Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
0b9fd49d76f6388c5aedad89d7903e66_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0b9fd49d76f6388c5aedad89d7903e66_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0b9fd49d76f6388c5aedad89d7903e66_JaffaCakes118.html
-
Size
875B
-
MD5
0b9fd49d76f6388c5aedad89d7903e66
-
SHA1
0c33aa4106b82b0fe9e26b0fda25a9abc707b83c
-
SHA256
4615898b91a6cf4b7ec2d94b24e1ed8a3a0482e15468ba3c88e3dd6e94bf26de
-
SHA512
144017e8ae0ef25bf8c5429773f68812e79bacdee7ca98705d789853b948cc194d855a06dfa704fef537452f1fbf0d9d42f4f63d36ab3cee1fd869c93a3da6b5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000f31cb294910ad33e847baa0316bdc984c079db595800a1ebc149433eb440c08c000000000e8000000002000020000000f515902713386a4eb8583174a575c1149ff2faca61041fb6f06acc4e0c1c0a0420000000b63334ac307f8ced403d8102ed4a8f8f2714347237822ee638139d79058b2aac40000000017693d182380f70f538e700dd570069f1e34f8f412c5edbeadf55ec6e5e1c176f5b2150822f1f883a03bd0ce9ae431c020245b13336610fd6cd4df07fb0f2a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3025add8b69bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420723122" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{152EA561-07AA-11EF-88AC-F2AB90EC9A26} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1008 iexplore.exe 1008 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1008 wrote to memory of 3000 1008 iexplore.exe 28 PID 1008 wrote to memory of 3000 1008 iexplore.exe 28 PID 1008 wrote to memory of 3000 1008 iexplore.exe 28 PID 1008 wrote to memory of 3000 1008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b9fd49d76f6388c5aedad89d7903e66_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fdd7e4d2dd93c7cb2061881c6d2cfbf
SHA1c35454e1e734a13262b9853b11a2c3bf36e08aee
SHA2568f507d8fd7b051c4503d7fa413cdff0781d768088c23c431bca35231f593eac9
SHA512a0fb50768e81ab3cfad7d55e31854e1ef786649a462e6065c2e72e49d1cbdff03562114f75fc16ffbd4c2ccb9425709b003b1cc6973b6e1acb7dec340a75296c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c500169fa3a5f4f7ec25670e2a992191
SHA1d624b0d2f62e6a3f28f03dd52a0142c14906b768
SHA2568b74075f5c0e20bd91a1d40efd71e2b559a59c5e5e5464735f85495de23e1cac
SHA512b70d98e699eac0ac1d1059ababeffef9a8533f1838978c95ca52b4612ded643678d90d24518ceca3616beaa194564c00ca9c039b7262888bd6f97bdc68cd37c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf62e42f928ea6ca91d4e0d0b73ea21d
SHA1345eb82157f8dd15430a2d1b8b0c019b6dc8a8a7
SHA2562ee012d51757aa024230d9404a832e05b0258ebf1628dca2f027c5e152f766ce
SHA5124ab23e0789b98edba6980b458375deb22dfb2bd49338333e6891a7a53b0d3d8cd979bd945d128e19045b837eb0e0db0d84ce6beed223ee53c07f89ecd942c011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff529b9a0628f654e993d8057017ffae
SHA1fb83c7f9ba0d7a6eb1c61097579d366153163f40
SHA256e5add867481f69df5f8d8edc2bc176a3b311864e19fe3d4d4ec74f02df31c4b3
SHA5128da407e1582c9ff2fef5a68e8b3c335587f3a8d1a4e1b751d69edd26426435dcef5013fb48894a822f9ba23460ec32f4dd8cbfffd21e9cb702f4439533504062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e63b510d5a09d72abb543544cff90b3
SHA1db144f6082a6c9ecb96ed3d759dfcd284cadb9d3
SHA256e33bfff68dea86fcbcdbb2cc30d3e23eb814652a2b5ca9bf365b4f9a58e6c150
SHA5120540ec9ae4ee3657320c35188920cf75bfab6b32b32811047700ad74e3d79011297dbb7911ea3f3057bab518854eaf08406085054db6ec6691c071e9af6dd2ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599ff13e25ffdc3f80c3357317f0eb65d
SHA1ca637e2d29b74faec4cb6cc80d3f8de7d65e034e
SHA256a13ba55d7e2641043ccd5a680d78fef638fcde04d21300541de98cfb90503976
SHA51245801d8b0532ce41259dd1ce54ac6ad5761d8a45dac792207717d0a915f904aca5ab4c2532a7d27f570698e8363a311b7a95754aa7eb47013ec273b3c3679530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b77b0fd339068aeb06c9f5928b8a4715
SHA1b04b9bc693921d22e2bdb445231da21c914b6d34
SHA2560bf1f66443a608d22d054c86e3861a4dc12e90684f116b809c8622a040267d48
SHA512a7dca199c7e798a9fe2df4306191daa6cd9b8609320da599a2a9b9199d3b07b904773ce0930e6d72c31e8d850e67e3c6393074539436d1c95199cafeaa4839fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534441fea775778c050fc4e060c00bb69
SHA1ccb8b6f34c10023e33cf988019aa9a07b0810994
SHA256db998087e3f56057e31c243b1999e55d23e8a63dc4ee5ac4f32bb361ca939f85
SHA5122d3c68dc0b0bb607c3a30c660790a0c09cfe1a4132845055f7a69ac3a30c1ad05a90d47f79725e7351152b85d3271de3affdb45165a321a173a7ed21c373f8c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac6e722fd42f405c8aa9a25b6ee78d88
SHA181616748d059095d5179ae53b53f7d8532d5bb21
SHA2563666597bda5a4c591e6ab675471338c1d79932e81b060ba72012010c6cbe58f4
SHA512cae51386cb1c20422fc241b4199ea977daf8adab37fc27e568a948414297e20b7651e342d0bb38a72920d403da186a68417d03643ab0e3947824ac238b75e902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e93313fa55260be2201de089282c147
SHA10bee01f1270b7714f6ba1bd57fabd271a0208c4c
SHA25652e29138c39308e3db41a7955b7e6fb96826f002eb961d2b5628780bd12dc313
SHA512b36fd0e6b9b299ccabfa5e888ab24a6b7db1ccd3f20cc683058db797d137ae96d750174bf71020a75abebded03500a289d470a14a7655aa9e24ad668c781e159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcb730e369dab95416be3c81932aee5e
SHA1c8cfdeae02d11515f4d639eca5da3a7fa0f97c46
SHA25698b2ad0c40cac077bb2857c6075e480da031a60bc0c8493f805a761ca80dd77f
SHA512278550919ae2c3e9e1e4036d95d4194b9a2f4abd91bb05278a501a1927cd032ccc3b54342e268e919f79f450c5c093a9e46ed0ba63b893a6b0133c836c82ea4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eee2c150af7fac3fa18698876b10c83e
SHA12646d50817f90fd786d50d31e0b1818fd780bf36
SHA2568766e524797455340ca98510c42366da5b363b80be3c594c79dd946b8b277cf4
SHA5125277648849b2029bfd2e2ea5c91bc624684fcaeac415fd26c58b0e941a14271b41cec80890edac39004c5b4d02a16447a1a10079bf7744718083ea43ddee2d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53466ff2371ed67b4a47c683cf70b9bdd
SHA151c04f28ffec3d21ede1702aaa20c39602bfe04f
SHA256def4ab9e8dd52eaed9fd98ae59af81462e874c537766121a031f3e9cb303cb02
SHA5122214fe3f5a92b06f8fa3f952a71adf376bc4806b9e049f6feb5b5896a4b978f4e3622cfeebaf67a1a61ac17c6f6745c9250f2dff0db2dc0d60ec5d926cd3604c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535184a3fd1ccb3dcd2c5226b0c186b64
SHA14506e0d700eed166890481c9feccef2f48466807
SHA25689d651ae10664aa243792fa18d34eeec5d2df01fe1387016e4125174eac14def
SHA5125fa849c963cee2bd0f47acfa73660e56a99b6a6cd898f6d1613b424255bb1e7116b78e9e500f52d34a6b501121ded237c4ec40e58ac7b919be4701a28198da86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5637fde0aa6d6cf5ff4961c051f74bcf0
SHA1c4224f9a611cc8a5e8e703188709026160be1e07
SHA2562e2731f61d6eabda51c83ae91d046d7577985b38836c45791820da0a81e1433a
SHA51209be52403e81b68b560c6963ad5900896c56d6599f34e0bab98703c2e52fe37f7747e082268a3748ef7ce04e981738e9458041cd46ff32a0a9e79c6e4da48637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3db661778e48394cdb221f739b1982d
SHA158bba08e4ff12e32000cbc6ee10382d851463758
SHA256d7a4f8ce5f3141d36e3749c2b1f268e0566835a4609a64c4b15405b99613f526
SHA512731f5235d984b256f55b4f8e4b2a463f12893871abbff4123293b2466449ca8ffff30d4a5f4cf3d5277520b65f8c568fd29e0c97ae957ea66d503162becbc1ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567099c28f756914ab5d25809b3597f50
SHA1510f07fa2ff4d2fee3da18ed8ec8ef71f20c424b
SHA2569cd33521384b209acf351afe2f0ca92aa4006642424c0b8275cda22ddf293e8a
SHA51220dc60ccde95d768cd2b02e2a058cbe8e5cb5997be9a9d0ec5cf210619bc4e8c56017ca28a46a9d7ce6e78800789c5b7bebd8250f825326a4d54799c15394134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516512efaab66243ace072f86db91d19d
SHA10932021221290683d8a79f3eac96eacd00a07324
SHA256ea0249170f8d4585ebdddb5b1ef6897ef9ba92c5626d1efab57a8114b5968dcb
SHA512e0334800d42f1c0a7bd3a433b77f713c18c50bfa636686d08f710c177fc1a62be9be0eabd8b511836b09a321425c5397760db5a3bfc238ab5540b5e228b30b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e489e5bd54f1d0c8e3e115fc836bad9
SHA1e2ac065a5551533c87a8cbc2f0cfe811b750062a
SHA256ca4b89b02efdd99e972bac43ebbd5b04cbc7bde6ddca7c91682d748f55548752
SHA512c20306bd06c9dea79a7ac01b9bad97964338b4ab0d763bbf36fd7cc70ec8ac37fd63f24abf857a0716d5c9c778981549c377bc946883141e329ab0258a2653fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec96f81c037d6eb3473f3cb9e402946b
SHA14075dc4c8f56a4ac678006952e1318e4ee233b2d
SHA256c22427a29c4d9aad4c2d936047e62376e4c55dfd058f9f6ea01149d3ef40a092
SHA512551832e839eaaba0d819b6e3c7fe793adb53ba481c4ef4eab33ad4cc47ce25c6094da5e9b25917c4a6556f9d999f98717c0d00292361c1fa10b195a706159249
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a