Analysis
-
max time kernel
136s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
0fa3e90ba27ee207d7e93ccc35dbaf22_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0fa3e90ba27ee207d7e93ccc35dbaf22_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0fa3e90ba27ee207d7e93ccc35dbaf22_JaffaCakes118.html
-
Size
46KB
-
MD5
0fa3e90ba27ee207d7e93ccc35dbaf22
-
SHA1
719cffef9a5dff35216fd3ba71cce413dc052970
-
SHA256
2a21c750f9f452c07343ada4d797038ed27bd88e97df387931cd74c1023572fd
-
SHA512
c587bd07df062b346c72d75c67fb31c32c5c76647f9cb91ae53d2ba48afc18d29442fef16e5d5cbae993140132d9d521eebebdf5605225e17bfc553345996a15
-
SSDEEP
768:SBlzFnF7zNt//985YjI002RhiZMwshgbpy6bmlfNAz4tduzGUwMxFfYPOrn52N65:SvzNt//985YjI00uxduzGUwMxFfYPOr1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420871488" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000009be0997ab6d2f17e8cc2fb4fa4e637944cb8fe0ec2e678614eb5f1a6b8d1e98b000000000e80000000020000200000007d601f4ef862138da65b449f2e889489bfc07ba30572d300c7c871be8b1cff9f20000000542ae99cc3f083d2507bf7a8e60427230c7a4d49d92de83581213bc78a44c17a4000000071f90edbcd17f5c879d3d74a611fd6d49f70c9cb180643d61abb6c6d49139b9cd724a5fc5815614902109c610e840b5b4f1d25b7d9394108db83ade3d0db74b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{862F9581-0903-11EF-A2CF-6EE901CCE9B5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8010fd5b109dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1028 2404 iexplore.exe 28 PID 2404 wrote to memory of 1028 2404 iexplore.exe 28 PID 2404 wrote to memory of 1028 2404 iexplore.exe 28 PID 2404 wrote to memory of 1028 2404 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0fa3e90ba27ee207d7e93ccc35dbaf22_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5743dcad123dfaaf06227d3651078c8ca
SHA12110630756ea81f82c3044d5c05510ab50f2d6c1
SHA256d6dc2b6c794ec31c0f463b00a51a93f013a64b8b852cbbe7b0374db6005e9d88
SHA5125e68124c33985385f5cddbd17f4f0995c8da7d2a707ce0ea5725c769815819f491f1aa01025bd9f499f861124f2cd5703b41a4d90ad5a8be7266304c5cbbce94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd4955180a20d40a8a032bfd303e8dc2
SHA1050b828b8280748394b682f7c407e9347a0b9ca2
SHA2569b4c574845d38459b2a6dfd31eca88e01d7a32ba6aad2b28b676c9770446c8af
SHA51241862ebfc64873280f042dbb68cd1d6f7187f35706b46e5d4bfe19525afda4e76dd482ab2e9b8ec20e6e25582cd8e87a1e53cfff79b6b9f0eed8e6dc59f11ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6d19677ae91f702bf46838fefa182b7
SHA17f528c8845615a3743a16f6fed0f856046c24798
SHA256006125b5766bff1e200c25a04794564c51be151a2ea7513b48a2a1dfc3021b9c
SHA512f9aaf64a1c501407764ccd08d68149d85313e13ad4fe0a612be44739e0c3ae01aef26fc0c362475efa915e542ba057045476ca012522b58d0be869723e4b8455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2a8e3a7b6c747a54812fc00f697f7eb
SHA190868cb08ff66fe68c325a5b1942b3d021e44bea
SHA256c607b15298568a569715755da7a2e7d0f323f1375fc7cce14619c30996a65464
SHA5127db95ee521a679a4c78494c728a52b7c639efb5401451dc7d5817a7c6c82d1f135a4221615f72ee8ac17072320f331a842afad6ef3066bf79fc7cba356bd6e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad98bb8fc15579b655a92e66622102b2
SHA1a9dfd6dfdc400703cf86a5ecedb8970f14a0a7e3
SHA256f898607db4d7286cef88e26d87fd99b7a98a14c9ae4ef087754c076f18360bda
SHA5124fc6c7491c46da7231fe9194ee6f1649fce7a8a2cdba539afbbb416a4f4586bc42355796b66eedb2b7ec5bd11476dd0e6e72e31041e78133e69eba86bc7acd73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521feed296eabec17bface0de2247dcc7
SHA1d053be4f6437858b0e8126a5b910fe358cc04a55
SHA2566332ea0e00271726a67faff92c54193e7934b18148d9a168a68826d7130fe489
SHA512210c787217683464175a5c9ede6b83b5abcdc2db678859f21000c2eda3295f83a32195e6fe58aff539cc116f636d2b241bf4059ca5bb300e304209609752ebaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ffe1c6162f6f05e9ce60e67ebf8ff48
SHA16a4c38415f536bd8f444060b30e8df6c8a34488b
SHA256b2418cd8314b2e0a06c1356e7334662b81c45ea13dea5707333e0b635e1c4a73
SHA5122e1426aa879c493a35020170a92a7c144aefee85eeae9a69957a06f4e6509592e0c4ca17ae396f726e931e186f1200413b24e433820ba0fa844fbf81ea3a8f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0fc1a54db42dbbd43b903aa5a8a86e9
SHA1563af84c2955510369b36377e9c7433d6cfd8711
SHA2567ab483726fd157db283b0e879e7e09e4cadf41247413c3e857f1faae8b9012d8
SHA5126937034f6fa78d7ebd3ee215c25bb52ebdb527e9caf8cbdc7955a37ae2962af4ac397babd956a23cec5810b8e607f32057f5a19a59ad9f79c59524660c76126e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4eeb1a3e630c3d9c8712dec810c12f8
SHA1ee8ff6bbbddaad05389daf339d885e4879155b79
SHA2568aa5ff8a1bc3faf8fe081f008899b7b8bcdf0f6ee0c7a3e90f49b1b560679022
SHA512c564ec5ff87ea1358a718261384f9ef4ec91cb8d6f62256e50567d30f4d166fa3d27bcf8d9119cd8852e25d4d07b83eab6504f696fb1d01f112747a077785584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dc946f8c2ad1210cf4b7d8d83fbb250
SHA1356c4f27a26f6c94e2edd9a0aa86952a5b23bac7
SHA25654f67ddb6f702ab41ea48044d941a3d13bbc6c4cfa8584a01ae2a02af8bdf3f9
SHA512f584cea9a1e114fa22740c33d7046a3a345ceafbabae25c9e6b876ad84ed1ec307ac478d644095a375772839f7dd41dfdeed032bc70df6dda6f614281cc6c4f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518e299b7e301919ff7d0bcd3426ea44c
SHA169c81cf03c0d1c6cbb4311bceda18744e57fd3be
SHA25619703de8693fec61f36ff19423de29ee23a960807fbcf4d878239f032b7b7718
SHA512b077bd6fb26beed3c5ead3fb92adf6fa9897e5c3b0e687c90fe40fa706559bd85aa8b209daea761d96de98a81a1ff611cb2c9db7c165a5997f695ebcdbd53e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a0d87409acdb348be6b636189568610
SHA19e5899889a156b2aec626781032c8c854aa6a0eb
SHA2567ac3d1483974cbdb37d412473b33f129a270387ef02ae10e8647f36bb48cdd48
SHA512781a6ce276f723f2ae61a776d81c89fa247194b2b4959e84fd72c66ea8987dfeee66511e6be563c20a8c7242242bfe88ad5ba455da77a04578d74fb64f55387a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508abd86569a8164f79b3e846cda0a451
SHA1ad37975d845df2f1c49c2e45697312dba66cb7a0
SHA25617996acbf8719e8173cfb34a42eae1b051ab6e6988e67522d79f32498420337d
SHA5120f193fb5969b6349e8aafc706729051be9c26f474aa81b496b5de80ecc043745e8d9d5030c4c4b13b788ea4bff7b7bdd2e5f4c18ed67d57ce3c45e0fac4b1965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a71bfdb13ddeede379333167a6471aa3
SHA1dd9119626c2052cc492b1a659188eef9073d085b
SHA256edc427ed13773e54494bb967c7cc5d8af38b8634c364e6409979bab2d30c57a8
SHA51273d6ff6f3e1117a4c32072184e01ebd6b305c0077f3f9ed13c8ee0f81b82f2d0eca2be444da18e76e76cbc8f8c50cba1604421148efb9a22ff65d38229558239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533d77bfa3edcfb72988c175ea7fc6949
SHA13e3cb7dfa214eb8cb11759d77c881a98101bca5a
SHA25607ee624f46d880b14f195e3a288ae009d9eb92f8a63e16451111821e326b8d0b
SHA512e3ff625258d7bf794c36294a9afa28ed8724f9ad2fae5d0d1e961af62d54e679a57243f20881d03631ee5d5bc4523fdf7fe7670fb366962580dd7ce66068618f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cd2b14bf9aed2abab1329b8648b9029
SHA1f515f02c53a88d21f2c4bfac16e291c15b19115f
SHA256d0e9bd17d71c2ea193fc4f4f4ff2e5ef75ba182751be28a7fb9c5ad2f74ad5c9
SHA512f9efa6a1919672d315606ee7d2197255c9c32e7d94b0516d53b0bfd34aa3ee588a9d3c7787486dd8f147bea2ccca22cca47b2552c19a75e406ef642d8c4580a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c266a0f28b395987da6e6bfeae477bca
SHA10f7a1acedd27d2944153d2e9f362b719d1c1449b
SHA256bc3b1bff39beab0cc4f9e0868cd97ba8eef8cd26a7e5a8f1a0bba6094729e116
SHA512cfc8a1d59a905da47686904677d46da74cc4f00a011c62818fdf0d787604e201e565773fa2eea61cb21a20fecd32d8c7afc6e1ad2ef932ed31c3d3f8fb30003d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5778242520e8294e57bc1117afe43ae2b
SHA1e8ac1b986ffa49f01781a3d5d322216e1cd48d06
SHA2566f22b9a069cbc64532f2752860238ee4336c7b8fe5bf79ab328c766c69269e9b
SHA5126791f1ea8ba0963991b5ba1a88a954467429bbd74f78c6721852be88ae6e91c330effafec19c58463d588edfcaa932e291ff9a3e9cb5597b56253f2716df39f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dbbf6bf3ffb830d5b83888a152aaf3a
SHA123f155bc0ec625d90fb3cbd0106e835c2bb39cfc
SHA2569fea18f9c97deadaf90268daadefd2e24046b7b00f39232b5e9237dce3b3fe84
SHA5129ca7272e75d642a103c26f42d4145805e4681ec0c9fafbcda22c38d59bf6c16fe05c1ae2c9f39efb9d47672b1746e2c9f85a0c811bb9b14e521adc5e6911a94c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a