Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 04:29
Static task
static1
Behavioral task
behavioral1
Sample
0fac38de4ed61aa939c85cd4a312a671_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0fac38de4ed61aa939c85cd4a312a671_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0fac38de4ed61aa939c85cd4a312a671_JaffaCakes118.html
-
Size
3KB
-
MD5
0fac38de4ed61aa939c85cd4a312a671
-
SHA1
6ed26e6e295e04350b70176f3ce0aef36f538958
-
SHA256
afd6005a945448cac01b8f52d0377877d47abaf4646257aca714a98dd2098175
-
SHA512
4aa2b7303b8090b689a30b0989c9b58eb06f56b5926a729e4fde8d0f6553a40213a98d0e82722bbfdd1d1eaf0c3020167560bc333cc3e635e79969be06634b79
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07dfb95129dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000006f7dccd190dd16a93d861fa13cb417d4e7bd2f852b7096e5da1ee86c0ab6e31e000000000e80000000020000200000003a0bb4638eb51943b6d77482d30bf71b40eec98ea7d408d284c6337281b7eba020000000d4b5d7a83436bad9cd348af6ec54054b44e85227cfdecf6b4da9793a5955c80c4000000046e8d6baa92df93b9912758e62d0ac5ed685ed9604b7e002f0ff1b3b52ddf498c1ea270f8a87c2b550b9599da6f34b6fdb24694230c1566272008982878d0166 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C13773D1-0905-11EF-9AB8-560090747152} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420872446" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 1504 2824 iexplore.exe 28 PID 2824 wrote to memory of 1504 2824 iexplore.exe 28 PID 2824 wrote to memory of 1504 2824 iexplore.exe 28 PID 2824 wrote to memory of 1504 2824 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0fac38de4ed61aa939c85cd4a312a671_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3e92c0544f312e709f4765297595965
SHA13ac2b76fdcef693ea15906a3c9c1c0f46149544f
SHA256dc21ba66514de8441f5638f1bca1a9ab6c965fffce83a7e097cea1104a2164f3
SHA5120fd894644631b4028888ec5b66c0462a71ed0183006a4539b097f94136ac4cb3727198ac2abb22fabe52384be0132301914f3f4bc592ba58f0282c8e413f2fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f908601ce99adee4a4431997a5a57aa
SHA1edb01f95b2f4b7b956e2d836c3c518615d46d494
SHA2563ba8509ad16b5ee30da19a0f2a838905601799f426896eb1adff0a48c4a1d5e2
SHA512039dd45d469b91a3978b825e1dcfc1a9fc51c97295f06eee96f4839cd9f378b4a4aeda66fb5a1b5fb9f7a11eb339eb4013fd2de733dbd3342e0d172a263dc494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587afb90e83d3f3fb12b6b9150017b51d
SHA14b421255a2a1b1f61d3d9d73bbc6550b64292d15
SHA256a191818a478d05aa698bbf0bb0da062ce32025fb0fa539c0c973e31ee15e1747
SHA512c8229bcc2a929342ccd9793a57513073c78d545f4e065eed379bf9d2a114017b668aa0689e758b0d19bdf5acded6f26f21d4456dc1e842a6fb21e4cadb6f879d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5637b92411bde6f25664d9ff269485919
SHA189816f6f14a95b50d57a87255571d0ed7a141225
SHA256c95cdeea0cc4fd00540a8f305676e5372278240d1ae2bb6a6ec30fc8cfb4da55
SHA512dc598cca042a24ad0eaa78715fe1f15876bddf0db3d5fbbc99648543d55e2feb1079e93f0e519a95f92bf760daf5d0926e4685e5117ba9fb4cf7c8821bbb6c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502ddb2e00da825e803a1d6e7c368c588
SHA178835cf9e0e56f95cddb45439484ec1de1c4b02f
SHA2569d287372435cf3f742847de45184dc4a5f76834334ef6561383ce56529c67f3f
SHA5121a5f13e3e57a8c9ae801eb678b351bbf1670b53116d76207302c0fd495a32353946a9ae7b6ed3f4efcfc61d53f11221915d7f5bc157a0ddd5415a8d041d6c0a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e6b099613fedb25d3ffab698c8c586f
SHA1de4d417c01982c7fb35cbdc873b9b43db08c8d48
SHA256ef582defef16825eda9100cce6afa233a645a35b1c3d16dbb06ca433f486564f
SHA512f384171dd957b57983c6d41cbe2eae6bef4b8db82069ab0a2cea8371059d7f75e83ccb971e893e9fe5e3e1eb9c4acf69c4a3d301b7a702d28032ecb32a6c4b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509d8b2a623338b0d65c1992a40d126f5
SHA1d16565d626a3c7e159d5b3d0fce50c19e6c5789d
SHA256beb120f6aa3ff0d6e86709865af54e5a32c74cb74f8da1f3ed98c4e9beb25fac
SHA512db581c7d5584a5fec47ac496fec5b3a5499ac2fba66f1a8ef114e4779f73401d4a4e981317846ff3fbb19ce5aa15aef6c1cb098af55a685b080c5307dbb508d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552d1e4bd819be3bc28a5854ed1ed72bd
SHA1f8d615a024025307bf9e556d38d1e958867a3214
SHA256bf14eca8d75097d583d27b0f998347408186206b2916bd3790ee5ec1161aca32
SHA512151e8e2704ce48b224d779995aecc956577db920fbb450939988a7d7f012c8e3196bd430abdb2fa563c7f3223181c42aac0a49b29c0f8e53cfa7b28f8d707185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e676ce7657d433efc720d202654e605
SHA11725a42128bef5b8983d97dd7e4c9ef5a5d8410d
SHA2561255a244783ae78de5447a134254d7750fbd2d21d9f14413ed155737f5d385dd
SHA512dad2e72ac105d41193371aa4ae0fac7ff736a26c3a32617972176e3af6d1a5d3450b8d786d81d1a836e7c8738ace5dddcb0fa16761db9ad4636d6fad93bf2723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548a8c89ff27e9f8e6f3d45fad37df98e
SHA15834856850e6881d62f5ded82f1212c12978b209
SHA2568e0ae7730c194419c71666acdc17a05f818ddc831f8dd7171eaec4cb19bbb8dd
SHA5124bbec260ffc3770734f4681f808ca385a8fee24634ca6ca05c79231a9d5e6660c67621290d9805ab099cfccd20bfcd9bf14305db3bbcf75779956ce51b8521ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585f3b72b398d93998bce396a002acefd
SHA11ef051c70f9a3493a95ace2d698c6b0d146f56c0
SHA2564d0c8847cfe28e1c9d4ce3b3f7533a023f8612178e2f5a1fc8a767bdb4f4fd1d
SHA5124ca27602db9d731d4af595229f4c69a6e4e9d1442e2d8894245049db80b423bbd2f4c95f6850bb36d02f3c9016bcab88992b5e387ac82660972d3c35e7c65962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507732cb1bbb39d67f13127e0beff2708
SHA147ed1055856a7ef4bc8b0102db8895ff7a07b372
SHA256af7fafb6002f4763d4b9b63cb064f5aa46d6b79ac28975961380e6797334cae9
SHA5128a52b1720cda83cceb5eae36209d1202c1b65e0496b8377d7aa80fbe2169eef7ca5bcd09f251bed8bc9f47186fb3d944c8015492a7deaaacb66b8471029caa28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fba62c674a58c84b5837b0b1ed26dd8
SHA1cf474d44f21eb470d6827a66cca09f91d0e50e63
SHA256dcd09e2ee7b00705132b869fd28aaccc005e79d2f6060dc41c05ea5690f3c9ab
SHA5122b643adeea9499bc4f1519630bc7bce4670b2522ce5304caa036c50645ef26f31952d9bca45fa73654c9034b6b8a9b8dd8b558aaa730bcec926c212ac373b953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a2861c36a808dc0031dba14476b3763
SHA1f0116e4fd50e27b0f945bcc3b72c15f51d41b752
SHA2560f3597710a453177e62f55395fb8ca0691e12df64bf203648fa6e562c0c8f30a
SHA51286383be8bc011f4801ac91a5d32ba157b2ae9a964818e868e880587aa81152ac1973011f39bf21fd98f8fc8d7964e068946d082ba471d2d40b17e81841ebfb5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c985b6663a7b3d4efe5772ea614d8f03
SHA1de23449a1f74f50f35a6f54544132dfd5265139d
SHA256087adbd47e061e7cc5d39d3ce6348e864777ad21d3096eb4f0ee0238ef487b09
SHA512aa2b3e6aa7fefa246a775c6ae229fd396c01469fca6b75e78b0c5e1a1be46e6e9b60edb39e4b8b2e162dd204a33f3bf65cf6152495265a3d01cd36d304542309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526538b92870c6e83bea10688d3a80789
SHA14f251da15ac3a23ae5535d1bdf9d8e30a4e3c007
SHA25670c490c6f67f8894c397f91ea35c46e184cb517afaca92d7011bde6686d553fa
SHA51288ea7a712861be499318167015ec8d6afaf6fdae5e3e0b210e35f17c1534f927750fad484e69bbfcdb64edb1ae17d16c9254ddef7b5d854505c86ecb666163c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b69eb9014f69e67d67a1edce2cb51feb
SHA1afce528fb9444d1ce63bdf338287a07449f56782
SHA256b40a0c542bcea910ccf9468634012d2b40c01543f2b07eb3dad10ac54c10fdab
SHA5126ae81ea83781e73f1ca8e03300e5571b4f2b0e8c2d4ae4a434f91f538730edba24e832a73192b4423b186036715732fedd76bfe1a925843e840698dd63c3da73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0ee90f743640d75b3fbaf83de1ab497
SHA1e820639f3549dad3664ac276a329fd28a7836fed
SHA256ea145e3640eb4ce9b9acb2f21e7b758bac8ab5d3916d6058ad2afe51764178b9
SHA51281d93545b93eeec101f3508754dfb3fd45ead7979b19ed96e5e40496a74c9acce46eeae233a1d2572b60a881391984df58f90eb794014299db664a71e2addfe8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a