Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
0d50a6b487ae408bbffedb7dc59ad9bf_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0d50a6b487ae408bbffedb7dc59ad9bf_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0d50a6b487ae408bbffedb7dc59ad9bf_JaffaCakes118.html
-
Size
36KB
-
MD5
0d50a6b487ae408bbffedb7dc59ad9bf
-
SHA1
9ae9ec3aad64e72d466a7a568502715480275413
-
SHA256
f2f7648134b4ea4a06f64e53d44109db438a486739f9150e7f01a5e1b0934c3c
-
SHA512
ffd48e2147e3414a89ee07ee5709f6d97ba5a74dc46ecba70bf849b6e29c5a991a224518efcc8616a4393f60c0fc0ab724ff2d4321517e8bd85137724bd8b1eb
-
SSDEEP
768:CyicE9hnEZsMPEVz+AUJAUjAUAAUpAU/AUfAUOAUMAUWAUrFx1o:Cyeuclj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34C88941-0831-11EF-A596-F62ADD16694A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000009aa42df5c5b817ac294c3237d7eb2d417c757d06742ff040d9222895d9ca9d7e000000000e80000000020000200000007c53c22c61c6099f7aaa79a461f5698c4479d018f976cde348f9600444412ba5200000004bf3eb84a00d557e455abd4656987526769ed4fb8e3862c26c2b8c1e9a47e81f40000000c2d7224df9f269893cb1edceea82c96fe1ab7ef1ee94aefc936dc596653657f3cf4c50019f806b050388c97984c567afcdd4edd04800e8a108c5f23ecac6b56f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c59b093e9cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420781157" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2636 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2636 2364 iexplore.exe 28 PID 2364 wrote to memory of 2636 2364 iexplore.exe 28 PID 2364 wrote to memory of 2636 2364 iexplore.exe 28 PID 2364 wrote to memory of 2636 2364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d50a6b487ae408bbffedb7dc59ad9bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e7710a98a1ee1656ad1fa2466a4e1ba
SHA18a5595dd07204314a8d6baf77d3bff28560bfb7a
SHA256cc6b0c798f3821a88dcbfe226f1bd6a0db566b5bc024726b1f3f5a36147db618
SHA512669f8d9cf8a92e697d4cc27a2f576b503aa57a7bd6150c701154b1768f1016f09851432bb2a0853a480e8e8329c6a093051db58e447fac7ef3dccb27238f3bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52873962b5ba51445f9fd1b14c7119e53
SHA1ecbf82846738856678ee4de224333aa56a3979a9
SHA256598857015ae74dc7874c3decd002a23051544278b6ae831dc6a1056a565bdee9
SHA512eeda4044e7800e74dfb7802e678bd510d6a286ea5e431932d4bdc17a974ad47cbe7553ce56201aa73e77dc7a78013e1c26c9a5b0bae63c9df7582d7948b15001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d97310cbee0d978da7f1665cdf486e05
SHA1e94d5f60aadec0f253ebe6c1171d01b0330a8405
SHA2561c6a549a77325f88b77e85f4538309f31139c940d3f9b530d46df9f0342924aa
SHA51238b57b820239789ca9d41333de1bfdf1f8a2ff9d4de45827954a228ef69c0d8b62f38b8ffef3e7220c7c47a280f29e535c43fe959ec24663fa47be99c53bf7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a99861d62037e27bcb9e024db98216a
SHA12b64ceda7ee323a7669b0f25f01ea392ada0c707
SHA256d11440263a12985a1ce978f9a530bd0954fd1bdf3dd37f78e715436d4e297f94
SHA5123eb0610231ce842e61bf286094560cc5fb7405fae74eedf622ad82902316fff68ff1524c7e806d752f2eae02d09bb7570cdca00eae4c1172991112368991fc6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb7fa029343308f692aa1dbdab961da6
SHA1b7c2480cd47022c55326a7eac0eddeb48e39c624
SHA256ed7ebb6e9f48ee5f7cad970a4eac7741ab40a5e1a95bd8ba2a8b2937509ea127
SHA5123836529cf1225afb85b37924bb0b66f691e95dfeaf7dcedaa717b8ca03b371244aa1d6ee2b3ca0718de08406a43a89e3fb1687a7c5e332de41cc02d381700870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7c9a506864ec4ef9586829e3af8d97b
SHA16324873b346717adf6b4e497e67ef3fb5559a01d
SHA256c408b5f74afbac3514cd21e3ab603f700198dba1fb2a13c55cdfcba78522c172
SHA51223d75961178289510abc66a919fcc84d23a059f0955092bedff551d9ad2eb17eaecc98ebbb8a36d29f2f0b3d1d92b3ce9cf1e8cdd8bc6a254c6b40b52478294b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5426a058a2d3dad2ef81cd6e44f0b197d
SHA14e6be4ca92d3348c7f675a9742c0d456d384e1a4
SHA2563bb1426254ec61b40dd3687e37a4f36e789c3d50bcb224f8374551030b1bbe5c
SHA51226df6ccc193dd8de295c3fb0dbee1da4cbc0c26b3660fa6ecd8d85d6aaadf517011f204dfbf9ecbe1e4708a1fde05ba1f90dead1ff4834d3da56ae73fa48c65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cdb95979ec6c0a2d83e5208b2fce9e3
SHA155c5510e84f147a8c9fbfa3d9b9754ccfeef4d6f
SHA25614424a4f6f8543c651d294f9bec47e69e2b645fb783f202f3713cde595b7c87a
SHA512720303a0837c8bb7d3467cab8b22f85a15295b91ba662a604ad21f96420698f7d558cc42a9d8857bc6a3f582d6110276e8e2ad441e9f08c4132111abd076a766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573dffec0c2c9f101a5d403a05990fd1d
SHA1d7045779f6c18161bb46aa1e30cc6cfb46df9979
SHA2565ec38e6111bcc2ba61a2df84965a2825a7ec66706ed291ce0663c48b9c014153
SHA512ee330fa1277b5febec3d49aff8e6f9c9089a48c30d0db42f30de4a3ddf051e7187fe5c9020148673fb2c90c30f497de59f5eb5db594c5da53ea5619c6070537a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587c512e087d82b3acfc1ff670ae03089
SHA173840c46e00a07899deac5bc4867ca1aed03586a
SHA256d9c44efd3a73155973747b9cbed6ed215a44dc5a3568895d32532bc2c446c9ab
SHA51297ab0cd1d15f68ecfa861cc8db96b33431b19d31d0696e35f09008806e0331c480576986eb2146bafd398ffc1add6387e5b93a2df50acd9555bdb1d220270627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da74cb1e20a127da20c8bba8894f8621
SHA1b417b647296bd510f57042529d36d38b94156947
SHA2561d050d48a4ae4892d41bf713015b91c589dc985730791eda285cc8d8b820aab0
SHA51240eeb67b286178e1f36429621cbaf56f9d4d37f417409496ce145612fba8937fee1db20b173c5755f0ad0db40df65e470181bcbb76a13322f387abde857503ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e3803e4e945f244f351cc043ca7de37
SHA12172118d64e254ad70a30906e3ca9eab3004d4ac
SHA2569780a35aebaef0023445750c2bdc5976b8c059a605908c19524d51bcfe53f8b8
SHA5123f959f701704658f2e91168d78c48685e75a4bf577cdbf1351f1fef107a98a5db4a3ab69a66a4a82c41010f9828bb62b4e583557c1483e39148740f7d56ff794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55209867ec88090af50cb4c6a99806445
SHA1ce35f625862c45f23a83abdf981b4d5600193f6e
SHA25603b871e575e9655329af912e957bd30e28385d5ac4e7b85723fda4e1437092e4
SHA512a571521f485c84a88d922510a79144b90a989726b3f5506591ac3fa14a90ed3b9557979835fa1e47bf812753c8842ce9dc880f10e1ce76b9347637433fcfff4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5130e8bedb160393e9487205acaedf792
SHA1fe31056af6274e1a4abe6031c4eb7fb2773d0b47
SHA2569d01ead159b9fa09846c7fa9933c23c52c9113d768ef8d43a450ca5ca90d9e4c
SHA51278e3bf4421b32d313dd298a9028118ad367f54ec87f7e08e72ac13bc0b699b8156c54dc70f8649ab64ea23442b0c23c979f821a98460a184c472793c3c14682f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b770743ccd0a6193fa18ded4d017fd73
SHA1974c01a6aaa984cc46b960d2d970cff48f6a6d84
SHA256a1eda2cbbc7f2af6938a1e8069557d53b55f6f31b37ee08899e3703bcfbcee1e
SHA5127488ee4b64744116ff8f7d30bba5e9167621fc0d48a146a024b2de802dc90413dd578aadbc0dedcbb0b121d179b8e70eec8382b0739cc973f9002a6e8af85b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab49911665ec32a58b646e5a02a8edcb
SHA1eb991b7d2d6859daa622936b86c26080e051d17d
SHA256c1ff9218bb471b3d2f6124fe78c8fd3d928cb4e6245e9aa19ad8a2671f373be1
SHA512d66277a0af4bcfc8f8110deec2804cb9b04cb8bf8ac65b27c4ed433865b5a647043f4cf5bd3768086ad1c43aad73cf51c72b53ce17603f65b6d42cda6bdcfe3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d77df4028a1fe61a197401c657480c03
SHA11c755f67100faafa624945a6e582012544ee8907
SHA2567c4c04367826cfd2a099ce1645ed7a1cc3ac182b548cdcbde4083c34f5bc98ad
SHA51274c8595a85acb2e46994f9901123a883e6dea32d80b89659434e3e8f8c49e223700792ba0ed66832fb76d1f35ca269a0a216bf8167fe20d9de70e72acddc0e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c506ef484c9dea540706bd6af14aa266
SHA1137b523ca5c672d2cf9eb10e03c00b1b640fd41d
SHA256bbbbc8b85a16e8008898106cd4f871e89dfc43869019a012b0719e5354e00877
SHA51282128ef8d00b68bb2488791e1b7083ad8dc5609e5701cf248c74f8756aa1b8aa5137e2ee07df4919266bfe21ae91abf58c9cefafd70e0e0fe5ccf47c6c9fe8e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb853fb65af238136f0d51396f16ff74
SHA11de873347ed1c5733ed627350894e2af002aca5c
SHA256c932678ae34b8ad906d8f4f48d48f85e1e8826a6bb8bed7a213af0e4e2765abc
SHA512a854941746a2cbff7368d5157e0f1e85d42bb924c2e6f43e5e118fd00169d629fd46f7085eeeebbf747e7fea55410740dfa21e270ffdc8c4a5d96d41ccee44b1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a