Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
0cf104f97a3ce377874a56012dc0a492_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0cf104f97a3ce377874a56012dc0a492_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
0cf104f97a3ce377874a56012dc0a492_JaffaCakes118.html
-
Size
23KB
-
MD5
0cf104f97a3ce377874a56012dc0a492
-
SHA1
07691b9f5d190bd50e8d86764a770acb18733a7d
-
SHA256
954978ed2a269e618619fca0c212de1dfc6916f376edca366b7ec687720d7aa3
-
SHA512
401d3fa0b8fa8d2ab7968ced528796d0c4d1d37ef4f655b4cdc300f036edbfdf160635f767019615b3dc9fa7edd7711da821b386a7301885c7fa18f7e6589c5c
-
SSDEEP
192:RwNon91mb5npnQjLntQ/qnQieEndnQOkrntsznQTbnAnQAnnwJnQtHMQnFnQ7Xnp:yNo91jQ/azk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420770496" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F48C2C1-0818-11EF-8F92-565622222C98} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e32134259cda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000007b51169a707cb64bf0cba3fab3ba2d0ee64a21677698b0df8b92fe33e65b8570000000000e800000000200002000000029215b823fcb28550597afa983aefdb05371c3038999a4e62454b22095e8044f20000000db806a2183ad424fdc2bdf1c217c156f36234c8c9ab6add3d8a5fa8ef80a1d9c400000002d1773cf2bf83dbff98ae08333154e173a34cf76fa6a03e3262a552db41e7ed6e374fa02cd562b0561b10e6449d5ac3cb7161d5fe454d277e54445c0f6642768 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2956 2868 iexplore.exe 28 PID 2868 wrote to memory of 2956 2868 iexplore.exe 28 PID 2868 wrote to memory of 2956 2868 iexplore.exe 28 PID 2868 wrote to memory of 2956 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0cf104f97a3ce377874a56012dc0a492_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546c10b89c8ae184584f38a531c32a011
SHA1422889dd44c1493f74d5b5944d4d17b4a9269ee6
SHA256696c91442883f83758767addf12b125138ed154f2493dd6913ed95482f5bb869
SHA512e61a7f153374b56f59b2257148433683c7d4557d1ac0cfdf90b96b2ae2656b8530700bab725771a3b75ea7cd474dbc14fbe775f2fc64c2ca4ab33c4a649f54cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5336364caf6cb36deae4d4681b105bca9
SHA1aa0a8f122a946d4caffb9cf2f5d8465e8674c68d
SHA256f7bf3d6142e6992efcb631a4bf1e8be224903c5e8f62d5c6a109fda643f7c527
SHA512cfe3cec05f4440b68836dc41733193add4a40a4e81b8ee4dcdd13b9683ebf564239b9d3fc8be80ddb69d57c5f3795b1e2dc734fb59b12a9e0619ff8adc30fa32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9c938f013d282294f65cfcdfb7b7bed
SHA114653327b8d2ec2c1b00816a07b309ef47bd2e56
SHA256d6c1d7873684cd8f5ec7a936eb80240121d19a7dc20dee33916eb07450ee64fd
SHA5129cb9428cb44a87e1e94d1e96ba4bc17ecf05f660128d02583a8ac5014226df63db0b07bd61882a1892eb6c32b3c55375074426b95fc97acb7935e5fb30755f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efea2326cbe0c2c8eeed67923b2758df
SHA1f6dfcef4ffab173a2ac815fdb246167b22c0efad
SHA2562093d746180cec86ee0b6977887ca1eb1b1ac319c50ff2bef4715cd07015432f
SHA5121b35a0eacd4ae928e624a6a54a76bf1557acea9bda996dbc4b530eb1aa40af01a8f27977bfccc40e4196ecab19516cca268b0253a77b440e9237293d7781cef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f02928202bc1a950b8b2c5146c1ddbf0
SHA1beacb3c6f8cd9fb64a79b45a7f4deaee8877499d
SHA2565eb11893bb1af149758d754a40f09b1c69488e144db8225e958d1b842798f149
SHA51212e9c79fa13c66ab7199e8c567689f4a7e12bb68c8004581445d1b1d3087ed042d16a442460acb4973ffec9293a028dc47c550e2bac76b10c0e328836d59fe49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558be0ccf0e90de7d3a98e0f1f5a966de
SHA154bbc9a333db58cfd5bfba54f6c28d6405764c92
SHA25675b351b9c4f748f797d21fec33989d8251edd4de65856c707cb019e67fb33294
SHA5128821ca31253d1c58863a5191a2fa4e015035f798175c349b8901326d8d11c41ba6f4d4ff47426a7b1d0a3df28ea043fe0885cf061af1c4b345711b3d330f8797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c2507154763f94629c2d7612a54eebc
SHA1c2ef67ac7b8f9f62aa6655e842c4d6133e211bbe
SHA256ad8a161394016544874af54343c41fc1caecf2958e7509197c1d6cebe31d8b16
SHA512452bdcb4837ee036aacc3f0c71862add403291d11db277deaf3722058227795a52f9659f9ce0f2c5dec45e1c4a5ff3121c3ed6a051a5eceb5727ba87ede60452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c0bb21de1b03534e55b0234f360d34e
SHA1e8ba1ad8c41d817be97121db7f38b03a1e1a387d
SHA2566e41a81119134d3775ac880bc86eb79791523fb9139fad9f58dac9f419429a14
SHA512c6e5adc9704b9df337e9ba25bd2ac7463d4e7c6f657de2dddd8bdccdd709264db653210d32733fd4d9f91af95215cdf7ea629b44f71dac026ea22c3d3b3cb85c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556dce1d75f4d2223e954a7365552a3b1
SHA173a378c3b8114121a55ee4bb5bcced2924ecae56
SHA2564873a2460a01a77dae9000a19dc264ec542eb315dc5968c0d0047f1371c8c5ce
SHA5125052684781ce384479d2928b29e6a9d76c5a9b1fa35ab9e6ccf33539778dabb4603a18e1690e9fd0548fd45bf102c04e8385db0c8d9e8062a871e0bdacc39695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba46ea1a401ab93253f2b7b450c9bbd7
SHA14ab4fe6064ebceda381212f0ef9897c372e2d59c
SHA256bdab92a882e9b39c90b6d83999df98cd50f6504e86d3ce1b6a3a6fb5da48ad2a
SHA512c330a8b9740c24dcd6d8386ca2ba00b3d5de1cdee87d61e3d7205fce4ec1fe6f45c5b0c095cd7c88207a147ad3db466e8500b543dae4080cdf8ae68e228971cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500cd64ba95dc31104c01d0f2fba5ce74
SHA139e1601cf096b0f20179faad33c66a217ea2e894
SHA256e612434f9615915eef6a8770b5bea32d7bfaa315a8bf6a325b14d0c72a82458d
SHA512c1c7299c7cfcda15a7cfa1df66dd3f5b4f50494e81f41b5ac56433f3e5ea27a403ab931cb658fe1388fa7c6ff0e1f619223a48cdac06476dfe08099970e8234d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501d9dac14d90f9377ec8a43713f4f1cf
SHA197f85d2187d59d3d2adb36cea845fc6e74f722c7
SHA256800f7bd4b588af280ac907a269af950bacd8537752d8bfbe2d746f8470c56cf2
SHA512d3a7e9cffd4f725f7dc9cfb61cce0a4322179f3eba05143d33b638963b3f195c5e34b57ae9a83329c60c81cb35b4150c3f4956991fd496443ba7db44cde4e103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568db8a97d1b55bc101461ab7f66a0f9d
SHA16ed281d3788365feaa611600b961252ce126da0e
SHA25659825f7d2ab5080873e2e5466986dd41a405cae4451a3d0ca5363e213ec74403
SHA512c032b6758e56e2ee8754ecbbef1122956fde9c9bf72834a84742f39128419adb52de2930878afa09ec6213e81d648d59e57cdd7482509d52e1a2f3f05cf3be1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbc68f529c3cd8631c63933a89375c92
SHA1715063755313f1d58592daa793de94d0e4b1d60e
SHA25600a0ba073258474044f9129973aafed4862aad52fa8490a6e1b5a7ce1286a4a7
SHA512fc01526d7cb9983f282650aa99e5b335b2b3303e574318fbc3944756b89e39a1c85a12bef922aab91a028c946cec95f3e26cb3dce32241af140ab0ea08ffe296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af9ef89c70c30815f1c48f01b22cb098
SHA134c6fd25ddc014b5b4b5a2febcc849068d215444
SHA256464d082e1db99647cc9941a636b195574e07822ac6912d0f8b2855cc7db830b2
SHA51278d94b47b4e91170c4724b24894ca85dbc7f6c40af05a4dc6831fae9efb94637be41c7b19eb9614aaf9aae474029c24edccae3a5b7bac688a9264b0769f3f63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a1c51cf4ec58e2a40d5299dee2a7ea4
SHA133d510d2b37d271422ac35025c60602da0110115
SHA256d6a570676e457913919d7cd61ace69b471eae138737e88f44b0d9defb0f69fa2
SHA512a6bd86468f387f3ecb7a2aafe162bf81f25960a5d9d591ce73cfe09507f52989f3a11226b4b965bc70f84511e7f2ba30a8844508ea00d546f5233f5224b4be2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554b0d68839551e79684a0958e3557692
SHA18e87daae47dcac5ef365774a7cc427b8cbd9b0a6
SHA256046c8ba8290c2a0533ad05e3f80194c3c5d723b520f9358bfd94a1ef5a3dbc7f
SHA512550e3178e6930461206fc5551299509500695420790d7177d8960c26ad27fae92dd022ed3b218c1bfe88f9d02e43ac6540177d668a542728136f1e94ab3e0170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6479b623cf826e4feed9f7def14a258
SHA12cf688b9900aefac5ce0a05dd7f0299e82cdb40a
SHA256781bdd32865ece87641bd83634d9245f32064d4ee9e48a5d6f7eb5a2d4972230
SHA5122930733f134b649de4bfcc9946e80c481c612d40b6c6fa447dc36da2cdbcc4da846bc0ab333f3b68be437c2ba5bd84fb4c4d7ad54c5b86b7ef0b003a920e689c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fa521670b4a3d73ac182b2d576bd1ec
SHA1cad59fbf112570c780d2421abe697f97258b0f55
SHA256f86a10b710d6f6d3b89b1588e5973a5ee667184289c827205fd942222a7cb136
SHA5120eb1471ff6173bdbf53271eb3ee21894414cf75a0a1ff113e7e80fb0e451c590a10f852b3130fb49ef1610e2c8bc928ff71bb78cac14076b998380667587e1f1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a