Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 11:57
Static task
static1
Behavioral task
behavioral1
Sample
0e6dd29c32a01d1151aedf0a8026335f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0e6dd29c32a01d1151aedf0a8026335f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0e6dd29c32a01d1151aedf0a8026335f_JaffaCakes118.html
-
Size
463KB
-
MD5
0e6dd29c32a01d1151aedf0a8026335f
-
SHA1
977c3bd9398918c6e72869d68a14a725b5adcbb1
-
SHA256
e6452eeaa2a5547ca43d00b2fb61a2a625f2acf8e5577b55e3f07c2f0ff50512
-
SHA512
afb9bfd95374d4bad78330ad0c28d5d79f1892af7368f1060e1573a017eb1fd76faee8cd364a45ff20bbbff5b4816727463447ab7d77a81a7c6037c2b28c31c9
-
SSDEEP
6144:SWsMYod+X3oI+YCrQAsMYod+X3oI+YHsMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X385d+X3h5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d1c2f3879cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B3D3B21-087B-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000004cae3419959fe03aa5cc0010ea508286b4549eefbf6730ae8d4a8a3d93bc8370000000000e800000000200002000000044a34ed4fa1a995f21f64d4386d4252dd750088ad684cfde5bbd1ff05d0f89b220000000cf00f5fb74e917d47dfd67509c84f179773d00a1509db8bf3729f5c28ae6980140000000dea60720c7dbd8445ef3aff7986518c9990953fb6e44a0fa57febe2bec9f3fb2ba1b3290be1bbf3acc1fee0d28c8fde276387eb905749f0004ab74507acd00e9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000611de4b380e42797dc860438cbecb10a8370742e5f7c003572f0eb1f3b80b714000000000e800000000200002000000084be3833a98eda0a68826e6f366a3b8f07597635e57afc21a7aa187d8799344390000000aa9ba5af9e8301aa146643e4c43ddb47ae844e29e806048400b4ded2113b076434abe9e8e291414721725de3c5926a9f1e7cdb70a864808a115d360628bb7fc9fc1a3d457a68647a405b0b2f0bbdad962126b060122571a92a4083687c2c691cb797d09e89f44a5a20467f66c5e18fb9cf769c32147de229e0c9264d8d9efa479470e21f8b33f13c9e5588f976ed65ef4000000071dfc3d93ec00c72494b3523a86d1e929212a0c6dff22b04c49bd05d8e948387558e6c281dba759ccaeabaafe4d84bcc1d3f4ce2bde2a24a0cc7431455dbccf5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420812897" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2100 2904 iexplore.exe 28 PID 2904 wrote to memory of 2100 2904 iexplore.exe 28 PID 2904 wrote to memory of 2100 2904 iexplore.exe 28 PID 2904 wrote to memory of 2100 2904 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e6dd29c32a01d1151aedf0a8026335f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5309b430c7a8c1eccda94dfe8084113a1
SHA17c81539701ff0055b3567077ad41bfabf840bde5
SHA2561617b1a13f022a30ac831106446b216aaf70ca04857299b0cd44642fc9700a82
SHA51261425849fcda8291e492d1b2fa52d10ddbc4174c9e36d6721e184b56fefcf089239d52f6e823a54dae77e4d72cd4bd22bbc0a51d79ace41fe5abdee6047c5445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fda38f2591204a770c596c93e1c16b8
SHA1ce94f6172af6266f31be6fb91f2dc4a3b1dc3024
SHA25636463feabbf160f84dfb4c2d4112e7901dbb6379088fed23583c0ae4dc5998f1
SHA512ada00e456d6c55d7e4d27f9bb066c2c71c80e68385ac7526b497b791c8be727924ac0ba9c40795a8d7cb444bb405c0ef3c3dbef941d6ac77f15ef6511bc1431e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5767cd39687fc3f6f686e9b4c7c174f51
SHA146a66a5894c3daf279d223dbeaa7f4b181febe91
SHA256ec58050f329691fd1ff109ae779c84127e767a6dfb8d98100f2d87f9d3889a65
SHA5128db94a5e1dbe34e0b0795e578ad9e4c1b144cfa2f0a233a299308de44dae95d16ae43b0a074a5426e8926bbcdf8f5ac315410852d36adb8d8acd6bf6c360ba1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5dd752ab1ed12ee699dbdec32ec7567
SHA1b9b0235c39eb6caaee741ccd7c0ee8a6695321bc
SHA2562c95a23984044fcfdce70d542888c3b1d48ef0331e1ad6b550e302fe5f400276
SHA51238d43346e19bb8ef0d2c0dd37687b49851d796c7f7db52809e952411c36dd586b9c52305dca45831486e86c3e8a5f89a4446b5b4cf6c20b5801db08df0584cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e024d7119bd4d759a7ad6fd994990929
SHA135cbab1fb78b19be0fff976b84408dbaa736a0f7
SHA256d2d40313ad291d332102676520409c03396bc441a7a35824c3a810eb6ab8b620
SHA512088f093e9536fa1699c467e2d9e958a601761a8241223067d0ce7d39e30e742eacba5e47108ab76513da371dcd52c0dad4573e0761a6e022c9bb17e1eb81dc52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5110e9c1986940ccead0955601fb819d4
SHA18cb6e591faa4b142156c25b6174edd663ee0b206
SHA2561af76197baf747297cb3f8c7323c9a284f2e89727ba8f95b640022ab4c34700c
SHA512087ad0ec6cc0c5501794d55c08c44cde79a06850ccc6dcb4701c6420e7a09ec335159c32b01daa2a8d1c68eff1a00ea71c22f1cef6c5a5c0d2c7747f7ddb2181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5556c187e5739da4af4b5f34cf1df8518
SHA128d78ccf6da45e59adea14a9bf056f815fb682bc
SHA2565b89a376cb280da939adb866c4250bb75ae7cad630455cd4ba5b2e009746375b
SHA512e56f50289848e49b0c2ad94a8b2748bdc40cf6666fcd66a299b077a4e14dddcf7f5a70abfb0ece09ff39fe1f9b730d4995374a7339b46257e67d2f7428fc7561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589edd26e3549c8972d4be6ed88568683
SHA165423ac32ac2dbe282b6be7b80492bace15a6b0b
SHA256d8581a2d78a92e3554fa6f1c3f9dac7e53fbd743b7679da933c67e5c74d19574
SHA512360ea0d0c16b14d6b0aff4c3cc9dd00a6b2375fe7984329894df41eb50760a0c8034ef31697d4a41ddda7723c415ceaeaa34d139fd15e1636bdcde84972c23c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51defa9d75218b6a7c3ee34d45870f238
SHA1e3b62c0fc70a440da7e692472ddb8f939224f143
SHA2565189b608277165abdc670b5d8a823c1718bbe38360c4e09e2a8c8b99382dd079
SHA5123094d8b6d56e53aa905c6a434770add00ab661cb9d6f4db21188237b8ef1d74e428427670de76ef8a59ab5b82017f05b4404632ec582a46e213c0c8ca28a3b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5462f132ee26a6a794f0acf88d5d0e99d
SHA1319d448f7be8df946b58ef17a99a2a905d025846
SHA256d3a6f10a5ce561472fcdc2c5eec1f223fc8eb5c3655566ce3c04ddf29163f617
SHA51219bf59effc4be9e702c25d6e158465239ee53f6746c7f8d431e00fa3821a40d9ced4860f27943a1a21f8beeb4cffeb05136f68659066e801915a1dc7049595d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538c9e151d6c6055d60c0e8cc9824e761
SHA12527d985a0a863be004c8d3230bb3ff7c3f65471
SHA256869710098142973fbd323bdc13d0d10ca262b6e496b161590991e290db4ad394
SHA512fdfd5a46083219169363002e0d8046f2b9babb7d639027de12964795dad277f7cbd3e7af22b71734315d128e0d31f08e8f0e5deda41aa5efcf50e1aa7f5b2c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ee591604f59736612b7324660bba55e
SHA1a09efd18aa8d6e5f306b2ec193c00bf5c8c459fe
SHA25642f63c1c14cca696e8ac31156eb339ef5e4e282cf2235192bbba0ac4af6381a9
SHA512c40e92a2f0ee0ef66c10d8b1a9032973405a107d45959d111d7d24d7105ccbdee9ae33e5e8bfd7089ee85cefb515f63e40b6bdeb32841c55f3e122cedbe48eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fca843415da0322eed39ae5b94dbb03a
SHA12cc0383c95c4b2926bb58b48a2d7c08d1eab81a0
SHA2566f0be303a31f311228a3e52c3d6fb56fcbb79abed18f30f28b3d612d77b58efa
SHA51214027c83270ce15d256664b0ffa5178f3bbbe388fd2a57f846fbe4786613298cbe9be4f4d8ca9d3362b60a2f9d5d5e0fa9f0361b09b0782765598e7ea8b18e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f051bada73670c6839e6dbfd9d399a5
SHA1c54a51512c9b28bab38f7e63dc3949c5f44d21fa
SHA256d746d3431ec83b49f27d71f3da164c9615d6f1ad8caa31f7b55c962d8610f57d
SHA5128668faf7a021349a93e83b629827e35ca1209041432ce73ddcbf97a9de0be5e1a562d72bc644ba3dc7f369d0e2cf4458d30be7fbe53a553687a400eb82fb1379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdccaeeb402e7c6cdcb81af2cc5c06ba
SHA1b7174bda205df924f84001c7f88015e79d816d73
SHA2563a4999885af44a3f8e30a64751a2da80d2f0fefe87de2599c0b2630601af9816
SHA512b1c6a958c650d6e2cdeab6304e2aa932009a20d9d79b766a5df7599a7ec4e7b5402ec9d59bc5662f06c4f2e0017e79961475b1aaadec5e12397acfd046a5cadc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5691ecc437f3e6fe681fae1a39cb47069
SHA1eee0d7443639da1ab99ce8e93eccb5c45591c00d
SHA256adce88faa900281fd53f7c478025ec6501fd95af6d0cfb3e800da94fbf0fc0cc
SHA5123fd2523e87a89dafb9251f9ebc0cfee45b7d6711550e41f620ec04a7a86ffb8f99d3040a66ce97fb129b70bba62e2696681cf377d4be4524d63a330ed99b87c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a30ca60507e9e1c4f0cda6c6320132a3
SHA1026ed7b500e0088a1c90aa583ced4c84dd779bd9
SHA2564ad113477c657547be8988b3e51420bba68cf7fd2f3c90ca1918ef120a9513b7
SHA5124db2c1e84c865f5e92a7cf77cc708dc780e843c7dc55bf7d6e59b78ebe90b08e32f06c173554c7e70e8f468652cf039b44e98a5b8a86a9944b93e8cf2e895205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faa067978b8b4f34460715e92f5c9a22
SHA142083174e77e717f3b1e8a4cc8ccd7d9d29310e1
SHA2568cab3d414b13c88606aaa81eb8915e6a4e3f7d4ced3e07b2ed1553290bc31c2e
SHA5127343e534c9907176a67f42a8d910735e52105819c40f45d7a495bda9cf7c7f884b718b05d6001f68605b516284ae5088be84d0b1983e22881507205109d0749d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a