Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
0c40ee646c0dd1c57c33949c3a24164e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0c40ee646c0dd1c57c33949c3a24164e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0c40ee646c0dd1c57c33949c3a24164e_JaffaCakes118.html
-
Size
461KB
-
MD5
0c40ee646c0dd1c57c33949c3a24164e
-
SHA1
543d2a691caf3f02a032b98e0496dfa83deaebad
-
SHA256
fe8ff268f98891218467977118d440b762357b23853b0d5ceac2617fb146c46d
-
SHA512
d9fb8bb560ef8002f737b98fc4d28a5d77a2a52e879387d5c44b79bcaeb3a8a5962acc9dedf53d0ffcc16cbbf3ab6a3122099ad8084c2755b9349c87d0234d9c
-
SSDEEP
6144:SysMYod+X3oI+Y0sMYod+X3oI+YlsMYod+X3oI+YLsMYod+X3oI+YQ:d5d+X3k5d+X3H5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420742214" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8854F681-07D6-11EF-9966-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000a55310afdf6dcfb832ed48ff882d6fb89fc49a210d0adc42ecf3698aa10dcac1000000000e80000000020000200000005e076f67b0c6db47351cf0a992ce32d6e5d72ef7041f65b623c36068be91e5b3200000001af2ae2766396750a3c2a39ca27a8da6907078ff3bdb5c073109c6b7c0533fcb400000002de85b5a726268a2d035780c127ea6e0e238a1f269501ca664421a4a1206c14b4153bc79cf67ff885e9c4d97fac26b49b52d0b4c03253288a567ef9a8cb667b7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402f0161e39bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2528 2132 iexplore.exe 28 PID 2132 wrote to memory of 2528 2132 iexplore.exe 28 PID 2132 wrote to memory of 2528 2132 iexplore.exe 28 PID 2132 wrote to memory of 2528 2132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c40ee646c0dd1c57c33949c3a24164e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8318f95f4b2c298937618f8e6d62b09
SHA1f16be121c06f491a1c489134a86278c2bf8120f3
SHA2560700a46cbf57ee545b7e7b554f7c926d786ce489e67b8a12e75a3c093fd7a504
SHA51210bddf7e284c7ad854e67770d189f2f860c36e2bae1f9e7549dbb1a441e95c78d7c08240d491b0d5c7d20d9f149f5c67fe5191c5434b8dcb51d1815eadc5c163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be4a50448e536a17b25b72b10a65aa67
SHA19ad87853b9830d8c1f248c88911159efa02740ad
SHA256a4437d8eeafa1cb5998e8c95268950cf147a84278b93fb4412d5e3e5df45fb97
SHA512b5e5c62ba0e154f991a4956c332182496895e1b4a50c47c31a3ad2d488dff0f75291cfd8817fc85fcf9ea976b23bd0df36f7a91eb668d4ca969da20f55fceb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1bf3c556c84e444c5c1f0be67ed0065
SHA181b0f3a61991003cf1b84ccf5633c138547464b8
SHA2568efafd9938c663be604281e2f879b04675fa901ccdf99185e0267ec7a72b49f0
SHA512b10d49b4b22e84ed66d87c7f9f9a8035fad6cf03b9e803eee81493b831f422468719acc77aec7784dbe411a1e20e7266a458c6cd30d913345aaf1e38fb3effce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5271927d7d14d5cbb0991fb4811c8faa5
SHA1de832e1f31abdf533523379b8c3b0906a02a2c7c
SHA25699e62121f8f5803fb730735697ec0ed9c34d5d8adb7616b8e1ec8b6292de19b3
SHA51246c9a958b75a519f372e27a2687ed5711d30e69bf165616be8ca89ef73f0494fb1dd462574579023817c0711d5d573436e884172b7ec7fca0553044e11b946a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b306013dbb6c0aef7ea613fc9b54c6c
SHA1bf01977882433cfd6235b40a88b613dbe9c6ed91
SHA25669f3a91b95574ff59c3db440584045053d2491784619ca4d649804317a8a3250
SHA51264b3a57b341fc1d58f1f1930036b23801d455d2f2912b1f460ab9159a3ebcac268756caf3d010757903c9ff29f89842817b6e19d917b49c8e031cd8a96e052f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d1c1a685f197b6cd9bedece6169b21d
SHA15117624dcc8f1f6e281c63ad5fb43a460525d4a6
SHA256620f92f747bc0281147202514f0bdb691621e62d3dcc86e3eee46ca3c6a0de06
SHA512ee76346e3ec8d8cb6d4f9c001178b276f3d9e5f60cb189cca2ce0bab335f9bc9c9dbdbc2ca94ce2d8e8b61bf2c2df058b9abd7a6b5c4cc2818c22ded75428e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e13ec5d1f1a979013bcf65215d1690e3
SHA17bc8b0be65188900a57067f5d28a612470f04057
SHA2565fc706f0c82c00bfdfd64adda6ad5549677f9b467c2dc447f4ccf66c69b8f952
SHA512b356c3d02e702310ae0459dac3a5d84f0533741db011190debc39adae8e1e05390ee8756a96a097e1ba885fc064d142ec456074b8d95b21448cdded05c784d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2b4c8d83d9e0a6df75aa720bb7444b9
SHA1fd5fddc4d3f8e42e39b536ffecdffb6e2a48c3f9
SHA256fc5c19086781b71cf6a700d0628e3fea027aa8c0cb406335a647dd5d1d89f8f5
SHA5122050950fb38ff549d6b7dd878674e90b26271f78e6aca1549527dad1980a35caa426932eb1ef8a67b66e92675168b67c4b6b11fbdb79ad39af9e7edc55d05375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ade9d5ed8d4b8d42ef52caa4da36a63
SHA1c0c45b496444d3d86205a19ea3d6b0937eddc537
SHA2567449df0467cd9e61f6a75cb662bea026b91124427f47b04d75d9e0746f0cd188
SHA5120b317b8062f7f677a7059650690d06277946c81c80e541034c8e1af19300edf8efbf3f2fc3c47604aa56427680a4b25ffa26d1ea09527fc7e36ce181ca6ecc00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595f048876967e5503aca23da9cb42483
SHA147727b872ecc308f6a2afec5966452edf0715097
SHA256a9caea2f6f3a956ff03d311511689d730f77d2d44ff9a05fb1ddc662a2e66312
SHA512cb0a6f32c80e9973cc702977153c4e8489dc4901f9e040b2bcb0bff6c4fbd81117455baf5559785548c7e4b9cf70774d6457183bc84a25c3c70f3a0c64f2ae3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545b566ea8f11f260eb1c2aad907cbc00
SHA120b94cf13553c8647aedc747dfce2e0091743cbd
SHA256e61493231066d3f75739e8d1d7cd3823ab7f1b08ffcfcc0d0e452d99796a1369
SHA5129e45700976948cbde8cc9e41fcfe5568f533a64aef2d46b011e4bbb8b07156f6bbde100349b8cf4a200c581e3121d8a6b6f667923da82e5babd34b265b4db892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56870463ce50dfdc7a112ad5158db7e91
SHA1d570df8fe6186ff061ac4140b8e4d9fa5a855247
SHA2561a289085ef382bfbde6abfa3a00333116744a231c839e2328b8b507c8e665084
SHA5127766849187314e8fc23072654e2ddb3dc6f045c5125a65eeb39579b6e9ef5ccddfca711af373112a1e764c6dabe632b4d7e6430ada5f3d443ab415a0938b35e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513f8d95ba6031113681d99ea07064eda
SHA13e342acb34091c815bfe65697a3d02d91120ae08
SHA256ef14b5bab35bf312a95f2e50d6a8a9be40dc58f4e9f0d68ff5d51f53b9269e91
SHA512f8de207c55bffd836530f91e17920e97344b21b9cf88fb3e06a802a60376e57985f98d33138d47cc0bbe2f91260674d6c925c6768faacc8a986c3770159128e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2348beb3d4d45658f66cf15ac82b8f4
SHA11e0e667fec9046b7627224a2e0b80ad74e966ab0
SHA25692b15019819dd30bd730b8369c65838e3d98606558462ead3141df48ae9d9fdd
SHA512983c0dd28d4ba8f376e65309af8613082bfc7ba1a45f5892a9f6a1cdf65f542151691e1b2e57fb91137d22dca4d5af8e1731690270dfbcd813e89ab9c05bebfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7ccc68d522b550a09add4eead8d74ce
SHA1b55417eb591ba6a2001ae7cc4defb0cc28540e9e
SHA2562ba2aef5f644e5c0fb8f898a17c09173bee47f8c942c89cd0192bc549b0b3c6b
SHA5126c6514a45739ba85b2c59863c01409a705436b4ffcabb3164fb40c0c450f79eddbecc9a8dea2b6d3ffe34ae3df530ff762b5ed674c3754bf25fbca8b5ba0cf86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f93f179aed910473fb82806ead534b1d
SHA1bdabf5858cf8195e85b2896940edc054464566de
SHA25659a222d59062cefd3dbf9fdb69d9f98587c3a4ddbc1a7b5852f5625db9e47593
SHA512cd14ed62d6e26c2cbd16fc4b65f9759d2b3371f5f4d2b10393715aa94d71d10ec78c14c0a4a4b2d665e2de6d04b63f541d0fddec069702149178cf2e49eecb72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52474653e2cd68dd00973bc43a71bbae7
SHA1f15c9a04c96b24d9b2c7ba6ef953179577501f25
SHA2562f01b2b8144ba7783901b32514bab6f455831106d15854259c774d31ec48b443
SHA5127a5452a95ba85cb6a47a635c8a352326781872a8b11f9ef0314400d9c1e96c1fd9e3e7be7079a884a150a63da73541383b87420ae71a6dcf56c7f6f98c05281c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e56c794354bccd114e1326922ed35a3
SHA1908a8d07e509af97e60f0601010eb24cc6240839
SHA2566ec2cc9cd02ac5dbaf72d26d1a23d091f75a3f15cf161ecf81676610cdc3e0aa
SHA512b259d5c99313c7651de45bffcc1afef8a6921e2e358d9ea40fac470bb2d3eddbe35fa0587cec6f7da9f4a65c54058349eb4db00d542992c4adc043a40ba8437a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595c84f5d14382414cee865e073fdf68d
SHA11f826fcb031817556677734a4986cdb16c46af51
SHA256248389e636153886c78d863f0b3b85e1a5ed633441b648b400f54fca58bd5abf
SHA512ae942ea5773409b78427149c126a3f5aa5012d880c4bca614b4dec7d82c73d5954fb558b7f238325102a5cbf822739e00267cf85df71627651e1cadb31c6768f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a