Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
0f62423ebcc0391bdc6442f3a4d609bc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f62423ebcc0391bdc6442f3a4d609bc_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0f62423ebcc0391bdc6442f3a4d609bc_JaffaCakes118.html
-
Size
132KB
-
MD5
0f62423ebcc0391bdc6442f3a4d609bc
-
SHA1
0c35c5e28053a1ae15dc4be13cfe4bedc388fc23
-
SHA256
85093949e4267bef095f621f60fe06b4f6243bbdf80345e34110564276698ec8
-
SHA512
26b451856648d629d6684ceb6d798d97a69e36160d5a19602b4be746bb9b6baa447e69947f633a9014de6958d23ea537d156e1ecf0b3316085643ca33783f636
-
SSDEEP
768:v7yIoE7DMMO13JGKcr4XMjk3+jP4K4tzfaz7:v7ytuDq5HcAMju+jPn4tGv
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05ade35fb9cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420862364" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000005512314ce59a04cadc653b1e4af4ea59c388219d2f0c17a30fb8f1b617c6027e000000000e80000000020000200000009f9301b4ed255e6c17e063e9b193e6e755043945647e9f94248ce9768ea69f7e20000000c17c87e9be2d0ffdcaf7a3c69e108b51d58750b358cf1a35b3db86ea1ad9590840000000d54c09c8d6383072fafb42a8bde533545ac0844941fcd78d29a613d1f3de88d5f9359a2ee052037d55ad9ff1aeb339eabc9252412dbb7708d17e55c3952d28e6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4742AF71-08EE-11EF-B012-52ADCDCA366E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 340 iexplore.exe 340 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 340 wrote to memory of 2224 340 iexplore.exe 28 PID 340 wrote to memory of 2224 340 iexplore.exe 28 PID 340 wrote to memory of 2224 340 iexplore.exe 28 PID 340 wrote to memory of 2224 340 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f62423ebcc0391bdc6442f3a4d609bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f961657747e247eeab382612d8c241a
SHA1447d15d94521470c766ceaff441ef7d7a573612e
SHA256ab195df71b4ab1a6784a692926ac9c4cd3f5ecddcf2cd827ac5bca5f5f1ed6c3
SHA5120f94fe21f44ef675cd6b5389fba43bbcfe0cd872ed63af90b6062bb0cd890f0628b9e97223bec1304b7f878fc65e190c35daca28d633370e58a9220e79c6a574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545f7859bfaa6d3cb2f0b0f3db7298b4f
SHA1fe17b8883a831f98743f334ade71b00286c53477
SHA256cdb5a0b8c191da4fe7af7bddbcb9a57b0f7c1b17168b2d864c5bb887954b8437
SHA512e89d7d1b3269911e21a5832d993570051ae47f664680bae9d9642160f3ea1c704cd607ea044696bd756ddb978165fe505ddc289a1a6f8dcdb6dad76f841b0d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d22d73da3f6bce9bfe4f77f7c6ac316a
SHA16e7495f715bfe2040516e462e535d585c8bfe454
SHA256bf36944dce7bff61f8794fb08697b1fe4e0aecdc6fb8d268a0233e9261748dd0
SHA5126f8e0fe01434ed9960c4c0941777356baa089bd095bef61f5c89a9f7121545d583085ec0267b5aa5527417f248417a3c882ff0dffb847b5dc420bbe4475cb0bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae848809b581bbd4e0f2ef04b6cac0ed
SHA12599fe8e6e7d2798128b3c5469b0d9f20e2597e1
SHA2564f87a8bde00f94220787ee3ddc2f974adf58cc4f5aac0682b5ebca123e2189ff
SHA5120ac91d3f9058a1483d48ce368423fc119de663c9339f4beb494ed48af0baf16e20adcca721c3fc2c2dd9614992c98187c8371565b55f6d8f7e73aa074433f59b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520f9a9853b68de98bb0658522e101c4d
SHA1cec077ca6fb6f348d5603b742b0a0cf12cfbd7ca
SHA25623efcf0076cf91f5ac310ebf52268c871f8ad7a0e070b65f7adbf0f58bc899e5
SHA5127b6e628ae67c1fd5c8ba1036ced7221c7d2a08c6d0acda5a1fc5de949e35c9902838c1cc12df927644c73ed1d931fc19ad0df436b4223e2ea6f5a0dc81ded00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b19017a8b55c85d7b640cbcbfcf1091
SHA1e3508bf6fbc09818fa2ab5ee49ac4ad4a38461ba
SHA256f15f3545188d6490adc67deacd9f660ee039b0004ab88f7747ce9f8cb5bf28e2
SHA51275bdf4777e755334593ded89430a67a3593f9bba8e40b306343ae74ca1b676c90192c14b2c929725c05ead9b72441c6999160bedaf4bc3ccdbdf9eb2c4a4c91d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51096f5b38b3f71885f93b2da04ef097d
SHA176d5b7986f72988a64e7f35ee5c02ff419e7bdb2
SHA2562b0b1e3cca6a4a178518e593d2c1d8fb01ae221578e1b1422f8043c4496c7a54
SHA512583bbcbff328dfb53cf13f8de4f0fa64214eeadffa52033c108c96d0b80001bde82a4c33084d7077a1d9988ebc0409fc228e73c63b6c15250d1035b5336dba93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dadce4d4daadbd5e929a4c59b1aaee7
SHA1cca3917fa7f02a5c498591dbcf9ecd4d817f441d
SHA2568b473210084f6585c917757b1a171941ecfdfacb290cd9da75c95308d4ccb7d1
SHA51268b181e6f67f22c0a0d1eb66853b82e2bda2f6cb78d33bfdddd78d64579fa435bce5891592064e234c3685a408a63f116998a6d734c9b796debf1b2bb5facd77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f52b61658f3def6d04243927ea85397
SHA1c1b34914c9ab6c16fbd728a9ff38d949043fa0b6
SHA25679c5c465f059a74d44151b8d9595dabc766c7673df15e19d30fbbb6ed8680b55
SHA5122c75f4149aee15816c1030672634232073b261a8244bdbcd5f1a24dd1a01acfc39c94ecae06980022b5a447a6f94a55b2bc25b9ed380cc70d45621cf02442d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532a5906d588f40a7466a0316f8b3abb3
SHA11e029bd1a234e2d9eb5c14189191dee9d20ecabd
SHA25660cd52dc1cb7b8ba6702919f81ff9d9a73cba92a73967bcc3537a512706ad0ad
SHA5125d0e0d6e6cd3f80cf3fcdeeb6a0e041771654cd252f9f61963ef0c7e1c524c5b3abfc5cb729dab351b52f5dc31edc421408b117d3d4aeae2794c8d5e0ed4aa90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5457efa84f2b9e9c96fbe6933736f3095
SHA17d4e75303980487cd1da0a8a81a63ae8c960b231
SHA2569a4a73e735b08cd7d1a07efbfb6aaae4ed0d6339eefb289250d4677b1c9279d7
SHA5120db00ef792191dcabba746d2e2ff2ce374c2be699edd0e900e822e6d7a070a678039542368ea37d62c805946cddd2b26136a4e00b80da2ef88498cf511b84aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589a0ba7aa12f9b370a81fef662226cb3
SHA15a9076d99e70890dfed44d7328e36763896f28ac
SHA2564d812f9d33a00f06cf980653d2d3503d7c08807b6942101c00fbd70f83dd6c5d
SHA51260b83c2f2a42e934ab25fdd15b852dd361e5edaa7b92385ad2d96132b0ea406c871dd30ade035061f9a9f2e9971cfddfe00ddfacd995e0231ef8440bf8a816ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55509b6549948a4cf9cc59c42f5e1ae9e
SHA13fd144b1174b1c766438709d73ddb99bd4378a5e
SHA256550b8a9ca836a5c66478436176b48189a7b54636598bfdb21847332fd7cb8d81
SHA5122bd7e482ec6a964c725b463ab97f32a4cfa9477dc1c787b3fa8545d2fa3c67854be600c898116bccd13aaad3a27958fbb3188f01af54b38dccecc70576be3cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506de5c79da4bd86c055e750fdba723ab
SHA13340c1a0e9bf67fbf17514d0861f20e6ee13b3d2
SHA256c9c923fcb17413631ccc34411daf355e58f0cc17b39d2ca25ee5cb57eb8e8e67
SHA512e22efc57d5450a0698e9c943d2beea558a3ee4774075a0486292b5b0042276734107c6529c723856804923fcbda79ce21ff33f9ce1be85c141198931d1aca5c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f2942199e9cce9787e79525ce6b30d8
SHA1e8fda9b79094913be4c21d41dfb30c57ee4f13f7
SHA256a65bea5443de095dd300940120727808881bd508ccc675b2860e7117a3c6c243
SHA5122e27002c342093eba9da52f3fa24c2bdebed263e313bedbd296aa7badcec1a99ca3ad676a00aac68e2405add963ee4990ebfdf640f606983a30d4a6cdfff42ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4e1266631a424dfeee3ab9dd1220b55
SHA17c27099bf5b3a9b6bb5151551f1b916e36566b9c
SHA2561e2387ed2af198dea3caa4bec82c7160deb93f205a7e2f78394e20ad512685b0
SHA512a7e2a09de8a64605ac0749bc0a2ef9b0b7af7fa566283281c0a3f74953636676a7dc262ac694038da4a490e15390688bbeef884d800ccf5addc12188d135f001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac825e389227c62a811ac7bfda080d6b
SHA1fcdc52863e05e51e88530fa3df60148f8a25188b
SHA256fdf285ab3acfec1a1b712681d9dc434ff6848880a823015d88e28d1bb46c681e
SHA512a3df6b7255ecd2878bdb223ec0df3cf004d600dc9fe5fb56f45fa3a09407e17586e2f120a52434afebe51aa4efb1fce15d20212f8b19ba3335a331cb31cb350c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571febe92aa697eed2b79c462d72deaad
SHA16b106ae189e05c6f561105a3bfbb79bd351c8209
SHA25695a92f01a20c1055191eddf43af6b5c0cd1e884075642b03c7e2c2b4a39a860d
SHA5124cf592708a6791f0d856219634f91b642e4f7fc34a1e61a41846579803cc235ac6bdee9c0cebda3f40fb2c0d312ef3a22af93bb8eccecd1f03bcd725212d6b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5405e977387b86e23796f59615ec79929
SHA1a7eded11cd51d8445ae8368a6180f4e9fd712fe0
SHA25626d5664769d5899692a4cf1385f4fd7011aaf50cd80502fa98ae8f60d9437d6b
SHA51275ab2a54ccf099e825d5ec2f6b4ec15c107849ceb85eaf8d1df6bcdc4a112745645c3868d63fe0549cc50c04e842b270cb3df6f71731734abc6f16e38cf24621
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a