Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
0bdaa690f80dfe294c3bf28cea298ce9_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0bdaa690f80dfe294c3bf28cea298ce9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0bdaa690f80dfe294c3bf28cea298ce9_JaffaCakes118.html
-
Size
53KB
-
MD5
0bdaa690f80dfe294c3bf28cea298ce9
-
SHA1
e8eff116961fcb0bdfb25cb25865753437a0d521
-
SHA256
cd3ebf16c959c5458fc31460ec75c65e714a386ed6bd36f58d1b53198d7500bd
-
SHA512
cdcbcb2995a1f46b667cfb68ab354fa35ca729646d09f8d36ef1a5500f10e75f6643b675dadad5051cf27f2761d2875040c947aff6bbd3e25ba38ad6d0e17c7f
-
SSDEEP
1536:CkgUiIakTqGivi+PyUkrunlYp63Nj+q5VyvR0w2AzTICbbqoC/t9M/dNwIUTDmD0:CkgUiIakTqGivi+PyUkrunlYp63Nj+qr
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ec50d8a0c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{02A39BC1-3294-11EF-9680-DA96D1126947} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ec377faa6e491542a1d314aef3a9a106000000000200000000001066000000010000200000007b5ab39cdd77b3429e08d289131524283a49604d07be5c526b8b868b91c0c04c000000000e800000000200002000000064ee89bc20488c0e91d533317bfd064a45fdb6eac5398468a765fba03bbd6f232000000007467f1c0315d1e1f8c830ce410e06e6597b6b9b2cfe01b0a60decc3bbf1267240000000b45aa9d1dcf8df502e948176dd4cdf8c6348e680ec8c17e2def1ca50e34ab5f1e31e39056d71855ea97965830e05363fce2b36c16ce1dc58c576a681d8e3fb4a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425441542" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2836 iexplore.exe 2836 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2540 2836 iexplore.exe 28 PID 2836 wrote to memory of 2540 2836 iexplore.exe 28 PID 2836 wrote to memory of 2540 2836 iexplore.exe 28 PID 2836 wrote to memory of 2540 2836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0bdaa690f80dfe294c3bf28cea298ce9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5784a610f77687b50e2ed085e08fd365d
SHA10fbbf28d9548f480362adf6b600b1ea8845484bd
SHA256a541a0ad90e0293fc4bcf598949d4ff2b0f5eac485068a4921b1410b802e31a2
SHA512c3875d91969941b09684a539f29cdb6ddb00fa2470fad17abe5547188c783f882579044f97dcd7511550541caa4a05f8bc2cff6fe44afde6c0fe8b0f6734e351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f576a4b91d9e71fea4c67883d6f1a454
SHA111d27399c8ca4d92471006060dd5f2ea2496051f
SHA256e56d033042fbf357ada325b7de4914a1c3cc7e653efd736e4e22b38465bf6f16
SHA5122b0bde029fb430a5a6c3d2c427061a8c9eca649ec413dda8d444a3ca009c0752f9a73cb76a64a2ca50bc3c87f7cd622e5272e38d2950fd4662a083647bb3515f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5023df5daeb628917db5ba49287f2a9e8
SHA1d9bc4160cace1f00643e015ea6a497123f1700a6
SHA256621f1a717f2e90b840fb286ec3f8bdda9dbdab26b7b2cbe6cdf14016a1faff19
SHA51211d34a52454d1d21779c318364ed31b14b881b1b9955a86568cc67def711292e34b376b07c065d9c9aae1558dbf1d876c39dd6e82fb45cebbd22f7ad165e065f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f0ceb0ac5752fdfd263c5fd8b39ae5b
SHA1451a29602b7568caa7832659d7e370c207f83a79
SHA256df141f103b39991579c18dde55047c1ef72d24cefa6e4c3fd1a1387130d012f8
SHA512b20f489a27e5652cb85ddda6f81028e5fbe9d781eb86c8fb2ca63b1820e5285c6747ed205b7616ded93c946cf4c7466e750cf28ce990097bb9e085aa6d97afb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1957cebe378a51bef1ee2ae30d7596
SHA153b95464b6fb50ead747aad9386f66ee3fbbc86a
SHA25658db7769109c380130919149c7b8077409a26cdfa2629566a184116fb93ad444
SHA5125810dbc3e7c80496ea8a30be0ad9be5f39c1305304140092330fccefaaa53209c3129cd03e4574769d532b1d36816b2d86fc95c23f458852953f0d3ad48bc585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c94557502a6fe83558e739681434aae
SHA151c1804fd4f2bf4fa5e571b7900f3af3d86ba218
SHA25695dd2bc41beef2c91be726ba131d37055dd955fcdd9bd15d084b522d3ad976b1
SHA512ca756ff80df485a0727b15c6d4d682f5c9e82db50bf4d590a76868fdee548a13f7e31cc3bd4d882a5548fafefd23a1cfb4ea915cca6319f0478538da0206c3fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fe9689783e944dda8d7161b0a23d334
SHA1cec20f8521d50731e0bead11f2f29b68a4b87d33
SHA256fd14629533d3abbf6831fe2ada43a5cf3eac712e3ebe274bcfa1b83dbb7e8eb9
SHA5123e6e3d913dff163ea24ff7ae151fe679ccfc39dde0487406497211f931fbefcbac61ff845b44a7e69c20cf4a4e83869a6dfb96e5aeed7c6b352a460e8008656b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51403b3d893b428f47b5077276236a26b
SHA1e39133d4486291ad1c59d6a2022b348de7c08f7f
SHA2568ecabfbce2f6c9f525702772a0ba003880eb82ccf95ae199284d54243fc3f155
SHA5126651f7a9710e477f8b833dc4cef23c15a5aab4c09f70cfc8391adcda5373af7275508990efa3de3fc04cab72aa35514def164f39d7b5b8a50c2b5ca0ffd84906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1b690a643d1c7fd458e733b60ade5b2
SHA14fc68a8ebc4b32816983fa6e0c964a49158bd1da
SHA256232de75e733a4b00c6ab1e20f06114a894b5f08adf618d6c65ddb780477ad6ec
SHA512d8634cfeeaef88db094b20849e42587f54169bc94fabeb1af27bed4e37574af1281ce4cd342ed124b3dceef919b7b3d54d6d734753c8a5af455f387eadfb3003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55635f16ff795d1d77bca385548578bad
SHA18229ae89b610d06acd04bafb5784534b72bbf45c
SHA256ad26085ff0529abea738dcf3c79b970e9c42019d2755911b214a0b420a43911c
SHA512bdfd255da4c653d76326173d7785aa87c4a77a935e7d7d335717cdf2e5f76163040f7f031fb3859c27c8f6f2d3bdc8bcff0a277c89219bb22759a742a082efb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c0e4fd4058cbc19532e290cef59d8d4
SHA13b35818b43f2f9c218483c560534acdb858f2430
SHA256756d316d3809b48e5ed509d5011c98751db4b2e6901f9d28041f2ab6c9a557bb
SHA51298ab04d26ba6670c79827889b758e2793471f98c75b8612794611fefd9dd7b447cf763f4db4bc6c64c420701dc9be4f7d63aa352bec99c9d319c856e304e098e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d38e31d32a39f6c71c25210fb42d3e9
SHA12fd2bf7efd745daf3ffd3cc7ac1c56cb23096e83
SHA256fda6c7d21a325f01e08315de1fd1df21a9127793a20e9ba18fd9e4bd3ab8bd5c
SHA5125228affdcce6ec6bc80f22831a87ca7df905544795b60e16af0e516b276b26db53a8c024846fb5478b9f9e9d5b2b293770b184c3bb3a6069fabe9f12f0588957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58579a34b825788ee665d2fa1f8e26b1f
SHA1494d0aaacfcaa9821231d04adb1dca311524bbfc
SHA256490cb4316ef0b58f59ceca48d926a935d935995a850714712d045c59aa04b423
SHA512f72d3e466724ff92a875601ebd444cf87eb3d4c191682c86e508ffb520b67a62d6862b851a779aa5b67733e1807d756d30e844167661d7c76be5faba6d45a4d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591eadc9832979a8c506e9069c42344b3
SHA1de75077cc2a7cf9b97e8a8bd8077d88b94d75135
SHA2560699d940e4ce0ab27a81756b2d41c2107582ccc910e3d47da8a80c04495f5382
SHA5121d52f1a2e087c1aca22d220a0a7e40fc63bed71404c86563f9e5e12dc5047557eeb4cef6d97cb423f2eed8a41438a4bb28ffc51d812c106d25636850afd813b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5ec9bcae5774d57a95296df71f1cb05
SHA193da0ea57e24ff94ac2d285a48abbede481a4208
SHA2563c5db4b9a214db84489e497bad7f7952f11710e9f8ad5c6a70547be028db3288
SHA512fef2bc468b97146cd439b980b888525d23d9cb59b67ad0d74bfeb2b441b09dc71ae7e95b3bfff3dc518641aa4160b696e49d31aea4bee1e936baafd6452a2309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf6a66124090262ff302b5955e4cc7dd
SHA1beff3f4663ad7d50d198f80dfdef088560449532
SHA2563e98a951afec6fecfc7b002bab35b5e09bd1ee34961e7a6204915d42d811bc9e
SHA512cc02d71749d122e5cf5637044916b72ebf48a3c21fa66b36655800a8382dace2a527b9edd37b75293abf9c14cdf3ca0951c2f0aaf1f231da48992d29fd8950df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c5e9b8791b7e1d5863eadec69258f9
SHA1536c10f52a352eae6e59283d92a365be058437fc
SHA256c9308ed5eb8a9746bb30f53af9ddd559f4e71f46ae0fa4ee37f5034aca478f13
SHA512855e3fbf4c06990b0b09ac978bdcd4fedb71fbf9f9be2954ff65666ac684c49a50f47d8a8d6b79c7ac8461edbaac2cf486adcf3e9f03a7e9107f7b400ea7e342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543fa5af7803052a37003ecfb0507d567
SHA1b0c2408042029d6f60c72dc6d5848dcf3a9ab513
SHA256671a6bdf00e62b778677d05a684f5a60f6899cb4ead341cfe7391002664fffbf
SHA51262d87dd7aa992a8852368b0270794e90785aa385028d7e1b722afd34fd1019ec9693f8fd5820757a8b3895e92419cf36b4330b0f7251bdfb6749fc73d8a91246
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b