Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 20:27
Static task
static1
Behavioral task
behavioral1
Sample
0cc50ad72a9f9c087f7f843f7f202c97_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0cc50ad72a9f9c087f7f843f7f202c97_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0cc50ad72a9f9c087f7f843f7f202c97_JaffaCakes118.html
-
Size
69KB
-
MD5
0cc50ad72a9f9c087f7f843f7f202c97
-
SHA1
f219e36aa619c7ca7877e3aae1bde76b1ceb1182
-
SHA256
6160d68b6f2026a0a4f51f94053def9d460fc9cd0c68a5767eaefcd1e53b9970
-
SHA512
293e675729fb38a8bec45fd587215a4ee77154f5684be5f4c0953d20af716390fe6438e868d28cfac2160d3918cf7376238d1c3b6241b066bd54fca21544ee21
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sT6RXHtfh1oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:J3xTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A954941-07F9-11EF-A596-F62ADD16694A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d2380f069cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000b7430b953e04a71299ff3e9688a39753d3530e8cb2d08a3e25cbc7b15e8fd704000000000e8000000002000020000000a439ac6f6d4d9a3cec944fac48f2f8d939b977756d3d8d3a1458515668c89a012000000062294bd354cdd7bbb18f250af23905f43190366795bebcacb55d6c21c3b0afe54000000012617fe8a9940ce89e9fcb702b98279ad746eca52905046aea5afac8a8ba6cbb158fc956a0477ef88603c69f7825e333ff5213dc36753cdee2a9dd9f145667a5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420757115" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2584 2344 iexplore.exe 28 PID 2344 wrote to memory of 2584 2344 iexplore.exe 28 PID 2344 wrote to memory of 2584 2344 iexplore.exe 28 PID 2344 wrote to memory of 2584 2344 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0cc50ad72a9f9c087f7f843f7f202c97_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c760070271b4f977d0110b1259d5196
SHA175ea72caf86f175c976433b0953aec65272dc403
SHA2565fed57da4d5bdaa4e569d9d1fbfbbab4da20d9f1382466ae92a2084153897a3e
SHA51207593702a4299094ca5b7a3b78140bf75d8854bbe9986535255e1cee8b4a9ebc8cdf0fd9acaf9bac171ec747759f45b36cce26a55d1a878acb321e3f07207f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55961c3f76e134f737e8f6b7e6ab97411
SHA1d188cba0d13bb300dc9331134ec10c206331a1f0
SHA256cccd677f1e30f107451282684fc4a909ed5d5598419c5c5d90f558fed088978e
SHA512e14fd7f6db02cc5d54845775a1d64488801a854b4617e8dd0b86ea47b7507005f9d4a3195b12289431e8e47b043e515076aee1cba49d9969c9a3ea2c76b60df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ffc9ebce60914451ab9bbdf788d22ad
SHA16bb751754d8d919c7af0530d4ced50ecbcb0f81c
SHA25605689c43f9d38e23caa88a687a8b7660a7fb8de1021900278defeb31d135ee94
SHA5122e788ee605c85fc04a7e58438b89ec2a6732bfe0bce95579bb780ca2f787b17c57974c9de6881b81f61b69c6e6a717839e46dec1165a9754d1193a71627dea6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536b43196fb38dc574b07d41cdb3d6154
SHA102099f8222d23066f3604ffea9b3b81078243db9
SHA256b389607e9d4d8dc41328eab6874858935611d17656e43d54507680a98782ce47
SHA512422bb63704130bc2af98f940b7e7852870b690b8ffc13586c270085809b8b1e65b97c22d570c4c1feded5c4bba3a94eaba07c8564a5218f125eb3423e1856bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545fce502dc8e15f0ddcd8d9427a2fe9a
SHA103772fb5d5ecab1edb95749f3f816dd0bcc53f6a
SHA2568c9f5744c9013f9359f6f396db2e12e2930e4dd6f679c3ad7b5f7f7925dbaf94
SHA5124353f3d07a933657841bf9352fe79520f8787b68cc9843ff50dbb0e8ad18340030b03507bc31cd1e8656e6de0cf282fc7b19b7215ca30a7aea9fc6cc4b9148f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541dd15b777638a65e6a28502a5e69a4d
SHA12ac0c1313ccc8567371e5cfda0c5fedf192aafab
SHA25667d35c3b9c57c91fa1b7d77ea8833c4f1bebcd06c1a0020fe08d4f81bdc17f8a
SHA512162ad83c39ddecb4127ff8c1ea2ed99f543b8bc060b0d0ff6abdde55c504248cedfc57c7af417918c000b17112ec198f3636afbd614aacdde7177e5a0ee0841f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533ffaaa8d642a311e44f90a44b1790b0
SHA1d9f37276846716a53aa20a5ed8b3e138e311121e
SHA25653f2f431d6f2e9043ee17f4562931633fe6ff82bd373429474dd3c57f72b65ca
SHA51254c92c407c4461afd86150d7188df535262ac89ffd46f384c9edb6eecbf18d7b70431481a5c65b7f7bb1a813b095394a699284da867a1463508bf01387eff4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53aec4490f7945c13231db54bdc73eb98
SHA1e305c708c6d08f7359defe5b26dadfa7dbc0bdd3
SHA2569dc3e27c8556a56ffef86a1663753a038b81613f6a81accc72b2cf8e41d71755
SHA512c3d008709b39c24c34876e1b4016c11525bb9a9af9dc1335572de2fbace2b24bbeb6b37e53248868cbe571ed22c89744ff3ca767a86cc1510dae32ff5d9f38ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5871c2967a8808b7e099ade5b6abc9c82
SHA1f1485953f95a06670d9f76ce494d9b323c905be4
SHA2563a6fd2e5fed99e2caed676c137107566fab26bdcd8d6b3d808d3c3c191cb3f8e
SHA51274484c19efa73c000df7f93af3edaf51bb4398a39c2cc51e34a1a71e5ea86d09f65266081b6bbe7b8f34f08ea567d9b5573ce65eaa31dca64ac972a87deb24d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5972f025971297c897235522cc6c378f6
SHA1e97b2e056862eb5d9bdcd86f546fb72d0e8682f8
SHA2561f05f34e54db65e734da54ce601deffc35269b13d1f75d5eb1b4c962150a985d
SHA512ca3dc2fdfd3377115e7d10393858df429d04d34cd9b28c894dbb00a36feacd5499fd85a374bf8e59792418e4a5d2d348dc617d87c563d5ce7f7d0c70e50793a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c95f91620bcc62cba21f860a430d681
SHA1214fc2727b8c146bede9d4bc6095b88ad9bcfe3e
SHA256a5d74a80ae6a70a044c6d3b5ef82c812473b1c192fc02f32607ddfa9ef9edb70
SHA51201e54be75fae64ed6064192eca8d6c8a97da2d76656b09782cac9fafbcfef75303117d96a5569dae2c2680bd5df274c968a48207a32c04638511a8e598dd1a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a381927758e23935f1b9c9de8188ab7a
SHA1dcf81ede574ab0e41edccb3fd60387a30d80af3a
SHA256d1c3bde245bc317e659f0731521b4bf4715dee79b0a26af80462a12ba8709987
SHA5125c08053e8aa318171c4304d7bd09dfdc3a1f4832a84b93717c37b54fe10083af63449d4f910639368b8d1ce09cd5e6f82cc2525ca10c68449119b8db290799ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545ae72962bbcf8ab29df09e61b600398
SHA1cd3b69a0fc0a28d1ab9374c68abc23bcd3669001
SHA256cc5427aad4b092555d18b38bb6a8dae3c095ee4b5dd64c13d4b2f321de028d46
SHA5121d0b8d83eb97dd6d1c7b5dcc7abf8f05b2bdf0c587a08bf28d3ced31b83944310e801201f4d759a12b66b0d7c7ebef262cab93a0a6b2c15fc1929f371121bcaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516f1795f54b1f2ae6ccedc4370670a57
SHA15b3b93ef0dadce20a2b17679df2c810d97565675
SHA256d2c9a3c240022804ad1977861644355eb986a3a9762c15ff37433379c48b4460
SHA512144336dd5803d42f986d30c7a4181836284599e39df9e56e2ba95d2eb24111a2e378f4480b99c5084787e7fa85efc5993735f56f381fb5187e143b6aaef41629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce2f0ab12806b4148b5828fbc89c7c18
SHA1d0ef4705365783b38876f3ba9d562b77d3a4d2f8
SHA25661102ad10ac5b62a3dc3bdff6100a5dbbdf580709107bf1e7d848bfe49c92f3c
SHA51270da96e00194e98771f07725dc5d941ec973759c23fc21cc92c065f33c990453094f2a97d30c1ee847fbdc83ced48c7d4ef6edfa28806d16c2451d553265fead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56365165c7184a80513718107958e3424
SHA1ad2093c4d34f80dc8f129337fb75e71fe2352f74
SHA2562e4462bea005dc90fed7a4bd78c46f1140c962f29b614a43ab4e6b6809be4ac1
SHA512de12cc0ac59b61e01bc9e39920744ffef5c8350f023d8be3cf1422afc33d399a50f4c547b13d2614c5b7ed61e59a5a20310fcafdd19e486b2534a96525375f37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfb8bbc84858e332b0f6f7905244c3bd
SHA11dd1f14367290ad003c5e28c016f2b6fb581f1ae
SHA256f85564f4e846b9804877866570c18030cc0f496a9997630e54835c96492e4768
SHA51290bc2c7f6cb8d8ba55cae0ddd79f22c91f4354bac65cf1f4845fae984a1d185564fa4934cdec379effb94efb1463416fab9fa3ef2d78ff3d3237f2aa1299eb8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57faa4c2ca00ea6ef39c12e1115cd4381
SHA15f955be448eac718f4415422caffa7b59cf7f220
SHA256e6af980c78bdfb60576ce0878a72ddf2b95db07df20f566cfc6275aca143fca9
SHA5128283a5640a4e76892d179374d9c86e310d0191f957e8a1b221a3c87f0aec835cdfcd7b7f63e57f608d87e88cfb17b5fba281dfbbee852afd5804e8f65436079e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a