Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
0bc2c851313a96cfb59879749edfff2c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0bc2c851313a96cfb59879749edfff2c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0bc2c851313a96cfb59879749edfff2c_JaffaCakes118.html
-
Size
345KB
-
MD5
0bc2c851313a96cfb59879749edfff2c
-
SHA1
d3fdd3730074a6828e943b35c2020ab8e0072819
-
SHA256
78df8b6a6d628032798bcbca71e6e9d92e31d8cb0a1758dd8836d8a28ddaf432
-
SHA512
1cd58a2dcc4ea1e7db0b6d99d9eb19faad9e9d0754522013dfe4c726ea016055b048529dab7d8eb82b906f7b1e71723d169df44cb7a046ce6a7e0de970dd2c05
-
SSDEEP
6144:SIsMYod+X3oI+YBSBsMYod+X3oI+Y3sMYod+X3oI+YQ:55d+X3GN5d+X3Z5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000c965bea1fe3887a9a87a3eebd475a55f2c4cc7de5a4d79bfb4dbf2741c80d7f0000000000e8000000002000020000000744eac854c592441fd95b1b92e47f054df6e9363a0d3e34f453d971b6923798320000000b99186f07f4f4f1a9de3978e6e61eee688e576b67e8924d099f9582e98946168400000003fe23f2feef45b66a189a7fd80007165970cb9a9feb13f3bfcf186135506416d074b8577fb61f98342e053825cc39311acb5457bd8bb18168b876423df8fa3f5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420727211" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99CC6B51-07B3-11EF-970D-EE42DE2196AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a080d977c09bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1720 2004 iexplore.exe 28 PID 2004 wrote to memory of 1720 2004 iexplore.exe 28 PID 2004 wrote to memory of 1720 2004 iexplore.exe 28 PID 2004 wrote to memory of 1720 2004 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0bc2c851313a96cfb59879749edfff2c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc96c23462d7233a332b08b4755cd6d1
SHA14c2249599290e8fc775db3151449883e7ba6bf54
SHA256bf502aef3c14c27eb07e6c680d6e4d0ac2ad57c07e08dc8952f45047ce7c4a11
SHA512162aebe8f8998cc6c8ca8e4f678b8e340f6e50337f80147b2dfc5fcbdd6f6b8f54f024d8201e5f33624a17364ee665d2a9abd72763527601c173a77214503348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508b90b64cb3810f7897720925d201959
SHA1572ee22841bcab06c10f651d7c485522a428af95
SHA256ead7336c881031ef3ec64cd8b1a49331239240d2c4bdfbf9bc59219ec3f978a0
SHA512acee14d3492a4f71280b541e1f52e0eb8fcf9a3d7b5a183662552ea2d9eda0729163792069b23b54fe91203598b4419fbe091e71cf9d17c641ac098c28aafff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523a71c65bd39b0c3499f14e74a5cff45
SHA1909cce90a51ad71fc98746f24bb38811821c0ce5
SHA25627c0e30372e8bf8ca173ad3fef72aeec8c95e54dcf8a3869c45934804247ad73
SHA512f5f69f4975f06c85a0cb42287a4a8e7c08fd93ee46310976415ef0aa65cef249877ae8b974eb24603351e61770df84c7ef013d19396fa4c5008332ba6d570c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adb37cf356599a3506ef208212e8bda3
SHA1313ad32a9c720a20c9ec6680fe20457b8b56c35e
SHA256e4fb956536475da74061a434dd9d54e111cc6978a9251f2c018cb697a944559a
SHA5125aebf0ec48b275b4e09f47b53a31a6ad6da152af36b5f9f2656f26a393fb4c5cb233582875f517e08ec104bdd7767178348f68032f265c0fcc73dce2e3d70348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b9bcb969bd45fa9e0365f0eb2dd833b
SHA13731f05e8871d368cbf9d8a5ea41f133f5860a2f
SHA256d1934b4577433c80dc7dceba230a494bb526762bb2a6728238fd92e23787889f
SHA5125f39d7958455f3247e363766df8bdf48af93871241a721bd94c455a8b8d8f8bd94c718562e73a8fe1225b6faa61c7286eaa5fa9d8d089a226f20105ef76c9de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57db81f662b2f45fd65888343a1bd1229
SHA14dabccc0fbb9e58b921092a14a3a085e55d9ed76
SHA2560e11f7a12468a2bfc5f9bfa01fb24d347f46f28dbfce574e529eda04977010a8
SHA512c546586b513731299f89098dc607e76b288bf72dc33ef24c0519c3de9a5b7dad2cd7985bb08cba351de568a094f4f8190e1294673e9caf56e9740e95d796d3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfb67985a726442ee2a58e8d42bce4dc
SHA174009a2ca6d3823627f99f5fb217d2eee2ced99c
SHA2560dc9fa886e1fc8eb7095c154962b8045fc4a43e954c498a9aace2808fccb78e2
SHA5122d4a8e2745b48483fe3011ec0ca9e33e7ff84314619382215ff4614a3489192e9260a0b70a0921d2ee68aec2aa0cf3927f6206ef8d7f4905504d08a462fe9477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5792b35610d0cdb44502ef46c82007d49
SHA144475684223c0119222a16e1469f6489ecf68ab9
SHA256edb6c5fa4ef8e4c88ea441377f4d80c338c26e25de2b0c3eb97886b13b0c43a8
SHA51287c97a2c365e36187cfc9d8e3d6a392e68325318e0b77a6b4da5f61f87439d162c61dfa402d1576ef5ab2069f1c9c8889cac431c3c25678330751cef95123011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b633a7d77f8e108638b1e7c124e6ecf4
SHA1d8c3d827c7ff23632a1819dd14b979fe88efba85
SHA256060437e54dedd7caf58b32249b1783ec9adcf2af0687d345d90582565ec4c03d
SHA51249ff7e1459989f68e91a578c293f6fa0d0a9f651067843c800f09eb417f6554aff3cc16863d54706254bda6a62cb477eba11fb014d1445167f80c977e00c1069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c2bb5b75c295b1eceb8f1bb25cb4315
SHA1bee3dd8a5a2c97aa97ccc93319c72d8d8cc96ade
SHA256337977ec819a20208bc706f77c432198821c8423dd1daaf356d2193be617b2e1
SHA512e734eefcff4bd697ace379c35186803fa82c4aa091672ae8438f119837b29577809afd4f9fc07d0c5db4ff6af54433efe2303fa1a23b834393221784493bf57b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ade63b5ce98c71dd0f0f25eff7e70104
SHA1d06df3a5fab635680c06baad1b8ba4edab3171b3
SHA25661fd90b54e45029db01595b692178da303989d6ca3cedc6276a5f418497e64ac
SHA512bc5afb9e75091200c9e8b1dcd116bd234b3c37277004fa9ea39a76468aac542bbc8c64c08672c8b6e5db22045e4e49f87ba9b94c4984ea00567160d1415d0e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535f9109e3038965afcc90a5666101803
SHA16f7afb395fda31754232487cb89b5bc757f04e15
SHA256b1e8352f8f8e7c96a144cf76b57571c9fc79e2b0c4f793d007ff7195ff6864d3
SHA512a5e7fd8028eb6026a469f106d4de53e0570cf649bcc76d1577537895d0cf87f0f9c7335c98c821d81d6f114567c58d62ef4a6b0cba70ca591cf1bffa2bf6ec60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55541c5c5a66bf7c1949b8f1175970742
SHA1d394817f158366cd1700fcdf45f0368b42814295
SHA256c0b8871204e8db7fa97f767a4a099927c2dac64de5b51d78b46e8e7704a4e204
SHA51250267a46926cf2287cfdaa444630ecc697f202957ab09e9632e28c1b2d3d1c21c231ed55492536f9d77ee6b7abcff031bf3e72691774a0ef42769618f978b2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569ed65a1baabf0c0cb0f934db6d7bbca
SHA1853feac7b1e4dc4978f33e27d6e8b27ee197ff91
SHA256f0d1ab1f582289d9dae3b2312b57f0044f7bae389871ca857760ac06ffa97372
SHA5120bfe4f6879e1903389e6b6ed1f0021bb3b5774c4c16541d141a62514da2eb0412ce9e6dcecfe240ff5cafc35ab585a37096daf5b627a0be7079726c2db1077f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563e20b4a28fd1e7406dc1b780ba4b752
SHA11a46fee36457c736dd39edc257ce8aae56d9d08c
SHA2562614f0cb717b9004ad5ca6ceffa587e7f6b244a0e3daa831835576dbe5c9b930
SHA51206c09636d779b215b2cf43671ebb4b865e0af138cf55e4a95343afbd59a3f5a4c80977fecceccabbf5388c2cd1e0be2de324c4000546e89306f88478311a55c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509ee078d84fd7986e29b7bdbd5a13aea
SHA1e598589096087b7ffbd1b5f5ef5eec1647ed12d7
SHA256ed85171f381322f401ecdb356d374268d2f77dc8cd57e482526d14a53bbf215c
SHA512f4b6d9b81e6de75fa8f54965ef75796945dd6fb6807ee53bd9341a3785f1e7e1df148799c3a32989711dfea1d94a9a8ca5379eb3113d118c7c899a403a9baef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546341a71e807db24695885306d31de80
SHA1465c93f149389ea95952cc507e4e26646fb58f0c
SHA256ffc6be6ae0d23d87981481267a2b3e444487f44f39c5daadfc265113e977e0ca
SHA5123dfdb6727e298f2a3b1ea0d2ebc7554eb53e0d144449dadd4a2e024d80e98526f746b6617c03be9a5c7f1a22783e832dea7c810298c4a083cf0e870fc6a33115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f406ef3ead443e1134c3d8d0589e5724
SHA116f39428a4595d9b108db3d98161d48b77e63499
SHA25679d74b80dccfa00163979d8c982d3722615cfdb81fb3707eff5898eed0f78fcf
SHA512c2e768c34385b52a8d1ad6442372b37f0cfbf56e1bc847d6c8d068d9e0410684b0c0b58ea7507ef276ce0415eb47077f64f82098d8710f7605fba42e38586364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4a29c549d1dc333e4085cb0435f96b4
SHA1fd68d6dd7ac6ee740e313497037e14233b95f952
SHA256c958d20d947ab3fa4bcea828057aed52f5f702353b5b130dbadd53fc8a5f7a25
SHA51212fbdff9daba7d00a8097f98160bab16686318fb9280fd3e1f514858ddf1dd25ccbb1fa6896bdf6d693cf4adeec1e9c36d9f1c42a8e43ebbad6d543724595c30
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a