Analysis
-
max time kernel
121s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 00:33
Static task
static1
Behavioral task
behavioral1
Sample
0b8bb36263b06bd1bcb38714be01fcc8_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0b8bb36263b06bd1bcb38714be01fcc8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0b8bb36263b06bd1bcb38714be01fcc8_JaffaCakes118.html
-
Size
70KB
-
MD5
0b8bb36263b06bd1bcb38714be01fcc8
-
SHA1
9728d8e87daac5c932c0c2ce7125c20d9f683e6c
-
SHA256
a3bac72c6cd7e39211b089d57c79c02fc93e7fde5ad9616b0eab9c11f6614b24
-
SHA512
e40e5e3663ada59ab566b8ecf034eee4907ec1f0f9a48c7ede9ac1c9e904a0069de0ebb223fff76c8532f23d45f09577e9967833d3f9547859ad06d6f0bc27ee
-
SSDEEP
1536:UThiUJwGx8BUwg8zTah5Xgx8wDctqvLINRxbBdGW2PFbevCnZ0Mzr785sq:UThiUJwGx8BUwg8z7cpBdGWEjnZ008sq
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8CEF5EE1-328A-11EF-A0E1-D2ACEE0A983D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000b6022c2371575e2b2d167167f1f24e3caf79726461f4c1bbe0ce8235209d1093000000000e800000000200002000000077fa78bdbf3fd5897014374f58a9be055f2f7e43d629d4cfa4747f89c5706cde20000000ccb8ce88d945b0ffb2f443c9e078af9334e1a7598f96971b78e67996236b5fd8400000000131cc0c457374f76de0b72116866b82a803faf33efdee78ea417b7f8acbfbe333866cfcd15e3d0e25b8aa024665870f685a56d171338ebfc220e9b04df05037 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c80d6397c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425437479" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3036 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 352 iexplore.exe 352 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 352 wrote to memory of 3036 352 iexplore.exe 28 PID 352 wrote to memory of 3036 352 iexplore.exe 28 PID 352 wrote to memory of 3036 352 iexplore.exe 28 PID 352 wrote to memory of 3036 352 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b8bb36263b06bd1bcb38714be01fcc8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:352 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b3c297755cee03d979a67d1f7e9a87d
SHA1a00e0041dc2d189e3b2b1463b9b9064b5bc8fbe5
SHA2569c4c5339fb0ea55888f18fab4af9f4f89eee501dd75dacdedd5651041df23cc0
SHA512f4f62a17bcb1ef09b843fe7b0069a9447e3f96a216c1ec3cf265bc2ba39a8c2caaebcb9878e4440984cecda9ca0df2d0180c4c0abb332b86aa20faf2c184cc83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555a19f477722fd2441c9465edd0a91f1
SHA1813abe639d72061e98f626d2a8ac5cc403b3c4fb
SHA2565799bbbba8f0cdcc68b22088c9a184c1edf3f8cd6258b57cf86e3c73b0de5be2
SHA5120634e3bd53547b3f74eeaf43daa25a6bf666d64d64e3895646116e1b62dd6ffef122dcd6386caca760028c7773d4cb14b9c8c74e845201a81ba14c9e1c441ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7476d5d4533e02eaf34358f335a0a89
SHA12aa92926dab872fd391c74a5ea3dde1c547909a2
SHA256d7365bf7155436cbb81996293df584cb3a3db617281cafff7027ee3857ae7c97
SHA512bcc907114a35b61e548efa3ceb2b2f2e4a37c6d9f7b04b9688867013738d36b654c7ef0f4c85136efc0d1cd5dbab7c1cbacd38be05b882f3ca7dbde513b743e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b23a99963e6f9e5610ab18b53416996f
SHA1a72073a5d0f168fa41d5ea6f49ed96166f5bd497
SHA25682951ea1c8ac7517fa5fae07857f9702a1f267d56c64a5350245a1fc3f81b8ea
SHA512b59d84947235088ae9ba9dc94ebd93242c8e1d906e5443c6924eab1fa2992b64899f235e819f4c2baadf05a8cea14798fda46904f977fc4c796ef97fbe25c122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f612a7b01b83202e713d40bf9a541ca
SHA1f6c3bbf105d9b7aefc1e1c733cc7f8df579f9dfc
SHA256f163d3617474cb9def0bbfb89fbd449758b9d651bb70f1ebee01bdaf502e3a0a
SHA512a0983e2fe75ba7da3b0a767d6a2f1158b83d765a6440242f74c16e18de25d51289fe7fd0e2a83cb7cc3c95a5338c873d7ef192a2aca4eaf120d960a1dc78c76c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ad7d4256ba2db9db95e45ccb2549d2a
SHA1334fc5e68196da4daaf7f2807db539227722840b
SHA2564fa90cd4ddcbf84a2ba0647bfda6a7a2daaa5c262c0b8fb6291d22cbda89bbdc
SHA512d534ccbbac3d2b01dbdf1aa96bc912efc784bf49030a1d33335863da876bb8b70156f2cc105b7a905e453dc86fd311808e39444924890805452d0f4918b44e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562eff5c3973aed2b18dcbed9107bfbac
SHA1177b9379877cf5526a8c9c79ee3c2a0c0831b0f2
SHA25693edd1b31a3d0197ed211b178933ced7c54c299f0d13e550b4ef5fbb2521a397
SHA5123b01810092e8a6b82a4290324206f64f74e2a8088a23f13e5b06aac508f33d819f1ee0d758a8c8e155d99c62eb0510f052baf1a7cdfc3938ef8fea38d31ecdbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be65cab3589ab44f50f6f100fe4540e6
SHA1a17a125bc1b07b93103a91b91143294029b96997
SHA2567b4a3ddda16989154872c74983d5c454d0ecb096f1dac7f1a4be3e27aad7e705
SHA5122012bd6221543ae49869cde399f63c5cda124eb638f6c782f104cebd823028d429fe18577b01bbd78457155dbf5e3d35e56700769fbe0d6161d417522bd02732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e35d2bdd9ab8a6702ad60ea2973e75a1
SHA1e94324ea5ad060317e581c33a8e835bac510a8f2
SHA256b25080e457de3a3ad1bf70eee6437d46a32e167ec6f81142c96ffd641a87f483
SHA512f900b1a96b7cc180c75937adba06f28ace410504c8e91117017eb5a9e0660900553f93bb0ac415e4db238e9af565ca3564ad2382575342920aaa5ee11320ceb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9eb247dfe70940985d188ae8b76781a
SHA1b74777ac9b6a87ea55db88cf1141572cd6840849
SHA256a9818b4cd258ec711e8e0e0428050edddd0ce82944b6f9df860527bc0f38a5e3
SHA512e9b50c0d6d933f17774bf72e354bf0dc8f4b2d1bc6a6a4286436a42b3a949289f7bff070d87e0a37d7461a1e2c8470b88a78926b2a70e9f0529f058bce87dd29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f736a50c539ae43f2c5d47758bb0ff1f
SHA172d195177d276b84e079a1747ac377306fd72535
SHA256c26eb2ce10055a8b5f13044e9ab2aa7d69c8f5b1d4774f625960dc986cf7089a
SHA512a75a5ad243c6803f3a642fcab5713f1a620aaf64d94f22e819f0a52fd292761ef99d3c5ec761323a57309577d915f70288f138d2155eb85924d91c81e68cf73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dce243b90b23ab58263b7038dc610405
SHA1e8bd933ab79407022848e475d372b0ef478d5a72
SHA25695e07e74dfb51000480d1d0540af283e7611f053db3ea8c38ae3f668b7c2d826
SHA5129ef4101d2b1519556415f946dd75cd3cf08b393559bb450b371f6274b565ad42be587259ddd261ca0169b889e8308589a038f3e4c837a779a3739e117f124112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e6a67407bc4831b9c923443508b7b41
SHA1e31833d652621014b239fa3add7eee6fdb04016e
SHA256eb3514f2390cc6c6ef1822dba81d2a6c8ac086be6a3bdcabe34851230eadb59a
SHA512846b06070e9da2da7cc3f6547f28b2755744c095bdf22ac89eaaac25dd92acb188134ef80282ffadf090b6dab9fd1f762196d6930363736d83d6fa75e6e6dd9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5018351d01b6c2e404b065aafb90dc60e
SHA1c97d6f4c2738359110e06cf2a6ca4adc1b918b9d
SHA25661cb29d24cc60ab24ec6325059a8e8c485c83f09f4c49eceb48e8f1a128b48f7
SHA512bdc328ef7321e82117b839b021bf76f8567d937b1e3edbc3132898c8b678a486c4884167c84a03fd8b3be2e0ee43f52b33b01f576b4dc6a232801d88ee648589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa445897af2a4d7b7fce7d6d5a8d333d
SHA1e8b29027078ae4baeeb7169ee877dbde6f91fece
SHA2563140d94e9ca87aa9af17d2d37fa2728e5f4734c853c14736a2472ec1e4294ebf
SHA512950f26a44057ef6c638255d5dc7c646f0ededcb324cdcbc1e3ecbbfb4b12d40707b9604ebae23642450ef42d8416a1e4924d85a45e3817c2a79e5a34e3dbc120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a37a7ba3a7cc9d02ce4d61bdd7ff403
SHA17e3d869e60d0267738665a8c7ae6cb78b3ed18a4
SHA2566577328c7992a87e559618266992c0280aa3a79165017939cbb5f70ba2eebea3
SHA512872ac1214bf80009497844b723140c3febcb32de2f0760f629f64f636548253039ab1cf0076a9190bf085872e8d4cc11bb423eff9e1dc39e73458f5f1ee8ce5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf251d39a0c9097e7b049dbcea87c7f
SHA1d515b1083a61c2f745bfa636a18716e8c7406a7f
SHA256439f3bbfef5ad8a904321771bf8d0063d63c8d4c1243715fc6619fdaaebe78da
SHA5121e01cd39d530f5dfa2ed8fa2343becb66de4653d6bbf4bb303a15de6f8100aa5ca4eaf8effae9c4435618789f8a5a6a907e70978dd335e8783e197c21477da8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e61b0fcfa957cf6326fa76799622fc32
SHA145f2e64719afffd494f010c6ab514b08b5ba1ece
SHA256f0f13be336e5c9f99194b10ec281e6e589ceb29dba306d9365bec285d2dc7b44
SHA5121c22441a4a817064ddabd2a5a8cdaebaadeaebcc2f7e7623809f51946753011a5ecd3ad62329e728974281726b7a6fcfe653dd86c2a01d01d6d74cee79b125f7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b