Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
0c511f6cf4faa9139c43e212021120d3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0c511f6cf4faa9139c43e212021120d3_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0c511f6cf4faa9139c43e212021120d3_JaffaCakes118.html
-
Size
28KB
-
MD5
0c511f6cf4faa9139c43e212021120d3
-
SHA1
a609b2f515ab4bc60406e01ef7f26ca09e1e9993
-
SHA256
c686cd59a40a89f5fdd4fdfb4bb003f6cca2df4d98116118ee6febee72ec4df0
-
SHA512
213ccf841726785054ab677be301e7c3ef5dddd14fb920fc9f5b072e2bb2946f62ee37299ee25837957d4ed0daab3622546df0322de092e715b073f75461256b
-
SSDEEP
384:YpU4ufQkIbkGL1quq0scGUZu33whue6gxZHOC1sNhxCTxb0LO:YpUTfQsGvY3zCLeaxAa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000009e24c40f99432c24cc67fcd990d4c2261b3d12953e30923488a4d0b9ed133500000000000e800000000200002000000082cac196738751dc922ff743ac3847b87230aa2f02e35cb4ed56555a9a78b018200000007bf7b08229d804f4d6c44e9016229d3eea2f623e03b6d8f7da438d7e21238b4f400000003c8ca7103ee6c48588a8032e724c6fb5f63682efd0e9757efbb3dd0e073ca20028130d6748217603efe65a41f1c4c7bee8c9c733e9f5a59036b21bb05590ec7e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420744131" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40121ad4e79bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF864021-07DA-11EF-88D8-5E50367223A7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000d0213b12d999edcbcf4b617e5bfc21cd453d2a5c96979e0f6bb804c08e5c8dc4000000000e800000000200002000000090aeb918de7ffd3380903e156edb4a22636c7823d581c0cf4dd49af2c9b9a4c59000000060a787a8572cf08b52e64f1f4ce01fbb1bfca300d2dcf4ec2e7f8f1d53e05ae1861b7e2108bbb1d1cf11067402c1740808a52034e6e13e9c89d8c16ae2b29d45775ffd3c04d13767af5d584b6669a900cae05f654052e761ac7009bcc4befc461a30187633d0f62226fec06a921acd53f80d10c65f0215e7057847667c226e8b4ad18e06fc044a1275341ea138926de04000000090658450fbbb18a4c070f2e0de9a982143d3033cf444833dd6efbd3e9a2c4d964b306464783cd81d4b507a4c62ce14bfe004963e25f87c2958491092024ea3a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1516 iexplore.exe 1516 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2568 1516 iexplore.exe 28 PID 1516 wrote to memory of 2568 1516 iexplore.exe 28 PID 1516 wrote to memory of 2568 1516 iexplore.exe 28 PID 1516 wrote to memory of 2568 1516 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c511f6cf4faa9139c43e212021120d3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1516 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5351ce7a1381f3ec118b7cb2cf8e11563
SHA153bfc5b0ca18631400492ac95d15441d00d1cc69
SHA256900abe9f0c948db7fe72636e4daecdc5da9c69286672c2e1e4086008c92cd289
SHA5121b482b6d3cd289c7780d8d57d1ff7a43a7a77e1b8822c83a892c8e2f67998cbf4369aa228299b4b2717b4e442997bf5d2442625ff1530141006cc00e3df404e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e21c31b0275fc4d05f6eb7d2aa440b1d
SHA1498ef9d4709ab76c6e8d3de1f552d8d395b092e9
SHA256d41cc6165d578523397292db2c50f724fc8144309e8c18d77a1fca2f335d8b5d
SHA51203382f7b6050b330708fdbc8bd5a3cd92b500fd6598d59f6025becf0c7a0c4b2d99136d23e64ac9dc250a1eb2c720fc8a5b5235af5ca59d920e7fa8e181404d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4f4e9281c389809806f37e9414045d7
SHA17f5e0aef8caf3195c53f05a65a21c12146bf907f
SHA256de54fbbac144021f73d2ad8d73a2bfaba9625ce057c6f6bad83103ba23930f58
SHA512901323f47397a00f02a6ec1e836775d33f45483601a5302a18fc92c455bc1603037dad112164eecbc6dc9f6b4aa17d1be51f99e7cbd9f07897b695e0e3a380d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531c60677ea562998e668dc865941fc5d
SHA14f5c94551a72d24ef46ff151860c083a8f832804
SHA256df19c50847c8bdeb6f06307d6601926f3f5e5f4a6a02f6dad15119e5771f49ec
SHA512719a3e2b5997d4992e36f08733c28abc2e7da1a2b1a0a38ea482cf4a303ad97d78c934e6f67de0886af533aa24964bc19d33b667f552d1e9d74a115bf8203728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c7fc806192595bb9218342ef57d0111
SHA1102628b9d1fc80bc3c967c8989fa2a243dd13144
SHA256f3fccc025d2386476ff13f29eef2022f30a3e4b5024762a91952c4a7b25cf15c
SHA51274f61d4c926d2cea1dd0894212333056cc0431ae27c954fbfc56f3b3d7146f543b5b249f9586ab0b7c5d9bda164b2d8ed9579b8013c3592ff0728654c2ba254e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e060fa7fb5dd850b92b0d73e771d817b
SHA133adc736f4e92b54b4c12f14bebd68d076166c0c
SHA256b5e6f9b31d5b5d810dd78380b2358a7de4e3d55f184d8b05ae189425f35ae691
SHA512f0940e801329d87e0acd784e400ce4a46749e36fc44624bd1196c003632250c7ce0239641e5a2e64b6026f119b2c5d21f293f629274aef32c15d58a63831a959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f847fd2ab8e7bed5a0d18bb8e5cec2a7
SHA10ade2b1826fc3d84754d0829594fdb959393f696
SHA2569f811b2885195ee88c7e3189b1f9f54cc0d18443f87183be9d7d31f6cde70c3a
SHA512c2f0f92caf27182ddadff5bafb5929ca00ebcf95a0281e71809e75a178124f722e1b429b28458805e2d1ebaf350ac4284b5a5a6f28ddce2cbac1f2cdef45b791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581947e0d9b66c765419a4b8e639aa8e1
SHA122a38dfefd97118e0bb3aa6d2b460e8f95334fe2
SHA25694be2f72993a6f6eb9a0c35391c351f05da7c1a946eacbfb389d7dc0c29d3245
SHA5123e5f2930aa7f51d10ebb1798c79cd04244435b3cc8b0add111df2a2b99695ee3ae22ccefaa161bb92f77a4d6b8dba6787d59fc8034d7903477d29f2b761c368c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6228108122d3a8c3fb598405da4883d
SHA1875ebcebc05b81bfebeb7273a7180bd45cc4f615
SHA2568787f6bacca850258a72139c959e88b310d87d2529caae9c42d0fb752a4f80f8
SHA512d1c6810a4001a8c4623495d9ba2d2b453672f428930277eda5d8a87a185951602d85b7de0ca31f2004bf7e9500eef1103a996fce61776d8661bba0a8f6996823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d26fffa6e3bcbf59c788fa06954a39be
SHA1c854eb59873049d42d8f526c3a6a0a9fde6a845a
SHA256fb8e8da430e5f0d42e5d2f6f401443c3fa8f1844fb10c83e484606813771c3ba
SHA5123c5fcee509f81db7a7058f32d71bde2c86b55dbdbcc46244300bf97b590d4d863522dee8645c439582d9c400d78741c7f9fcde96ff5cfdfe5f45ffd4f13d80f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5983c6cf838e55d9a2c1904d162ef59a2
SHA1d7e268b9a4bbe23b66de4bc90aca99c8e2d9b190
SHA2566783322f6f1785b0bfd2eb5000f3a794db81392a106c9e2f69fe007e3993d1f3
SHA51296bd25d9a2ce461341d9084302c4aae165345caf078fa8874816f670494182c3ad19f375aeed8c372e9aad67c6331d04cf985632b5e04f9e08d4b9af05494950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564223d28bd0e65006b2a08e8b0b9f67a
SHA1e01c59228acc38222e22eb6714bfde173716aff4
SHA25699fc094c79ea09102c4b10d302d656df5315541cf5c8da67e4d29b5eb5c2f026
SHA512f67ac924017c158a7740b30f090b3aa5ae12d0789da7eb111319123875ea987b5ae32181df2b5283d193623a4b911f1c9636f6176494ee482b17df7d78bf92ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2fb489f42b19bb134687f2cff961791
SHA1c1e8c68360d77c146c580206d148836d1e7949a1
SHA2567428ce1bb51075c73164e8181a8f4dc7514a4c10c9a878f8779d4b758527f7f8
SHA512d663fdd7c4d245723c13d6c1498956ab293e21c7625616a84ba9d5ea39548de421073632e141b08cd4ba99542932df656520b3284e17ac6352bdc024bc8503ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585351d870dad0c0596bcf52a04b7b5de
SHA130c6deda2f5d91b3977734105c2762d36dd933f1
SHA256f530f97ec183cacd98f2fc83666466cf82cd1673800758a983daaaeffacce4ce
SHA5129f59bd39d87f695d3f286be8220cb93a8527dffcd23aac6cc2e56f13da360bb0d0810e2e8dd2672b1421ebde19e9b11cfb825187bd0c20bc27dcabefe2662eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534efca66f8cc82047eff14982407e36a
SHA198babb4332ca2b57f561604e1623a8e03b7c5c28
SHA2569d8bf61b3a11c0426bd7e1ff5f05be98ac57eb2ff21dc32afd93283e5246a664
SHA512b03295471f7f63e2c79b1c602a66292275700d3f98dc700a7766c906ea4d6cbc7b24f82c05eaee93ab5f06a37b197c7c61cb2b09310e64d3fdb2a7f234b2cc51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c67b9d9e902e316f16959a8abd7ab8f
SHA11f92d5b8c2b93855d7ebd4984fa5af3d19d0ccea
SHA256f083f4f3b397f6a40c3d2b051ce17015f05728ac4c32939efc52e394ea663282
SHA512fb1468705ffb151798fec7e0cbb7b2f216b5e8a2a770c3cf68a7d744c359a8d0d8c08be8a106243a30e0824d634ce5276f9f26636975d718b78f9179a78842af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ff650d57ddfc2ecd5045d66616564b0
SHA1cbddbf5565b544c0dd9f1d6850edf2b8c699e54e
SHA2566b23ceb9bf6e281ab7289f62d1fc1dc3e2489c82395a221fd1bc6bdb88c63347
SHA5121cd5f80e7708561ef9316ef2e8da0b3e60d3f49668a9fefbe5f22ef9c981b0bf4d64221cac8a96e83aa7a52cf113799b0feaac33de089af9be0875c22e7eb5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58764364151b329f56293a44105304e9d
SHA1c67d78326bf80d14a709b9b4b2ba450443410dbb
SHA256c8ee9387611ab326a7f3b6cf68d32b4582f303a4da1676292d7520bb24e76912
SHA5123973c411a54e45c27afc52c939e393e0d9ed4a226ed4a86714106cf5761ef8408041c65a2eb45957f37fae1a9e3595d385966bebb641495c412187088dbacf38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc1ba018b647af8c0f8b5a0035d35dff
SHA18a22097d690a91eeb27b74f30b56d5e8119d4ec8
SHA256093e276355c3a566ad3fa62a363cab0b8df1f26c59c6987e0f43f3b32ae0e96f
SHA5125277e97e975b07279c76eef91be4bcecca0128c1050577728602de29869973f8aeb20077ec293378b28170a64d6099c772639509f340ce0c0b1399a1829fb1b3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a