Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
0c30ca23295211e8bb2a5e1a4ed2170f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0c30ca23295211e8bb2a5e1a4ed2170f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0c30ca23295211e8bb2a5e1a4ed2170f_JaffaCakes118.html
-
Size
460KB
-
MD5
0c30ca23295211e8bb2a5e1a4ed2170f
-
SHA1
1e336cd78431fbee3d1b4b12e7620b9bfb413e53
-
SHA256
c67cf044a99160b6ed216c7e33efb963583200f08ce4b0252083c994e768d1b2
-
SHA512
ca381cd5ad6b9903e1fefc6314d3bbc825c309873099daec2daaca4b6e4662d7f639487e3b535c53e0284c63c9d7716957223775968c972c6bdef73fe03a0a4a
-
SSDEEP
6144:SMsMYod+X3oI+YwsMYod+X3oI+YzmsMYod+X3oI+YLsMYod+X3oI+YQ:35d+X3U5d+X3xE5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420740268" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{006E54E1-07D2-11EF-ACEB-F6A72C301AFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 505bedd8de9bda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000a881441117e005fa63d356154bded9bca23caf0674810cf718a6a814c958492b000000000e80000000020000200000006b55571b966c63b36e350c42fc131e7e6382458b3bc66fd3c5dbd0337aabfd5b200000007862c1dfdfec8142becf85986607ae447f510adffc3ee64a3f2d5c8fe205ecbc40000000f2f53a5d3b1f720faf24dbeb99b94ebffbdf1254b78b47de53592ab4fd06fcb5ba4c5f37ece1fa5859a9d0fbda780082e174c0d647dfdfb8e0f375ada4acaf3b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1256 iexplore.exe 1256 iexplore.exe 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1696 1256 iexplore.exe 28 PID 1256 wrote to memory of 1696 1256 iexplore.exe 28 PID 1256 wrote to memory of 1696 1256 iexplore.exe 28 PID 1256 wrote to memory of 1696 1256 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c30ca23295211e8bb2a5e1a4ed2170f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1256 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9f3b12b83b2201467b21202a8d42486
SHA1772f0b6700dcce2249e73366402c47ee832640c6
SHA256b4eb7c8b0b62dc9908150795a0d6b42dca566429bf2e237368020b9068ecceef
SHA512a106d3605955b5ac5ff9356e19e97935eca9e38301f48a76a4b5cf1f2a9a9ece62209ffdd66d62ff82895e1eaa78fb099a7a1858a3b7ae4317250e3183356b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd68b2565e1cdf29451904f1c80e6aed
SHA1b75d66bafd89ecaf79da0f92695c824a1e48025d
SHA25643b19ae8792c94a8683dcc7bb24bc9feef8251eff204003167f3ef37cf91575a
SHA5125f14f6f9ccc93ec7f3686c70856f09b12d6976c8759cb8affe0140a0643d447da365fb412c5d177ae5afcd716e89464f6cb8d2b595ce2f9030499be4efbca0cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5703253fcba0fd6afc150486731103e2a
SHA1655007890392df192bf02651a6a8de046a83cd04
SHA256c6e43c3548266feba4ef4f34eb43bbd503140ef9beb3a690f37846a435c261ed
SHA51236dcbe7b4d3f5302ac26c6e4cc049790ffcf091adf3ac8b655d277d7c9ab106443eb84b3209231a07212e06b2100eec1557be5b9ab70a0e7dcffa9a4f2611309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51821fc7a96868f95b8d69c5a9560e4a8
SHA156bfdd43487e7ebae6d898685b7fea638e463cfb
SHA25666efbbb545dfacbf6a2f5ea8ca1a58021d291fd3a4be1b94f93ede56b1ab3834
SHA51219a9ba2a2022578edac2e152b468abf60540b318ca784f633d01a4543c1f645868f1d796363151cd516a2c285ea3fdf767133372e5e2769518e943a9b3ad5928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d4258c39689723800d8b7d91a742033
SHA1ca34bf46d1db2af0b5811deb0c261ecf83cae06d
SHA25684a3a759dfceb2ac3bc13f0865d4a8db1e99f229a3c0dc378de2ef32944db092
SHA512e395ba1590a333dc13b3783a018d2de64e7050bf31352cca76adca2a3c71c28ec436021322617792d8574a4af1dad7472587d5cbd45572e2d819d40b67a4aae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d46a867df182a207b1045a9a94f1526a
SHA1284dee94eb370537a929a7425c34222867259845
SHA256c20f5f5f3a662e8ae17443b71e5979b4be93c29dd1237965e82b301f98c559ac
SHA5127ce45a6930b31a1e8506098f01866336950ab51b63ddff4f9ca21d68ae1977b56e17beae13da2b7666420f06d65ab013d0c10f9e07850b47560830dd8e15d384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cd08f582aeebe177ca3d0d87020d87f
SHA1ade9da5b310d5ec9b33bdc028f34b8a4ce8b4349
SHA2560ac0ff381571bb063dd6bed1a3f5dec5bdce7f876bf0283d0e63d7084abe43b6
SHA512d6b7de018d29afcd88e7c217c60be19d1b2893da4f29d2cf52232425d061d51169ae613a4091daff0e09db9a0b44952914bf6d27bc7c9b73bfd65c87cf8fde83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54afbd58e3fc7486903d46d5bd40cd76c
SHA13c5394b60fa26b9649997ed57926316fac2a519f
SHA25675ca4e052c6a021f2803cb5c2c350cf533a98a25278b7fc6e496d9c4fef88c64
SHA5126c778a230c03dd1c0b91bd7e6b900f0593dcd3b4db3a3e85fb25ec45aedff3df6fe3f8430122ae6cbd86ff25079dc26a98be7d8fa7d940a3752846b442747671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5188a0b4acffad44dd5662ba5f77a2f27
SHA1f760678849b201a723539a9d92858190a7a8ef62
SHA2566cea6a5e2e058f6c8f69d18ac30ff8f702bc8d680879ca6ed4d800798f417e07
SHA512a5ce5818d98c4f52fcbdc6afac7f52e59552f4f949c50fc1f4bb96d08e3779c8d8352a2cea5d97f46505d0bb00aad0fbe55d97955a026928114d8079f2043055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b7230f123e4d065f4e8303a4b84fe2b
SHA155f99f0879d1d58a13227bfbe95b2424f6010f58
SHA25675cc51f94c21953f3ea71af13f2bc8d6e90c186612f5f55b47594da4023f85bc
SHA5127d82d340bb741a93fd114d372388e1019842a1d9915eb0547b7d90d196d5948b61d9f9b051eebdde3bc2de89efcacd107365df52e13ae6e44a0bbfbe29229685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57002b6460749d6ade98938f66637e362
SHA132ae82c72a71d442a2d2b118a6dc5e0da89e52c9
SHA256318a9898dc004e945b7eede22915e2e873588b0ddd7bb661aabf09b52dcc3027
SHA5129e606d6f7f0498c49944e412e2c5c1eaedd15040a1b203f5e8ca5b529e54052eb1eed4405b6325d5a397d77a653d5fa6c80051f4830a2f9fd7fab193cf2629fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe86454089864f0feb3ddde75b9ed3c0
SHA1c57131650d54269d3d0c4efd3424aa972b9114b0
SHA2569d168e8630454c19f564233a9d9d6c6e40be182b5b2e5a3c3da2e7695c48d287
SHA5120c2bd8e25249ad5547a6c1870a5f54340a82e379e2654fab01cd3d758bf501965463daf8815bfc2a22d927d3c56bd48b3ad9c76e6989c5690b23cf8ab1a42907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbd3531540f5492a652810e736f6252c
SHA1ef2d630883026c9d380c273da21d1a87e0470dc4
SHA256a2b4801981baa9ebd7d3751e1b613f1331afb6c22ff9176f9c42903cf198b487
SHA5125dd53035b4e2b8895fdffe4388dcab605edd17d006bf3031306ba1241e9de68d239663384413401f9e64d48f9c984d69162135cd1a8220080ba7d71b1881d146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527926d290811d22c60bac7e588dcb8db
SHA1c87979c07b09774afb0aa4eaf7607d2c7a28f8d6
SHA256561a0d55c04b2bad2ca83fc78aa66c0915275bf66038911d5bd57321a1bead03
SHA512e998596d55f7b08b7f9d92479a013128b6a8c569de77323f5d5e2ee5da923047afb99d61ada40fefb3058f5f239ff982ff589c79c0a6c649c006464b7e63c10a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b698239d3e9d7b9695a67f68f4a1e16
SHA1f915a2e5488b44c5040a738182f74be1a2e8c35e
SHA256912270c57ff9125f2ad1b3b2d8b20e619fc80831e4b7a3372aee43e9a6679cfb
SHA512ca7283571e575fd50207062cc8935947b0028f8a767ab5f8e6b9ce51a993f0f27d801b510967f0f3d651a49ffbfa30e2f2872da685b67668020aefe90065a8c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd643baaa83db8f6a05a9be41158550a
SHA16ee302d4b498885c503b5685ec7aa6bb3d3d1120
SHA2568b7a3e10a09e96e61ec8f4a7946d9b4921282060d9c87b70853403ea91b32804
SHA51273b03633c91b84839550c74dce75b4057fdba429150006da69965d024c21a90e6f4cebfc1bb33d03fdd16fde0be470e5644c5e611da3ac5d9f068ee5280f47f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5daa495fd85c9e187f3e8a25ed5986425
SHA164379293a35e2aa62513e31a0ea36453f67d0e1f
SHA25695943f9482aca9633546ac5788bc6deb099ca27434bfc476589d1a86359435b4
SHA512be17dc27b44589c4aeb2c920354a9a69d65ec17af5530d93ee999b991775fbdbd7418c49a25b9adadfde30d0787fa95dfeb4bca613f3af36648f539a19ee1476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e0c0258a5053502ecdd8791af65f07e
SHA12dc71ffe72f98de3fa41197e3fc88565ada673c0
SHA256c0235e005ea01c5030670e14e014459662e2d0f1504f712fe3125ab58b05b868
SHA5124b74c415f510f0ee434c89b05e417d0bca6042cacf182e0290800b1e0955c65ea3e490c9f3c8170555620edfd4294dcad9244ce6b331120d500abcbe12d03110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d993680be20372450f2df97d6bcf44d
SHA198ba66db4db3a686591fbb267466e45e071cce5f
SHA256f974bbb12e39adf69e3eeab553b280d1a623cf4f3ec8f571e1bc301d358cfa5b
SHA512e55c652e38e4f8d86b3c0c98a4d8bbdb0492e410d7700b681adc8df28c6e388a353ae38ef267571e24596b6f4edc1de058ba23d56202496920c6c701a8a046b0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a