Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 18:10
Static task
static1
Behavioral task
behavioral1
Sample
0c7c73bd3a51e36844264de75f816faa_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0c7c73bd3a51e36844264de75f816faa_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0c7c73bd3a51e36844264de75f816faa_JaffaCakes118.html
-
Size
36KB
-
MD5
0c7c73bd3a51e36844264de75f816faa
-
SHA1
2119103eb546a9f9844b27e6e483df9ef2619c45
-
SHA256
1553ea09024cb8ec9e27abd3d1f6513ad330f7d149d820789e5be27e04e83abd
-
SHA512
1c18b39508ebf407f8a966ed47b9da0a1ad9cf1e82508c66e29fca9dda0c1707e4ef761386e4799caefa1eebfe3b1a0ca8d47ebed92f286e54bb4b10753f5f65
-
SSDEEP
768:zwx/MDTHas88hARLZPXSE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TtZO46lrl6lLRcd:Q/PbJxNVuu0Sx/c8OK
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E22F051-07E6-11EF-B012-52ADCDCA366E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000002a512ca80294e39d309b3b607ad773eafedcf042ff08357dd43b768d8789f80e000000000e80000000020000200000007c126cbae0ab273bd0d9c53c70ff94b9fb7b83f2588ff50c90b2e0943bea851c200000000deda7dcd3fed8f81527e837f7ccdac4c2488cecd3165e51c80035d88a34daa640000000d255d663c10cd48c9272851a589ed84fa7bdfe42af5f1381298b4d144a50d853e9a221c2d7328ee25fed4a935253ff8b66013a0bd9eb6824450b22c68285c53c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420748915" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0303fe7f29bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1688 2040 iexplore.exe 28 PID 2040 wrote to memory of 1688 2040 iexplore.exe 28 PID 2040 wrote to memory of 1688 2040 iexplore.exe 28 PID 2040 wrote to memory of 1688 2040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c7c73bd3a51e36844264de75f816faa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b4bf32ba4aec2e04aadb2c7e6a149c01
SHA143468d8506e922c1d5ea9554df36e93ad25c831b
SHA2565f3ab5c04111898daa95deda4d75646219fed2fd887c08a3e85d4c2aca861e9b
SHA5126dc78093f56d370a06a5d169238a0b16b22534580d2c056e1870114b864eb4ce94ef6d0af099b6aff1b89f20f0979a457adf7f0f19fe03197baeaa01dd2f05c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c97759f5412462dbb3c33aad98aa9ef
SHA179b26a6413e7fc1314c53ec462a32ee1b3ba9c30
SHA2568b741cb541e8413fdbf8c297e652f8f8b947c17ccc8dddd423549a5a00b3cea0
SHA5120189166f30b333f36f5d4e3bde2e44e6f98823273988318e67a6313ccb9426a245b92df101511321ab1731f458a478a44a3b18130bd4b150ca6d4d8ea5ff5231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538a414c2e13829922c20bacf1d49631d
SHA1eb4533f7bba8dbec4939a8877be27ec7b1a859fa
SHA25686d80a3ffbb9fb51cf3363e08d4d0eda908cb392bc81d5d4a5f4c8b8f7dc7579
SHA51240106ca26b64b59eef1668d4a856bcbbc635c4d1d20be7e9d6fd0853f9846ee250e2915654f6642528cd3bfcdf0e4b31f4509da825205bd291d708866fee00a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b46fcd2aa8c39252e01dd39113d5835
SHA1f369b1df722edcd3a73f72f5b7bf704a5524443f
SHA2561c554dc216581477bd50bb9e253ca3f534ec2a46b7305ad420df08c9798f46f8
SHA512e8a4dc42c218d0dfd1d9699a9fad89892d912c0985c4091501c1e0bc140ac3a2d59598a9df4d58678d38005dabd3fda3e4d52cf4f30e283b6a4d57ebe9b478ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9604f4fa9ac01cbf1144c39c2da67fc
SHA126fd41498e1d6e14790911eb852f5c4b3fa39979
SHA256c4ca21dce7f8b9a886ac6db24aebb6c0ce769ee7537cdeaaf44f44f34e4ce3d2
SHA512716846f96bdd44baa3ab5899b7f78852676c5f36ed521d5780fd2a5a511f52f2d97772dff3b87c23ef81cb4ffc6b5ef6ef42bb2e190e944b1af67e28231c0897
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9c87605d8425f61a7ae11295277c441
SHA17ee0f815bad6c25ca8c58302f5434f903ccc5a27
SHA2561665c46e4261f391f9d8f47f5859dbceb7765ac2a6e36c278d76dd8c1efa9b72
SHA5120e5a7c38b81383991759fbabd1d6f0903e7762d50ea0c714138746636986637e83ad062ab5d1b9fc08d1f5fc510a161493929644038ab75c60ea1408f78f96f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c6ded9b0ad4f592fd9de4b5e39b7224
SHA19bc01992eeb2cb9586ee4df134b0adc704777863
SHA25689ae72a7b235f4b7fbcbaf176b5649213faf6cc75edc5627c5f9b2b58c04dc5f
SHA512bb1ccb1a27645ec6960731f3287809c7bf4a6623157285bdc2dedda335d7011c7c43f40fdb52ce3a194f654d5b913ee73e8a821596ad59c24cc6563c13e74ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569c901d7c873a4fd134ace21237f9400
SHA14b67560ab89f95ff35f6230df109890a4e58d41b
SHA256508d93ded677603775a74a1bd307afd56501ef962d18574338c378a268ee43e1
SHA512509c9fa13b78107e6290f23c52344ab4849ae6b08405d0eef5e355f59ec3afe9af02e60ad49255474a617e612938acffd269b0692186001d06798c1f35d97eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bda7311783e729474a5a7924ac5f97c5
SHA1033eea1cbd0e9af15db3a0a1012bf0582177fa6f
SHA25692c2b9e3e6792dd780f5fceb4d19c410275633e227343b8359693dfe2c557dc0
SHA51247d823ed78e76b7d55ce0d2fb85a355e718b256416bf368e8e13db07d8c76cd398d651835124c2bb66538898acce5934303050fa934e11cc69ae570de6eea43e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5da000163a3edb9e608503b483006a95e
SHA12a2b3a164d802035d40541475e022fa49a9a4e9a
SHA25676e7e79b82349a3d57c4d8c78b4fa92d7cc38ddbb875961087863c93f54337d7
SHA5120db93e56328536e8c1d25552f2857c7fb6af5a12ca69f2e8497123d55b6f23a19397d2d6d23ad06cef268f312b8a5a6ffc766fb4b58c3dc901cf6805189f708b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\ae111d25cbb9b2d7293e8bdb2fcfe8b3[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a