Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 14:18
Static task
static1
Behavioral task
behavioral1
Sample
0c0418837ab0d222b5ae47931a4f2c9a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0c0418837ab0d222b5ae47931a4f2c9a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0c0418837ab0d222b5ae47931a4f2c9a_JaffaCakes118.html
-
Size
70KB
-
MD5
0c0418837ab0d222b5ae47931a4f2c9a
-
SHA1
69b9883769e05ae4885eb2f423c3f3caa3e24e54
-
SHA256
d2d036857f0f65b8a87d30e95a1dcf23ccbacba397c0d00a6e9075d829c7435a
-
SHA512
9b1570c1c557a9f5082d2ef3c35c536588a17d9ef1b0d67d5caa8f6585a268523690636eabaac79808e90ee08978bbb285c3160c367442e51869688c003c1e65
-
SSDEEP
768:JikgcMWR3sI2PDDnd0g6YYA5GBoT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVGQ:JS7TTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60fce086d29bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B247A431-07C5-11EF-9907-E698D2733004} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000008ab1de5f1a7ff78b4f57f99541d23a2e905ebff5a999bd2f8aa353711d51ada000000000e800000000200002000000034f2708370e1117e7103018a790acd74a83e02667e284f56615c57116639a19e2000000096b895c43f938f620efe9693c574c5587bf68f06a5780d3734679c6c2c6896fa40000000922e2e4e6ebfe46bbadf6d72ac79e96518dd75edf44c1ffb34bc25147b40383f4115a3cf7f7e1065797b9f31f5f28263b86056135b7739a5fb7345c14ed5f526 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420734982" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2916 2152 iexplore.exe 28 PID 2152 wrote to memory of 2916 2152 iexplore.exe 28 PID 2152 wrote to memory of 2916 2152 iexplore.exe 28 PID 2152 wrote to memory of 2916 2152 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c0418837ab0d222b5ae47931a4f2c9a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e32e82ee606d7819ad9940a2abe113ba
SHA176d7cd15bcb33210298778b08f53d1f911455939
SHA256fce6eab194b445deedd2281a5d6c047230fcd3d2cb5e26a5e35e155710268666
SHA512b21799be9d0910c1b0013cac3ae430c16357c474120fec820b8033829bbab7a80dfa02d8330e2aa109e87bf3e74374c9e70a3e7c30bd1e34d73337ef17188ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceb25cfbed55a3fe93751f8ff1858ea7
SHA110f6a5cc14ed2ddba6be6ee108b7e9d24430bb19
SHA256453cf3924dd5ff22f00f2dd4b6106bb75af2e4b9239c29d59bda434ee3cf425d
SHA512f5b968a22fd98fb40cb104448cdcf6df306a9ecb4c20916bc549c9154f8f8c50e6b62cb57345dab20eda7c96f0ace4c7108100f3eb4a296a6336e873c6322d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4810b05bc0e21c999c1d3e7a695773e
SHA109a761a1b0ac808ceb6342622a3c640177fa32ec
SHA2560468d975a19c33b10fd6b7f7ebf922b54c30973128c606b5330c2f30e319a26a
SHA512f860ab5dfedad66b94d9f91758fbe373f80227fe6f3b70d6f918b63427db910bc66f6f379cdf97a3e95a6b9b7b49b5bf29b980fb66d6f6584722da2ce87b2796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e64d86bf9c3f601c99fb832cede2f4db
SHA17fd607fe567c25d6a6513c680f84534635d49839
SHA2565259ac82e688957e7ee6d2290a6ca212f5011e6f57c75c433d6554c4fd82867a
SHA5123663f6ec0233ead352cf889b2f32d8e9d58361bbbaea23f25e22d53704b6b1b552d8c0300f0973dc10a1bf9e62c285c4d42f453bd806ec3eb80d0ec99133612e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524d1099360f377354ce8bbb4602185b3
SHA1e925e89a6cf1c376cf4dc46d065f6326c24d1c0c
SHA256701f51e3ef1dd23432a8a759a6e39a69a89a5a65dcfe2f5de5b6baa38f8b6a81
SHA51212ae13c8e2fbff34380bf2639f98bb8e31827a3d222031a0cee9f59ecaa4159f5ebe01cb0ea9b806aa355cd034672e6af23ab4fb8a88fc5d6405360e005c9b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a10930e32519113a1dcfe90e99977afa
SHA1dcb49f91276fedeab34cf6a9fe6d384af09d2fbd
SHA256ced4da48e733037b52d01d877b1d5a9e80821cac914db0be3501fae142d1e76d
SHA51295182d9d1d7635ba012268a1f3162ee416736a7da84da807030c66778a960da3baaec82c4c2cceb1d072a05ba42b96c3d682ae207f8e3c6346ba1910805df577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ee8fb154afca7b406eea571ac56cc7d
SHA16cd4e0a6e7fabb2897d997b2c9a53ba2b18b8a96
SHA256b4bd20d885ebd970aadaa241c9970d86a86e123b4d7250be12d439cb771d0dff
SHA512c330a32b153ac4386f88d8fba21134b166c6a2d8a18a371db111cb6734e704245f819a94ec4d397e8ff49bfbda04ca5fec8213b4f72c02b1e1f118eeed2ef683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b755774652514113e56799f6fbeb7ba
SHA1b90ce0c6b82d35642fc7d6a03748790145e3ec63
SHA256aeb76f11b2f6e8ea3c51b04430541b83ca91761b03340b7bc152d3648f7b30bd
SHA5125f672ab140af5450dcc5131ee7d1bb3ed69c714b2f8e24d4138bb59c4c841ac98a4b5b8f2cfa4d2f0809a9f6846d9f703ec5b84e3ba6681627431edc6f26b62c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503c3c257f417b5180fcdf2079bd30bb9
SHA13650e17f563bd8a70d7f30926e33e709994a2a4a
SHA256f4126cda753d7e1c55db6705399e11b04cd57e2c33140af5c4a8c2f2c2f6197a
SHA512fc38e6cd7ab46c9a17a5fb481cb34153c1f89921b23f041997281ea3630fa07afb1d4e3138fcc0f875af3bf178e6dcdd6db0d4ed429377972f632c3f61968d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502ce1a5223dae8345b1cb8472797e07a
SHA18d36b8c05f654185090e64070c73777fe89019ae
SHA256b215c1fafa1704e54809ced4b06d8405a3f3d0b7ae4aa1e04746d7c09d90a38f
SHA51259cac88805a64af04eca48c743b292ffab5bda7ad6ad65337d4b52376f6e5486a0168aacf907c3179833ff305fb2104abd12f23c55a1df82316fd1d7a0b92fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d0945540b2fdcd4ab63c5609262f826
SHA1aa3b43521d9798463512959e2207eb59df963c44
SHA25657e8c07f1596a76e87a0edcc205d7b40aa33c4f0c68921c73c1dcfff41a27b51
SHA512425b72ae6359aecbb48faeabe062882fd5896f6d6f05b63534c3701c77e3981add9ab14599b083dc567f4262e7005e071150c0675f30b7f68eeb9f4cdf01c3c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b53b04fa045f44361f8cf4b0f278361
SHA1dc31e90180cf2bcaabf9d545799ec8dbc0adab89
SHA256f568c4238ac3e1f53945bb861dc2da82933f3cf0e061e832babf9c15eadc23b7
SHA512d144b1b346aa87a8d7fde6289cbec80ef52938c7a6af0da60eeb2f7c56143028d780269ef73e785fc836d7609eb35462f69a54fda4cff6c0d878aa9333ce5355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574a5618d9616baeca2aa0f869f690b4d
SHA1474629ee26f29cee42bb8eecdc5d96d80a83bb8f
SHA256ae2818821cec6ea0780a05fc1e3887b42ce70d5b9b0c38a3d26beaabca2b2aa2
SHA512bcbb2cf5dc8561e18217e0981bad3b0b55dd3acd594fc8a04a16fd004d002e00fbb822dff022feeee9f918dcd43cc3795ec4b2403ba021a136ede9039962fb6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5588548ea20d3acca5401d8a3e8b16f03
SHA1e9fb5e219ab3d7d6676673c6524f43ed7c9c3d95
SHA256df734e9de32243c1fc39c337e6c4146879a2ac57aa4d9449796e114fc79674c8
SHA5125c892fc163321f618c4d72551c63fd26c670744dca0746687e743d0e39b933ba9459d99289263edc4523d911ee3e68f589f0adbb300ee2217bf20beda5911c25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba20a1361c40188f4db54f1f5ed35858
SHA1c77388cb49008a2f6c032f859321db988d0e8840
SHA256adf6da7803f6f17c8da6919ca12ebc67c35cf5ebf1dc1932c837688622b0c1b2
SHA5129d963c8ff4c32a73bb5143d544dc05889edec8eb66762cb70d5077b7fe32be5c6efacccc4bfdaa6c2e658250ea9f52ed4ef152ee43a51509ac7cc2b5ca3aca04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581ccad1ee90b9186f1d1b486e601bdec
SHA1635b020b1032433f4656e3969e058dbb1ba13983
SHA256e5692ad798a80502ecb2cbe7908cd584036ce4747d6d3074b97904f001503e72
SHA512ec628015a5d6754cf35a987078af307c6762e44aff02408fe039f720ad19fb7eae7b876caea4deb7e4c2b94d20f3c5f964a01a618c0c61b8631fbd30b6aa1d8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce5d64d300becbc960638d11b85292e9
SHA12a43fb9e0101f04121db933206bb7dd45a0673f5
SHA25623d91e1358718aa4c7e5a446c319909219ec6b0360a9b1d65b613e01822d30dd
SHA51251bbafc2db36d298506d95e95ba413b937c24952797250a9d7bff6b0a93d14e2a9dccd9378ba7cdc3f4374ccf1ebe5402da19239dbbf7aaf757d5ffd3d16e567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3daa63c721caf798a80efdb84169229
SHA12d73748aec0f025de53f274730d8a833e1dae417
SHA2565d01c9ac0b7ac467ca5aba4262a534b427f1bc30729f9a49a947623a50a03d04
SHA5120cf67f44d3a623eba92572dc4028326b4e08b0bb179981ec2d76bbb59e0eb0a656fa835d5357f492cf06c823ca1e6f35d06f2cdf88a9b2ef16d62ee6b2aa6b6a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a