Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
0e51937c8a0e62bea3d98d8a6e4e6b8d_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0e51937c8a0e62bea3d98d8a6e4e6b8d_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
0e51937c8a0e62bea3d98d8a6e4e6b8d_JaffaCakes118.html
-
Size
460KB
-
MD5
0e51937c8a0e62bea3d98d8a6e4e6b8d
-
SHA1
730b31908f68eb326fda76659e5faeb167930b45
-
SHA256
20b58ea76a2f6f77e34591e7a158a18ce1df94bc035c0aaa91d145873c52b130
-
SHA512
3084c9bd9b38a852a94504f6ea929c629258a993152c04bd531854a43c9c262ebca7be41217f110d4cc3b2984ced40204f6e43e486e0318ff154d7f933b58ddd
-
SSDEEP
6144:SMsMYod+X3oI+YZsMYod+X3oI+YzksMYod+X3oI+YLsMYod+X3oI+YQ:35d+X3H5d+X3xy5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420809793" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0afacb9809cda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000007426861f9beff9ee0c83bab7edfcb4206c709544ed4ec2f19266ea9b869ff142000000000e800000000200002000000018bf8ead4bcbb593c4abca7d11aa66eef85015fe5f147170be440799129b9d9190000000137f123fc918da6128823514f685cb48ddbe5fcd66eb5af416e53ef618198edd0d945a160eaba3dbf9a5fba6da994f3590fc8bd4d0043460bafc9a5a51f988ca1328f001a5b6d82cdbd585b5361a8986e2a13c2148bf3206a274e7626ab04aa82bdbaef320839724234baa733e911b432c4015f9bb273a3ed463cc50e2441aa6a5ce1150f9d64a47bf4020429360f090400000003ae44a1da2abc7d8197d022113d5dd8b4b215cba1570d0e8b1a55411612ee45a003308da6f6f0cd8d5742c7478ccbbf8e6621e56eb77d3f3220709dadaf0c11c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E126EAA1-0873-11EF-AE27-76C100907C10} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000005036642f971aeb8c476e174ed4109fb61b0554f5227aead44df324321afad418000000000e8000000002000020000000b0dabb2bbd2f85c511850c35f750d560fd5a9ef3efc776b575b693db298dd13e20000000168b052285f4b990c06e91ca54f5385beccbec90c485feb430ce079d8fb04df040000000eb458efe1928b72d163e9d60fa85a7ff49337a1b0c5c6d53a95b4300364e17f1253a71e3121ffd9518d0ee0464dd02c78d501faa2565d2454338a9ce81581888 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1752 iexplore.exe 1752 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 3060 1752 iexplore.exe 28 PID 1752 wrote to memory of 3060 1752 iexplore.exe 28 PID 1752 wrote to memory of 3060 1752 iexplore.exe 28 PID 1752 wrote to memory of 3060 1752 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e51937c8a0e62bea3d98d8a6e4e6b8d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50220bd866e4d70665c8cfd72a058024b
SHA196b13bcad8d733d439c098b79d51d4ee3261dd1a
SHA25683cd42a5f80ad5260f9c950ece2f5e905ec80764d3be0aa82b769cb7dc73875a
SHA512cce92694fcbbb5920befefe48d6548ba97c5130e866f86d904d049f951407509ab9343bf309db299bdfb8fbf3efa266211105ea71b037d9b76696d03d3447ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562bc0ff38771a8cf9ea547becc2573e9
SHA1f656f55271e16c288de5b130183b436837af55fe
SHA25609e683565123bdfbf6693a3b12c3a0f6a5945049398bf05dc590a416ebd9ed92
SHA51244620434adc8c04c1b8e65fbdb884d28cb01ec73fd19b80321d9ce1d2388c993393d2d0e6bb04c0b3f2a933e848a03447f1c4ec5dbb1d44296ba138603721e94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f87cf17c896a02c3bab105f3d693419
SHA1bdfaab0e7061aff20054406b4d803a01b9545ae0
SHA256d2979aafcb87fc98cb5b1580c512dbf1ab027d57f8d1808cf8384231bb64d6b8
SHA5129002b96b1881560339a4c9f2354f2396f2cef3bfc5b41da61f51fa55bd6a52a38dfa061f27d3ca48f403f66a402190c2b5059fef971560473b323db43418d945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e06b57482879d11b906d4ebb20ea7797
SHA1476fba5282ebb318d94d6c781639d7b059a9b93d
SHA25688b9479ae063c29260e5038608bc2f490a81b3806f65e6d8d20aa2284f29e79a
SHA512c001438286a90263db3baa140a0a5e865e0796a38581a3bef999d693381320d92ed2f82f0ccc3524ea9f3364d1a90aede650bebb1386d748e4f78b0ae507b0d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562ec2df3d9c93db229471ba04c1ef665
SHA1b7ebaf2ddb27ab245b51ccd477c0d92005993a40
SHA256977cb73cec023b8d0047ee27d959fdeae6d0bcf29c7ae24f0a9d0b0aa398c23c
SHA512e74a785c6b0904204ff480ac6824b2c4d7c81e65846b65a2dc9ca578aaa9d9b2caa70bd49c730fdbe5421a0ff5840698704bdb7dfd5d90913c4409c67c6c8610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc6593e745dea80e36c38f6fa4d31ac4
SHA173292c2b82fbc6b8a8163330eb76ac8e4858ee2b
SHA256b830bf5258ede268f139f548ebe61d775f882dbdc007e0b432fbccf4ed4c135d
SHA51206ef09452dff60c94a6ac0e4d2f600ac2185501a65d50f4fb36130c040acac586f3859d0820cebf72de8915c2c3cdb28dcd3448ed59b12f29b3b51c3700a5c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5246a37493094249c589e6bbc725604bc
SHA1bc0712a28adb94ed7fef2034a82a9acbfe4eed41
SHA2566be19e2b768f6ead2c54793df594aec969c56b17a46952d7c2974218e07d123a
SHA51236f03c9874a3639d98a697b2cc8b40968f1a1abc9e0142f36e515cd2434bffa1c6691210dbf66202420afbee99a105a2b13d8be4ab718e8ea4459935b1cc28ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6904ab43a106a4aa99da5ef20cbb81f
SHA10a7b1d3604e6910d6118bfe92d79141ccf71902e
SHA2561e312b2e5692da7a85fab2e999008353bbde8d6c6c8a528767fdb331e0844e7e
SHA512849bea5d248ef2c23714374cd04fd358d5092a7d8360571425f0a5a2e69d07e59ef80a902205e6861853e2a6044f75e3a6f7c1a6fd8dfcb28d5db0feed320d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510eef590c3e0b0040b8251465b54eb98
SHA1800c800d0eeade74498aa49e79887ca1f7cf1f9e
SHA256b08ba7ffc8e26f79580077df28e7d2312803c6e218255066f9f3e5fcc97f61a4
SHA512059a4e17e3c235dd64ea13f66c200a013294aedddbbe0fcd516da0fc76761038c1bf3a164b605b9647729f26852b0fd83a0c6bdb3863407eb3d4b70aaa2c0992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556b90eb56189c9bdbb0bb412ea54cfcb
SHA1f41f261b2a89493f587f123f299c7fc1693571d1
SHA256b5795ebfe001972253087cba7bcd92c7ab251a09f411a35271fafb88f835b5d7
SHA51229c3170a9a881256626a0ce1f0440bce7eb8131e47e15fa7225959909b811873ca4e9b07225fccceedfe44b8258e82afdcfb198ce12940b00d2fca59cf138087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f1adb5e1b42d73393838fbcf8b10cee
SHA1985fe705bed2ff39e0f12162466f11556c2f14c3
SHA256f9b6aa0440ee7634d1cdd8113aa3fcac8badeb63d764a29cad0eee25289dced6
SHA5127ad1d158134da09f8daaabaa314f94a7b08569447943293370c7c6c45086f5527d751c180c69e2c36d89a561ec29d6957f810a4053e5147f97b9a9243e92be02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab4877bee598a05fa65184dd87875283
SHA14621e6546ab06096c1b9df4204313e4f958f8fea
SHA2566e16cfd068d2206558e84d672d1500b89d5f28258fc8caf8b6d84262598eaaa8
SHA512fd224e48098a0a21d99e9c1e5365f92de83539687c65a98acd0f2b28d1f87839972e09dd0eebc9c3a30984276f6c458ae0add2447c87f96349816b62840779f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e5b18e8791f0899c4d8dadeebfdd402
SHA16047adaa5b4543b801ceb3f71e39e8d521139da2
SHA256fe7c6ff72fcf7d0d3546b88d3928a37798b8b39c3c40ce62758715608ccee444
SHA512274eac5e65930a3cd87907f73175cb18c88590b4c3c14de68e527c7d17278ac06f7bcc3edb502963213aab7bcec6d19d95fafb73ac403b9c564a412b7560d9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52640de68b859c5eaff9373549783b936
SHA1384c5d7afcb09fe9a55b1c902216e11dbe8d454f
SHA2569e018a8879788c12f66cd35a5c15113922250c7443e61a0bbbef5d8f9e78df42
SHA512c5875bd0e650584db3eb7e81b7d067e7541d1bcf8b80c5b76afed63057eb9232415e5a54a5593c6e63aab79abdc2bb4076d11547ec07a47b94a1390de4fb9920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556a565439a293350611dabbee387f312
SHA15feeb731bfe455f11c7c9c3c83f415360a77acd2
SHA2560489472f61d1b31d78707cea1add3b0cf207cf4b7743eb05cadf4f78b4dbad8b
SHA512434f466c95130d1c1567c6da28a5b63783c0fe6b3801d13d8e16c1064a83f57976128c4492d01a7a4ca862952311f9c7190d5b823289815ceaf0657490b055c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537296768c703744aa5f59b55162ed2b4
SHA1d8ad65b2af62ed301f0e0221fa25a71022ec04f4
SHA25626e00e0d19504244ec66c951c09bc4661b5fc84c6040674726cdb3a12f92e4b8
SHA51219acdad8f908b88af0c74a98524ae9eacde8504d7c9e311cde734b33d3d94d143107a4eeba8cf90b7485c45bf877ccdf8979d293f13c4f5ace33fb7602e7b73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c0ae1afac14906461e60a49a16bc4d0
SHA12f8229e7d87191e3913e240759fab0a2f5e7bb73
SHA256a3bb7c794b68636606bea40d743c2dd80e0145b80bfbb7989a828cf104ad97a2
SHA512131de9cb3b43edb4bc0d220548142edc8c29d9f36bb73a23b0fec661f892387ed454a70fe42343704fb1acd705ddb3c77def7c92f7eeaf11fd024c859dd10053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd759a4663c391204f3fdd037c0aede9
SHA13c9e5b2b590b113c0fca2d4c159edb014c01f92a
SHA256dd19e8696235c1fada34bc18baf29a96faa6fbf9b5595ce693d12b0a286a4ce0
SHA51256981f72840de3d361ac61af3067f3fca2b7801c37729a03d59bcee2a49bad2210f408335e9f25cda79e934cb3ec1af5482ed28e4e6503ad18de89a7d30238a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581122321971c88c19e1ceefa7dec7468
SHA1f442bd42f92ec18d554c2829a6bf791c8b5dd399
SHA256b96a3b44cb63189b20950f8754e6c3ab4609086aa8bc20941024c48dd6095806
SHA512724433c6a18a32548a36c00a20ccb04f1f05d77c558a011fcbcc9996ff48c362abb171806ca63cd67e488225258f975821872e37945679c281a4a8607cca2753
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a