Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
0b5888cae2c4d59c8080700576819924_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b5888cae2c4d59c8080700576819924_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0b5888cae2c4d59c8080700576819924_JaffaCakes118.html
-
Size
6KB
-
MD5
0b5888cae2c4d59c8080700576819924
-
SHA1
97edc8d57778d345613ba09ea21f65e666aa3346
-
SHA256
14444845d7a949ca7573127e9a8642adc0b985bf0b5b37df1ad8cdd2e9e516cf
-
SHA512
3d8bfdda08299f1796800ce9a1ce88ad3d17dea0898bdb43987adcab9f6eb1e20d696785f4afaa498b0e94bfece1e87e939cac4442f0181afee8f27aa88e6e58
-
SSDEEP
96:r1w+ZPmhhpGiAgEP/qgM51gJQDCAWdPtXChAANWUtEr+1b5M05Bm3/hIB35y:rvJ8Mc6y1b5M0fM5iy
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000b96dac92bd3b972be525d8509fb585f18c33cb962d9b6e46c8c52524d666e5bb000000000e8000000002000020000000b4842fd9273e39606d22252945a0bed6ba8fbf783e1223f5191d5ebb41e0af22200000003cc7183eed20eec80e90095940da1b1eb608f672f8cf1483f6d841bb0ddbf3d0400000004110e27f0df8f84290500b9b31b7ee7da97d81d333836bf573db1e81901265e168f51c69c3143ef31f7e59a0f0742037541db28af5fd24d496a6a5e74d09d393 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c4e0f1969bda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000023d46336cf1ff39d5d3c606b4d49be2295473ae309928092f09ec24bd5f664ad000000000e8000000002000020000000a6b14ecd484c6bdacfb69773642daf25c941cf68193a1f2405f74d90b4c044bf9000000037e9a944eed6cec91384433accb82d37aaa20dedf9123bc93c5965e0ebb7d7ba17e5c8aff32b007b4a833a6acedfdd7e75fb1f0bdd80cab470a87fe7e2b19413a8dcc46b81c9f788c3b8ea7951b8e2cdca9423c2005d48258d3840c03e73d1cbb51c4a6063a4f161111958a7e6b4f92018a0078d9a8321a070a0200b186ab38cb2706dbdc24d3c2049ba6a118b7c2fa540000000865bc7c51452f1d070d6b7b17abde53518341585a86c7cb4f229952793f4fbb7c8a626ec8a343886cff387bf85cfb8d4ca6c64346dd955b0c015c24311e45d9c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420709385" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19402451-078A-11EF-92E0-EA483E0BCDAF} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2432 1724 iexplore.exe 28 PID 1724 wrote to memory of 2432 1724 iexplore.exe 28 PID 1724 wrote to memory of 2432 1724 iexplore.exe 28 PID 1724 wrote to memory of 2432 1724 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b5888cae2c4d59c8080700576819924_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efb218aefa13fe70fcf8826be0bd3142
SHA19cfe4ca6c238175c92837ebc5a92dfd697b4a1f9
SHA256e9aa98d6c46ba73616e12d579d6316b1674e105c1ff1882d2532d7b24db73371
SHA512b66d649a48df099a98640de3cd6de11319bfc7f5962ffc8391a128e931d51f1f4596d1485d4f2e2d5e692745150e6db059b8176612cbe309b19db7cba5095c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57418d89823cd7d807a280852a8f975bc
SHA19f1e762b4a4f4acc27ef7f18c6093b280257c522
SHA2568e974597fcb272889215a50e41070569062a6afd0f73784c7bcd0ce2519004ec
SHA5126b85c9de7d59b85aaa3d9c545b9265c58724a6134a4681a5bf69b4666a774da732357599fcf623ec0250bb3488542a3bf22f1986837f4e2bc25e8c10ed7d751e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ef51be04dba2e858943183638d7e018
SHA1902d3afb12d471bdb8fcebd370307135a24aa632
SHA2562e54411cdb7092c01620e387bbd745c7601c6c864b5e002fa9a014faa1e2230c
SHA51275b23efd55a10ccdfca8a3d921e36569f1af536b2f690db1693ffaa450eaded4c876dce8d7e81cd0a46306b6441ee61dcfb6a1f4c91a023a6cfdc3182f39863e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537836a59f6496f18673798b9f34539c0
SHA198dc4fbf1193d0d33c89248d2ff9077821599d40
SHA25638b9644ee925c602f90216efdad730876e4e13cb3b77824a76948393e0c6deff
SHA51287a6cb6957bb34a694199f25ae039588cb0d74161402cbb644550f01e87db6b0efc87a2f902c561537395d75fecd91f239fa51e3cdd374c67334e51ea4e9bb2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504a459f22dc4fee2f5c9852f65dbcf9e
SHA17d26457ba8c6f6e6120349b7c59e22d5640b85dc
SHA256740ebd3b4d244b9f655af6ca948b48684369e08bcdc2b01868b86e4b82df1bb8
SHA51251155a88757b6c825a22c6358bfbebaed5a8b091282e82e361fbce8c96a91213519bb7138e0ab59d1250ba4e062ed53e472d3f14c7e9f369dd11a18e347a43e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9bb9d3ce700f7c6ad0f572d6a2248d6
SHA19ced3f9395ca04614180c0601f0be1108b63b4d6
SHA25630580cf5382ae91cf45943616fb0634c055d44cddaf0ea23a8420bb523ee807b
SHA5129152d2628f34b044ff4686d5aeee3fa12f003f04282a1cbd01253655c33927900d3453b1da710f144d89505ab838acaeb8308e0b07edc9e426734fb81e42b04a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f219c923aea0db0095ce485d731aec0e
SHA1b738027180d6dc9262fab55595160f90f7caefa2
SHA25646d930977d3a3e757a00ccf9c934c8ff76427d5c3ccb62788ecdb59d8970b54f
SHA51226afb8393c2d84970266edb952b2005c268cb690c056d59863ea3941521f55416df12c27cb88aa1bc98e7b4d86d6e1f9ea14b0fb63fc3af0751576064849c615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cf17a26edc2fb2c9d1d026b09a8a061
SHA1d55f4e7d417bd4e80936391130ce0b9de88ac5b2
SHA256f9108b3589aa5b3bfeb040081a79fae35c963e72939e7d798c37f6c512390424
SHA512b135e93755afb4d49b2b91feab853ec293d6b9514b3c19b14655a757f95a0e2baed61081e5124a381df23e95043465a9587a780585989d777e20e25fc3aafadc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a07fe593241134668394e9c1f281090
SHA114ca142b528753a7ee3cdc4aa4d07e03ce137a51
SHA256529aa2b598737627fe5195295aecef6641f6dab4e931257acaeb0b0f137a9d36
SHA512017103114fac1a84826f9bef90f8ee8f21a6bd4ac6e52fe71706703ef30fd0d951982f63d7762ab25159795d2adbdff2247b3ec4542143ab6823715a57e5889a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e35cd6c54844255ee4adc149c9c0c514
SHA1946e605e5ac0819adc3f11581155a357ff6a3939
SHA2561fe5c881677baf6c69f9eb956e013e907463b5e09fc8e55bcc43732eb9abb47b
SHA512591f28f87efe867fb55861273fd2a282932ac1ecbc2527e2ff790fd1d8aed07130db3bc1226c60c80876cb8e775a1d2c571075d6f6504ae81cd336bc3af898aa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a