Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 15:56
Static task
static1
Behavioral task
behavioral1
Sample
0c35dbb3d6cb8c088d451f51b6c91755_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0c35dbb3d6cb8c088d451f51b6c91755_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
0c35dbb3d6cb8c088d451f51b6c91755_JaffaCakes118.html
-
Size
461KB
-
MD5
0c35dbb3d6cb8c088d451f51b6c91755
-
SHA1
88c820d444300b8e00fb7e2de4622d90723381ed
-
SHA256
d697af0bce9e5274dc8f74449e39c82bc59cd38664974f37fe89ab5b9f987490
-
SHA512
6de36951ebfdbd363803b0b9e019b6039d9a5f46382c1ff8de0ec807f17915d9f206fff9833d5549e1ab688fac62c3855c272412531fbb793339cbc0e3394078
-
SSDEEP
6144:S8sMYod+X3oI+YQsMYod+X3oI+YBisMYod+X3oI+YLsMYod+X3oI+YQ:h5d+X3A5d+X3c5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000003de683720ed38489d9af10ea89cfbbc0e90194a734ec11ef7f3dc67b438704c7000000000e8000000002000020000000036433f597008be19254512554f0d2e4641d82cbca998dc72abb16a6bf920e3c200000005e6f58283d3b8ee5be5dcd2e7906397c1ae96fd80dc89302a14dd2d7d979d18c400000008be8b5b0e45353048c4b8496c021658e61a838809030998a996a3ee2a5b8ddc324b3b16253f12e441a56f0f5d081484003848151095ea7a3ecfb937dd146675a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a6a04be09bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420740889" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{731EF021-07D3-11EF-8F92-565622222C98} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2148 2872 iexplore.exe 28 PID 2872 wrote to memory of 2148 2872 iexplore.exe 28 PID 2872 wrote to memory of 2148 2872 iexplore.exe 28 PID 2872 wrote to memory of 2148 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c35dbb3d6cb8c088d451f51b6c91755_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b07fed3ff9e7ad61f96c6a61caff1d5
SHA1f8323534f76e08906fecf9328c2d239693ea16e3
SHA256a03347833136d6bbefa705c71f3ecd224b675d6d0a44e457293c5b1627a68b44
SHA512807ba0990c9d7395455f8af871040b51f2c616c950019bdc56ea2701ccc8b05d9d4e9b323cddbd677722f4ca51c5f2455f8159489b63b9102c2836629b6d174a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f72e79161d50858d757061ee1ac7365
SHA19f957ce01414a2e440cd9f95cd6caba5b3e6b7ad
SHA2564219eaa0faafb5f8b72e1400ceedeaa021470e796c5499e635da363168e785f5
SHA512e3e1c7677db1397a5478f1957759639db315859cb4c820caa548e046551fb11d07d3e72dd299e029d3c4ab8e2aea08fa1c3b8fea8c5a8b366ca70e0ec59a6ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb3ee737f3ba0be3ed8d0980c07d81c1
SHA1effc56403c120240689eb67219563e3515c2dd25
SHA256a3f50332c702b8c0ba54a2a7443667bde1d0c282734b1b72e5cbbbf57fcf3bf2
SHA512eabbd95c07b7bb18be66fd2d1479c07ae730db7f2aa23c344743f7a6123a3405f023f102eb2c6333e971a93f8947f4fb01e70331887bbc470df224c109222e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589aec109fffaa6db8ff292a2ca400207
SHA101e7e106acf80f9c0c75a2c982ad4f949c3f0816
SHA25648c65816b38a225526c9c328a9f1af5ab1e7d3f180f9060a6c855fdb6bc987b1
SHA512f0fd8a5ea1c8e36d2e9ddbf4e37452afe5b9361c0648b5119eb9ea4e1f86852ebf2d93af8907c90132c189b01fc577204d58c4ce6e0aae72d56ab7bb49acd75a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5782e240ae5e9f24249c549eb6f326734
SHA1850d98ebe92d33ba94d5def913ac98e89d4ca8a3
SHA256ba612b67c38bcae56e582b3a8f04fe7ff00fa43624688a8e63e014af0dca4b0c
SHA512da65aa1166839707722f82f6e57a471c6202ee10cdaadbabd5c7e7636fe62a47c9d982303f2de537cbd7cc9c88750a7241d5b6d8082e8afaa592deb34b07c3f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5823d9a9cbcb52a3d66a53a4e9e42e0ca
SHA1260841c5ad5aca1346a63dc92f77a46d9e451b74
SHA256174b9d629b4b204ed33706cddc2e0b7253affa56042aba65ab033c2b0cef4af5
SHA5126627b548ba18884daa2988a5272231017e4443c3b6f44a7fc74f6e9607cd09c122069159817dcd4a6004ba56445f651bc35556c2b1438df32e38155638da655f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53aa117ef51804aecc7726114fbd1bc80
SHA1eb79456cbf3e5364fad4072dd3b291db7e12c0aa
SHA2567ebdef3d5dce469b00489c2248e16053e3cfff7aa15ca2cf35837962cfb098c7
SHA512b41ca9aac02b92761826a245eb7b33140007757d0bd872b6015a1fd8769836e4ce4d89c37201b35d9f5967b549eb7488e80c059b81dd4e6caf0710bca678759d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fba7ed843c1c706dd6f397183047b528
SHA1553e29a3f05373f0be7cd5a21f57e9a0d05fdeee
SHA256421cb9f836d9da3f36d0facbd30cd1a087f302e99671337c7e0709ae9718e1d5
SHA512fcaa0ba380e8be38a565be8c32348bce7c668b11fcfa88d78a90055cfb5034adeb4fc8928e85812825d61d5d6b337a5d7b7736cb343d9bd4d7ce1efa870c921a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ecf110616310d7450c20e933d815a72
SHA1cd99cb2f65abccfa8eedbeb7f47b68e50ea3d4fa
SHA256137e8a4077df863597ad71ca99992f88f2ae6fdc4ccc92625d69944360d79280
SHA5120a3183005971fdd176709257d01e3f1c928ff7d3f152ec2ed15a5ae3c873bd947f3a7283b6852cfd7febd1bb9605f708b04be90d80e731cb72a875bcdf9b9409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb7a447385f5d598600b22212a2d8982
SHA1b038ef4a05e71694a6bf3aea72a0f986e9e07c10
SHA25654fb0a90d0eeb226efe6f3f099d760d1a80c6e326f1144d6198d74a8232d4839
SHA51231132147eacb87c5e13da8b25cc4b3cd40bf294fd3b29ef3abee3d6b0b55b4a724a451d4cc7f9556c1b22219c4d8936e750499128b78b418b8abbe1d52ee01a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5576a245c394ac1b3e2bcf3ebfb3b7b7a
SHA14c129ab3192ead5e7405cb588cc628fdea52b2f5
SHA2567a1dcd561d97f4b5cc35344548c34ccfbf3ff2a5e3993124766c436480131f14
SHA5125225aee392da192859051b13f55e0b5c96e97fbd615089ec794c078503ad97bbe2e9b5a26b3b8a8a3883dba8719f7a7c6c90237c9099cef187ebb1cf5d6e18a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570e17302b483320dba5871a5d3e47cf5
SHA14c5abc1a4e05d9d6e2c3c99df3bffbc1eb8b8d2f
SHA2565f013923b2dafa8747c8a923f165263124c32404e345fa1105acd472664072e3
SHA5121dc579648e9551b673c9c4e82044d4c9c18d99e0487a939be7f5dbb0bff1dbd8bc6db05003fd9f779f9076800334e304fb8c9df56040d9280c41da701c48fef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575e44375bd08814401e92f8594290b4f
SHA11253083bb7f18ee7089a8191b9128b4d32efc356
SHA256e430a543bb9df12f0da69d0a9045f33e7e7c68d6abf699b122481a6830cb83d4
SHA512ec30731fb5b1d18b6871b3ac50aee6a0391aafbdcb715b32471d8a15c527fc7f5d6c87fee5ce5a927418856495087f79f79c5c4701a1a19658859ae05f6becbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512b8937323da6cd62804ac56c22cf182
SHA18b26489f21dc93bb33f3dc88d6da6875069065a9
SHA2561bbd41bc38bd801207d41029d16b50dc7bbf1a5bca872a410d88d123657683a8
SHA51225a9a326197222552b641b983cb0950cca3ed6e9020ca4a91729eedc6ba6a82d082632cfec593e414defbad49dbf954d66546e8e58f0f482247adf3ce6677248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598c2fb6d8dba5913bafdeec794de39d0
SHA1893cc0947c3b334da9795c3341de8a52215304e8
SHA256d8d471784fd747476647e72e3ee34389544b474047fe2542bde64d2c3c877eb8
SHA5126687834ba7cecc91d3fec3cdf8b7ec9ca751d83bf080bc00573368d46dbcb19f409f254b370ceb7810aefaa63ce04319b8662bf52d88a74aea197f7faec3f9d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1a4fbd21c657b1b32ebea58efcd3b32
SHA12c86fa110a27168497b79a8576f6728189d1f76e
SHA256ddd08f9454f7f9514ad5f2c7a600f128229557a9ee8d0e96b452dd17663b3798
SHA512c25eca279d3bd9fc90ce83ffcbf5d8a71ed11795684a8d41c32b6c591a477020b85fda270006158cbe66508cfe809c9b35c4fed7b384ac6856b1d73f1bccbe72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5260b14ff7e6c8da29431a35e9839e557
SHA1b8b97e8ad980bd8dad19f707d61c557269553343
SHA256d68ef075c3f7c8a52da6e06b208cd09209b0a0b9f23a56300a4ed0743aa2a8ec
SHA512413a9c6afa8dc6bb6b26df820390423fd5a1793b546b05729979a5bab71584245b47154d62a5c437a99eee298ed7e0b88cf59c908198a2cd8eefce2047fec239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502ff438d0ed27b564d47872c71370f09
SHA1ddc1c707c02f48eda180d1fac966d2611634e42a
SHA256fcf9cf17a8bfc020f4acbc1d5b864009df5559dd87879a373a1a411d10f91def
SHA5123e669b795c495694de982226b9c0a08d6f6c26de26ef9f7706bd8f30125ebe7547241ca461c8f6b8505fe115b3dbbd851faacda1a4f299ea6b76dbbfc431e75a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5707999b7fa7375ef8c15c7b27c9cbfcd
SHA1a76c6ebe31cd7cba0f7a5542c2eb4a309ec75c67
SHA256e2d4fb9b1dc3d09046f1c66504a58ae766ad052e0d18d7633c500db9be5d4723
SHA512ab975e3637fb0366878007534535390f995e81d3f1c0ab1e1b76b3bdcc01f96fa750c6ef40394e740d5f0142b9c6de2a575db7a69886fc30fd46e2bb51239e51
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a