Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 10:45
Static task
static1
Behavioral task
behavioral1
Sample
0e482806b154ac6a05ea46fde7a0ead8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e482806b154ac6a05ea46fde7a0ead8_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0e482806b154ac6a05ea46fde7a0ead8_JaffaCakes118.html
-
Size
43KB
-
MD5
0e482806b154ac6a05ea46fde7a0ead8
-
SHA1
ca9e19b87cb077d937c8892ada504f2c9494c77f
-
SHA256
225aa412e623e8decd86318cd1ef44b68fb06dd6499d1a58a4cc9340f98dea7f
-
SHA512
c7ce868e0eb2b4cbd6220dae9506e7cdc234aed9fa61f1544d608610b0944a253eb71da897b553143777f110aa84c452287730f1348897513e753d388eba97e3
-
SSDEEP
384:sHgDtw2s2Vx+i2cW/qwmdptS/HkPAZKMUD5jJzQItAtW3t6z5F:PDtw2s2XP2cX/5j6Iawgz5F
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f07851ef7d9cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{197F2B91-0871-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420808600" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000047d7d1d00d7b3b00cd766daf3c1803b7a907bbd77d4888aa20a53b0114fe8c01000000000e8000000002000020000000e58da756b2002bad17949b7bdce015afd495a19e17897ec7b0993a323023e5eb20000000b73404a072954c90d7cd13f14f96a27f5f5574c6feb5348ab9b1dea797905c4c40000000fc5acda71e1dce3403efeb6484f01a83d0c18e7334432d9804dfe1fb525486a36d5efd8c8f0bc028c852c949ad2d2f16657d70a8982f0ebb943110dd9447546b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2860 2864 iexplore.exe 28 PID 2864 wrote to memory of 2860 2864 iexplore.exe 28 PID 2864 wrote to memory of 2860 2864 iexplore.exe 28 PID 2864 wrote to memory of 2860 2864 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e482806b154ac6a05ea46fde7a0ead8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c4ddac03c435a584a8aee990d270ab03
SHA10c77bc6a1882669af094103803c17aa306652815
SHA256119cfe82fe11580cd91efa119be1d513b7c5ae4b8dca55b7d31025d291bc6edc
SHA5126b0d9839cfaeba265cf5f7aaf609ba95a670837cef9e74c63425925f53839729be8209920011770d4726a65b8ff7474eb6ab02e4e3aa2101172dcdb1fa5573de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d51aa371356de7dcf5ef5088458cba52
SHA1c55313ffcf51c95b3fcd5835495429b92e2ac1e2
SHA25698171b09f401d160cc2f90fe3552e2d35dc5c08d41059c7fa57648ab740bc217
SHA5123b8a69ecc59057c84860d7d71b2a0bfd313220e8b09b3d8081585ab77777cc290af5285e39ea012ea75c47976806acffa9dd28693044068149c250fa4e34332a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0d7d4784a3101699b21ec3cb12a1932
SHA11e51ceb91a81fa1917d53a6e4427b236dd43dc27
SHA256779a7e5f7859e0b253dbf6f33b872795c9ffef203fe0f7b1c870bbc3bd7ec894
SHA512810033052b13592cfd8af53a9c6dd7f81f94c603726c6c81bea484b867da88a00b8f37b0895f19ebcce76e52fc85f061dbaa0b278cdced794c1afe3690343d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bfefae4e2905038a51095fa4f080c7b8
SHA12dee1564c5c513d9e4c56700ef001a79e1baeb25
SHA25661c45b5d934cba9fb02945e03bddd7b1da604aacacb8d5c323985476f3d8cb7d
SHA5127d3f2644b8028eec7e563589de6292b66e5aa4f0b969f8f4d65ab3b14248f2b0d5a5f762e28f87137148228917c0cb8f905e91f8f62321bae4bc3ef268c19fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb2fa7d06e98b1c1b0648e6129ce3adb
SHA152421fc54c787571d4d96ce7768106e72ea4356c
SHA2563aa1a1ae0abbfea021e682250f39dc046f0f9061ca3a661633ff82858175ffbb
SHA512efb4381a77780fd4ab479a91f202a988384ca6eeb9a0bcc9b3786617118a204e191ad7be916ae82e0199aece28b3b1ef60f754590e01d194ed9e56bf9d03ab2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5131d3c9a65508aec17b0bcce83ddb6df
SHA144c1c7cb541014ad9ab10aae780ba4b42e0c6a88
SHA25617238de651b0cc031792108a8e809a12c83f5640f0fdac669f83f067dec0b3c0
SHA5125f964ac6c8d1c73bf872b4b5621a7f325fcf74bd1e7d66cbb1493f436e7e21dc21b22553cda5e8f42ab1eac21fd54959656651ea10a28031c5d48e651d6add7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f6a731a2225814f77e3c564f4800a9a
SHA128ab87823deb0ee780d1c4338ff1a2fabb31380e
SHA256b270d7aa90c19bd66debb94551795414337a0f698719e145d1b3118c37c9ce08
SHA512a66d81d23f5043069e7ad51c3ee92c063614550f2c0c177169c1ffca87edc83d7f03990df6d27fc61e1bf420d26c968f55390213cb68ba743c1803987a245b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c3c54275008209d2edfc01d83102555
SHA158e1f0b074ad807e496badf608a8fb31ec9c39a4
SHA256bdd828eee5a4c538939805c2da73683d3dd33ae9575f48c1afcbe051ce85c45d
SHA5125c09fbaa81d615cf2b6554ced75a9f74b92b847af9fc3895128202873e06dfb0b1731a60e30f4efbfe550cf4a0226de9887e1f2ae7d6522b364515c7e3b04816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56346a091b78a2a5a1e9fbb24413cda25
SHA1e9e3983426c068918bcd5df02a6f46b08d5b6e01
SHA256d50caeed4128133a41410f364ddc6c298b1c0c1fb13f169d1ab874cb3ec0f71b
SHA512366b7a1e416f68e4718d445cf6307e31fcfe76e29718c49c3dfc9fd7f55920edb416946586dbc371d3ba6c55ea9daf962202680f4d35b93c49680984499b1486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591ac51c885522d64d134b0778a0178b0
SHA1bb988637b6b4bf6e0080f4468f89d1eb7da66df8
SHA256fb9d06e524198ff74c19a1216f4e9bf31b4c741ad283eee89dea4c67473c9457
SHA512dc10c4de2663dba4db6b521afb03c32e246e8d2d67e4294967a0d927593100ed4af23b0b257b0509f2482b6be62c358bcb0cafd6b39084989ad3529931b362f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e227d9fd96f89a0b7e9c38ae7d1d12b
SHA1869aed44b1406880558da1c8d17860fe98250e11
SHA256e70c7b6a1164ce1296965c9947427611565e5e4f367952362409ec04da41829e
SHA5121ab722facb9efa93c8c2fdea2782997815bc21c52124fe09000d67af40175a2e9624005663559c56d7100576e2a4751b0de094ca54b37f3843b8c1761d0a2c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553f6a799f9bf5f4c37efb9dd437bd0a1
SHA18f3582a845cf8e722266b3c2f996f658d7d44be6
SHA256dffcc24029fab49b32947965d83fd2979f9375def576a4f0cbdb793912099782
SHA5122b043c11f7513a0a68fa118ddf64f9fa63aa1411a9ca07920b0f004d8fc04406a984333f971adf8c8c9069916787e7e2f418f10ac4fbe6f7f1f890534764478d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52577df3b787ad07273ba63fd8720756d
SHA1287d48f3ff7c3af6895ee37d6ebfd0c7b5e2f7b9
SHA2561b5d8162a3e158e18f583db0db854590de65e6836f276c0ac8be9598c74bee0a
SHA512c75f313ec87526d40e88122d0bb305d265aaa45e1e94372bdb2df67ac26ed84ce86a854a570be86e0221b34d6dd14aaadda57ad98abce10c78c6cdab21e9aafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea1bdb54bfd78826efad51e1220ad124
SHA173e4ce4db8cac2c697a8c7a45d68c38949a1809b
SHA25631ecf84736983f5626ce9203b728af3f187d11f759ed66a4049506db990cb2e9
SHA51213dccf04c2c73e09acfb4ebaa906f13176292d0b3679f0800386001b14597b1446a65c1db64667c9643a3c5a7fb0d7564efc099b591e84a5f8eff9baeb96dea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5224b93282a3ca07c5707d62f217df45f
SHA1ef795fe006e96dace0a823ed69f5ccc06f89122f
SHA256894041903dc95861b565577a6cda81ac143b37ce9061532103c5d1d00efa35da
SHA512cb8f1e7d3533af8ba7af01f1a4d756ace4069ebd7f949ea9bbb6921f051dc848583771d0382b9ac75fab59a895238e4fa5b83e7f5da482f8b40357f147cb5e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56443a1aa6f325cfdbb88b0039cc3bb3d
SHA1d6d5a6cd34733c00cf55e382b44e509ad3905010
SHA256010f1409a959991c81c500fc6d8353cbfff8f361dfd57a09a8b9da6b503ff893
SHA512ec5c58f3e0a93fe89f0caf660f4037242c1d2e5ad76de82add68b6ca392ff8a479dff85cb6ec1ad570bfa21c1e2afad4eef996d53ca425311bef8b60f557bbde
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a