Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
0e8d374720b40e511a22ae568b68defd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e8d374720b40e511a22ae568b68defd_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0e8d374720b40e511a22ae568b68defd_JaffaCakes118.html
-
Size
37KB
-
MD5
0e8d374720b40e511a22ae568b68defd
-
SHA1
245cc62c9f0e5bed18bb98337d13700b85af2995
-
SHA256
19a19600b935fb0e5ba7b6d2d91c2b94225291069cba3ccb0b1a6997c3da0a97
-
SHA512
4b995e6d00d382a4752f7baa78a4f5c4a796c0b6e6151541ba97aab86b344bf92603445fdc5dd2474817543d1036c8fc0d2ede92be8ca9344c6a1fe916b11f3a
-
SSDEEP
384:TjvHwduTvmBxnxbRLMoicuXWV+PzCsBSGXNEu0:TjquTv2nx1LBh0WIVB/XNEB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000006b1282822556e79ad795dc6b8965d4c06c9ee9054d71231a9fcb5b59aac373bd000000000e8000000002000020000000d8400e96e6bc9e31caa5d5d8d9ff69f5b89860df49c1ecda696d4559b436792b20000000e53cbefa903c804da7d50af125a9fbe091f119ffc92ddbddb22b532e17b836e24000000090bfea32a7ce1e5ff9679ac8612b3f28e3b951f2fbc63afe446249f7341d4d3d49709a26af8d5ff09d151120c0a29c4d8b57521e9cb8f14a4eeaffa2bae767bd iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a03fe0918f9cda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC7F9801-0882-11EF-A7F1-FA5112F1BCBF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420816175" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2724 2364 iexplore.exe 28 PID 2364 wrote to memory of 2724 2364 iexplore.exe 28 PID 2364 wrote to memory of 2724 2364 iexplore.exe 28 PID 2364 wrote to memory of 2724 2364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e8d374720b40e511a22ae568b68defd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56802be043ea781c06f62262db503c5cd
SHA191f9cdca1c54a7f78c9a2b37005d822094c4b9e1
SHA256acc56c5b1e7c7cb65ef9236c9db742e49f7d265e81dff3c46fe4d8e0132f7951
SHA5122e06929081cb9df542d61de1c7d95d558a93d02f9e4afde5a99c068550319affcd2f003cdd4a21518950eb856d61cc367ebed36773d23c20e8e0769ab7e4cab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d1bba920de1be9ee0074addaa30f0cb
SHA11b962370ea1d603fe9a078a5bd8a7d7adb223cb6
SHA2565a30856f408ddb9d744acf629a4b8a7072dc2017c020ef59531ad09ff5065b10
SHA512e35e80c740190d3392e21bd954316ae7c99291036fa62b4596b175fda8c6689cc6620067a0efb3e44affe9d04d494bd670051abae73bbfae04d72d66d2432f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5856a215446b59f2acc8a349fe69e9509
SHA1d4c57697c7d105af8ea88f591b51da67abb51890
SHA256f58bd599d28b5fd8265a89abab8a9d4142a5784b0abc4722169c148b76182500
SHA512cbd6b56358460b4f8999ad6619e48272f06ddef14ef4b02c06b73024cd5f8fcf95ef838381a19421ce9e9dc38d69f15a55771ae13ba2c68be42f65a93239544f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5431d2b50aadae1c8f4a3d92cc2a5b37b
SHA13135924ef46c7391ae32a843f6ef77f58063455e
SHA256d7cad110513a91e953e730fbd0fd22daff76d562064f01d85f2ba1ea7a10a3e5
SHA512e20bc557c789d1a2fea1fab32143900138060d80c11ca33717318b48ba10f715284cd9bad587cad383950bde7c6d28ee8e30b1f4a35bd019941cfa0bc2678d43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53703c64e6022a72a9b55e4e83ca9858f
SHA1feb5ee2a5f0869a0e41d1aea0b81340638cfaca0
SHA2565df91f13d1343bf43a8a1684b4fcc1bf55d19034a6c8d3278ed83c8ef865637b
SHA512300bd6425998b31e681cc5e2da2420bbaf29f4217b08b20e53a057eb560a4d0bd8f7847667ea27830431afecedae827a3a97ca0a4e95d3116cac58242e08f047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5594e57dcb1e53b924ae925801806183f
SHA115fc69bd1af0096b86beaf8759f699840b00af99
SHA2569fbdce21cb62e002666a35d7fe81aac528d50290eaefbc400c3ad6f4daff1068
SHA5124dad63c3befcb0e654310f3adc3612ab8adfb6273a86f0f9cd5f672af94eaddf85db6f41b86bbfacec86e04928beb84687b684d155ff6930641129ee0cd5ed6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59adae355c3ef3bfccd6be24680ed937c
SHA1fa97c66110f4033127ed5c7792dcffe4cb50d6ef
SHA256b628a672aa8103473986b8bfc2ad80741544858acf8bc2c48d66dc4c98a2d963
SHA512fd543ab8c1eb1aad3805e13fb42789be88e36cad0209ae201291b6f1ca8a42373bce55c9ff8cfa57ee14ea8a0ebda5ade1bf1364560d6babe40eced88cd21a5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544320171aa06813077874877c03052da
SHA150ce91ec783eaba2733b3015995259f92f7487d1
SHA25630514a9c18514079d4df1c8a55b404482d0d5dc2523a6b45c1ff636c4b9ab9d6
SHA512c37d5f0060db0f75e83baed07235d3089348424e519d8f242ab99b3212af84be028356d84582edd7029ad74e7e22e140e99ab8033ba9c5df449805c83ab037e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519d67fd622ce99fe1d75a35e0842f0c9
SHA174be8897248030b54d24370d1cd16baaf8bd83ac
SHA256608c9fdc2c9a71005a72e35900e7c1589b7e2b38edaa7f4eddb49b1e1b971914
SHA5128b9e751531296474aa03d23f51567a3e7f3df84a312b75098badbf5bc28b4a68dae2c1038885b437a93b7bf9b53d45e51c7f2861538f73b4d03f48a619c8307c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525eb1291383ee6628577c6eb9ac8db85
SHA1df78422c7c09b58799f83efe91e895460aa1aaf2
SHA2560dab1cb15cf00c347a1eddcbae62d640f009f25eba1fafdaf2ae51a11bff4bb5
SHA5128f341680745c6dc9941c8c008522a8ab81f7b6b9bfbd200c7c0177f497e54dc1595ae7a8da15492bde0716303b672f317a064ba6f6c1f5c6cbaff6caa10e92e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511ba1753b3bf547b74933a62cef963f2
SHA1944827c09b100bf707d708ae87c37eaa889d287d
SHA2560220b8dbbf3da5a3e951870184c46b0b8f0f0ee5575d25770cccb884a04c25f6
SHA51285ce6194c6d72a19c15ae6d899fdb4f992564f072c6df1f9c091703ba0d046dc9620901e659416788a3417656d5200e4723b836e0df3a64b5118ace92a0ba7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c4e50e180c78dff7b9f791ed26a448d
SHA1c40ac48217bf9516adda5e1125273c67983fb05c
SHA25623207b7e7c48024dcdeb7a5d719879a9d58ae3c9756db9cda12bdb052a5e4f03
SHA5123f511c01010f5e36adb9649d1b5d4a9b67a069dbbad22c8c1dcd6d69d6b880ed801c35fee8d8b7eaad2d9365f25d800ef471c3a493d29cef96eb8a9c6f592bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3fea26f6a42727b7554ad96a4ed7635
SHA13233ba8bb99cbf805a8d41d0cfc75c495216de1f
SHA2563a94e7bee1034149bce793a004c80ae240aab25f5b50db22a6ada5b3be1cc6e5
SHA51223b6200fa87070a76c35b7cb45bfc2e5277bff799ee7e0716dd2ec8907ea80f7d4da6c43859f69c340e03042388452be3c74fc298e792a32da4ecfc8388f503b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59762c4a4c1e8fb22672122e98ad0ac66
SHA1f3f59776c26618a92cc8b8a7181246aa717a6ce6
SHA256ad1971be8dc62c92d9b6f420efd96be38196c12678b0314cba68c1ae9bbca16f
SHA512a8663a6db8f6087db03a162788aea4c6fa537bf07eea08f4b2d3caaaa3423644e145753da7a2f94714efc88b863233f88fa07db48783988a2615fed19456d6ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5f89773efcdc14d26912d38e24b1b3e
SHA1a4a037a670da7a57cc420283be524516ccf77801
SHA2562a39cb375c6018b89f55653f5ec8e0d549bc12107ac6a83f9686f1d0434a8bed
SHA512572de9bb81dada32cc4d7950354f5b6d140aa48c16903b27ba0da826432cbe217aeef46a2ad9d0d79e28f81516dfe26d7fe800e2a18adb06ee4eec17a0d019b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd10dac11f5464f1e8ccb45cee2aa6e0
SHA1e0ec7b1c62d0e829be6e481823e790a9d4be4af5
SHA25689eeaf0a5f416a2bd725e53ac55ee243562e3ef70f958da5f8871c8169d98f89
SHA5129a65701635f644e6c809810fd3acf6e47252872f3d7a0edd2aab31538afa2de195a959af733d44b09f985da5c0021b78f06ed901aba7adac5d8bb3b707f24842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a2d82196dd4ddded56267f43784cae6
SHA1d3856e52c8ceb069202bca4037a5e395088ba10e
SHA256d8249ef775bc9dbc36dc8716454319a75fc3240756771831eeb8426e454d0db9
SHA5122e167018d237ed24cb2c53bdbfdb25b051feaa945b2c57a47da0bd9a541ffcd0be16ef2262c92257c199493208de8cc66611c0eb0a619e35ac3f9cd22b0db6b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5fd64bbf7366502c37ee69ec939a7de43
SHA1c405b356c8c02a63e61945b692e85261e150ce96
SHA256e382fb47a00c8140fb54da23b23e2e1245bafa7676be2c17b79e87100c721285
SHA5120f9d13a4515c8ccf887b230f0c0e0c42e1060f089422bd2710974f3e1f38783ad5cbd08e8c1d6a040f3448022323bc9ec76b12e2d243b8e5d8ce2fe8b5c76854
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a