Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 05:07
Static task
static1
Behavioral task
behavioral1
Sample
0b1ece8a6daa3cee361605b8ace763f7_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0b1ece8a6daa3cee361605b8ace763f7_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0b1ece8a6daa3cee361605b8ace763f7_JaffaCakes118.html
-
Size
2KB
-
MD5
0b1ece8a6daa3cee361605b8ace763f7
-
SHA1
17f1b43e1c49a23130aadbb8c9119c41532ddd08
-
SHA256
d50d1bac510d36f07305ed6badf35dfa2f266cc5084d63b574d987afb9f4f8a1
-
SHA512
0e86b1de5dc75fce1ea5ee7305f64df5c0212970ce36134db2c3815af27038aa711a819e980c58f782c7a5691c92ba0572be559dd2bd6479fdc9ce39387313fd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000077420f4933cfcd29b9295d4da5169e221fffe19ead2a7c72e8918f395db6b118000000000e8000000002000020000000d3005cfdcd4941b7624112849806191e14fb0ae10dc05d65631bb39177c7a730200000003afbb31fc757e0abedaa51505461b26c0c8cf576764b3783e5b153e1a62969984000000044ccccdf6a31ef4cddcebe322b6a162ed52c190d5a3498f81fe31aee838914e722139a1463ab39583d2d6af2919dde3ff63df97e02916d48d1edc850d80870f3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000027d601bf12e8c87387021cbca24590c93c770360698aeff723e7f3ca250aef83000000000e8000000002000020000000fed074b2a1da7e94265afe68b2b2c7137f2c3df62bc122e579a3ef1c2fbcd99390000000917dfe5a45212a7bd03e946dae1ec30fb266b242992df1497d5733ba4ff650a3f1f17182a8e9528172ccbf3d40acf3119c73a5b11bd4827d0ae08055ff336e716c82ba9e0267b286ccde8ef4faaea7475bad261778f2540630492867591262ba481651db27c090aa7d11453061bff273cc967c5178f5de424b1bdc734a723a176e4f0cc9500bf0f9e5b4f4ce2155592640000000fd447659dbb86809cd657a96d3d44b27cffef265544fe7facf56e6a62a3b4eaab08b03a74a09326ed76b7af5ad446206cf768731ae2afbe4da2e668fc3ea21f0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420701944" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a2779d859bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C61BFE41-0778-11EF-9907-E698D2733004} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2916 1724 iexplore.exe 28 PID 1724 wrote to memory of 2916 1724 iexplore.exe 28 PID 1724 wrote to memory of 2916 1724 iexplore.exe 28 PID 1724 wrote to memory of 2916 1724 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b1ece8a6daa3cee361605b8ace763f7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5acb871b28303a81a73c2584fb4d788f3
SHA12cab12b4f2071ffdeafc4d98761bee761485a913
SHA256b12664e9f85fdcde2516fa74ba9a4ebe9ab57f584fb93aa94acb441c71a38926
SHA5126beb624cb805431afe41606faef6e652c6184227f692aae80a5e2af67853913c46072652e90da4c3ee46cac289c0e36926d5c9d864dc9773d4ac5c157b99657d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD583f9962560760f17008fd7c094f993b4
SHA18331ebf5172f6efc9e900305c1df0810886c2dac
SHA2565209cef40acbc4b8b0df1b6ca3003d5934796bc217b7e8c75f2e1c9ad60c04ba
SHA512e0192a012857facad6b5c130afac2c099bf287fedcdfea5dfd472c743188eaaa1d5d8e498c8f4f8c4053b3d842c7f9ced4d8e4fa4da6c1c25fa34cb7dff1dff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50896cad3d6b6596e6ac4936656911ef6
SHA1bb4ae9606be01a99ae03be1d5e46947286009f66
SHA256a13d3b2136914c8288c4677e6b8cf3a80f97e82c280efe8f77e1b4c38b5c8cf5
SHA512b52baa05caa2ea2f1e15a86cb7d523a60f515678b1dc09e42d72d7c4b08d977f2de89b6d7a879672e40c40f9280cfa242ba165238a9a0f54b0b27be0b5d6971f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59bcd420710e8ad29854e82a502354f43
SHA16045bc703e330f3f50a841736e4988ab80626def
SHA256aa1c00ad99841b1e91c8aaf4c161bc45c7c4709fd69ece2f91b13290c95db49a
SHA512b972d9927bd57b5262ce33b0d361dd85d939e43bc47a9b7fcbbf226d26b4e32c774aca02695efa296d54fc99272311a202ca3db9f4d862974b37736ac58731fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57ffc2233fffcfbe4abc620f95c0dacee
SHA1f4c42a0e9712be26d05e7e4a629667ef751e3a9f
SHA256d880dc78b4ea47a8e75ba149aaae2d6929b77bb73cb96281dd3d31de9928f82d
SHA5122ba5ed2510f591e9e2502f4648d4b8096a336d3f52071d10d310af3fc8b0b22e627ed1710dd55d215d9152cfdf006a7318a164157db0850277fcb2493d75ab89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56f3b7e6150b8b5f0e6ece4a46c241ba3
SHA10d1a6dceb1fecd80146aa79fa83ca9f97390e4f6
SHA2569589720571924ddc14925c51cf8e92dfb482325b6b7d6bf671eb47941abcbe37
SHA51255f82fcde79a04d8dfc640d5eb6ac84c61588f429af2eb3579f7b24927793612ab8150ca0dc1016da98b7fda893e51bbe4813981392e8af3714f397bb38daa9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d7ca12fec477de95308c2c068aa11b18
SHA1d4f3452ba9021c8d94fa50a176d6458732e524b8
SHA256d1f22c74220073a6e26e242d022737db6db1501b27fad56f5c8a2c247e9dc7e3
SHA51263c53eba164800906b032e461ac3df91a3507fcf7c1ecd0021dbafc8b6c3cd1b869b8066a160024902522d306362d813effc5aa8247ae1117a61722b9e5d9054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d078dad20954a192736800097bdc1ddf
SHA16f90e28979e065ec8a7a0e8a7d19c1a750bd236f
SHA256c72b768aa779ff0b1c3b803f0b7517d5d9a22fb5d220f6cf4c2cb168b2a3923b
SHA512f37b03e73b75d0bbbaa66e93ed3c182de7d42e1c1ed18ff46759055270dc284e7b6427be4a08e77fc6b96570106ac1c9a9b9c31820f7db684624369b5de98fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5be5f6d322049235a98feca0fa4466cd7
SHA1a5682bf3ed8f1aee504392cbac78bebe6f5da057
SHA25666bb052074db282eb7bc87570fe3e56fed46f0c5118dd12eb663087fec463ce4
SHA51258be67a531aff4f212f5ac8b7398ff9283eabbf1e521a5ef94f4755a16841f6b6fb987d4c19fc2ecb8512da899b0129f8878b646884bb5c5a2c2a26b1b90a58f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53e21b27214f4612211d59025015e7e4d
SHA1e96f936ff5c4c750157d6d5854264fef80a82a50
SHA256526cc9ec3f77c6e374c5de57f7fa4b16ac08699d89e872f78f5d764f2c677786
SHA5128940a9ade9894e1b091d52571db8449767a59b43b3605c9d6adb3d6f714c2205611993d5ed150aaf2acbf08a9109c457e8b9c07da2efde80172abc32fae347a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a9521eca156625e1f25e54f7919e4140
SHA197d63de694e5ad09479fcd9247132977e9d08e9e
SHA2568c0fa4c22571f994cb6a6a7b52177cbbbe8dfdbbdb99c177f33cc51e742ded5f
SHA5126fde63a389dc338c1183930f5bc3e9163d4ee685413aa5ca18313685a33b8b51244cf2ba3a9951b71f970b5d4b47886de1e7244cb4ffd5a91b5625348fe04a5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD504ff0ceaed047bef20ac2b33e4926466
SHA18ad17762d055954c5772cc1950b7e75da31a25a7
SHA25627c42e8f08e83073178f7a1bea3e4bb610bf3e00d019f57d5fff52141775efd2
SHA512abdc9e61a4811ddc3c52bc6fa09039825d8fea24904275ec55b9ca3a3aba160475ddd7de471438baf5ec58d8616cd1e083271294fcbd1784b0e1dae52c3af7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c0ae9e5e3045c995e7aceacd7b39d5d8
SHA10a1fcd2f0494d338446df1810543c6a510c10cd6
SHA2566c75a76065129afd38973b5da57a769bf9acf2c03b14552559092a86e03acf17
SHA512aef52e1cce093e8c93a64e2016ac88ffb916524760c16679e33794a89daeb8b0f198f86030aa33b64a8194b156574b89659eca88b80ac8cbe0fd4230e389a4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c2c4690ba1b94999bda7502d82eab554
SHA11796b2ea24efc66d3fca344aea521a57c75df2e2
SHA256870b48bbb210ada24ede44aa6b590f0f0c451ac60de90b24d6a47819063bc484
SHA512e99a270558ed477bb0d36a4f17bbdd8db11482688672c0b85263f5cdd9f2e1d4a0b92ebf3a731f68e97679e72ef1ae02dc9365fd3c54f6bbc2717692166f368d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bf5436ed5104be1866b2be2e7f85bebf
SHA1ae835cda1746db53d9ab7491fc279f3e8d2ba0c0
SHA25625e0dfa6ae75ecb09cadb418219ed5de86930496782b6def711fc2f27e1da86f
SHA512668c81f9c20018ddd5ad1531eab16cbe2fee697578ec0efaf48831d0ae0818b25fb0caf1254689eaeab32e1b6eceff7f7854c5619ecd8f390746e317c30559be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD578b6795469693d328e54dc4d8249a4b3
SHA155827b25e2159cdd455dfd3695b9dc9b10eb7d54
SHA256e2df52db938ac4fe3e5c974271443b61789dae89cc68bbd9b769e6c01f11b78d
SHA512e30c345cb91b4c475432e49b108419becf24875a21e3df53eaeef45112ef42c1d13cda5f0a5069f09df58188b5940d95162f0bbd7f822be1a500403f28723b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD592c1b402a74be9ca2bc78756d43cc071
SHA1a65d6dd1afd93fa10897ab499e49d0006414329a
SHA2567196a60ea6e64a415cb4ae6bb08a7b25cc1328c357132571428fcad197e1fb71
SHA512ed3d5433a4b9e2260894c799c2a5cda6840d08e9df38bfee0ccf34433a5ea59f5269754bacef20eba3ae7cd019a505eb417c2cd2c2b373f32a3b4bdf6914b4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD529b41c4ebe5c0c7d49d2f625d3ce72a4
SHA11b1bd0576bd1d8272edc5b5ec0a81c311063ac80
SHA256917157ce53faa727355974d9994495e09f3b5bee1ce162ac18b2ee76a9e7bcc2
SHA51206cefeb5dfd8947f09c867d0320e08b57273564d5d3ff0a40c8bd3532be24181f108e53c9ca126dab3e6a4a47dbc6c5c6c333c1081a73708146188f1f166b626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ab67a085aab9ebebf277aa64db17bdc6
SHA1f2f5da158168d63065ab3579360b99a96834bce1
SHA256ae3b740726af96d5ff4f89a1779088f7be05d8989aeb8badd3497b62fcf452d7
SHA512ef7ee379f41b7a0d394bed2a5e5d6ce53f9cf39b1342faa601666819ab52c7555d338aeda03313227ffd91d9460d3bee007e77f3a440c6aaece34ce025e774e0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a