Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
0c7d0fcf126fc2d5dd06eb0c49d3c947_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0c7d0fcf126fc2d5dd06eb0c49d3c947_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0c7d0fcf126fc2d5dd06eb0c49d3c947_JaffaCakes118.html
-
Size
73KB
-
MD5
0c7d0fcf126fc2d5dd06eb0c49d3c947
-
SHA1
f3a3f3a7e7ad420866ed4cf69e7ae8114812f32e
-
SHA256
7bc4625a561d031c7f04d6fffea82fcb4ba48467ad0b3bfcad281cd59a815d9b
-
SHA512
164b1edc76ccc68fa09fb5e92c1b744b0025c3f44c010e95ab9a23f60827bb47b49289773b28d80f6bd3f8be26c70378c26c3bf16d2157a7d669b5d9867bdd83
-
SSDEEP
768:Jt+upO1fyLZBnVWkO1fVcWyqN68aWLQ0pyywn/RjM:HJpKqL1KByqN68aWLQ0pyywn2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420748977" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000148b7a9d84235e415b3dd3b2b4cf4dfe76c4a7821e85cb34eaf5ea03075c953e000000000e80000000020000200000001b7c64f35f230e17d14f87fb7e843c24f4c4c603ee93ca724feed9b425a6d4012000000001f3479fb73f3678ec2654586b2387395ecf2531eb120de9879cb119859e577640000000f74daa7e59365518eee4f6c59af130e5bd16a3834cc81b21353972ec1167dc8123e669beb3d6cc973a93afae93dba53324c6dadc4924cb89b7fb077eed5b259e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34E6BC81-07E6-11EF-8B6F-CA05972DBE1D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80df090df39bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2712 1956 iexplore.exe 28 PID 1956 wrote to memory of 2712 1956 iexplore.exe 28 PID 1956 wrote to memory of 2712 1956 iexplore.exe 28 PID 1956 wrote to memory of 2712 1956 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c7d0fcf126fc2d5dd06eb0c49d3c947_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD556282e3f56542f67e60909a4345c5a35
SHA11a627ec9980ee9e3f5846da3b63552122032f78b
SHA256719698173bbfbb3375c5e0c43342f785c76727fcd6560364e0d9bec77232a6f5
SHA512291a1569239659ae5c1466d324f6c0114653f2b1578e59f1f340decf189aa38ccf9599c2005551e09ce94f2bceb94f64773181fc011dc1167edd4aa9b1b4d11e
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f8381683ce729de502acaf5e9eaf5e05
SHA147aa1e76a4e2314de26963aa040bcb3d211f4755
SHA256912eb2bd3a897ce8d34a25e710ec3f38109139cba48df1529c424c0440d02959
SHA512d73cc6e4f0d583a64e37dbfd17dec7b0e14f63e028f43ce40ec07346d73f6c6c0ae850d9365a1be387573b61dd8bc0d4cbea61f9798ae8451f44f2a8d77605b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3f54365fbbdca74c08169b671228630
SHA1051fc6ba8a336e793c5c2758b6c67ce39b086e56
SHA2565a750e4ed696d821dbd3913958393cd2c1e153b7b5c60eecad4fa4e7123deed3
SHA512e7f9cfa148592e5e725f2c442d688830153c9e7bfd4cdde71fe68c6178ddd8db237ab2e0229e481e65f1b0955351020dc878a0ba038bf0c2d86c19d5e8eac2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c74d6050cb77eca9fdc5c68b0beaf2a2
SHA12d611fa10ac3b22ddae9304757007729fdf57587
SHA256c4ecf13ea4546234549fba99ab16df70b6d44f9d65ca218fdba27fe1c1d5c1ac
SHA512c144e507cd03f9898f4992be16f3cbb17251c75c17615b012928d318608726e2072586c8ca9fc42b0ef451618e803e5c6f85df042853c7af482ebb16a6584823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b6e94ade4ef87797f761c07f38363ae
SHA1b153947009cf8e8312935b38a0babdbc009e37aa
SHA256112faa4422dfd797ba8bd48db0c97700e7b7fe419297f5d2033a94e888072e9d
SHA51211b5e57d1f8bab58808d7399cd23622a93f60115459f35001baf08ca31ae2491cc503b833f6a72900daf153149b2e020586aa89bcceceb29296ea076608db83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54297102bd0096a87eb51dde5474ff969
SHA15d4afd87c4e39255aa2ec784397e286f50769396
SHA256adb690b7c802e3e18c23b60ce7b413bb86ec87a3da3e34027217ea077b30b204
SHA51264d0709fa989a7d1265ddfedfb5cec1e63150f27898807bc4391b842cfc50a749f9d7a2e0edb58b072ce4bbe7d569e8d0d14d89d2a1c34829584d53301808dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f440771df20ff15454f8ef3344d3dcbc
SHA11880135df56b3bc90937132a752ead14ddb9e877
SHA256c1a0fa4386738472f629655215ffd1c71f41f140f4e8a49baa731025bb2c5d53
SHA5129cba83fe83f0b98c09561a987c36363f2cc599130a9418bf118484593dcfebe01360418f0c3eb09b89f68e69e0fd9c67f24dddf476bbe968504976a6a8c14eb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ed8b284364a2f00ab10c5e006f3671a
SHA1e05d77b32c915bfd9685156aae3ba09a9772b31f
SHA256493865783561ee4267c48f98c266cc6cb95963d4c59adc158cb4f73b0d7291ed
SHA512e88d74770b53f365e9d54dab7dfe7ff53a3e1060c964d77ea3afef9d718960c6f2c9a59a29fb57329820cc778b82a6333a4e59077392c4bc8443d5158416533b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c356709ed430ff21366959d27eed299
SHA13709b6e6ff088d3e71f6c8ec838ad6a144a50cf0
SHA256d00bd527fe37771a7b3b560e7a3a9d1e0674b44c11873d7e50e67c649210c045
SHA512234cad4269176726ae8026426b023e187c2ed3a217d3f55329ab19ced25f20133e3269d821057f12cf63df2633ab70b8fc1ebb84817ba5bb6bb0b42690479d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfbb0a204335325c6abb12675a31a4e1
SHA176e7cfbe054bbd2449d871146bb93356960ea035
SHA256f75f18ffb13cbb731e2a6da887492d38849fef414fca3e1422a48806361ef503
SHA512e77ac25db2f2bb97d82b15cffe835d9d09c9b55f1db60bda952fbd397312656253d24df0556b4b189b48e0af79cd3f6d5a2fa1580d7dcb17e0cd759c9e75bbe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5484a0f4f48112c93afb888af138566a5
SHA15016b5a6153a83cfac0c6c6f81a04e036b473056
SHA25642a092a878bc9e55dfa5069954cf1dadb659edc8c4d1e18d6d06f87395445cf4
SHA51274b3a61519a4ad9e8e51a49d0b78c8e9f142820f341118740a2b70bb5f6fd75f5c211e3351816c19dd063863025f5ab3de38e6cae2b24257dedc938cdef9550e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa4cce80db38846c0398cfe10fb62b12
SHA1e69afab33864456ec0e6fb6906f4257203b1a2b3
SHA256b183b0ecad520617902aca2b74583ab2a84f6e3fef94e80a8e6be5d2ebe14707
SHA51212b22e20562296307849c6be97cc01b4ce42e329ead2f64ee332fc4d66a93d414a23419b6cc0c2d313dbf32ba3a3480373ea4e80ea99460c237263ae0eb36378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b994e071edb7c40a9bedc13222affbdd
SHA16b6ce7096a90b7b3406404c3f9cde32ef538030e
SHA256b5a5fb927cc269a7dfc426a2798fffb59ab4acf66e138f5c5848d490298d76f6
SHA5124c575d92b89966b92acb74c45b13e9e09ff1d994e588df1f4bac515c2d0a2369393f7a2ca8ea3f26da797cd4b0b2ac2802616675529ae02155597fcc5f8d0c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5daea418c17a9d1887cf3e81e2cad487e
SHA16a0717cdfa05b212c3350cc1226493fefb25f719
SHA256da19bcf4f3e352499c484411e5ab15b2b1187c21b76f23f0f993e154768d2507
SHA512cee4fcac08e0b3d59bb84374213deda8b8e558658a6d9564c4744ab2fa75fe50097095c8be1c5087de9e66d1f1bcc96b02e1faf7eb4b9347741c48b0816169f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD55b65a4ab1d63b8b80100ff1f80bfa0dc
SHA14ad658d99bf3c8c27fdb1c14c9ba10bca34507f8
SHA2568740b6b3a5f76d8dc46d732c75bd75b2ba99a5a5378df5beace2f8c0bb28a791
SHA512b3bca4193cef88b48ed2b1c530f2c9ddc029e01d3ec0df3d88af40be4fc4de2ec48765ab43d71a24c816334fc48945006039fe5e1199fea8ad796157bd896925
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a