Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
0f0d610489e72930004e829cb41bee8d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f0d610489e72930004e829cb41bee8d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0f0d610489e72930004e829cb41bee8d_JaffaCakes118.html
-
Size
15KB
-
MD5
0f0d610489e72930004e829cb41bee8d
-
SHA1
63bc4d0c78f20a3b7042fe5220eb37f9b14b1e38
-
SHA256
f10e5a27f12897026a474031077ba365f280fb019157d756c4058f8cfb7ec556
-
SHA512
287a6c6a12453804c4ba9ae91aba9a247d823534723daae5acec8851c8e56b41d585cc1a97f76f5aa278181ccf44d56132116e0e16d6114b6ca4bbf2661ed6a2
-
SSDEEP
192:SIHaepCrvvcD3LL9AkC0mgpteB790+8737SaL1Z:SIHx8q3LzXpYNQ73771Z
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70060263e29cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000003e5c34f3f0488d463c57ab0c885fddb3990d559020f10ec2ae65484eaa524287000000000e8000000002000020000000dc257d91b55018506085c8fe2a5f6b81967fb9cd7e4edd4b463ccd0f01e2255520000000bdce9c8a87d18d16aa02246b79031aba25483e37871790efbbb6ff6c090797ec400000004956bc23530ae429e44df9d182a61357731d5378cc42415b5ba9b2b928351929731e292a3f1ac0ddbbc4ebf4c6ad56011ec488a3e441ac9de3c375496f86648b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420851740" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B788391-08D5-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2332 1924 iexplore.exe 28 PID 1924 wrote to memory of 2332 1924 iexplore.exe 28 PID 1924 wrote to memory of 2332 1924 iexplore.exe 28 PID 1924 wrote to memory of 2332 1924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f0d610489e72930004e829cb41bee8d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552dccd90461181270f20e1cec07b4aef
SHA163ce8fc87be06c546558754c2a39b2c79ee49040
SHA2569780aa26ccb406a15cdf9ef64163ca1fff22dee05f7f193ecb1b394f7036c5ba
SHA512c933f818824c8d0c30f94d8c411ad17735eb1c8383b4eefe661176393ae9c8a5f0464a7665ee9bccb5d023258d02223b9fb522d945c92a05f41969dbba40b7ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c88c9d87f5a3599cd2a5c0080fa0d75
SHA12760ca9be1199af11c76be096667b9b97a349178
SHA256440b95aeb26222306d9f6cf2fdd123107ca5dfa7b3bb1478ae9a00ed9035b583
SHA51215f96c5355b64f3008aff53979910fe67cb845c6a6b65d486699001ccf36ca5ebc6a22de2adbe526c90d9820716a200a226694f7e0ec79b7a2ededf447b18c25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58643fb127e19e94ddda3523978d523ee
SHA16376843011d939b1f465e8c8fde6f6fa1f2f0f6a
SHA2562c05064dcf9ded254679070cfa00448b2c3fd2ee9b8700cf449048340732cbcd
SHA51220a36cf7b65cd732336f21b13724dc83534051adf5baf8554f1cc3d7f969b895dbdc1cf0196f3439a9e1f2ad041fc121b4117d5c1979d14ef7babb5692c0b85c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9afbde183f9434d3c06afad3c6060c7
SHA1f6a509e60584c3944a28bf23396732185103ef59
SHA256ae006d76cd176f5f60337a4b8e723d47c171ec2834bf26991b425ba98c0824a3
SHA5125b1abdf37b49360ef4f9b462f43e9b0f42bd663019d9f605a383a59de3c0f4ca401a91b116ea5773b8b82ff4587d02a1d0b8e90e65f8955f910afd3b43c17da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53beef92201f4b7e077e1a531d27a7b9b
SHA145a25d3fdb433f019f16872b2c98c390601a908e
SHA256abca722bfa9e21d91724dffeb087d6c9651aeae15b3512df9fc8484ec30f4f08
SHA512c99ac069db57e5122d891b0fce7eb005d0f2be756b4ba4a2e1e55d96a47090fd949371b42df14758aeec8160f34cd74ada73b3b5c05b2694c0fa6a4cc90b28b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56825768ed71ec689b7cfb405b22dbef2
SHA1822abce170235a79e6d2fa1ced663eee3e3e00d2
SHA256aa3bd8c3e1dd0dcfa342f590bec94a2a8b57cbf9a2481a55a5640d2024967565
SHA512660d5333fc69af73f7c9321410915670779f47c5e4c9283b6f00a998a535ad236bb0cbbf61fbc292bf231550f937aebdf515af2cf98b1bda7d51a98cd83c5fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffc05beec8603e84c968a8e6a1eb50b7
SHA12f2d7d878d1ac9dc606ce366a9bdde1bcb097ec6
SHA2565577c0a578a6d8025f12807160f22c2c55a99058a59ae00e4cb517028e4aebce
SHA512b160973904c258b76d7e4dd251e2ebc81e52f46ca728e3efb9b2086608d44e7501f7c9f41ea826aededced4fd843352d0964a8d1cb194c1e1b6c73e2d1564efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c546fe3b1ed7791f97ae35f7ea872d44
SHA174aab94d3b4ada0c0310f812c00b04e241b6112c
SHA256a6216eb785cdf86e2d0ced62e4c00b313e0ac662e5f2ea7548dcaad4d250e294
SHA5121f39de33e73585e9ba02fb675548d6d3461783b12046b9a6cdf607801833f66ba833dcbb5965ccdad038ea85ee01edef6c3a79089e7781853a78c889da046182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0b48c5b653a825ef76101023c50d71f
SHA19821dacbdcbe4d2a9ea477e253034969c03e090f
SHA2563f4eb0bcf03faf237fe47393dcbb82f0a2810de98821514510e777c771d03fca
SHA5123fe140cf71e67227ad57028694e83a9993526a224d3cbea90638c04faa05c9c1631311ed55f53cdd65f286ac8a4753a396541abd0d2fcc218d744798a51c8405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec615483909e75dae291c2cee6cb80c8
SHA11b9ce01ad887d29cf2d71b53646eed207c3de5cc
SHA256caee7b73cb49240fcb10213f2b0e5b3a540c1ae7c98b86a210d71e5c1f15c817
SHA512a8459b4f0d5d420a0769017612e8727e49800ec99b031072e25861774a73b0718cf74730a66630d89ee1aa60fa96d0a479e062aaf07829da4033eb4abb7d91b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523c929f43c2545468a894f2a2347f114
SHA177dd1ae413ae0cabb234435377d7bbb9bfafb998
SHA2560a0af3fe0c7810a399c696cc4beacb04a04c6fa96208c514b17a6ff5912e7bf2
SHA5129a6116716ed8e81ecc1355242b59e0019297bc7bb9b9ef21426bd7c9a3bffc39aefb20a782eda0ff249261b50222048c12ba860bcd8984706e50f33f1277ca37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4ee6206892b89e455e371091658ec99
SHA1995d4235f8a9402284194e9685f1826343b9d905
SHA2565851333dd865820e6ba3a5632e1158c22a2d5df98993c5710b1c1d669cad9e6b
SHA5123265aca94a0fe4f9b22dfb89d5717cb7a1e77f953206ac197ee1187c91943ad982c12a122a7cb2cbdc1d20b74c8b38aaf15e80fedf1121a99355552ab9250444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd89fec3786b54199c86a6fba31455cb
SHA1006d36b75c91365e4eddc71bfa03b106c0af9e59
SHA256b8b84e31b0de55ded245facc2995189c57c845df0ea95f607daf6ec04651d491
SHA512a88f1dfe6d0bdc1276ed641ef691b7d4104b211757c5546ac54350037b79e99e3c5d3fe702b54c6fd86202819290143acb528906d93d8867bd5b01185d8c9bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557e77ec3e6aa6658d7fc44a64e2af3ec
SHA175cc7e6cc35a568b3376b8c9f1b0f2d07d324783
SHA2560912b243a50635afad4c689dc14eed3652de6b52097c68a36aff06e86790c137
SHA5123f7a294b159bf6d720e26aa0b179bab2cb7db5a49ba659d0986367020567665f8fb8bb8ecb7f6ccfd3e626c22a494863d2a19b9519a7ee0a34d4b8b9a64032f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cd00711bd656db5b557184267f859db
SHA10da9ce294f17926150a313a6ae563195b7fceef4
SHA256e42e9e08922ca70bf1b357c0b67e3d378eed9c5aeace36a3013a2ebeacde8e61
SHA5127d74e9a92aaa11529853c5b6741d7f979991177f0fc6fd36b0391470309a9812595f61e51eff13eed35086196283139a7c042b2b4bed21030a51fb27fca39fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5b37164aacaa3859f62e86ff3eaef3f
SHA1203db84736ac411387420d916fde189022e7847a
SHA25655ffd7b4954ba21798eae40b4f4e3ce6aa27b31fff67266d209120b36d63a6b5
SHA512376b16ea9eb50b4d200d1d48ad08a64bd285215cf20a7f13928b9956386cfe4cb39d0d9841efd9e800a60d021aa37b9e2c3d02063e20eff08dae727d5e176afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aff1273033be36f2813a126388d498c1
SHA17b9144e84806ddacfd2d4caedcdd0e4fdf18a36b
SHA2561e10f0b9ea2542d5885587f168ecd2132d9c1a58a4da98fa5231b23ce44944bd
SHA51241fbf768cb96741725f13dfe7c6746330425285518b9ba1e81498b4bf2ae4bcda453c8edea9261157a4ab0643b3622fa9f0c5d773ab280261794eb839bcdd9b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593efc1d1b731ffcee0921563e5847bd7
SHA1083f935b7246da2687dcd09fc265ae9293e1b496
SHA25666917a09b05ec131127773a48fad5eee0c8c64508d7aac22ac3f03db86e7a3fc
SHA512dd4640266b92d0abbe62ad3a6d6ce123a3486998651dfba06e33b8341b57e992b26504b33661b8c27d7c728d7d523af3a889eed07bbc7d3dd5cf9086a32ce536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea2ea321a63580c579119615b81ecbab
SHA16c152305c4b3367c67f7302d8b38179ecc452b48
SHA2565d9a43482f2dd5d49b74b456f0cab8019d721eff57628e422cac24adf502eca8
SHA512853578c61bc10e3989a8c53b6a29b26498139f6a595b1895348eaf7ce3677d0c7f3306fcb2b9436c5bb1c0a41261f155d25137404995cb400350061abbc1e57a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a