Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
0d65543825ed85fd806b5b6421c66256_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0d65543825ed85fd806b5b6421c66256_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0d65543825ed85fd806b5b6421c66256_JaffaCakes118.html
-
Size
4KB
-
MD5
0d65543825ed85fd806b5b6421c66256
-
SHA1
40387cab4defe418c46b118f42710cebd92ca098
-
SHA256
ebecdea120ea35d06ba027ace66b45d3771dee5741cd7b1ada9b4e59428237db
-
SHA512
851440a27caf036b36c2fbe33569a517dab678c8549cf3e26e9ec0424da9cd024d6e524535706d26d155e0d7d02d37b9b45196e4532eca6c7ff00e6570062eb9
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ol8/pXd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDf
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420783303" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000dfe3290007dffd73724508cf56c05769733f5ca6de2452c5ee9d4271e8de9e8c000000000e80000000020000200000001cbe4e4b09d2bb7848636c352bad10b59a7ad6b052369f88dc7a92c59a4c23562000000078e3eedd839a9ff16812a01380abd23cca3490c95318c5bdc2b8be343776c80b40000000c9926cbbb4231311fed68f62de15a2ec5d1cc342681371bba5bfb6e3b06018969693cc45c1bd88c9b98cc696640741844d45b66b929c898a48896cc01094927a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{333F8601-0836-11EF-873B-52ADCDCA366E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07abb07439cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE 1052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 1052 3016 iexplore.exe 28 PID 3016 wrote to memory of 1052 3016 iexplore.exe 28 PID 3016 wrote to memory of 1052 3016 iexplore.exe 28 PID 3016 wrote to memory of 1052 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d65543825ed85fd806b5b6421c66256_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572e01dfbf49d52c6c0f7990e38662765
SHA14fdb11c5911c85f30feb22d3245d028b38035fb0
SHA256c38d1fcfef0d68180bb9d717f76b5d380ffe4ea380fcce54be6bdd9b27fb8fec
SHA512bcc2a9826b5e20cbd37524a4a3356c33cd78012d6d36cc42f8499bb59cad024324ff83cb0ea139e2baea084dd7931d3a3833c136a64dca33c15c36266c856bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e96576441c52facb876c77fe1447d466
SHA1ad60d1acde322f3d7df7efbf61560996ee1594e5
SHA256ec11d6ca2a84e28045552998f6baf9c1e85a4f2201f60826f0045f09a5012a92
SHA512db7f9ad0a0b8852478bae44506e062b29f4812535b5410a28a1011e721306578ed755659a16df6d728f0237588a5bd2495c9ede716b69122a5e34ff003f0c488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5276bd07c37ec56f9fda3344312e73c2f
SHA1b28a84f61ceac5aee4ac416fd194b8c58cc01cfe
SHA25645b0990d34cfe4ec2662b2d87dc9e21ff93f0e710f604443e672be027222f7b0
SHA512e8649b77029f92df7aad8d40084e3a41e00a30ac506651214813459e8af5af96c13564844236b6c6c013be57ddc7bb4e7a2b05fdc450012e12ba86857b7bc502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbdea765129c39d41e2713c58fba3545
SHA108062f71f25ba88f96f9c0146ee02a52d57d735c
SHA256c679ea9c3aab78f359962339d20827cc4b6a8fd6a72eba4718698c61fd96d4bd
SHA512825e1ec38d2f1831dae9344ef16092e5f61d175ad9ee7127f336b0c2717307cb2ed5ece3d14a88dcc98ef8f8f5e0295008ab843322c48f84d94095d607018dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eece4acd8fb94071eefd3ab3de066796
SHA1186430bd8261c8fce69ff3d445e697e836cb5d1c
SHA256bd3f59edcf9483fc5542399dede8437179ca46aeb313d3c854433e83fae0d4ef
SHA5125557fb3846f97d974484182726f4c0833d49e4c7a91580ebc332a85c82b48604561ad7c89b2fcad29a80c70f0437eb7434aa63fc96177f3bc72f45cf7d358c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff8e830945fbac87938c0dbb77997754
SHA14b07ab84bdd00ed34af47bd19256ab2eb73d4da6
SHA256f5e30f9b78b5f3b324a04ce3a908682717b8cdfe999116f268b65f511bb42e4d
SHA512435a4215a3e1cb4a6d7d431f0ae828622daa7ca4aa7881888f4175c310e8c1ec3a887ce825eb931288713d625f2bd4299c261c1d79ef115e715c5b3066a0cd2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55792b542eab5985106d136d8a50ef673
SHA13a83bed2525b1e658124caed650531a74de02422
SHA25601e8487219c479b6f0cac6bc7f665400c0777389dae179f2193d31529b07e22d
SHA5122b6d596fae503f8d2f2152bda872d4c7150741d92eff72f0c4489a6b33d6a0b37955c695fcaae41b7694efce1751a1228bc2d2a7b3f23fd64bf7c80aa168a8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abd22ae03af6ef86cd8ad29a80a325dc
SHA100c5d08eb5aed3c7f0f7b812feb2bb618f234e61
SHA256cce94ca63fa40906f1e87f31022265beec8a632b75b3046fb979babdf164d391
SHA512ba4fa83763525a9aec5a61af40a3f998b38b4101caac352bab00092df40f7bf149a4b8877f5aabf2ea14d208abc7afccd07d7677a7cc3064665dcf2ecdfa64a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573c26abd3015fd0b5c343da40b056e45
SHA183a5a3d4c4bdbef01ab917f17b249f8112f25fd8
SHA256c888c4c8832479aaa0f948062189090d4b83650e35244ee50d287786796e3f78
SHA512dc8b05d57088307f78d2a30046da9d6c9fe5ec9ff62dd8800b02d3301de5a6b5930e4b991ba65f8782733e04a03c8bdfa7c6e812342d4453c9f2a878f82f0672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5d34867618464e17fbae306edf982f8
SHA11bcdd9cae2c79a1629c450f0294d3d5602e8abb7
SHA2562fa565260559075e79de26f9f1a0b965c269785c2a5171503e2dc6f1955d1e08
SHA5122b2fa589700440edcd9bd9d0f6eab96047c147525898c8101a44079262b4acce1ac90f6634e6f0ee39b7cf5bfccc74eec33dd77b2aad4ba11d4fd0d82b2ebd3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552dc69a2cc062d965c488f25237325a9
SHA18512a0fe4b083ceaf2f1697dce450c88ef409a18
SHA256ea513662cc9407c3d9242ed5593e1f53441040c3167b8bd2486e2e50301f5b4c
SHA5123b9a3bbb6ee0fa9c1f7df24fda2510ebecf20b68f7fe2b0e51f0c066ab0939d8c5e1d1612c324f72a797b992c46ad9e8db29400034358c7822151cb9fbf16905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574c9eebf807f7fe786bf5672cf105389
SHA13347b87dc35727eb9cd9945b24527b947ce67536
SHA256381a3763964c62531cf098736bda4bfa649497778edc98a3c68651484c575cbb
SHA5129cea318b5ee9fb91981e3ad3817026a47c8e5b1aad1e68a90a7984663309a3e20f4c0356392ffd2922ea505ae5992bf8d05be2719f88f0221dcd3ea7cb6a0c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dfcc99bdb64683abb7b312343864e60
SHA1685de9b3f1238ba9f78f03eac6d538fc9197920e
SHA25693a349313d244cbd9f8a334cca6c306f6043e22fc58202957a73ea82810d2d3d
SHA5125dc8db15768ac5335af255fda1d2e36b67e3f3338cb1806f0910166e1bea09913e9fc7f05d5fb9eadeca304c4795f38463bd7213471a88b98b52ddfb97f880bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eb071f70884877a4fd702ec6f8df2c7
SHA1136f7f9b92579d76e409fa51779f40c3fa2d6757
SHA256cf8f006a5162eeec3faecc6386572c32f12db6cfe5be31718da91448fe8486ff
SHA5121c88e7f140e0584ed2b869db97cfcfc985c874f374609039ca2b1d526fce02c7592e208046c73e7ef81bcf5b4b620c1ba479b75da020a6f7be4350674d374456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568b15d0ead8942579d833e4ea866c11d
SHA185f575d922d4693db33b7d00988d76d07b42d7a7
SHA256c690e7b19001d28cd63c174672a4a7455e9ad8e0bbf757a2d92ad68a43097fc6
SHA512339585cf0fb8436ac10d7095d24a808cd7cba2e38408eed2d6d1736f842bc3c7d87fbcefc771ac9113aa47e2a8d1125b522be091ad450426033023fccae2fdc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5352774390e3c5b8193bc54e660a89b54
SHA11e828e020ae0ba357090da197e8ef04ab82b24d0
SHA25636e8d9346ad2058f4544d974c58bdcd1b34618b9dde6e6567d140b435b65ef0b
SHA512fdfa4d027c3a27fa4238c0575fb8cdbb0cf9d8348f10e9eb1b3510d642581608e87b051785f8a222afccd3bc06ca33d78df753e8d9025a2cf6262f4841c8cf80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5e96d205b24fa7bcb208fafbe4f8d47
SHA1bf1696cef7903b5e4fa0ef77a69d18e2a7c656c3
SHA2560f81b57d57ad54fe41b752015bfa490e3ec022f98de66b06df507cc3b3ed6cf8
SHA51270c3c52d26de76cb198c7f2e439bc3fcc39faebc4f6586454814f0ff3a7b1a03f1e5930acdfe3bd1587ff056723ebb645643b06f7fb3acb8a82f4e6ef923a9e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce77bf9e3ca63859e63cb941d0e0e27a
SHA1740d281aec866ef5ce2355584b4fb331128009e9
SHA25607aec02111a7269156145cfdfcf905527b7789ee0be6673f4c336bf22df03c12
SHA5123fcd65b194e6b62d62c213f98137445321bcd406d3cdad06abfa70430fbdcd6b7049cec6ad7057bdb33acdb6605c3b6541b728247ab1579f521ce00b25fa937a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a