045858701620a8c66b042e38be76482298176c5e57201420000000ae8a641e3a92b05b3693a56c28e3f112fa089768018d7240d394815e9b2f8044400000002fa29fa0655abc10ba1ca1b80727fe3782f2f23628b7ffba6afcf9ed07881c9c08f86d75168315c48a99163d63fa5969af768da5b183ea6916d5e733a4f30df8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1684 iexplore.exe 1684 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2804 1684 iexplore.exe 28 PID 1684 wrote to memory of 2804 1684 iexplore.exe 28 PID 1684 wrote to memory of 2804 1684 iexplore.exe 28 PID 1684 wrote to memory of 2804 1684 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b1bd7893b182b97f6842cfc01a4b554_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5295e88d24d74b576594c722e77748699
SHA1aa147d32822c13e3cb109235c2224c48fa863250
SHA2566c52f4d7aa29128d0eacad3da4cfc837148ec055328e951ab3c87e9a8272b871
SHA512c489cacc1042935889152238857f4e235199aff479a1347e3fa03efd1c2665de94ca98fa06270a22c93671c287cf0c44d2883a30a13640eb5eff5cc7df307556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57be72770de59779e5e09570d85b8883c
SHA1e537ecd27e885245df21412bc1dbae510310443b
SHA256b1ce1824d8c1220f688ac260f7a28a2b9814e4ce1d3d97011daa8dbce6a99e98
SHA51230e249981fb6656a1a57ffcac760f8be904ae92b7b3db23a76f6d40c667414cdbbc347f1f40e141c1c85d4948903b9bb07eabf987e6afb0bdd82fdb7237df2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56427fb8e868ac03afccb70444fa62eb3
SHA14e54bab6cda59ba72dd154e32a2e7a1dd42eddfb
SHA25672892827c889ed343496708366aa188ad3e02a9448fb9a831a7176ad05b7c03a
SHA512b269811d9d67ba88d29281c7156b3b453f7d5180384f959b3660d1808907007867f3d770e42dc74b015a9279394e4abf1407ecd7ab6bc468e1cec69a61886879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c6ef3e24bb065c5cf69b8a0be60822a
SHA1a50c050958af6c81bb72b05dc45b5625773a00ea
SHA2568463106c2e78c43d0fcf910495356712f28d38d42f299e33373ab675b9d80b57
SHA51274b73c93ad0663d7e630863b1fc89ff3de539a3119a10583180d522ad68b7c945dbfeaee4fba97181ba34447b17263586522f344719eacd8a0b6b84e9ba6e2cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536f2112fe41ca5236b2a28591e3801c2
SHA155666eed651de3ca6e20d459269409d8c76f1d0c
SHA256c1f8706f4fa213e86ad47c597fbb4bc107105c2271205d69a032385f0e69dd2c
SHA51255473c0c0dae3ab37eaeb378a450658652a3c70ca5b756e6be9bf367dc5ba81771d92f95f2258905b5f7241b48d48c8ddb7e54713640e2541af9ad7d28180823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51af201c0fae35c5721d9fbc75411b518
SHA1d7836b5bab6ce12c259f737af60ca81cfb55a7ee
SHA25603fcda54d8f1f7f0131d48b755a7c87e0ffaa7976852c98db4ec1969dac821a3
SHA51204300eb436ebd9003272a05ee0168124b225077c56c41b6bbff2d10ea3f16ff70dc343db422cb638fcfd56e8d34fc87928ab6c19e91857d4e46684cc71883ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed3e5b19adfa7cf6cea1f1bf48abd04f
SHA1a25251f0af4949c9f8d44be597aaaf5987a4a559
SHA256f8791bbd8d9580e82f1a2a437eff3bf3af061be387b271b4db4e39da5d0a9b09
SHA512dacb5e064627f1f10a50001e11dc7e867e77b5768d6dc9a87466603cb6817177194060b7a402f1d3f03001095dd44bbe6517dab06a8f3f348636a3bf3a79d303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5894ed6a0ff42885fa30806d0dd643ecf
SHA137421e24db87e6144637e735a0c35307710777c7
SHA2567d33302b540325ad12e2be131e78ded00b418c05c337b2c028c9223398c88861
SHA512d2dc2147c0998f812721d19b5dd50be2f20b134768429f27deff3ab12f4e4c371de743eb6f99daf815da2c42c1c2c75ae25ce020ef57a8e6d6c0e3e6a87260f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6ebcafe2b2250cedab20a71c527b814
SHA1fe88d7e95b67fb6ff4fc489d59859bf3700c5a32
SHA2568534e48b5df01883cb58d72705385fe0545af85f2695632527e9c8a7519f50e8
SHA5123cdfe805493fefe4056aa85643059cd76cc3a307ffbde1d0f0d7e5ec404eeb421c18e9fa531f0679afe445090075d843c34fef97c4045b2bfbb0745a9c65806d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e618f4462e1c20d8e19279e24744920
SHA10dd93dc8dd9f011ac19c3256ee1bb0a7918f22d7
SHA256ad7b16ba13d7b71fe07aee7a77afa4df0efc8f695f979aaf9e64475db2cad76a
SHA512ae88cf59c54551db9fe201518f238961d24c29235627d24e3fb5a666aa40f86b73779a96b0049185ec3ae1f7b43d7ac8d40b070dc7b8d85ce66243b83460fc23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59986fdcbbfe63a29644e199da9bd116b
SHA157703444e99b19710357ea8cee93830650dade6a
SHA256a1c696e4c9f13fd47cd51686a9ea818e86b4657632dcd23bb24ff4bb4fe178c6
SHA512b1d3f64552761f2a0834fc0490dcde530f5ced5d01741fe99bad3a466c4dbb5e5ca57af07b47e938153b80e401f9509c3af5381ae9067a5ef7fd936b4bbad99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5befa1c8983b3c723c06027349165b39b
SHA169b4ce1e4631629fd943224bb95bd2ae2db716a8
SHA25609545112ea13db8738f64ce7fef35313edd3a01d4ee16c65057ca5d4e558f4e6
SHA51292c7801796494cc397d060c6a883e437c11214b71b869e2be86e4fbf5fcac978a8498b957531494de91e568122239b8d24733f353e43de0f24f17c6e9caf355e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b2316a9f8246a11cd29c23112ef0c2a
SHA166273d0e1f6b56e4f0924067f5cf5d9fd920b3c5
SHA256235cdce8be01d515e7faf40662044dc2d2a7de4e7484477ae01d4c13c2987379
SHA512b4b2c4f8a241c40e24ea8c27f07900986cb77061b24dbe17cb77e82a7b4a956a8ac13cf685cab137558d493f2c868b275a57e036807a6d2c07666aa91735445c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e20e93c5fc04ccde3e0bfe5f3dab5ad
SHA137c86a66f5729e313e0791ac0ca10efdf3841f61
SHA256e1c12ea39532e1d35fb0abfe9436ca333add15313224695082693f8d9e879cae
SHA512b9a849204b1445664bcd5842f5c29a229c27cff6be1ef480f119ed2005e7a0814b7448d640b8d287f2ff3330bf04022510d65f277a4459e054b19ae84b6f3e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528762e091e2db12df620f65856df6759
SHA13e761d08697974441dec1cd45104545e59ca4bc9
SHA256782db942fbf9877ad71607bcc127494ac6901ce3e3bc7593a66da77000cfad33
SHA512f59a94034e138c4f9697a8648b038411a0697918fcc0927655fa7a70219bcab15c04b0e76481ceb543985bf07a9da223546718d09f6ce56cdf97b3fa86739f5c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\jquery.min[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a