Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
0d57ef7a44f9da5d4c64ee49facc9af4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0d57ef7a44f9da5d4c64ee49facc9af4_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0d57ef7a44f9da5d4c64ee49facc9af4_JaffaCakes118.html
-
Size
54KB
-
MD5
0d57ef7a44f9da5d4c64ee49facc9af4
-
SHA1
647e7782d728aceedad6c404dde1cdf075cbd58a
-
SHA256
6968e5c0a338ad1a2df4702dbf327e0facee141ae139e457f6dcbdd6c844a7f7
-
SHA512
9c95186ef0964324be270c4034f644df4c432100d42a41d409314abca25310b506773cdff93a16c3af78fdbe296a44103dd34a3a354f639668a0b4f818ec5a27
-
SSDEEP
768:SU5HLANUNPaSBdTfmoynM7tI/FxR00aGCU/cDt8Y2F:SU9ANUNPaSBdTfm27mNH03GCU/cDg
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000006186019b07a54f4995f04f9b4609974e7b166986358a8ab4e3bf6fbafa44205000000000e8000000002000020000000de745d7cff22b7630a7e2459353a70e1db545e71d9a2a06821c90c164f454a26200000000b2695e49dfe041eb806f197be50b1c5539d3c1f70218436c90e381568552bc6400000008542a77c814a8540b1e421230b7a1fbb5c3a5d90db817c0855756785f7dc2bcb407638e2f5b1322d5ab02957b6b6a7cc59f8a8ab18d7d3554a2d67da1f8764aa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d42e503f9cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420781701" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78FD9B41-0832-11EF-AB14-E299A69EE862} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1688 2988 iexplore.exe 28 PID 2988 wrote to memory of 1688 2988 iexplore.exe 28 PID 2988 wrote to memory of 1688 2988 iexplore.exe 28 PID 2988 wrote to memory of 1688 2988 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d57ef7a44f9da5d4c64ee49facc9af4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee9fe4d9bf3d757c3bd94e75516b35ca
SHA1abd4e0ccd860598dfb200a744130fc86cf4653b4
SHA256bb973e252562f60db6a720c9a142d5554c502edbb032d274cd3f0b48a7e29f9d
SHA512dd02e02e2c99eaf3c3ebb75e1852873b07efafedae1df739fcea2467119f8014b4b4c4079e5718961ae824af1a623c6bd06a9ed950b67ee85ff6176c85d41d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590078d417be11edfd3c2161e2e5df0d4
SHA126ef85b2718091ec94e09e6d9fab38fd9a32bb24
SHA256fbe0e957fed9e8c5e1d9058cd8f53b072aa6a77359b7efca9da8ed26b25bf8e8
SHA5125ec985a423494bc447ff660f0f440f1a6c76d266dc4b3f2b6df8882cebf4996524e9d502aa49324fcc50206a81328c8954b2ff47588b30ac0132efb58b931b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5597adeaabf9c453e1578b0db55b69985
SHA181130af1f960053263e7b3bb201569c51b66ffa3
SHA25607eb36d395d87fceac184c30bef1fc293b0d3659525ddfb4b301758140a7aa48
SHA512e5f22d817f7203d979f7068f9087e287934c12e11f6fccb2f9bac643bad0861285e9257c7f68b3a4b4db2b7ab499f00b8e19bd1839d3f05d8bde99812bdf44a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5730c079de81e17ecdb1c436b0a6c8876
SHA179601cb37cfdbe61550cb654c31e83973194bb95
SHA256e870faa46991d63d56d4ca02216e344e9efc642ee9ab6e6dc7bbac3480ce76af
SHA5124113d23ffe3b78dbe7d31191752496ca0e3677435df334dbf1a04f02f441b375ba51705fdcb2656404ba48112879b180d329955e0a43bb8748669500e3aca6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510cb10156a696f1149ea019cf4132fae
SHA1e38332befc8732b86749f307c2f582b6b5b83a55
SHA2568c835da79e832b8657d70497e89a8e237d0c4154c4c8081b2bd3a68e66cbfe68
SHA512bbdb65a2a911440017c38b63e31c9e3bf6b06a7285f348ce24e3d90b2eaa1a61b7748828d758e1043ef7d50e7bf1bec6e33a8cf3b09d1daa5b32c2402dcc6b38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55732f42599addf17be286d6d3f69d01b
SHA137faed61d6939d23e727064b24267cb7fa819db0
SHA256440b4a9d8e986760a2bbe22c64a708feaa49e5246df3865548050ec365418005
SHA51235f65f6103579eed7696177ab5bd09f4565ace635ee26e3abdaa8d8e078868f4bc40955eef592763d5cf8f74ea7dd280b547c387bd63cdcbaa738985f9e4d69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fb20ee294c35c1abe9b5121ba7bdd56
SHA1e23f96d7290da67ac62074e86f68f5dbbc423554
SHA256887a687997eb8eb24e5ce9ac785c7a7d6885867e98968b68b5a92a996ed324fc
SHA51248a0b1fb712e9131b0bcbfb3d5b4cc80fef57fce7d9f3993db8db97a825bb121cde14e8d111e71f85b71801b20f45b362faeeac05017566129b1e65c36bbc820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be9c651068083c7fe21c135b97dfff0b
SHA18de2eb704e0f72cb20a3d5e6fd9825637b063205
SHA256b649df4a6b684136d62f70bd95d2a62c18cfff08d8625102cf6ba31c95c3dbc1
SHA512f360d31c94e328c542d7ea3f08c7a7e7be855b109ddb75dddbe6f6c84a66b4939bfdae0f825d3f0f4457ddbf1bd7599107d8f7f41dcecff6abc84882fe385b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e721d4e6b3a308b0044a213b8a820d7e
SHA16eb468b00c65e404813c9d6dbd29dae17aaff0bf
SHA2563c401171c5c1df6d5fa102121fb3e9933aea268758e631d6ab0d943f27d85285
SHA512b3211a710d95dc9d08b56e492a69f677c6d62428be70faa6e6e738b4fcd097d5d9664dd220278ae882212ad267710bfe1fb0394b0b2ae72aeaa57f959812e002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5037559e475c755b78113aa90b7e056f4
SHA1d18b179ace1304a1fa193a29c679ea425f68c60b
SHA256416f9cb76aa1aa27f51f3f15d4306c9ec775e5c26bdd94c97e717fc0e80c7f2b
SHA5123598e30505597be8e50d39b7e7e2a2348fb9d1ae090660a34581ada76af4262174633cdad026bc4d9a7d59f6043a805185defa9415dddadef9d1b4452e07c6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6fa18670cc4cca330ae609a3aa69d72
SHA15ee8aa2af958dd49227b4d9fd3368868266d0229
SHA256b3117fb785a2163b0bb24d3537b78f5d0f7f9aac96b710358454a2765e87af65
SHA5121e7413412f76324f2501179d413fdfd2164b61ca6afde296ceaa37bfb85b73444f3accea9388ac23437bc19e8eac9d36c8f35a35469aef77030971cd32a5d239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdb1c6c789ee56bb1ab63fc277e13268
SHA11033d028789139791f723315de3c18e46c098beb
SHA256872319f4b91cc11cbe54141dd528766a15c694c20e2e7fe49c823e09e8e60cd2
SHA512a7bc99edd3533bf6109173351ac852cb946000e401a3566eecd8a5edb4565beb26a5ed32c610c3020509e06fd92348a2b17647b4ff6e9ee4c8c4a2cdff54e182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54deb8df07960bbb6877fbce3efa0600a
SHA17f961d58a9905026db913c68f4adb786a1477bbe
SHA25615e7983bb8c2e0672cbf811180c7049e80d0b7a3cdc28dc5b17dd7920887fc43
SHA5128da002ad353db026b395db4fb645e764a0da83c2dfa1af7d5cb6b5a1ca0612bf8c7a8c5288dfd312ec3655ab68a9fa7fa16186b6d17a224585fcb87a33fcec9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f36cbee13ffa774ec7cce6867412edac
SHA1e7fc62664183e8619a0818ac491ef798a9e495ac
SHA256b54f3b31acef85aef5fd99b5fe79ee8117520092f3231dc45866d96ac4937381
SHA5127e55fd75dfdce9a31d1eb27469863429991fdb369e5d2ec13ac726f983dda1211d96ba6b0a69b7e4a1b700e7383a72a60c48c9685e877889951df74d90ac07f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e23ce1617d0ddc1fc4e24db828e2d7df
SHA1c7fa3effaf052ed5eb15748df313b6eae627b445
SHA2562da0bff8b581f97e4a6b6a3d497fd6240214037b11f5b2fe7c722b2e846eb9b7
SHA512f3102cc997324ab083db4c905b7e398da6d1d55f48c711578cfd6784bf52a8fd281d3014be89fb40569556103d04dbb7fa377a051fda283a5425ec922014de8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fb3ac8d8fe0059e978877ce9ff6522d
SHA1f16b0c999ba251b97e3d5b3650835c457aa53756
SHA256f19b449ed6db5d734889043229b93640906a717bfa544386fa19f919563fd936
SHA512547f807f86c9d5898cc9626b728bb777c31be64f2455c58c2f780be83ca8b6741488ad74739dea06512408020fe11a6cfd744172a81ce0b864306a2dec783b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584eb47053d983fd1e903bb2bc30b4137
SHA1ad794f5f997fe17f97342441a773a6e00defc8fb
SHA256010ebf0a1ec89a1267f0726ca44b51899e425e438b5f1ea4f56316bbf3f26086
SHA512d7e1d9939ddcc6d48565d1566b1e2dc0c1d5cae0e510378e66944e811fdbfbb9951a569188c21185606ab3ae5a7d916e736b71521abd0e31dbb74376ed545490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528540a9b7f16d40129a6cd99440144f4
SHA11614587babc81885674cbd08b9035f8119223a01
SHA2565671ecbe01db921ec90077fd6a012b47ba3d1c3cb78195d79319d8c209f68625
SHA512332359d591ef44b5c407dec8ecf66bfb1fe12aa42aca89697936cc7d7b98d9ad5b13890bad9406f9abe7c5bc3743458c39ce5d8e18e13ba87ef35e66afe7dfde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590da3bd8405936bd25f8924246204519
SHA1859c939d73ab81d347fc918dc75d08f3807351fa
SHA2565af78e3ee9a43b7a9c72a04ad2ccf256414f851b190ee61f560e5b96b7f3278e
SHA512ae23fa1ef63435931682d334ccd2bb12ae9a713bd7935b241998c4accd134ae24c9f75bd20bca92a492a7473b85a7d4bb5135a4f16fa14cb7c6287785a51a52c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a