Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 15:29
Static task
static1
Behavioral task
behavioral1
Sample
0ee1f9a9ff46cd5473f18f9a57be2da2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0ee1f9a9ff46cd5473f18f9a57be2da2_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0ee1f9a9ff46cd5473f18f9a57be2da2_JaffaCakes118.html
-
Size
1KB
-
MD5
0ee1f9a9ff46cd5473f18f9a57be2da2
-
SHA1
55c22c3c22d3d3653f5eb294fa6f2dc86f5a20c5
-
SHA256
123e09198c336f2528fe27da42da203edcc8b27311333096a9b86b8792ec1ff9
-
SHA512
2ce353946d8335dec6ed601537a24648358ae9c972f48bd0a1c52687bb572c4cb230627719864c7d8828ec36cf45f7b63251072a0fff764c81575b0de4669278
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000007c4e800e3df43e789d9546b54b54f608659d19da911a6cf0cd35c8c0aaee43e000000000e8000000002000020000000c71c9a7de5d3773cf6356c7ce6d67aecdd0d20bf5cb1fef6deaeefcde5e5742c2000000083ebf9b8442e980238c4e85c8924f882b7a3f18d8c7df02ec7ad0538b1f040d540000000ae0c05abf28848ffcfb69405dab8a3998c18315a6de771132e9e60249db0f75376ad93f3891e5d14c2f68607b160b771b896f1243256ce56b144f3423e6ddfb9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9059de8ca59cda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420825617" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B8643991-0898-11EF-9988-CEEE273A2359} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2496 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1888 iexplore.exe 1888 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2496 1888 iexplore.exe 28 PID 1888 wrote to memory of 2496 1888 iexplore.exe 28 PID 1888 wrote to memory of 2496 1888 iexplore.exe 28 PID 1888 wrote to memory of 2496 1888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ee1f9a9ff46cd5473f18f9a57be2da2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbccfcdb54e92b47ea5b682d40608e9d
SHA1e83570dd2f244b3ffc391ff619faf04bf2727333
SHA25651529669eb44aa63c331a6236415d584c3004a21b2ae4638afde3fd4e29e6f71
SHA5122ce02d2204b7588a3805e3dd4ef9ab0af05c6d8736675e25f1319add2bad59380a3a22c23a1773b9467462c38ec9d9b277774c0029ff926a97cc2668aa8b6364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba04c4c3024a9d8a6229986a9a48e3cb
SHA160684807a3051d609df680c405390204caa1473a
SHA25613097a01b301209ef19336da146f9fece8f446c02d56684c66b963033665187c
SHA512dc18b80447f5c91d3822045d1958523f85d837d57bcdc604f0615232942247a1c7709ecdc1a1f907c6af41968a501edadcdfd6ea187d14d2146423fe4cf11c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a38c88e3f942590ffbca978eadc93d52
SHA1819676a93b5c1a6e9b37176de58dbc62150f96d3
SHA25652811953a2a1edc7011df36692c3fccc6d5aed61e565cfbb304dacd165daa74f
SHA512903b39e1b1563190c1203e5597ffab231f82f96e3f79a0c4cbef5328091387277db0fe1cf249e26b8536e9369372e774dede914f40bd6e0bd8b35e68a88e365d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513b4966c7e1052e345a67b6638ee3a31
SHA1f711344a1bf2a7377778d551611e0447a284dc00
SHA2563992ee969a2e20d83980726ffc3a0075670a78bbae3f8e58ee9b7b721efe5bdc
SHA51240b2c58484dbb9eb15fb6b338a0c64f523cc1eff7d0a08f562cb913f0efbf052622286b9f8cd5e2d89b6befce923e3464e265035e7c4c0dfe467bf1a17094b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a62bdc7aa6d40a6a515d69e92a1d63eb
SHA170d9acb9a24354c8f6430c93ce7f9f700cb1f0d1
SHA256dd62e7eb92550ef0edc88504bf52c4db8dfb25ffdf5ef9895734558eb36678d2
SHA5128d6184a5a48d08738582a5a6df31b271d19caced9435ae5062e546917c7b6d2241b513c89f8c66a52e42153c28d8773b28622e87693f208cbb7bf5d67b8e8fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bdeba227d8fb07578ff6fb42502a960
SHA1072448f88ca05270821dd6def23e88f95c1c9950
SHA2566943129eb5dc7445ae0c5e525406072b3fd3bdc4504fa7aede11796c89d19979
SHA5121141ab5dac156280631372499b2b5f280b63482f4b1f1bb79ed1964159854b33471fb584e719a5732d3aaf544f42810d749268c4df57754f796bd7bfe65a515a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3d5c2f1812e73f65599378cd92ee772
SHA148946b05f795686bb90b565b9a19113fea4fe6b0
SHA2568f79755fb2e6c7c90b70d0ac8022500cd12ac25ec4927e9fb9b2423f30c5ad0b
SHA5124cfba5dc179219ad5da3646490ef7016ee59502493c783584bb324ecdc9ec5a0aa023ad6b4bc1ac24f1391021a727a35b0215c826b93c3e1745a34e381eefd15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55977927199ab6073d4c961d9028575fa
SHA1eb908c5306f8700ff7a6ae0b511a7f68bb067f08
SHA25678809a673110f991ff90bf7b0959ed2eb0cae36a5966e8bc00adfeac5b979643
SHA51242c3f878b82612b3c8cf59b9a0faeb6fb83b8b3b3555074a47cc442829f5e484270e3e5fa35c0909634583eba6d4859d095f658777fdd691baa2c40e9bfd6ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576e3ecdeab8e16c00b20ae0ae130b2d2
SHA1bfe184225a09391eb79d4643c9dc20c6e146a4be
SHA25619a5100a1dddf3de98cb6b316aa02478d783d0ac228d9223ded25a05b1559141
SHA512e157d03e47f28a1e108f83f35378691eef21737e03e3571ef6149a5a5cd1bf52a2ce7792f28087c47ae4a1ab21745058c8968b795766f0824ef202e7c9d58015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51810f0108c65ef2e7be0e0cb4c6ae825
SHA15acbd56b800f490e4b3f8e07b817d6acf58adef6
SHA2565aa124dc193a5d4b0ad14f62a3f1f09d4e8177e5307a152bcd43523d1cb15851
SHA51210727e7fde93304d861eea63c336013e07e0d8f96cd695446eec47a8c9bada0314a71554a539a7181f93295a03addc779a4314f1c5cc0e1cceb4ecd8bb689f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2133a1bab6fef1de5aba9838f58b9c9
SHA12fa2345f3336c86b3c036fe868eefa8b7113f446
SHA256746754e08779def033fb96a0409ea51099a9bfeaa76c8a26567af951937e6e5f
SHA5121d404045267e3996ba07aa781e2b3e2d2252d2e8013bbd2a67f963911f94e269d988e1e6004020a87c3bccf2f3d4e8327b8b490963c931c06dadece7b319a1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558d4f9e1e3cedf585dafcc19a5a76e78
SHA1b56a9bf81dc049979dd554165d8d97abd0cf909e
SHA256a26def727d6eda2eb031df653902ecf5dea8c5aa96acf5167be1513f0fbcac85
SHA5123d943b07b53d110d7a386c7af0a9908c8a9d2836ac7d35a3c699e2c794ef4b0e8cf15733da4bef372ebf94e0118f23f16adc3475bdf19649fda7f3697234ac61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56250249a819ef74bc528ab2067f85bfd
SHA136a1eef549288021441f02e9273daa450fbdca07
SHA25619be76c9217ca845a8471a22fc892148dbe75f9a1ec7f194fd56ef416e958d45
SHA512c8f0bca8885941c7d737af93b7e8fee5df707e46120ab1fb53db9c4b1b2127481ca48664de60c7650c438998a10f931bed8c01ee1467da6d14e6f0bc7ff8d1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a2c7f48e07b14955b79bf1fe7478625
SHA19db8efe42a3fb286c39e05f12926e825083560ff
SHA2563afb48862c228808968b234361624d0fb49aea38817daf9d66c171cb049e47e9
SHA512e4da137c242c1a92720d6e8222b0ead54089a0605dadd067f4ad1d8be62523cfd681d323e0eb50ae155b394ea37382d4a534b6e389e4b0f4af25705bd7aa6f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a16dc9cc16a6c8248a780c4cfb30243b
SHA12e1b504eb92d301a54883c576063a9cb317f67fd
SHA25624120b5bcdb16bbc84b29c3f1747202a7e7e2ae70d08c2fd3a3aa49bd88a8df2
SHA51230839593dff8b1c40a6d593946d20b59bd59c84fae25399c5b39227188f85ed26429a8b6d64b74cbf0d635e890022eea2c57c3e2bd43caf9adfb60ab8f08eec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551d0a6149dc1acebb2248548a574e64c
SHA12e8317d60ad129dc52b09899c9070e0fd89b5db0
SHA256953fe3a744d9947fdc2182a6bd6b8fd1bcdb701a2328b9ac2f80e2b99472f97c
SHA5129e5a0ff42ba9ecbcde13732f8806d2fc5165979097ea9f4370ed9530397a76c70fdba21ece4e663ae7395485742b2c10c96474d3cf5e24dbfc98e250e4590f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59aa0268f5e202a7de285499c7e7fb495
SHA1038027e935efe77a3226f8bfe41f2ee2a0f71d28
SHA256c91a182e4359b63d2effb527a04ed228318cbf2b1c8ce47979ca6a96e9734d04
SHA51243379282dc53d7b54296f70f3166e075b09a273c78fbbe31fba6bedfe51f88d039f78d65a6d77e726d4a4ef4eed9f0706dd362ea0ce1dafde475004ccdd69454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ce97bc89edc77ce0b26b1651819a627
SHA162156b874516ff10c7561ddec1fdb7d20b98f61b
SHA25662cf9fe4890e6d6899410be4975949b6c3d5bf8f62a5e54f37810c996a50b5b7
SHA5127fa0459bfc266d46e79f9377ce4822491ebe8be58fb4d003ae300cf39f61ba6b79a5c47b97933c3fbd8fda36debe5b14a333f9c6d0684f66ed786d854c440b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5112ef76f5df9425b8b641ae059ebfc0c
SHA1b1822c3a1272f46f4232223bedf42353ddab5182
SHA256840fbd26c0f72191afddbed14c022261436e045bd07609843fd5589208aafe00
SHA512cac07fbf5d5ac94e7a88bbc376e88de92fa421518b82665f181bbe2c00e233d350af36dc599d1659872f01a2531717783e40c24bb29ff853dd99ce536b94bd6c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a