Analysis
-
max time kernel
117s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
0ebc5412094840fe9d561bc07999a969_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ebc5412094840fe9d561bc07999a969_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0ebc5412094840fe9d561bc07999a969_JaffaCakes118.html
-
Size
6KB
-
MD5
0ebc5412094840fe9d561bc07999a969
-
SHA1
8d1c20409844d23ff5f32ffce91bd5525e940106
-
SHA256
eafc62ab8e494c5d7b1ec87460250647b86195dfe744d3d1ba6a144fe9965079
-
SHA512
280314e6cc442a68308e1aee768a737292b0bc378881aaab0a387301bc30f9b358ef3bd24362e16bb2b67825caddb5309c26150b013e3fa277ce96c6c847b205
-
SSDEEP
96:JhM3sHfJrjiKHY3nzjCoBxyCMGqSWhWJ7uilz:JhM32ZWqE/xBxoGqSWotH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407c45e99b9cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000034a593dcdc24273575af220a2e1af556af04bf4689b576d2a4e79573086b5a3000000000e8000000002000020000000f6b04451d418ffd868301b87b74dce6103f1f1f430f926abb81a7686c6b39183200000001396132034be026052cf808d0eb95d1ed2c69d6bfe9273aa485e6620fd6fabc640000000a2c121048ed435c72af9700937eea81fb8b920bf65ea50989c741271cddcec9e988bd52df14b0fef5f5687edd2e12151655f1cddf749c0cf24330f84f61b73b9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14C1A7E1-088F-11EF-82E1-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420821485" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1612 2328 iexplore.exe 28 PID 2328 wrote to memory of 1612 2328 iexplore.exe 28 PID 2328 wrote to memory of 1612 2328 iexplore.exe 28 PID 2328 wrote to memory of 1612 2328 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ebc5412094840fe9d561bc07999a969_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8f044c0356828cd8e1aaa1209fd325b
SHA11f76b26e88f6ca776d5a3b994102dd269d078698
SHA2564ae9c28d0cabad6caea615351d3167e49c75c099ceef9d5c2450c469903435cc
SHA5128831a4e9822b5d7d0b448c90a5431478886006ae9fad307945f85494286be2ff90f5dbc9e5676eca6f59f3d6a1b0b2dfa0e2b97d3de5df1af14840df82eb7d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa1aa9f3dafb2109d787bc139d209e70
SHA1862079fa3d87a65dbe4823ac3e211ae5e8d05fa6
SHA256daf9bc700307240114bdc902d856d3a6316c20eddd46aac87df613b154020e8d
SHA51219ce3579676f894f2533965eda32f9275d08de93e8dd8ce4c5d0341b31864e4914f873445d25c942bdd174607acb42a563bd29ab0a8f4d20b775b61aa2bd3090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5951ff5f2a4e50a9357627f33482e9b48
SHA1ac580946500b3cb1aee68beabd549e8d52497cc8
SHA2563d4bb379487b4070011da9f1429b1015a183ce9a6110f556b02bfbd711bd99e5
SHA512d2f7bf74747ec54f5528aa0b58b70982b2b48dcedbf8051ebaae228ea31930a5e2be767d2e5237f3c597ddedd0279aa0d2ff57a94a70b5ddbec05c7c88e56154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af0060094595315c45f1bec2ef5a311f
SHA122322f7d526c4cc8909dda9d9a765bb74ec3d390
SHA2565d592ec3610e85be02b0093a2a3aef7547ef0b2ec6085c49fd3c9370af26f744
SHA51243ddb9c71d4f52646b9c9f8fe36352f395ee1095200c4e4a409ffb89b114cc389272f1c6fcdf5905b5ec6f6ae87a803f320034e9b8bba2242bbf6a0ecf0f6ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbb71f19e6dc5cdacac688dce5fb7cee
SHA1bda1040358b5f7278e68460c579bbe5ddd9fd140
SHA2563a9acfe0884ccb2e4ddfd2db453be6a54d2907c6c1c27bdc4316442394464633
SHA512169c186d684c03729e04673dce01d14b1141bf57f7cdb3f051fb73df053fe3ea6122c3868002d4f1cf88cb021b6c7a76c9f5379d80231ccfce29f5dc7ff8e0be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e98b3f1c7ad07cca4b21f97cbcccb530
SHA1b944bfc42b32706cf983edcee3433b3ab7217038
SHA25620793e573506468c0c97d7e2eacd8947bb2df9f7ce7b63ac4bedae6010bebb94
SHA51272ef11036d1930fc5398bf8ac3d0143f29dedee1de35da3b79f4750a753e06c03ca7cb43809dcc8897bcbf3ded64a44aa0908c039566d4a1e5aea0d1a04933d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a3c687d451c340d473aaf358b466ce1
SHA19dd1b5acd538352a00b8916b01c63c2d9cd639cc
SHA25696dfa924120931e165da3de2c6d2cb5a88c026d78303058029414c5bfb67bf7c
SHA51258b3d192ee66a5b64330d46133a0189bf3f5a30b10b1b76b08fb3cdf1f2603a13bc3c46599713d9a1d464bf54424e51fad437d42f8b4764a584e58cabe6ac01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3585ad0519da97f2b50f64ca7a75665
SHA1caa33b79839ba25ef2096ee40e48844190a95fa2
SHA25653b7fefcf520061e41884c3a72d79aa13cebba6a2e13f2775505ba6c442a4e9f
SHA512beec2e7f08ed2e23d997795727955f13f6de6cee0ea14e501b930d310b2986d4197c7c5276d67893cb7e687524c51a2ee4bc74bd10dfaa5e226bc45d0aed9c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575c63bc945b6a27378ead5b068c85e26
SHA133435d1d7915e349eed492c271ae441ca9e7be97
SHA256a0dd7fda91c9fd716c0d050836fee897875e6fcdedf5869e51b93d90ceaaffbe
SHA5122a7e35043ef2af385bb9949db9c8bcbc87779df903374f13818acf81f246045d3f4d610b67f119828626181d425d42205dd857b38da1df914fcc86c118c76429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d7424e9636dc817e3d1563395f73137
SHA1e90c9e9030cbe8ca7fa6d793a7eb08a7f1e5d602
SHA256e8b175ffb773a794687afd18a7c47223a727c7c01c9c45a3c8dd802aaeb9dd30
SHA512b6e55d820215272357357de26d7dceb84bcff1dbd59416aad3e5c2e0bfa33ea304b2b7b9bf28dbff4c6bfa4aa41aa3a850223ee49428727ea98ba6c69d72329e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589bd3e4fa7ceac171333f0a514c07a5e
SHA156b56790faf641d03e3497e75086223b146999d9
SHA256129811834b0e1eed07547325f7dc5675e096614cf94a27af8ee68efd1c89ab47
SHA512c756665fcda782d31ab2ce89defd9502f6ecca0ce2043a99729e1231b8c7d8e7d65e1fa6495be2abf20c2439f7b2b5b510b4351a59ecd08ab2b578eed1e97e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517db35e46b950165adfae5e5abff663c
SHA1f3d6234aee0562d8c8f3474f0f4f0fb3fbc16c8d
SHA25688030ddf57d807bab1a79a57a6f56dbc1a6beeb9b31be2fc560dcb24e35d793d
SHA512b07e558c23358bfbb8904831a9c9de3c29d258d457cab7302c54effe48d470fcc3842e487b06421920a122c886eee54326cb4eb26eaca376128ba0b311a8bda3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c912d20dc73eeaec9257445cd2d25083
SHA1a19b4908ca62f09c507742575d9fdd4e0843ea1f
SHA2564dcaba9c905f7a977b3b94a30616b8906f794ba8504d813ab3d519c10c925661
SHA5126c74a627d941dc46ce03c383d90a0c0832221296dc2795abacb808d988ca16f9a8b2df04835bd42b5b6e9c4d22f27dcd6f51867a6f73ee40bcc92d8ee2291495
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a