Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
0f46b15beb10d02a50ba03763a6a2752_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f46b15beb10d02a50ba03763a6a2752_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0f46b15beb10d02a50ba03763a6a2752_JaffaCakes118.html
-
Size
13KB
-
MD5
0f46b15beb10d02a50ba03763a6a2752
-
SHA1
6ac73ba7dab379dd4c1e0da06d8cf7f2b0710a52
-
SHA256
bc2590990a102e9e96fe34da7670902976df673f8fc309552298e6b2d8afd4d0
-
SHA512
40657d080867fc5e0abf42ca51c7de658c360d75d6c0b4f9226b297aa531e6be3a707c782de148824b170a1230031f5e4e965bde35d46401934acd714fe30b3d
-
SSDEEP
384:R8vBMUBMmBMaBMkBMIBMES6sgrMK2fKfKuK9K8KdAe:RMCUCmCaCkCICEogN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f03232b7f29cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420858764" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E15761E1-08E5-11EF-9891-EEF45767FDFF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000e41344d957e276a7bd87c8b869a948509b5ae56234a76de4f30c1a6132aff55a000000000e80000000020000200000002a6f25eac0a7eed0f0d29918b1dd8763fd1e44216805d74a0305bb58fbdb0b44200000004e6a45f4fd8e9301b83aed8758011c98ceece14db38d88c42774d6c80ac2953c400000004ac55a4f3d8cf27eb46b7c036d21c879dce2eead3d3f297dc408d7aad0312cacf888f9bfa30ed9933044612fe1fdb6fff24a368907fc784ff3ba03795d60fc6a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2944 2080 iexplore.exe 28 PID 2080 wrote to memory of 2944 2080 iexplore.exe 28 PID 2080 wrote to memory of 2944 2080 iexplore.exe 28 PID 2080 wrote to memory of 2944 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f46b15beb10d02a50ba03763a6a2752_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5984b26282ecc5d6c4a80e2a1d44ab0ad
SHA184c6c9fd03294ae2761ddf49117d3105b89f4243
SHA256a53a86a3941b7a7ce7351d71cdda8d82099af218f9497fda51020dbcba6ca8a2
SHA5125563cf7493a5e1d57f0a0e623814ba6761e13fe07f9d385e2c4717fc94f21f7377e04b34ff9d454a6e70b876280a3f5d8d9b4fe249550544a838f649e7499bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fa7181a1297045fadb410b77cec7eab
SHA1e7d0fce163947437dd5927c9b605bb9f4fd7182b
SHA25668b94425962dd19e1c7015240c5731e51f3cd9c5e5279626461c4bc45a1683fc
SHA512d1fcdf26c9b414e817008fc52351d5b1f636accbff05499f4bdb0151213624874fb27ba4e9f7378bc921bcaa021981f6ca66a65e84698cf914cc3dc75d17779c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531d23ba6ace9adaae04db987b06caea4
SHA1574963a4a35d9fb68b66e88dfd9105555b1096ba
SHA256923d5965916296fa6062707f30c8971104afd94a66ac751969c3ecbfc3807988
SHA51205907d959910141833fd73df6ab39065b3934a87d73d860c2d1ba0e6dd590a0fdef2e5c9c0c61b45f955ea6751cbaff0f8fe346cc5b53021054139ab342cd56b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a585356d68695559ac6fe98075ac4f48
SHA1d470843597490e9f6ee76515f760828da2494bf4
SHA256857a76ff87d5c71baddbdf14c7f86c2df5b4244672eb50ce0c11e8b80dc9988c
SHA512c5bd68e508bc07f226312050fe8e84ad8630134affef4815870e8e05254e0f955b6c7d95e4962751facd0b24bba764e60924d1bcdee21beb81aadf694bc8903d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c9ae02273261541c06943761463da1b
SHA1886f3d9bfccc38fb527bdadc6dd3cfa5c29fa3e1
SHA25690d4863dfcdf296650b6468ccfdfbf245c3d02fc94b2f6d40d267d4d1c05950e
SHA512dacea2a919187174d5a8210afd2b7e1dc88ef6190cd71f19d6e989fc859375614e9c73f982597b621789e72ad84118c2531535ecd461699c27190efaf91d1e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dd8b2c949b9606c90b79050627ae51f
SHA144c98dc4617bd5b2706738140d778bb18849f0c3
SHA25630ec70ec00fa167176accdc4b33652a5a8301df84e50552e34c165cb452b7cd0
SHA5128fc5a8f73e9131f6901ab1766635c801636d7df79c8db29f2bf6ef0a00e271419cf3e96ecb51b76c8f879dd29aa4b57b345d2f036d4387164c2b179c18069ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbe34b048252a1649c5a88d1f19a6152
SHA1741f4fe82dea8b9bb58e47334fa6a991cbd2915b
SHA256d58ab2cb0898bc341b2b1431b542c4319c065e5aa4b099a7aad5297ffa570add
SHA512533518614f64d82edc6eeab1e65a80bfe46d95511d0e9b4a8f159c75049cddeeb79705220823d6ab60228db9ff1d351a341a67ddf0933be7a212046ed295249e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eb48a63bfdb154d21fb24b4be4619e1
SHA1050697bab6d11193806b92d44ea76075af7d4996
SHA256a6e9c463f9f20feceedddace3905ca5173a4647655b443cfee07b2a1b4adb01b
SHA512946b45e0c1003d34b2a7ec67c06a690f78d6a833cef30e72e5e56816c03421fd5dcf4efad425892b4b49193006f74c02eb58aa262f442f459f496ac4e1dcac21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b48a5bbeb377f46cf61bbf3fbb8079d
SHA1faabea48ea1245828225926c05dc893f9fb1f0c2
SHA25645e3c2868fdea09e889ff4362f3b08d816f3a18094ec7ed385e3fe5b48b79269
SHA512e0d8390ed4a721971ccef186860653ba5ab38131f1e6752682c12ba6a7a0b927d3bc1702bf27db1e052d3e8b62bcb0e6fe08ea827c60d069373c3f66b67be533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537eb179305e51c8053e024a236a014cf
SHA1f0f0cdd2f7dc94aa09028e458da6bb9b16bd0c57
SHA256dc019ef2a29cfa760cae216a88db090018b6d216f19dac2e87a98697325b8bc0
SHA512315c91c73eb002cdc5b237744291e33edc63c63841e90f50f49602f40a92750488ffee32185a5e97a7cf8c44773024097cb8e55f961aba768b6a8770a5c525cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b71ba0eba897037442a4a8765155144e
SHA1298b5d4c0b752ca670b2044bbecb388b1fafa215
SHA2563b3f3f67bc674bfbc19038893a02e9e9b2d920a3f6927853a4cea270028bb640
SHA512e20527d78539451ab7422db2c44bcd1fd30d50c1517c4298a43a8e30dc7ad10b902a668eb2fc35353023140816785e0f288cf84a4b3620ec0103f88d84257322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae60ba7d378c960fc28474a38f78ba1c
SHA16c4d633eee662c087e07d75eff110e30386a6e24
SHA256c51e7a00ef00a41193858ce68f87d2ebb1aa10c7197d92da04f2a59414d68741
SHA512346bba018fb00f27ab989ada0164b6b34064035d5357b836b686c8bdbc82cd1938de0a2adf4593931feb6d8b98f3c8b273a19baece13bac5ddc9ecba0a4866bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b4d31551cfd308696b6832817588bfd
SHA1433b8e97bad620c866d1a1c0f601b413da8b64de
SHA256e66c88d6c5fb487946ba8afa080d5e515664a9cc62bf22432da84833dff5fa7d
SHA51258bd1a9138cf1da4de49acac3d89d8b69245e6949e8097b36991ed19dd648e7fc25f988aa846c8c1ba292cdf040ea932f7b284074c96fcb807e71eccd4d73823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5af443e2d636ce2a6141eb8ca2bb8f365
SHA1d251bb747a60dc1a7a007077af302b018f7727ee
SHA2567aea99f77e6b8e50bb14eabeb003610a76ce0605b34cb96aee74cad49e84ea95
SHA512f8dbe5d8f4dc6031bedbcd918f2bee7f4b1a0affb7207e5d337105a42ac79e0e9945e1e4bf15554a9ffcd3b5bc9ffebe485d56104a9285bc462b99e0521178d4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a