Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
0d150e5f9524fdb56cff24eb25987af9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0d150e5f9524fdb56cff24eb25987af9_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0d150e5f9524fdb56cff24eb25987af9_JaffaCakes118.html
-
Size
460KB
-
MD5
0d150e5f9524fdb56cff24eb25987af9
-
SHA1
4fee879b7a1ff88e812430814a6868565c807b09
-
SHA256
c5eba78b8cfbadd47c0a62e733f73465af37ed2de3636f5182499ec86ce9f290
-
SHA512
63724dcd1720908316631983e2c69d53bbc1856b734fe805116a9f42c2ea7f4802e25a1f7280c9cf7589270418d771d87f201f4b4cb1c7754cb0bc4188179c09
-
SSDEEP
6144:SbsMYod+X3oI+YhsMYod+X3oI+YpsMYod+X3oI+YLsMYod+X3oI+YQ:i5d+X3D5d+X335d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000001107881c49b1b90c0701e57b8f9fb2b4256d5b1850fffada7bcc137345412f7a000000000e8000000002000020000000ba0d39fde3d78514d7d6d00da4cabab9a44189328e24dec170585b13e62a2efc20000000c274b0c03172b5153961503e395b31713a67a1f2e82e039bbb2c7362c99250a5400000001a8ab30f72a1da290d79f1b33d9db48637c8d09984ba5a4f9e9aba5ddb8d7c283e4f4a296540f228f8e888e7efb79afa47ebecd3838a6d56617f106f5f7dad5b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420774552" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300fd2ab2e9cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D3459371-0821-11EF-AB14-E299A69EE862} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2020 2860 iexplore.exe 28 PID 2860 wrote to memory of 2020 2860 iexplore.exe 28 PID 2860 wrote to memory of 2020 2860 iexplore.exe 28 PID 2860 wrote to memory of 2020 2860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d150e5f9524fdb56cff24eb25987af9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9064d86083fb74a07cd2aa2bf3d628a
SHA1e8d12f16bca190ed857735d6292feb7b99b42963
SHA2561c52905480cf434e1366fbfa6142e7228cdf16a35d88925aedcab99d8637151d
SHA512a76d5fe1a950e7ce158ed9046c61ce917affe75523f85f030364531073580cb18e0198832f97eafb20a664f5d5f52a933658968eefda936f712ff854e936b402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5113be5432abb78e2effb2949c6ecbd42
SHA1c44a25079bf9677f6729d85417609d6916a6a6c4
SHA256020facfcb55d224c75de55dd49c75f46eda46f95af7382d3f83b3a64e974b5b0
SHA512a204a2af74faa06045105bd34e679abda06672a762c9dfcc85e757f40749ea82dede7d2b73c3f6f2a051d0ee2fed3e0b04f51a1f2ab9f8c0246df534ef31dfcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58286697908dc8f9c6bedb70e4852f905
SHA1210c4e34d222bddb501435a94eb8936183d6ed69
SHA2566ce4e2eb0aa7e1a2307701c2cd71dd6077efac95b332d400729d5bc6f388eb06
SHA512e8187f6a0338f9d2e57c619865876463e745d8dd3453c708de6263116f016864a62023130400199e4ec6ab367464f5dc750925bc0da6cee0c59e060dcd6f36b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfe7602545d7fbb1cb190c7ad4b0f031
SHA15d362f962807d40a306320b640851dfab60c0275
SHA256d11de2da65f8d64f5bd577c530bde15997d2425c502160d0bf8e96ae10d3da89
SHA512316501612ab45e228c95c6b139dd3152af47a80877ef1d3427a5968c617d25c19e030dffb1774798d03376c93960c67a6b650ba1d2396c7c42426285f59a7bee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575181a5c2354d4f13b67e099e04c426e
SHA19f1e4d225f233e05065d2c38ad724bbb1a08fc1a
SHA256e56ef8335f5456e68af826bca9e4c4fa769d37780f14f5115bbda3627a51c0d7
SHA512e78f7547ef38be03b4e0d51fc28ab7f6e65ee6674c157238a41fb1ca6d05ef8ae73b0ea7392a5a3ad45a8f32c17b8090d2be474a81b62f8c1225e9e63d8304aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f07a9f53e4683e7f7969995427a6f1a6
SHA19d913bd60b2cd097eaa271e5c8b47d9c0a656987
SHA2563830780421541807fd81bc549dd6676744731c68510457613bb72df61d151ed1
SHA512b94202a6a49b460316851a85e27cd5e2478be07611980e2bbf8e9c329f2dc53453b0b39f845a1b72f7e9a4e8331154198db8c190c80d794b60f149ba114e41d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ce997dc25ffab5be47613730622cb28
SHA1653e0f2c7e7d4e92b00a73d464c32580952848d3
SHA256997c18dadefbcd14ea82569d95d420808a2683484bfad23bf2ae2baf650540d1
SHA5129714a5e808e732c6cc9e8743f4b754f6b6e00a14e4846156c8117d338844d7043edb08a2cc50e160110aa5f991da0e669ce04ca645f5bb463e9dc316cf1e4fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6fd9f6590a5b4b1e80bc321e93244c4
SHA13c16d79183f04fcb306178d8f2884d21736356c6
SHA256343e22be465523863368cefe59aa445549e1cb7687f7b211592fb71702d63f1d
SHA5128e34b736ef1a34d0b943faa471a9a861b1a897947925212c48e6fbdf8f4f5aa5d619026e1f1b551ba99a854712fbcfa8fe3c7db5d37adb28c3b1767097246584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a763c8442921d0897a3a8976baf9af1
SHA10f4d6941a8a89828d1b193322409936a8ada7578
SHA256adb1e099b33b91865a1b7255182d2c6a5d560ff5c504c200cba89e95e119cb32
SHA512a6aa05ec75b8c6f921736fb9cdccb6dbba46a595780ec8e0917fe9501400585a36b27146f9b1fed3cbe8c9443b73856f3e78a0f9ef48776313e16e388fc6e1bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e4f669983632620d1d62a4ef3ba6dcf
SHA148585557dbf57a74e7ee2d97f84b6237d63165b5
SHA2564d83812e1d126247a3d612c3a7dd41e733abe0892ab58449d22ee2d429dd405e
SHA51218ed9acfece21139843f5b28efb07bf391c64854d58d8f3b2d0b3296e2aa05274f3e556d0b90dc71bc52b522f3767df0a7b1ea7210d41e493e87f02ef9b88650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd0f1df5b6537274bd53c20d2d29527b
SHA1ff32f97213d477e143b47c8adc8e9ee771df8ca8
SHA25691a564f8d2e101f191ae068d174abaebd5b50be3bc84d4204155354e67bf3a8b
SHA512e57ddb2dd354ab2f217e7ab05140c29d1c56b240c854d7527a62919737936cbb25a2cc754eaa1e0b7f3190eea76a20ed1947af7dbd6c852b0f689a9fe7cfa261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5711728496ad73ddd12bd894b0ebb6016
SHA12a2f8c1be877bb54b955e415509eb7c51dff0890
SHA256bf972f9134b26ad8054700ab86555252ae5c9a4a03d660963899e60f26ab69df
SHA512d6cf680c020e7433515459ce303b64620c1bb03328e3c85dae79cd59261903a1a3073c171f4bf96ca0d9b6165e3be0e411da1277ee2e7210af0fd4b26166a8ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db41c9f6c7771fb8cd7324faa244a0ee
SHA1db20887e0bb9e25f12293a92f640faa405930e41
SHA256d31a4b60aa6f6821069d85e495aa36cc2f14c7afb8d2325545ffb891f01cc3e3
SHA512577fdac80a7b5972e21223f3a69127ec9d78c1799e66f6f42c62b71748f4b5c55409c21c85130e8f8adab6ec32e6f31d664e810259a76be1d9ed15fe8c017d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b003085fd9be47e51e07d7d427ae262
SHA138072141e6e1870ad800325b50ad1363d163170e
SHA2560abc3e18a4b56a78f3f7919ce7f28b912b5a421e759817c72ac15096e7caf29a
SHA512277e707b5684a69812e5e4b8d17ecf0052929375bb3f8e9360e3be814537501137ceeaa0840a24e78c5c4b959583ffa9e764765426ee0ef8ad0c89ac1442a2c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fefe6273e5f78ff6858d41ebd66f7adb
SHA17a7f00fa20c4b35948750166a97b182c8eb8cc35
SHA256d18372fdfa0848633cad0d9cfc71bcc8e9361d3ed066dc4898a7e33ff9d51dfa
SHA512d0058eaf41070c0aefcd9356b39807385a419d43806ab111cfe8a6d4b6b795df4f0c90c614d6f36a798b3b2ebf0dfb4be3f75ebc48cec55c668c4d24b6259548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7a8c1c5bb3717e822402b98943a40cf
SHA10d460a6ff1b8df056ed92dfa2778330f071b717e
SHA2560eecef8230dd56a70361fb37dc45279f39ea605d2e4b949707e2bafc2ef6ad35
SHA512bf1faeea81de8812839dc47266dbeaa13db42cba21935edcd0df677ba5def33f9cb259467fb226da74daac345e1cac2b8b35fc3ad2e352ee4228789059417fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576698c7941fe649d43dc60b7f95e7dbb
SHA1be65491207fc2237873699a4e4fbf5172e6435c4
SHA256afbf4b008e52d7471d88eb32a65b4dd4d35ea441e3484edf2e4882d01a67dce3
SHA512b21858f107925d6d640cdbb3863b474ac75967d8d02089e885988a7093cd42fafeccce0815947670e1f65de556c570720b4d616de34ce6f0fd9ab7298afbfafc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f6ec1da365c09191204cd7b8d12876a
SHA1df58cb3f28be46f7792f30c17e1073a3b17846b8
SHA256fb1bc90523629ec7ca7db389e6b3a2316ca1bf4896b1dc0b184423f938942572
SHA512b5b36fd4876a7fc99c63593af9d093fd83f28f8f05688861abeea34cb7093396953063b84c2bbcd3c97cda33906a0750ce90962e6b7399198dfe4871995dd2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596917bf7f48f4aec392240e34214f664
SHA1d7602b05959cf4774fa1a28f339ce1d788994432
SHA256a88eedd01fc4d815620f992ca7254c7d15868a52d99e71c045dd0585cbe59c48
SHA512d2704ec2d646dcbd7c9ab9e14148238aef5021413ba4fb8608f12d9bcb87dfb3e39f57b6c695cd422756b54a017773b23ea21d6333e1ef570fe749f254c567dc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a