Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 07:28
Static task
static1
Behavioral task
behavioral1
Sample
0b5eb4971ad841866f8f1e1d4f7c303e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b5eb4971ad841866f8f1e1d4f7c303e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0b5eb4971ad841866f8f1e1d4f7c303e_JaffaCakes118.html
-
Size
76KB
-
MD5
0b5eb4971ad841866f8f1e1d4f7c303e
-
SHA1
9b6e649bb6b934a4abd2074e417644753bfe7370
-
SHA256
f5c0ad16c9fa1278b173f7960fbcfc1e9a40069eff5e96af3a1c8ac3c894190c
-
SHA512
073d668b95f46f796ff19bb559b1ceed467b0e61f833cc26b64be365c0821716dd114b5ae1f8a7e7dee42f0df1b1554544e3004d57da8c4229da19e308026e98
-
SSDEEP
384:mF+JMwWmpmYCqJI9r0zcgUAv6eAhMUi6cTxFODNIq48z:mF+vWmpmYCq00+WFOJIq48z
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60DA0721-078C-11EF-A7EB-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420710367" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2620 2300 iexplore.exe 28 PID 2300 wrote to memory of 2620 2300 iexplore.exe 28 PID 2300 wrote to memory of 2620 2300 iexplore.exe 28 PID 2300 wrote to memory of 2620 2300 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b5eb4971ad841866f8f1e1d4f7c303e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD582da1cbb30fc5388e4263b83bebb070c
SHA16bf0e34cdd2051d80c46a7751f5d24b31257ccfc
SHA256d2401d1b1268d98c261d062fee2ad32d0b4e83f505d2dace7ce044d892c79af8
SHA51272c284a694610bbc26be4836e09453a4c2ac8773fdd297951c29d020e287feb1ed3ea1804772dae60ee584336d041dad6d4fe70cd54d7d637e00b2ff2ff05553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5fc22582adae23f12812563c2c60e6a41
SHA1da0c7ca422a498025658367e7694dc1dc12f6c4b
SHA256c5769b14d64deff833de212b2f7c40d0eaf617a5341d6512beed1298e451c647
SHA5126532d5d8e337300f02ac15c5ca28a81d7633065cd64fdb15ff1890fa69a3c6fee50a5c72c736e7d92727335757a65a7c5b387546fbe63640028a06ed466487d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dc8e1b43819d6d771a3dd711cf490f6
SHA19e81cb1778b311344ef7aa74c39d3819a9f35829
SHA25662179e67313dc93276c18105637a453fdca43c661373acc83e77814a785fb840
SHA512b41848a1ba2a24c484c079a30d7273bf814e6cfdc7656ed78d13ba860b84ba4268c2cef0ad21c41ad90188dd4196b283bc672a5cf769543e45f33fd6df7390ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2a2cee8617892871ee37771dfd0cfc0
SHA1a0410402788d13080c12d6c5f4e03deddae22c96
SHA2563508d7ac7c300e71553bf4f07b1d0760eafa4a9ed3976621a64cea8a54f8f7f1
SHA512d4f69d6d9752c6cbab99ab3eacaa64e36f4632d384f3b991f6431cab674f6c1acb645fecb259a71ef152f741828c9ba95784b4f40c4cc4e444fcc35eef46c47c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eda978305ad38ded4c414fd7d6e45a9
SHA1767b55f3a46faed270a9741f95eb2a1c5288f07e
SHA2564fec5251f07bebd0fc4fe24f185c28b175c4f1f02f8296a133f3865e4565562f
SHA512276180bf9fda31270068b31435fc92b1628c29b1c113c3a5b9eadc2078342036bad796313b2c1b033ce987515d6e605196b7062909d7ef12decbf3bfe694105c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531391533ded208f9ccc069aa9241e600
SHA1669dcee7af1cd93faedac6c9e245a3b8140b853c
SHA256468768f381e6220f2a41b3cdb80f4662df2f33662829d9e8cd351b89ba310009
SHA51210424f37d1a23cb7c3b7c1649dd8056dcf0d2093a995a487b126e0fe8648b1f8681e24f6f85167ce775d3e6b4d49b23c344f36683b24aac98c823bb1b4e391f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537ba6032ce1302d33f341d7d3dc1103c
SHA195a651b4414a84e53c4497e0f7c9aca69b4fc8e8
SHA256c018556ab01ac1ac968feb58489a5d17959634996da4df03a0a286d228355977
SHA51231718291691054dac261457c7412a6b046495e549ba2d622b0348da71ab1d25fd431ba40f32de88caa2a0e8fd73a0e9edd2f388ed1cebbc56553b2ce5b200136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5412c608fd040e6c69436ec1bdb8f6ee5
SHA1b65bc0029b899a4ca12afab26b03fe86eeb9078e
SHA25648768ed76c7530ec1ca6548f2f7d0e390c39aa79ca68610194968e7a04f36cd5
SHA5122b0aa6af4998959b54f07c8863f0d2489e22bee97774f88a02397615b80704e420cfd6b66ff75a6b8959d2a99da207bcc1b0a9cf3f79f9a5f891cfb47bbbfa9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e22096cdd2eccf3e5baabf7627b87b98
SHA1cdda775f8e97ff34c159b9080228a34d59d23f2b
SHA2565348e8a1baefc7e95ec68595edf284ea9ae2bd7b8047e2a65f7630c5bdcd59e9
SHA5125515ebe8f53073a3434497b48859b8152f8b91ab45c93686753da0948907cd388deb1e3096911bbda88d7b3ba3847fbf44159a062fd1f144d94f88fa588508f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b0b98de709ca87cd6641d2445238ace
SHA1d12961ce4618902f7eb7e3fafa3d76a951ba4719
SHA25698793e9663ff78aa1adf8fc9a49153413c569931bdd3f4a31ea72307a1615e33
SHA51232bda66415150992572b51df30b4da1c64b7ad17baa7fe36b2f591a58a0f75e3193c5bb03838586b4e7ed6ec9cdb0a04de1d31f7a346dfdeabeb956af32fc2cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f57efe5644eb42bdf8173da8ae523ab
SHA1e59b19f713e807f7daf0af9280a2fecb8c3cb9c8
SHA2565cabd9fc322a23f5a03aa8ce373f4b3a00c166c1707e78b212a269fd882187d6
SHA512bf16ef2d909bb4841a572561ca780232a6c0ae8835060e632e9833a1ea11e3bb8083802ee86a9b5c277f3893dfbf559938a45ccb4b1657413c17abf993182060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591a7feb59fd4d5909faea4485b94b7c1
SHA1a0a403a2ee368d0e1c83680e7468dff5e3fccab9
SHA256beafd83439edaf3f93bf76b3ec79bbb96125b22f02f2a1d238086784f4a4c3cd
SHA512075da8aaa0fd0919beba8fa177e2cead44e0f898012352d448f1be3818ef0d9497781f42017abc0c2f0482925512aaf46ddb361dd922d1070cd35f3e1e43ac27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513934ccb7d438581bb50a5fa8ab05288
SHA108f271137216eb01e7ec061fcad8bd2ea572c6c0
SHA256155da154df9108a03fd7e71206dd5f2a0e48ae99dc97d7a5062a6f7080de8c7a
SHA5120e1e564b42032a54189a0e117e84a071794076c73095ac0580de118fc8d82bc61fed359fba8a1c3eee7d6559f8376dc92061117b48cfe05c0309cab68b13ea99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521e46f635496d379d91e680d8ebc0791
SHA1d1e187d5f3d3c18bac6790b2f9cd48ef35a759aa
SHA2561d8709f66482e695fb9cdce9fe8aab12953a77f8f33cc380d9e9399c1b0f41e6
SHA5127d371373f0352c99caa1bd52fdb8f11396d0ab2167fbea461e059a9353abc356385fb37c6f894917e55061275ba4acaa0580abb7787395bb3c22830b4241ce8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ec0e6ef88e0a1f384ae5b43b52cea27
SHA12b5f040b6c871fae93ad8e4fe74315f43604ab41
SHA25647702ae253a9c5efad6d4cad085a602f44420f89f613ed8465533b9aab045731
SHA512a2355096bc99dcbcbdc96d39f50d3416220611e675f9edfd647e597062a39d4f17ebb5edf4c5164fa042c59a5111fd0c271c50c8c4470eae4e24dc80f79c85b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc7ae1d1a028e48dc57a2636a3978fd1
SHA1df8eab4a677ccdfe14a17133aaeaaa55e00f8227
SHA2563efd33a2e2c2e453b79b3ffcf0dbebe5f40f5a33bffb2bc0311076b696d4e4e3
SHA512544d60bab5898e2aa7aa96b934f0c2cc7de30231d4f54d60e317cae530abf847534581cfb8e44c272e64abbe81ba6cf92fe8b537ec98eec9052f29814792b283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da1fd0a907d0dca6e106907c0ca900ab
SHA12ae7be5db1b5d606a27406ca22374261eb01b900
SHA256f5458ab5dfff461144c79a871f88ba1dc43bccd9d001f4eecfa1b323aa0bb80d
SHA512209e1f3d797c5599b78b5e569b854b0b100796930524d6963bfdef35cdb15d3dc6a72ee0e42578147fadf10d0aff19c147b93e4b48d49c1017b8b58afc6ee6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589830f97017e406f6c7bcbd8703ede07
SHA150b850373585ec3d143dd116743ff17695c6ee3c
SHA2565b9d7f7682b5d51df545bbd3eaed0638e6f5b23aa44fddba159e2bc4299ab05b
SHA5124ddffef64c79c8d953f3658c35bb6b2a573304e33c8d067eca1bf73e072e75d5509849a99faf999ecfde8cbb718adc112d5d3f755ba858390c871230478ee500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d0bd6b8ca464204f7acf55d1d7ee1229
SHA17f8e53f57f7851369731f2db3370ab21ce45d0fa
SHA256ae0620bffba7729a38079bfe019563b4d19c010d5ee0407a6f12e0cc5df96ef5
SHA5121a966d39aa51a7a9a7992fa54486c77b7fa5f1db10c7edbc8585c744b9f9ca1a81d0321add2aff671d95ea1bd3f671ec9203fd15a27d2ebc58db749b6f6957eb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a