Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
b0fb00df31337cabb673390b5a00498a_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b0fb00df31337cabb673390b5a00498a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b0fb00df31337cabb673390b5a00498a_JaffaCakes118.html
-
Size
79KB
-
MD5
b0fb00df31337cabb673390b5a00498a
-
SHA1
27e90a93a1478ff3878a78ef50143da56a1b928e
-
SHA256
08ebae4d0d703e3ec26733826fc1eda99ddab86e782c7797a812871abec0843f
-
SHA512
5f666b3795061a91d5e0949e070082db83eb37cb2d8d35b47b0928219c6ace080ea22eeedd5cb5efadae0f3834249fb4c78a7568de59f91d785cbb5d8402787a
-
SSDEEP
1536:rFae6t6/ZlcCi5FIymkYvIiMQUzkeHpQqeOw1:rCcyrRmBIiiQ626w1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000a5742f7fef659be1d57fcb1f64e5ce6c5eea1e33ffe5842aa9349577e90592de000000000e8000000002000020000000596090471d4ef996844018e6e2d2854836b29ca0ee8262979396dc8246ba4c842000000058ae388d8bd9bb010cd34af76a1e0d287dbab005182abee28209cbadfe39e7724000000007546413ba74cf3a448ae311880ceda412e0de80314d8191e7e0e985512476a6ba50a9a915fe67c578109e49825c61210674250410be560e52e2d61715a1e5e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66E588D1-2B7A-11EF-9FC8-F6C75F509EE4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 505e4f3e87bfda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424660886" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 636 IEXPLORE.EXE 636 IEXPLORE.EXE 636 IEXPLORE.EXE 636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 636 3036 iexplore.exe 28 PID 3036 wrote to memory of 636 3036 iexplore.exe 28 PID 3036 wrote to memory of 636 3036 iexplore.exe 28 PID 3036 wrote to memory of 636 3036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b0fb00df31337cabb673390b5a00498a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50310644a97c73e60eca1e27f9e9d14e5
SHA18179abda12f73ffd054619417a9807427ef4513d
SHA256f24b98bc768267b481d2f0fc110d7f291be885f739c057dcf1f76de9185d7e18
SHA51241e57372a2f5884ac7ef9666d093e37ec5df8bb9278b7e7253212a1645ce119f6e689fe9deaaf1afb9f00d64b35d292177a7483709c09a40ff23e146b4d6f4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5105dda5f418a0d98e7d0b28d183bd8bf
SHA179443f65241b425d1c041c798ffa8f814af7766b
SHA2567147f0cd33f6fd698abf6b834a7d8761826030876872adfeeb2c66da0649bbd6
SHA51271b4ac4f55624fa2d9813d2e28eb457c69c335aee2266e919d10e4c8c374f758a18f4053fc8706d0ab126f254ed0e8f8d23d1234574828507897ad287ec1e3ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585e314203a1a2d9f448dfd449ae2b907
SHA1e11df01ba4c6c0d8c8aeafd6614b1105389a8c63
SHA256322698ac223476738ca221ab0552a182aabee114d26cd90ed49292b202f0faaf
SHA5123256fad308b0e321f4925f51fb666e3c63b5568cbd15836adc36087dadf45e207b8b7e58f596187512b7c08aded4996e8fbdde67e20e8787184c9280542eb050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575203794aa6bb577bf2f0ae12b6c6b56
SHA19ad55650538cdebc181305ad796cf71eac737120
SHA256e637346d8ecc2e9c88d619d0bc3612f230a2889702617dc69f41ea83667e54d8
SHA5124ce128c0a1897fbc8d1587fab77e0954be5e381ba73d71fce2561adbb9fb3c93419fc9fd9dc90db75618d31705403f65e01d81ec82cd50d7575ac6908b148403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b301d206a9b05b0b5b582d4c6e04977a
SHA15770fbbbd96392df2f6bda6bf4e9090c4d4bbb82
SHA25696e09e497d98d6743b052a9f9f638a0cda0f141353a3378aa31205e783403d10
SHA5123aa69822408915677862cf67f928668203a06bb26a2bcf47af51ebe2c1baad9c91b669e10f88e91583589d15ee0a4ebd3777933f86375fd54042ae28ea7b91c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560aab46d24425a3a6bd550bdf746a1db
SHA1f3810d5bf4441a8cfbc998b4b2cec319a1e92d28
SHA2561c0e1d5d927b1ec33cda04184d7ca990b51d32e9737934885bbed2ecd3ed8d82
SHA512d396cb369b21bf0a579d98b4aadd0a64d18f259f87019c07a2b5ad25ff8c183a73b50f33e8bc8417d2e3dd438e6485dab04641e7ffd002ee3a4aeb1c5f91bac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6c7550a4dd2bcf04445fa1dd82307ec
SHA1dc70fed2ac8f1a13074bd5e206ac91a86735fc65
SHA256c212db214f57ec67918a06534b5c92c9052451b1ff0b5fdff8d48ed1edf775ef
SHA51288a59d1a11bdae887e94501dd778f086ad4931c164384bf5ce402c3dbe4b0c7c4fff371342f0fde187c0e136c6941e6dd4921692b9134e2bd727c03107424e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5001d260121e299112f0eca569bf3bfe8
SHA192babddf69b217c2cc1af09582a9d912cabeab1e
SHA25606b5b6e56ab08ebdabde5a3009d6bcfeab20a71757e0611b4b870b95aade054a
SHA51293a781df2f7f53194d732538a068aeb97d28ea24d7cc34ff5695b17c21fabae79a7401521cc90f4e884b0016206e163be6cc4accdc440db46fd42880f9022474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e4936a6b68724e7d6663a116f51a93b
SHA1b8096f86790593cc8cc55de6761f7305cf17accc
SHA25651726f99cd5fac8448260e3007c83b4a67fa6de4206e8ebf8beae605793af586
SHA512f44a8eec441e55c0398f06be5bc21bc30a5b4628e4a3e95a969c0639672f8452f7a2355196c187c55656bcc96b53add725586cb168e1d47d7961fef014be1b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51086797cf0772b6de0976c9450b8994a
SHA18b6a421992a4a2a6675c177f658754a9dbd5fdb7
SHA2564a618162083823975fbc60bf68cbe98eb4316066071d67ee01fb6830b4e963e9
SHA512b23ca0d472798a186708e11c440129a04de2f28820b6ac29ad730d2361128db2466ab551b8287e4d4f4d793cbd72a18f4aaa203a4effa709d1bc1ad2107691c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85faa9914a141b7add88d47b8d317cb
SHA159dfe7dd958aa16d58197e3681d2af0338992f35
SHA2563a8575d260220f1c3465082fc16f30653629832d1f71fbbf4fe9f7dd1022ff2e
SHA5129c1bafe02230d90325d1d3cee3c4ea75bd189f4b126356ce6d2f635d5f893123a3016c0f3dfae0ac379f2d0b717bbd874e65649ebe27ccc51af8a06e6a9aa1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558dd928d136985515f0e45187be92dcb
SHA143b46be866e3bc05b6391a620819b8644b832056
SHA2564b9a9f7bb919421663e213ccac0030c559417f9d12652458a5ae65a6a829fbb8
SHA51203a44329596e65790aff55e1917004c434efae883c01038b2f04e23708fea0f23e2a18c20de9b9d27f3f500f2feae9b8ada3afddc77f34fb5b6e88666e75a7a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a354af628d79436ed39fe6cd67a59be
SHA1224b4ec0c7c7d3b8c14b1082488671522786f097
SHA2568d9f59ceb6583b80340a5c42de25c4972df6d21e1eb50386e6b0204d3e02df58
SHA51201ec1418491c769b1f5ce9fba8303c7cf7079c1832335f05929ca4a0a3fe5f48c5b70925dec7722368b01fe1b7cfd266592127ebee53b67feb9f4b1d526b3cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599a51627bfcb55dbbbd9501f661f6750
SHA1ae33651a89ad65b077985f3b7a7b269eb54b698b
SHA256587cec502c0af12ced4f5c63257f10ce0a26d9e9b4a0897f94f420efaaceeaf9
SHA51225fc60e773bb937362ef605b0b92c8d54aa29962d6ee8d4b2dc9b9ec499322a02d0ddc2dc588c1b9bde04a316fc842896635ca418b86f5560d64995106f5e576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554eb4b12067a503ddfb5ff0b901cde88
SHA159358251c70964b0cd995b5e56f9f90910398f21
SHA25643864e21998fa0d048c2741ae4cf21d9ed381517e8f1f0d1ba32933e4f64ce72
SHA51238399cbf34060f7c9c277a47d81eb19ad6c246e4e8dfc72b3f6f4c7f0773bb2922edf04989859b6856acb0849f83151b7143ee319c799febfc5be3391e09d629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbfc1a49177d320267c31c026d0598d6
SHA128960fe04174ae0fb7ab1208892ad0151112e63a
SHA2563d65d89e4c76ada3c4947887373b26a1772269f4100ccc9ab1b41b9b2e6e9219
SHA51241251bb3dab3c11d5bdcf1839a9d7067cf5e12f44d7349b8ab34e620ee0f212e1395c848644eb02108e7175731445f63da3445fdb545f1e6f8ccbe4c0999986b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb19163d3e02a1503752331df2272643
SHA1a607942e8988063197df8bff13153f70e311641b
SHA2560aec171f0c543a0442eda5f4663551e9d5f2725f6bfe742a4fe7bec6556f1359
SHA5123681aaa7544e9b53c7666f0e4e282eac21726c7f85fa246371b8c0abd996eeefdc959d4c2b0b145473f593d56df4938cf163f6d8b1447fb33add44d814b2af9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b04ad40c1e675c95ec40a2ff8e6545
SHA11840ef766b4a6b20a67fb96d4287f7a214e07df7
SHA256043a7a17556098832631dc52de14e626bb6b1f24fea9581c350f46fb8fe9805a
SHA5121475a349693a27e4e0fe076534adc5bafbcad74df3d5a2d441ee50a7c606dc415ac6ff08d6ed827d9d0ae86354f721dfbddcb0faef981f80274ebb2b5c7e7225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ca3eb25f0af633862075b64a837be6
SHA12ec73d4254b2571a4847f81f1695df058fae85f7
SHA25618607f0660689d92411904995b73be1fdce0d42058ae035cd3b0ceaf02e15575
SHA512ef30f70222d936a9b1f7c55021c10f05afcae3e0d39075ba26f939ef98ffc75a5d6c45663e64b5d87597554cb90dd3b8c81cd4f3f1eaa380e2d52f9229c93861
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DODQ7AEY\0ky2aezff18e[1].jpg
Filesize7KB
MD50bc8d04776c8eac2a12568d109162249
SHA1bf52db1e18d09e8a4d46629a2cc33d73984be441
SHA256cc3d009865e4980b354ea615270128620d57aaaa243d8593adc8a13a96e4b088
SHA5122b112160f4a215a552c67eee59671fba3b5380dbefee40106ffb9732383ddc9fcf70b3d204053a3db34f4bb483a1eaffd493567d6ec031b0d856dff40cf12751
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b