Analysis
-
max time kernel
120s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
0c7a4dab5418d6d86d1cc1c18400dd0b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0c7a4dab5418d6d86d1cc1c18400dd0b_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0c7a4dab5418d6d86d1cc1c18400dd0b_JaffaCakes118.html
-
Size
6KB
-
MD5
0c7a4dab5418d6d86d1cc1c18400dd0b
-
SHA1
e4cdaca951a73183b9d911328b3614e249d487f5
-
SHA256
432f070bab157c5b64e23bd97455d1c141104ca97790dd1f947fc28b22ac9993
-
SHA512
4bc03753c72e2f62b277a08b043413a7eedd583fc8c54698044d09f3fbfe908479024e47b241db74c9c5a943fcf24e91078f7cbf727f4be60c5a8633a2fa0507
-
SSDEEP
96:ihM3sHfaXidSw5sKUJ9c56mpgpvaEGjWhWJuoLVQORS:ihM326Og9c56mpmv1GjWoA2g
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000008e1af746740c7c0fb40caa59d0b55595f429beefc1d280863f94edc4bbdae5fa000000000e800000000200002000000005a702d9c636a9996ce8f8247120985ecf06735b44b0a0b3dda9382d4625553e20000000604f23efd12a302e2ba8fc67459783263d47d93beb86bc76d2504669d865318d40000000ff7d3dd35387ed661e11bc250c7b1a022634aafd22ff8cfd6be609436e4ec60afbfbd271c93295babb24be2a018d6f7cab1b5ed8edb125dc39a0fcc802c5ee0e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95B56121-07E5-11EF-B2DC-EA263619F6CB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420748692" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6046bb6af29bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2456 2888 iexplore.exe 28 PID 2888 wrote to memory of 2456 2888 iexplore.exe 28 PID 2888 wrote to memory of 2456 2888 iexplore.exe 28 PID 2888 wrote to memory of 2456 2888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c7a4dab5418d6d86d1cc1c18400dd0b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5167ea1def5def94e2ae458dce9ec3a58
SHA175338685d2a993228f6bbeb362b7325ef5b28e6a
SHA256d733b2190a1f22457f80ccbf8b89d4518606ff08d9f69e81cd0392eab55dd2d4
SHA51200316465b26faad14496b0ebff8991035711ec7c6c03c3756fd33625429c0e10e22373f330b963d5782ac0cd62064ba02d9201b2bf5850ab22f0611d92d4d98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5031acb53f7a0995d096e67799723c90f
SHA16935fd56482f8afb695af18879611efaa40b62cf
SHA25683f2b3d44e9a4b7e649af85a8c11755fa4cabb682e97a20e50218a2a718df937
SHA51295e0383e32ff2d72c7cb2ef905afaf54f7c022b8be674c527146a954828615c6f1465a516594c61fc7a6e41b63e9531907f89692e05adc32355d02c6bd4833b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5827874573cd5a618209e9788ee0b3502
SHA1fbb8c2a06cf1056c6bd9665c24914451f0244c42
SHA256824dd9e3661ed975e7a4e561816ec33a0a161838f22dc537c355398cc9a6a32d
SHA512173887468f44e84b349ce9116bfcda8924d14575d2e6fb741c3b5a2c1b40def64c7f04bca69772f285b5341c273d73961a162ebe2843acfcaa609bd2a8134e99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53eb81894e20c3e4e915eaca2c9ea2cd1
SHA1145ed9b49e824233d00037440ea1e45b49307356
SHA256d09f290b7c586d5cd762d1ef004bb1f1553767213333d2ae0d9a54960f041e81
SHA512bea3cab2a7504aaee1dae6a70b90ad3469ad8feb3249cc004b22d626b6850874eaf3db03c18ebc0ada8a1283ef8f2dc11783d2202a969a6550f29bf0418286e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551973069ca2f28d3e96caf98244881f9
SHA1146cba97a172d40eedc3eb7c577e155bb2b6f807
SHA256f605b6475e40af2381a9bdd492bfa7b71228396a8c55dac9eb2f5a17a19ec5b4
SHA512ced254f276c5b01e98a903ed991ff409f41190cfc08e56c35e9a976309789f60f740e5083ed25b9138e6602d92572e07f50cd35e64ac353d79b48a3e7fd6a992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d112b6265f179ae54f632ae3109b9c7
SHA10ae79ae552e8ee5afa9138bf04c32fb1af55c02f
SHA2560d78a06072b6f8ee8fef338f7b19cceee75da895418e026d8ee12986345fc002
SHA512d0fcd6856e16b714b353178d6086a3c75f4531c7e135a225e54d1b0ea341f3b2e586cf39d739ff5339ced56a74b0e99beccc892abba52d597d8aa7f842169452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5675378c5c0abbf71d858007fd75ee8f3
SHA153efa959384067a26d3c74321b4f3e4fe1b6ddf5
SHA256d5ab297e956634271c8cab25a532b7d02fd37e156931639a376cb6c30c19dd6d
SHA512ed60f645936114b78f7ad248cca59ef552d3b19724fc0eb2dafe1f58edb77c06b711e0e3d0d54c7cab3ff7f395fbb1ad40b90c9ba92f0d88c3c683e4a59c9003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df87f8f8c49a781adc55d747311f3449
SHA1da0d23bc75b49f67cc383c3ccb8d411e6e5f6e5e
SHA2568dd165cc7fd0024c8ce03186a45f7d34948faac31589911591c9619b4c674ffa
SHA512cf4d385309a359b1bee261e78b1e8d04245d768c1168fff0bf8c58bebccb005aefde219a86d7bc8961597d654428a7e0bdad40cd0ccdc4e66c4765d910ad4647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e19f0e7d6111f7f830e4a8cc8d5e309c
SHA18937f4772611d52ea28acc92d28956ac15ea483d
SHA256b18a6cb7cb940b2eb993d69394414c5f38539c04ec8d97165bc8d41aaa54c419
SHA512a67c848836ddbc92b8187350c3d6cac0cb26fca4740f41a59d65109d4433850ebaa3699816686ff58f86a510253bfc79028d455a52b62ee6d57abc0b3c37ab34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fc3332cb5147f0e150f2da899721fe8
SHA170a4b797afade07bec4e01f65e7baf83a265a41a
SHA256ed45a95842b703daba9fcedbdb4cdf5cf14f6f32ac9c62312447f613de933a7d
SHA512d1d959103dfe931b38b8924f96c769f7fbd40138187ea1c4a47c07cf764474701bd2b0e04bdaaa1c619dc9466fe853a9ec12d96d131498149273f5a66337b538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b2c8d20e6e7b4c333749d1cb7429460
SHA17c1e26809c8d0ee89e06a479b82307daebabb14b
SHA256d013a312f617f89fb10e15e226bf19a3866dce33e6f865644ab1830bda413be6
SHA5127e7cf4d363d8ec1e4be44c9796db3c63c1cc3a15b39ffccfc61008bef3a526257b4972517b5bc8a3aa3072be900a5c6f9522602441875c4b28fa8c08bcd6af04
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a