Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
0e16418458a65b0c166dbf59e31c1509_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0e16418458a65b0c166dbf59e31c1509_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0e16418458a65b0c166dbf59e31c1509_JaffaCakes118.html
-
Size
4KB
-
MD5
0e16418458a65b0c166dbf59e31c1509
-
SHA1
fad90756034be508a443bc5cefba027fc1d16000
-
SHA256
2ebed3440fb71c64ac9eb8e36666ddd87dbacfa18ae44469bad89da7d79754af
-
SHA512
5f017819712c7f7d6c4d4e8024cfdeebbff80e59929fc463eeb16433a451ff45cf6fec21c789f0e091b20bc7de1bdfe2c0676e4b14d7f635fd906a702cea3ff0
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oCNwd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00fa9d9c709cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000883e29c2ad29ff941c5676f55ae54908f8dd93916e9c3966972e5acb141a264f000000000e8000000002000020000000d06572663ec0969127957187f599067bc64a7818f6d83ab5216e32467b7c0702200000004b966b7884962152f8191d0caab75ccad0f1d56ebeeb1b77659b95738a8ee54c400000006fba6f40403cb51c534f768b4d310f2921f21ea7a5170e1ee15d94923e0263e69675553bbbfcbe480c0ea6ecb1ecc6b9d567f7afa4126f243bc716f30a6f4766 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420802879" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8127CB1-0863-11EF-A0EE-F2EF6E19F123} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2904 1680 iexplore.exe 28 PID 1680 wrote to memory of 2904 1680 iexplore.exe 28 PID 1680 wrote to memory of 2904 1680 iexplore.exe 28 PID 1680 wrote to memory of 2904 1680 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e16418458a65b0c166dbf59e31c1509_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc86bc910ce014d0718c019d474922b8
SHA105081105620b65c59a36a334e911ebfdc758a557
SHA25633974818e9c301b97b846fca2936c8e78d7459320654626ba08a14bae4a4669d
SHA512940d0e8cbc0d07a9aa3abac946e68ec0556e611acae7fda5bce4d95ef45e81d843d5d5ba3c3d8400d25b84df52ca9a98bdbea615f39ea78260c40d2e2b19b90b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7afcf65318b1dc98df1d787970c4453
SHA13928eb3b4d1f606fd113a5b7746013abcedd000b
SHA256e169d0750aa0c7fc4d0fb72ba81d8df5b074fc20bc48e49de6b61b9985337065
SHA51285be86d3fb0a5ec19ae00f52d29951ea57e7c15f72afddbe1eac2d8e811bcdc37af5b54f44def4635b0ebaee9f694e6519820bb10d208a3d4c9898478ae8b6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574fee5bad7523666fc06097f9ab143d8
SHA189e8ae8c9008a7bae5e5516b2f3356584522f68a
SHA25606e31202ece18a99338711a662fb9f8a12f17feac99582003eaa1975ccc1099e
SHA512084ffe53096b11082bc44d02cb81c21f0aeb00ef859bf9ac0e954d40be177cf9129b48a31513c8acfb0fc6a2dfbc7565de764c904bb3672eb5daea3bf04d49db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d5ccd7aaffaa15dd9229673b37df81f
SHA15f37d096b73d1e3062e824b09d39b4a2c811dd09
SHA2569e3596bf64dcc8ca009e3cd03c903f31469851ba2d70af1c2e22987f4bbeb8c9
SHA5123f9af4b061d89aeaa39c06670c67d3a33614b4217608198cbb477c0d3347b4e378ea6ead885171a129ac950a53a73bb6ddebb642ce8565a1bc1ddb15a6bc403d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b00d9acf603179a258ae7aab051a983
SHA188429695ecd7e9b46df95f4cab98d97a96976153
SHA25604ea1f0c1bf02032b43aa53eb30413ffacbaa1bf8d9607029eca972bd77ec9e1
SHA51241acab924e8d4a7d340ae11b2684aa53726ebb6098c7bc123e9e456b80853313360eb671e31df05e1126e2ada87725cff138da50102f9308659f8d9289a598eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef73f391dd2f18b6cbb28501503ee96c
SHA13ebdee571ed74e985e3d727df5c8c1ec205018b6
SHA2561af7112f7d3197c3e170fd34876b52030f50e6347c50679409a9a30cc88a3095
SHA5128d941086ba88bab0594bbe4def1eff1c4873a17c562014aabcc40dc5ded78104ed3f1b044874d1066f36665c1d25481fa54960392a1525e51a1dc41e32078c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540f2b553f2893e339c2ddc1a9e25c51f
SHA1ff7caa0be0bb10119eb641fd50add00a254a1937
SHA2563b056cc06577ae6ff22d98d2ba139eebc17330a9e5c90229d9c398e28818fcbe
SHA5123ac51f7b2b16bf3845180b8f18b3115ee98b08435324cf24f2ee2fe2a5bab0a3a513bb6bc25155727b152011289e69d48340b82caf257e911440eaa720a1d190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c0dd8f5df52a4299c622da1cae23989
SHA1835cbcddf86615b94b5a665376cc97ec8c36b955
SHA25692f52eeae00ef932c814fdbffb25ed15dfe3b1de54fb0d009fd17a83d73f53b8
SHA51293a37513b3abfc4fb3ba8b8a3703eac180e467809f8a372a7feaa91036a3f4850bf52d5447d8465f107a216860aaa10ef560bf1a352a4024c7e7ee11b396d91e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f7c8deb1504d243d62c81ff7c8658f3
SHA137442d4cdaf218acc4ec617e7a049e831225a2f6
SHA25645455eb99193e0eaa6882120f128aec5cf072f7d806854da520afe47c51f0574
SHA51263f5deb36e839ec96c1a3aae2f1f4e2235b94467f476340f0e72568b73a59ebb996fdebd362935275a247a82a008968355ce628fc13cdd52754a153448d77a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfb815b690b683df1124c7f4872952f7
SHA139356767cf228195c596c99d06665c504cd921e5
SHA256265124c410765d58795c1c1c88f7a4c3c9aceb1694ce2f8fadabc98b63c15b01
SHA5127b9a625000a07fb2b84a53426ca885d415c1e6990467ae9f68c9211034899be6ba41cb493870307f9e7552e5486d8e3e0ca08db9ce7ebcefb3c2d87d9334b22f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5198522fec057fcf00461f62b655b5697
SHA1dfc26e6e6f213e1a092a4e7b7534cea12158220a
SHA256eef50dd1b4cd8e313b3ed6fbb5bc47cf0961183a344283e6101354a7f262dfb6
SHA512e5e7452b46b4b11f3dabd82c701a8c97147dea56bb56946be02b9a51d5979f9de399ddc5fac1692126a961268fdcdfd814ea767b6f44349aa5ed048ec416ff63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560284b18a964fae9f5ac105a5a1d694a
SHA1d7669046172500ba1fe9457214614d6114ad05e3
SHA25609e06684d5f24b8dc57c50f60950f24820e8c56fdbbbf7180682d1e82efb2cbb
SHA512ecd51893cccb6e154afeb0817cd5a523b3f01a2e985bf8876e07e00607558d082d486e235c684342cd6f2b0360ef0198fb4bf6ab7d3f5f4878bd962e3d8ec4d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584f1875dd141268417fa17e67ce52c9e
SHA1cf05c4772dd6be109154ceba346d7f752e3c3dcd
SHA2562ce4ed85df2a2d9b9f1ab3ebd0ca9dfb3b8b1275172910c0e20e64d05c1983f9
SHA512b3f11fd5f4b5d35e7e9fc2d488c277207000f9020b2bab5e41c91189e5635f8f8563ef2c31e08b80ad199807fbb65447e81d1348edb81125e3d10ae9c7dcfdb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb6d6e7a1478b085ba920356b410689a
SHA1f93ce670b5ffbe91e727c489eacc5ffb99eaa305
SHA2567dfacbcd0440597ef4196c8143c3664104c3e096d1fddbb5352e75c157cc4dae
SHA512b051f9ddf3c43a72f95737a214f920337ecc6b003b3e79737cb74622cbba614e908f39f5a151fab4aae07cafce554ac859f4d0b77740e3494ff0f8733182f635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525c0bc8b364189a0941ce77ccb9fd06f
SHA173a821e7b487550a83d9696b7595929486e718da
SHA256755a368e365e209405f3585cb56a56c135f798aead2fc9bea9ec8f0643520199
SHA512bc551a5b863301b0cf18432a929cada23ed35e13a4df4b7d487d1cdb1fb7a21bd1da0787b79cfb90f04093cbeb0b65a0d9e90cd69bb3925da0cda8bd587c198a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6a1785556679947a1d618837c88fdec
SHA1332ceec3e28fe2c17094f691f5063c9b0fa6d4ea
SHA256a5f8052a652809278f7ed74a82ba6362f02537cfb0f82ea94aa47fd3fd10ed5d
SHA512dfd3cc3e5e1545123b5e4a8bc1fc1d3da2ef0876a2bfcd60782e5d6ec100cb6e2fc9c6b61de07a2e365ff88dfa96bb54a959039f132d9a108d3e42f15e3b743d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50db73d2b36d7ca035375f80489be6db4
SHA19b926c578bc9659b5c035fe57122cfbfd7465ddb
SHA2566f1948a1752ec4ac320d7e3ce2a40975abe20270703ab6356b22e310ed3341a3
SHA512e907015e49f591b0dd702139468018e6ecbb59c1d66548d77a01e9f8fa5456be9d4088ed498a9fb77944cd6b9736b09bb8c6cb55c973b55b4e4c43eb46ad5187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578487e2b3b17d0860a29e210803fc31b
SHA178c960a7217cffc3cecb31abfe0aeab5e8156dc6
SHA2566fc5a90676c739f61c66f8def8516b05619fe7cdf9b8a0a21a498fab231234da
SHA512eb781f9b5ed4f743ce1bca8ca83b120e41c7bf260bef030182f4e9bf772adac66bca54df245a8a3a80afdaf9606bb2f13709340b0771ae32b036b9082f0c6e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df712c9b82f147f84924b76662ebc854
SHA19d519137f7e7f4fabf4c804868e33c36e0d8862a
SHA256be6bbb2e8bfe0635663a2823f786c33e30a936b4997f551773d75b71f5edef8c
SHA51220255bace29a8d96ee5119a9b5e9f924f03b8044a50e4fa2525e0cb8a15ad51ffe085c274c0e02bc33b592aeaef51dceb077c87b197946a4509148ae39d51baf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a