Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 22:50
Static task
static1
Behavioral task
behavioral1
Sample
0fd1ea28ec7037c7d68e26444bed836c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0fd1ea28ec7037c7d68e26444bed836c_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0fd1ea28ec7037c7d68e26444bed836c_JaffaCakes118.html
-
Size
6KB
-
MD5
0fd1ea28ec7037c7d68e26444bed836c
-
SHA1
8c9cfde7734ba045341a600680df3b23e70e66bb
-
SHA256
c6a6b24dd5a6e1bff422666c4e264485c1daedf374d435dae7cb64625996114c
-
SHA512
1c6ccec83034ad0555b28211f62579d191c2e0ee1bb7713d4eb0a1042fd0272974406d9b3acf4712a11e0dae4ee370ad86bb5d14187e2df8d7c5f332aea6b9c9
-
SSDEEP
96:uzVs+ux7gmLLY1k9o84d12ef7CSTU8ZcEZ7ru7f:csz7gmAYS/zb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d095d23552c7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425517721" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3c76ca75b487442a7e6f1e5223a8ea00000000002000000000010660000000100002000000069eb1cfe80994917558bbd4fdc387f87d14b944df5e532ff15172742c1add5c3000000000e8000000002000020000000573d3d95c99742057f6e7c3fa439c9638d9a9cd046f4572f97f18619b3ff7b25200000008043116be9a6e6447e548711c004455769a4388f81de07c640261bd697aa4a9240000000e198304becb3ad01a86b11d585ade8062fd7a42dd009f2e68178361b32397bf85471cb2eec1b8064ba2d44d52059a1d85acd98ab54e8f8329555de657dfc5e86 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60E0ADC1-3345-11EF-86DB-FA8378BF1C4A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1584 iexplore.exe 1584 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1584 wrote to memory of 3064 1584 iexplore.exe 28 PID 1584 wrote to memory of 3064 1584 iexplore.exe 28 PID 1584 wrote to memory of 3064 1584 iexplore.exe 28 PID 1584 wrote to memory of 3064 1584 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0fd1ea28ec7037c7d68e26444bed836c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1584 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2d5d9012b9904286d5336f9013b77e5
SHA13867f9b3b26852fe92c53eab2767901cba143cf3
SHA25600eec07c299f88365fedaa9afba8e00b1e7c4509e00332387867015f3d686303
SHA512dcd0ed932c664b7db0da6711ce312a739fa68d846562c90b865624d3658f3a1f82395b30e607a3d8a264b7ae94baf9a2c5fac1430189a53e8fd8a3eee73b8294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6bb876ebefba6eb9b6654128ad1e62e
SHA160e73f27da38d477b146817008835db9da16897f
SHA256e0b6c98cf7e8875352015cbd2b034cbfaad18ccba0b4308a1ab4f5214415ab64
SHA5124ac833c88755bada251dfded3a15963755812644b9686f7b231d44c7321785c2dc1a54b40051de66d4a0decfa134f2e72df993ea2aa9a02eec86033cc3e55db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538cf2eb6006179d378e8c785998150c7
SHA19910bdf8847119bc7e625349d8126a975cbebdb9
SHA25694124832e1994bd75bf9dfe12517161b14365d69969da904e3c0ca663c88a758
SHA512c2bd03f5bdbde93c9f5024b4b59cfcaf85f30d78f324be9de108ad14cca368d14dff38e7eb1577f2747280b5715f170e0d3d6a4a39bb7ab2f22f959790c70b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e3bbf57cefd8486c8774d3bd27a956c
SHA1276f498cd39d1e7f7707dae9ae7a5429fc03efe4
SHA256a1b917cff6377005255580d5cbf2962409b63285a5f11330d1654010e619c7c8
SHA512ea784c93119b73bfcf6b42d580a5d2663294c0a9705dec9ce8ce42a678261c219b735d97a6515bfdede58888c360b06907b7a4788b93c7deef24ac142d157ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad7e7aef850e01bdbb7501d04b7ab8b
SHA1fd49b381c6a29ad6953eabac2c2656648a97150a
SHA2569f16ed4cd56c6101040b35bd6ab4c2969244c8eee41d569a9f6c58a3834b92a8
SHA5127835f2b8dfa0816524432f3473c5d330a15f511bff808e6717e7c6746981e0d9bb3626b9a5dd45d182eeb6f7546affe7bd8e7b30dd8f053edabf817d550ff0d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b4d1319f7c017ec48dd8ee7cae9aee
SHA1fd8651655db0ae6bfc5badbdb1c982e497bf8ede
SHA2560863709f9d83b57277cacbe3ed6b36f62645cdc1976f75aecce53e5b17a6bcd6
SHA512fbf29a0c931f132b1f4de7d9ff261c175a1817cd831b6a1f05031e7d698e1f11f09cfcaf440f7859fd68bced063dc2dc1746ef7b3cfd2ad7223eacace8b0ac49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d70516ad0ec75a2c41d940221836425
SHA1f0fc36198d6a266799f5368cf416aa1260563d13
SHA25694e4499bd493db1fe1ff1832dc9409d6047cf0983d1bf075481cc41b14a62963
SHA512e52d5f9a32229c89e946b9ca7fcf2059a1256267c8df459714f977b394292728ad492c59d5d69246cc7decd8bb7f49421f675290d6f9530690e4f90b0726940b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5455ba3cf61a8a82e3c179db7fbba4b58
SHA1d107e1ca303632036b044523daf2480d1b175ebb
SHA256085a2a0100b86cc330e581770591e93c6f596495926cdc556278344789030ae1
SHA5122de2256f417480ab5cfcc35b83a166ff673143d4ff06db5f72efb13a8dbca1c56a4bc1a572e9860220a0254a10768aac5b453f9d2b1f9ac09f385a4b2a9fbe10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d49d9dd037c86ae7f00dda13d80c1cc
SHA1bc1b3d00c800cad581c249b058aee6a5a5bc97fd
SHA256cf9b42d8a7410436aa94e7ad98e96a11cfed81a54d3e22e9129777b5dea67719
SHA5123a25fb9d7ddf3dc5aa9f11484c48572b2de26926ea45318f554b3b0e1c05e6a8b726968fff0f842e0a17b9ddad73288f65f576c4ee514d945463a19a062928d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a99f0dc914b7528476f09eb415672e75
SHA18151d67e95862d180254f386f8a7e82c57abe054
SHA256b4843a30744455fae69a63104eb369bb08fae2d29c502b2e4ea30ca41eb18701
SHA5121f9013a1bf4f2a8632f3411525c23fe5152917ccf6b9199389d5f1c30e0ad9bc2838a0ba5520cba9aaa9c18799de6f45f3e8a35fe6d67e09330b78a7fd2a750d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50be1ad2f157adf86d775ba1830b243ab
SHA1dc441d25f33d161fc66420d1caa1e710b2e00af7
SHA25663e1fb1c60db45d3645fc9184299569872b1e4f32d5a768285fcd4878a4e9742
SHA5121f11ea02e1a50bb48807e621e472294eb4e64a840cc80f89b25323305f7a569651c7ae81334cc2b26f4b83e19ed278fb6f554a9c92837ec62d32a263f45c7946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52658680b1bd40649ba196e1229c90203
SHA114ca140d80859235080eed21227e0e70c9beb1ed
SHA2563cbb916e835ea2e52c9ee2582112f5c885cfef4425389c803df5dc909f9ea1da
SHA51290a16c536b63ea29a4c9c6b35bff2d768ecb1612e67d2568514a1582afe80cf36b1b57484459726823d47c15b1fa3deb135f77fa1200a91faf84c2a5c862ab50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57245480ad358e30bcc0ed1ef770911b2
SHA1cc321d39c15d210fc54589956a4d864772f6a658
SHA256152e3c9cd40c808a66a8a6e792ab9a65f4f4cb5fac0036cadd221c1037572db5
SHA51262aae4719037bea2e6bb474237438c36fa5a21eaf76ba6d3a32258d72d0f6a08bcc7f843af2128c7a34a824ae99b9ea5eaee27cbd574036ec7e1ca4beb55c60e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7aa80933256a968f7bcbea6d946222e
SHA187e33ebc8dd1c9d09d7531ed49bc4e87a01496d7
SHA2565041cc1580ee92261692b89db22ea40e6576a734651dfc62303a3a6a2cc61593
SHA51298d688b4e969302fcc3fb924942b372595657f88a6277baaeb21681778f0c564808ea6161f2e6be3f799bccf64f7fc5ef6b722f50e31edec10486611f97e726a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5451586dd2a4e3d23c0ac147ea6a0d7c5
SHA15ab2c8a9b4444311d70455420a5b63aa399d4bfc
SHA25632f920b488b13d4c50d1b09213dbeebbb200cb84faf1f88fd4474c08f8c38937
SHA512d8e18a397ede06f83489090362bafc20f13050714fcffb05a2f773a522555853ff245662b9f68a50def4d3ea0841a0819716651f734199a1da4fe43f5d786999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d6e6a660d2170598f3cedba856477b7
SHA182952cd277b7f7d364ecaaeff2addb96fc8e89a6
SHA256d2ea33be3fa6736a50f6b48faee4c1031b3b88b9fef0ed24ffdf2d4f8c92b18a
SHA51289688c3819db7daba8ce86e61969fa9cf1f0558eaa26b936db68ea69b5bb89c09d7783a9e3d46868743921e0d00de54cb92feacdcf86d0e4a392c55bd8e91560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f81f4dad12e3d88bdbb21b1eead563e0
SHA1fcdc1df1cfbcedcbf322df110711a94fc4382c89
SHA25699772b80df85a519c4cec9aa7a704f4295326e8f3fecff1dc45b07a36d5e470c
SHA512010b152af7c1f2a67bf6aa05f8de28107143f203b0d49db5aa35e121e624b89645340b6f3c699516e576d8238175d023948a09ee6e3bb7f4ce0e64a5e13d85c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a7fe5a17bb49ec38e6153dad03d9ab
SHA139147baecdba7f746fc3d425faa0e8e62690ef14
SHA256b6cb5b7340558ae722a2e6f9447348cf357ede058ef58275f70f9af2ce48be54
SHA5126991b1e599970739f83aa518fe186f51d88e1bfb328fe6aac66f8abe94d9ba9e7de43f8d81f9b85a619381689dfed843b449972cf345e78798fcc512071cc5c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e16ddd55320fa27e5a586d5911f4c93
SHA1b3d97102a508ed221cac02d2fd89f7a1529e5f53
SHA2563584fbc65516cfc0b8af8d95d56b797799fc25cfab91a9d7321d18124ffdc2b2
SHA51260891376c18a5ffd48282e1acfb183071003aa13d19a76a359bf1a3d7b44cc26c201cfa3a9c5931d4299ff8302710805dc88e2bd2809bb2d5f5ea0cef892cfc2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b