Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 12:47
Static task
static1
Behavioral task
behavioral1
Sample
a0b8091cfe0bb9e782bc2cb501a1900f_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a0b8091cfe0bb9e782bc2cb501a1900f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a0b8091cfe0bb9e782bc2cb501a1900f_JaffaCakes118.html
-
Size
51KB
-
MD5
a0b8091cfe0bb9e782bc2cb501a1900f
-
SHA1
e4ae22b735e57f077c3ae372c9b0a88b9eb3d957
-
SHA256
cf0374dcfa1c64d7c81deec2ca966d5100ef5806dbc12121d304b52116eb1b04
-
SHA512
eaee3c61be979646df85d9336d50c03c39a68cd0365d40b07d7f4524656152f9de93397222d1ce2b5bf73d629131c4688bedbe366c86b61732989967bb71ab10
-
SSDEEP
768:S+YR49z3ZNh7YsxuaFvG/Es7nmu4eyTP9BzTJwLY6uwjg:S+l9bfisxu8kmu4eSPfiM6uwjg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000c230e4e3f08f9c520de059b1a6007cc56e3f4d58fbf8fcba6f7224dbe8ab70d4000000000e8000000002000020000000a5e23aaf0df04251e0a2d1bdb0981a042307f3e29b48da1605e0cb1fbae09b2a20000000aca37a4c7875ee2152010a6fd4c7ba05a38881249e8e7c4320673560ffb7a66b400000007172ca6b43769d1d3a3d3de5c72ae9a4280638682cbc4799f08de5dbdebca64186569a9aae7388a3914b90ffe2788151851eb0032e065f5ff50a8ec031c9ec24 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EEB467E1-28B9-11EF-B489-E681C831DA43} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03ce9c3c6bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424358320" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 3056 2268 iexplore.exe 28 PID 2268 wrote to memory of 3056 2268 iexplore.exe 28 PID 2268 wrote to memory of 3056 2268 iexplore.exe 28 PID 2268 wrote to memory of 3056 2268 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a0b8091cfe0bb9e782bc2cb501a1900f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d72f19746ba9153150d1a32a61b07bc
SHA1a1354ab02647e8d6ae0bcd4384af0bfcb1e96cd5
SHA2566609232e15c7fdfeffd655d676ff4f0d8fd1ab37689b85d57ac70e65ab0f8f74
SHA512374e34c07d077e461b2e5ef1f9777204d31c634ccb1c512b784c19017f2d0e8ff4422dccc76b5360d4dc1e6831f8e8b0a4bbecb44e0a4b50d0ff79bbdd706485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b362b284dcd1e4156dda93431b5a9420
SHA10976b8505ba23ce8a934b71628f86ad72bc6b74b
SHA256f35e5d779f6153a3e02c8f76741a7f91300eb32674ed3b3d083c4cf9ab9f3845
SHA512bb21eb739300b12442d532c618d0ba800e7f0d83297ebbec18ac075acc0e2c3965518f4a7c4ef2a11012762b85fee9475acc9ee2fa2b43c00d6c333fc39f8c19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51699dbb6498269515f709249cd6c0466
SHA1aa36efe75340e4b6af9a8f7cc416efa8d05ddf34
SHA256944fd9a03afe8274222f2efe0629d1bafa4102642949b1e086319f12162c776e
SHA512f7e62b2b6f61f02cafa5db7fd351153c662ab6ea747d627fe74c9deb3b3da6941fe480e687c204cb21e57bfb868ee4c7cf4608664b0b40e52294fc531b8b08fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557cf50c983508fa31680eb8d61387a52
SHA1df8f05223b7fd428bab74f52b552a8b29c1a107a
SHA256e2929b7fde73849ae9e4ee0302a24377e53b7c8c211a8cd63df9f8aa0902d672
SHA512c2031f4d86fa4d74a0402e037246fe43a9e1d22068a14c3b30c49f0108644a094d701c29ea6e15fbb7dcc1053f78b1146485f91e09cfb41b5a6da1cf157d8122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b101e5c9fd1bf2e5f3873da1c0a07ec
SHA156b2f069e5bfa1fc4f941427bf4c14d5eb8b311c
SHA2568ccfd05ea9fedd67dbef25a2920bfb9a9b0c0751354ebd9d099ca5fd65f1771d
SHA512b8f97ac8ca9f67f76af2fdeb6b2cc556be146566f4bd490e96990c89f2702cbfbe4539b51b9d7143fbe9a1f781ffb6e2e65765f5671a86b808c6e0570bd27d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d94653e3bc828cb10a3a56bd4cf353
SHA10befbfbcb9fdb8e3026c03c1edcced008439dba6
SHA25672919d99dbb60eb0f95bea933d77f0e4fdb104b566c6f5aea6740fdac6ec7a6d
SHA512a0111e30b386066a9db7510095fb5d6d1f68d1628da7bda49f91d7ee5bed1443cb2127cbc67d760445dfe109d446cf1dd30c6801efab0327f7fb51516599cde2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3a7238cc51fa5ed7a4302008b54cb6f
SHA1d1c0fc825a8a1c555033f16928611f439f6fb073
SHA25642dfeed16b73f2560868cfbc42ee4664f275b33c50e8eb766c93d15e419bfd39
SHA5122210149a1805efb815f5eb24e30c78495637cf77dd962aeecc22316b3971ca5302b9e1beb41e229d2cba4a082dce7937460877d827fe9d54beed52dac88a83e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583cf3879cc090361be335105b55053b7
SHA136a5262969ce7b18293c87890c0b63858c82628a
SHA256d5d0bbcac4ed62973ba6bcc444bba0b1e70cdfeb816f792c00af01fd9de93308
SHA512eff8d842b939879996eb6f5a4b679d765ac37ffecd70fcec597623b8ec8a2ac12a5e6b315da09fe9a4405c67c9b97efb92cf1d94019dfe1110a8a3a5be481989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da611e9c915afff38cfd3696e230b644
SHA1ec2c7272a353c6c9bbb0ab1806b6bf06da1398ad
SHA256fcf187ae9979a4404a649b2638a89d727789457a6e32fdde3387827048f7dfb8
SHA512693719e0d03e54d4156197a57cf356cd89a2f57e362c0649c81e5ddde61ff88f951fef3da3ccc6f964b7a4ce0a9caabf106bb546fa84fad60013c57143e2c7d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507d77f60eb71a1561942d29de39824f3
SHA133649704565ae492bade1e9518d2f50d2e1ad94c
SHA25671d47c79607c9d9417d63040910ca52bf487b1fa8da2f1f0f58053814e2ccafb
SHA51271be8ee1f3e8cb69d45b3e1d7eaadca8366069577d916198ab3ec1a009267cc731bda0270abb089d3bb412c8ca2742a62d0c8fee2cc907b99e0b3e1029abf230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd25a095490f2189fbdbc622a5db2232
SHA140caafb79bf26af6e8652693604cdc3c7051149e
SHA2568b6c0cb4f92299eb021c0836e7de0ca5ac8d57d42aad40d04b22ead1cda360d7
SHA512b8a8754e65219660cba15c27d8f30018c9527c91a9f35c424965c6a1a1c0814ce2a6e333ffd2e4cf8c844c37e4c46b9ebbbcd1cb2bef6824a48fd6564775478b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f94b80721a458cab5b75bab2906804d
SHA13830b4929ab2c937392d6d1d2d54ab036d4cbb5c
SHA2563cd6442b878bba39c5d66c7d629b29e14657447329af4587aab485dc9a47f5e4
SHA512fdab68da879fca39c6df2c15280f58eb120e35244384d4457a70f26fe504b1c28debcdb8ad6b6af10f37cc47ebdff4fe8ffdfd6d671e384bdfe1430b030efd80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58024b627c387d053702f72bdc1eda3c2
SHA1c432d575ae2cc142f560def2d22c921f4938f363
SHA256898620ff9c5fe656be3a770a66943e26d71a29c8b2e9ce42f7136f05bc76f553
SHA512943353d25ba89c55f3a12bbc68f68cbdc1880457e1aac46dc785ca69db8020502215db166617c7edbcf87f397f2d00feb8ed707a49b07267ca8361a352a56dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cc8623ac6c8bb06aa92eeb707aa1269
SHA11a595ae87af3951f42bf077b8229326bb7f010b6
SHA25614394d5c1c5bf599e4b9a8e093129a568e9fff8fa3b1855d075607f699089dad
SHA5120c82ac2a254166113256426dd2ccbe71e92956e1aac2eadfa6816e619e220d431432656c476b8992a22808c47a265bdccc4f8737f07e394859be6abf2c81fe55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55994902611cbc2b95e31d77db7a6210b
SHA16c90c3431908fbf972ac12596c4b0bed3143cc3d
SHA25657c787a2f47214aea575e48c53898671647defbf27b188e1404c7aeb6964823c
SHA51268bfbb75ba9783f6e3fec1fa433c9f2a4a2b38a0812ad14789e945da1a9b68ad03bacac42c31681d3129c4fe915b34f511b7ba9784f5e363d2f1f713d210db3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a5e24a3f20d9026bc8e416c17c01548
SHA1c7c7f6c2c2a201a19cdb228d1f2f7925241f6191
SHA25626db137c7c55e41e649e86698284f3c3a80793501690e8fd70fa1159094fe6ec
SHA5122070b26cf6f6255bdf238c0fd291a6e243c54a5b97481093e230d6c12df2c32bf02d8876a21964e7d6d5a454e3e5ed6a7caf04a0dfd16eea6eef8e82c7c86756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f7405da120e911a145256d45d3284a3
SHA19d1f59b1d29a3fac76e41bdd836fc2d883ccded9
SHA256e9814259d1e0e317d3495a46b86ceab6a457b57a06a6149e93c32ef0b6e6fc09
SHA512cf12ffc444309dc4b6bfdabae6fef7baa3732b4de175d99e559b71e69afbc9256d5960432dade09deb1ac6af540c566171ec4b3fd7a7d0b83d6d0efa1837ab2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cc217c10f88789e6756943a607e5066
SHA1990cedde0362610349bc7373c24b1ba8c053ab0c
SHA25665c1256c363db2dd7151dff69586f597bdb1735bd6167187881422aaf71b9a9f
SHA5121248fb84d75249e84807c399ea64fd05765ca0d922ef2a5111ba3ff30f00e845e20fea79ac2f5b81c4695153bd3a1dd9586968d8411dacc940181694c2a7b967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56adeb5cee706109bf18ad6ccc891c54f
SHA14e33ed711d8d81bb3659468774ab92e71c860d5d
SHA256dabea626336ecfe38042446e814d59f8565fd7b9476750b75741634725a10ee7
SHA512eff1d79eeea2c4ca7d318fb2f5949906dff80d172c22e3066b37b11232a5669bc41f356ffdcf9b7f559e262769ec871cde6347058b79e1305a80c4effe8a190e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5948683cb21574dac53f7589faaa093
SHA1ad57f994826c42d56d06221c752f6dce2b0890c4
SHA256c9bb17b12aa09750751f0c4a4af4a214ac3ec3dc3d4da7799fd4f27caeebeb51
SHA51295db18762fefa7f75a4f2532979f4cb36debabb5deca17cbc436212c2a9add5cf427e660d72074fa854b882aa210f3047446bed8211ecbd269d42cb5d18136c9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b