Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
0f4b2a98d6f76fc35b2f4b582600e737_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f4b2a98d6f76fc35b2f4b582600e737_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0f4b2a98d6f76fc35b2f4b582600e737_JaffaCakes118.html
-
Size
19KB
-
MD5
0f4b2a98d6f76fc35b2f4b582600e737
-
SHA1
1e01df8ede3df6711cc5d670423e4b6872df4992
-
SHA256
6355fda8a1202fde3f06cf3aef4cb9c02963d7716914d930ba319ccb7746fc2e
-
SHA512
cc5d190e2225510485a9a269d4fb98ff3b80cc9f7f2e016bd92c4240b2e5bdfe11c2c1b5037baea6f3821c112e8583f9edd1f05991eaa3d8732dc6a640205450
-
SSDEEP
384:zieaKhgESaVBD8c2Q3Rl0L9emLxXucfIk99hekzVc9N/:zisSagcZ3/mQOIk9SiqN/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000009afd754abb7ce0c4f902924ebb77669804490fcb55fd5f0f65bfe01d44244292000000000e80000000020000200000003d1019a4e2abb4da04fed7b194775d94a53abffc6f48df7db9c0e8a25c989a6f200000002810fb3f34242c178956b65412c950ed743c7c0448e411970e9055c1e81abce34000000042e59d4fa664ad487486c460e466eaa6ca46ab6eaeba6215955e0840bf9cba2714a4d78764a84dcb6b95bb66e668ba7914aa7d80bf79ad5e6716a69ece4def49 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420859282" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803076eef39cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19184FD1-08E7-11EF-93CC-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 360 iexplore.exe 360 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 360 wrote to memory of 1720 360 iexplore.exe 28 PID 360 wrote to memory of 1720 360 iexplore.exe 28 PID 360 wrote to memory of 1720 360 iexplore.exe 28 PID 360 wrote to memory of 1720 360 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f4b2a98d6f76fc35b2f4b582600e737_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:360 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD52b87d05cb8c376e834e2c30fbd10b882
SHA1c8c85415499c902168c4eaec95d74a0a0fe51464
SHA256a51e6ada2e792d80884177ab661367bf4c172c346c348fccb64737a60affb114
SHA512e0faa7eececf56b14977603b9cd8b79629c905c2eba1c56f6fc16cc4c540cb1d882061484ba719de5b762a20ac6be34578f2eef43967afe70fa92bc5285bf8bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566293a2cd298508bace875df555dc5e0
SHA112c64c28937f5749d332da8d5b5d54b2fa409fc0
SHA256f9b2b41b9294c2349c815df24c93fa1d5a6ae54fd2d20eeec2aa7ab9d10e67dd
SHA512e1da1b9295a2b07103a0b7661c5de53a1a7a999de434bb074e4476b93ccb99142f0ba1fcf00f20beeca4b57b3d005283a7f8169df09d0c7580c086c0ca8282b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510105e32ec1d570169fbb13a3b610cbe
SHA12e91aa063436662b7e7408586a139e4e4eb67ec0
SHA256c36ffc0f7210b28a0244e97fdce69d727db6f30abbd5a238aa898fd9d58a087c
SHA5125dad7e9113e306c4f1d5966d373d0534d73a98db697d04e6ddf8bc1e7cd21b6d4cf157cd34df0913b54fca01b38434b2bcaea1921db2c50a35dc61b51cbbdfdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da89b0b203cb5ff394e84f1559b8e663
SHA1a7a7067845a4807027b3661723ccd1297fc817c8
SHA25697e9cc4c72e73dd47d19f808c068fd34aca90822560fbda54d07fdd05d6dc1f4
SHA5123a7f477f992eb55e4b43ed22a1ae919215013d1f3e61b628d58e97a3d0351d21cdea3d0dc157949b42d7d9b6aa781fbb28a5968ee3cf12fb5f42a14d454957d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6ca7da44cc90f0a8eec146336f6505d
SHA190fe64c4ec9ddb71a78a6606b69434f51fb7b73e
SHA25683f33b0d2225fd03121ef286a2a3d3feacf7ba857244dcda9c538ffeaeab6baf
SHA5125c298cdd55bd103a5f5ad829c5e3969a5ebdc5a1862308f5e85dee86ab69343e8c8c77529e864f122245bdfaf3aad38a9852c821603bb573b1fa9d715cc9e838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de56bb47a98a4f5b5455d94c5738160e
SHA14849a5704b7f96cbc9b058c10dbb10dab0023592
SHA256dbf8a44f395571ce3bc0fe41d466b65b18eeb3eefe912ca5c1fda8f5bdfd4936
SHA51230f69b5750a4442c481916361e530833601c1c6556adf6f21ce8acb16fe0e514ee40bc7eb02e2265ac4fc0588f3a0665f1e1dcf03454c902a5ca701c6c2559ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582fc05c4b3850d5952b3fefebbf280ed
SHA1be6f4a8cee06108c162b4e3fcf61255186b5cbab
SHA256a257c62d30c30d34e7d3cefe3e178219616e830556a12686e064b63dea22b63d
SHA512bce6600c98679fe17f1093f715f51aad7d8e422efd6d971e11aa2d1413069f84a420505b4bfb33588b4c4da7fec2f1a731b3fc43085b3964eb8b4b3dc2faf50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f83887cfd660b2cb0d8c34575b262ed1
SHA1e303d66e19176207741805b6ee3c0b810f089e4a
SHA256855a2f5296a5a3ddd4295404a1bdc1b6d38b88bae08c757d4b863c36de3ef132
SHA5127f12d81ef5b22d17fd43cd82d9f97204f9ee0839c7daf10bdd8c2d23bc8536224bb422e1a3551c4a03f2ea8e61f4bbaf984307ce37542a13af35d8ddaf10d5b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb72c60b98c3543dd33e50808c4c8f45
SHA157e653c5f48e90781ef324df16af9e02f504d820
SHA256af7e07be398f1ceb52b59c37149ed71dd31b92c950814f71ba47ab23892acb49
SHA5127acd15a10d36118b61581736581653abdd40a4643b01e9432f453f4c81c5a18aebcb40bcee546c00cb22ac378cc3e893d7cf176068e569160a79afc6dc5576c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5180ff5ae2dedf18e28b0cb9239b03b4f
SHA1320648d94716caf419ea42ad4b7eada885ed6af6
SHA25654c94b3bc998049e39ebfea2286f98692f7d1ad7bebece989aa1adc4cde3f0e6
SHA512af8e57542597f65be157b71d5db9ff493ee473e9d4229f7cafd8af79dfcbd0f10df6244fee667afdfbfacfb3b36912247faa557505133a6b47748d5e8852e59f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f10133e7910ddf27a256a1ddbfad62cf
SHA1e5fe4d3a52bd7a0a9ee77bd9a32508f4934f1844
SHA25647d050e5d135abe7e5901f839152926b05cb401814559292768fe569ff578f93
SHA5121619993ffd5ac6ece19943233134de72a5804bb9f8f2daed5108b445736b7941aa770e9b98c042cc685692750a18507df632a983123bcef97df6e9956c0bc2d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c059333c6bcd579b8654929221084928
SHA1f75e335d5f7dea9af53b57819fb6c79313a14264
SHA25618ece2d2ca3664bf853c1e1a25e5e31ef4aa60196ae7c4417f25d153cd5d85d6
SHA512f8352704789c326465c7652f8f31a836f9a532d224a2b9adab5636f84780181f0c6ca08291c8979214613dbf20a681f8780215eabbffbc94a2487e7c5e221a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ef270b42aaad8480488ee57958a69178
SHA176687d381e5cfeaac001259d5f4c07a506fbddb5
SHA2566144c7e3b8122e000465a9b460293e4cdb2d90170ab0328f2e5becdda819339c
SHA512f8e43dc7c21a401113c353608d56959e0723d75a3050b5c7c815f765e280207bbcf811cbd224a49637a92a200f02e3b5670d6aad40257c73e5e2a60c88e23c47
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a