Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 03:22
Static task
static1
Behavioral task
behavioral1
Sample
0c44e05b2fae102854ca3a2adc543865_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0c44e05b2fae102854ca3a2adc543865_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0c44e05b2fae102854ca3a2adc543865_JaffaCakes118.html
-
Size
4KB
-
MD5
0c44e05b2fae102854ca3a2adc543865
-
SHA1
458353727ca4194010289a8dd84ed1896aad55ab
-
SHA256
434122fa3204b1eac18109b506d7460dc839b3466a3a9dbe4cb4beffbd370efe
-
SHA512
4c93ccbfb8f2ee2992f77199380dcce8daa5ab526c806c44cb57839c998303488190be9687aad12ea40045bf305fc372aa88b8b99c57bb6960c8d1289235ba81
-
SSDEEP
96:/0VXuAkYQf5wucu08HbePl3Cp2QZtU7EREBd:sWTf5ffHIqC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F5007A1-32A2-11EF-9A4D-7A846B3196C4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a2cdf3aec6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425447604" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000068e2d75946c8ef47973d8845b42d081f0000000002000000000010660000000100002000000043504be40930efb861ca1ec943fef5aa726754f6b1864272265c34daf6a6e8d0000000000e8000000002000020000000da2806077fb441c1de4ac655e5ed2848482ad76fcd8286b1c6ee5f2d0231d56d20000000c61937902805270abc24e9cc5a3518643e453b2b033569bf7195a5fcdb06b946400000003fc6ea340a0c64cecf1f0ee388540d00b74930d7a86f3d8ce61e8e83095d0b829862b6f7114f29fa3cc4ee90a10c41ead12013bd010db6e56aef4fb73872a39e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2492 2924 iexplore.exe 28 PID 2924 wrote to memory of 2492 2924 iexplore.exe 28 PID 2924 wrote to memory of 2492 2924 iexplore.exe 28 PID 2924 wrote to memory of 2492 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c44e05b2fae102854ca3a2adc543865_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dffeade19906a110097af3f46c632f40
SHA163b1ce59c54009381e5e10d7df80445c04d1a281
SHA2563471adbffc6c968860a4efd26e2f9c2b213338424dd1342f7903365a5df766ed
SHA512492c6a021a4b4202be977ae3374d4fce5028fb613e1a057355756cddfa69de37e9f086c8ffcd5a5463aad40e720d1b66e5942918cd4ca8fefc5e9f5da4d3a880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5225300aff8167387acba6962bc9291f1
SHA15322a047f6ce04d90606a155850df00503dbb4a6
SHA2562870611755792200196613d6c0b945f01fbc2b7a0d0b353ce5a324fa0fe6a3e5
SHA5125aef02a12b9a1ddae96612da4167d0690483e878a7292274aeb0d497edca893ad9f8d32c9910b0f2de2d72450465131b70eeb583a87e2b5b5efdef71fe923f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dde37e683562dcccc93af8f3fa46ff7c
SHA10b622d968ea8584e81088d87a420618de6207a8a
SHA256caed9c57678140f4c6b68efb7a05af47170c63c59f5a0776380c91b70a6b15fc
SHA512354826daeebaf70cc255eaa6eb8eb1db125e68c96dd314f3382f763838630058b2fc323d126b3c43002dc1808b98d1bd1c08d30a1be2941b4ed76213c512dc69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f5322f18bb5e5b701cbd1b8c186641c
SHA1285ef0581537d326447778da406ee06249243a82
SHA25615a5731e80a0826e7c2c5d53626fa31ef9f118daf8f11cc3912c9e1be96de137
SHA512b100f16429db7172163e792270747b1ebc3903219c879d0c19c323bd23616e01caa68f966edd83b34b65e2124708b597ce8233beb63868d6b0e9e2e8d8b53ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b28e9242adc59c8d13f88122c7a059b
SHA17590195571206c22689943cb020e54731dbcfcdb
SHA256d6ecd467bf071bd928b49f8cbb94aebc27e20d82684f95d8f79dff19b7a603b9
SHA51241af48ba8155ca45e9ec469cac97ebebff686bf0ea1409eb79ca99fc54261f294b6b1b03894eaaf505bda4dae4790fc9b9fa805888fef99876c2297fb8ed79c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3141fca11d75ba36f25edf05b8bc4c3
SHA1cdbad4a5a162dfc1f5eeddd60517d8187d62bb02
SHA256b673ddede96e7c6052b0bef7b838dd8e50fd68202d287b0e18cf854402a08edd
SHA512b5844745d053bdbf3aa3e574bb8eb6a95f0d23ac8574ba62906c074fbd5235c4ea4748ad96dde6e838bc1984f99344f0c6d2e2437db153a3a8c33323b802b55a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527b59a5751453e47720306dfc043b2f7
SHA1f6487588adab1de6f3faf15441b105c6c09cfcc6
SHA2560eed59cc96f4607f922543af619d4850f03d51c7d49b453a379a01ff0c44e08d
SHA512b8a6db5f097b12415ca264eddc19aa0a3a55c8b0054139f65bef7f85f0ddaee28fd88bde8a6cafc1b7ab1d46c433d1a63526d7a5d95f87f2e0171667f9a4f3ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5327ca24988280e049659caf2040a262c
SHA1e7c5c5ee5abf82199714a8150d9c3575da8ba62b
SHA256979dd1452f7e53085288dd7d7e7278433f0fa1b1b7bd18a471f1fd476f316a6a
SHA5123436b49a096f163474b4428f0d4dc8fc8b76764462ffb7598848859307f567ebe0a58f13615ab4567f90d76f335a0e19c4ff877379c0af0da2f0cbab4c28cade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b72a316ba0d500c720db7b53766ef298
SHA1fc6523dc587c5f0ea976d92840557ac754965b2d
SHA2565cab4803580e6b67e26009be2339482f9b40f166116be75a9c68014c4c7e8233
SHA512460acef8762ae6b488f76dbe242e369d611ae7c048550b4f422b00340ad2b26adc07dd95df687c4e7a391043d992859f65965c53b822467b3a858f213caf6921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8793369c345adf72590e768d6e7b1df
SHA1606b42d2b14ef15b0984104b1fbc31d55fac9f8b
SHA25609e894b56c92fac63c10a9173ad7b07ce197d697059373451f9d4b4ecc766057
SHA512135eece59c0c430d4a7972ca78cb4b42291e251a834d9c402f61ccc3234f89540c2cb0e6088f03c1a00a4492d9e5d80295a6445a602672835b92e49323f0f14a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b271a4a78ff8fd6220b7812daa488613
SHA100428a6b9265197b2efc8b262a2f610a8004b664
SHA256de8e87806c66e0effa1d4556a196c83ec701fa7d4d6c7aed168d815f40182f94
SHA5126ee261f0309e0c5e2722b36be4467410e115a15cfd47e3435ddb37e652f27075d0bab75945ec56637e74421b1e3474201e3e0268fef943bea2db1117707a4beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd100dee93299837d41244537ff2e4a
SHA15dc701dd8f68a9947cf36dc59c9aae2628e87bdd
SHA2566e310de17079f9bd44d365b0c2a46dcecc20971b15a6e423d762af52909f3355
SHA5129977e7d1055f0286a8e39d341d730cbe6e9f14ae985fa8f6f5669cc4774504350de2685efea6daff34a60c434d498b81c7e0fe5462336ba5bee1280b83515425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fe40e43ed8ed00b0aa571eb477abb58
SHA1e513d695d635dd8ec88128173a6d1249cd4a5b35
SHA25620e9b41d3b3ab58fe8318d61f18f41b57c46e7c62f9ef8cdf6ebace149384b74
SHA512d6f392fe7874a58652766838bf55e7ff2cbb523103b2150555e406a618e43ba20b3200643d8422958aac829d9a06d8ed68b4ad0c1d0c8343a9928cf59f65abd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c61c30ab504e09c971a6aa25020fec68
SHA1de44056a9a3cc766cbc2d6feb046da31022842a5
SHA256c1de151a511697885f3e53b25b7db7fd1d86855c090fefb61106c57749341119
SHA5122f9a34110dfcab47621c78d16bab72203bd13871ab52f663496ba2ddd4ac5a0d60075fa91356b29d172b06658b8536c798d0d5b35aa01915aea2fc4b18c3fea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e686818825932e29e8ce302d6cad0d86
SHA1defbcbcd9afb0b929e7f4b11cf418f394726566e
SHA256865de1d43009c9298d6892dbe38bf9e217dd71491eb31b694b2f8e016e17255c
SHA512f42e604cd5eed00f0ab8349b0aef36727a2829fdf3cf119c57829219ba852b84cad77fb17b8553f923cf489ae89e1ba0c8aa5dae70c19ce57b6b377e293d6de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574236aa177832dc8ab9be58ba37397cd
SHA1f868f88d49681eb542774f6bcba5ee8985832edf
SHA2560bd5f5fd696202363db462b8890a28f3b864f6bf2407464ddf167011e8a0beca
SHA51276af04fe0a80b5a2f2640a781fa00d77949a44d3bd6ae8dda0fdd56c375ed21bd31452aa7301f8f2cf91fa06bfb3b110631025ff890de58590bc47aef44552a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b303a85816cca01cb41afd6b8fbec289
SHA1c64afde2c724b800379f715d376719de0ac6d349
SHA2562843001d2558bdf180f65dd360ce7f9f587879ef1fe6fa680a6898a166206cca
SHA512e34e000d29cba180dbf5ba1d6f44d7b048a70417afa8e64ced1bf80cd37e46019b23bfa59f51f261e350033da7edd20398836fbfd3a5d458ee61b422c88b0b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3e774ccb8d6b921d832a1437667d7b1
SHA1df9e8624a3b2f74e52775e41d0a994cc052d92f9
SHA256725d5bdd0031c8d895cb747ef9b9453001cf622c2ac726a865833f542710cd35
SHA51280de01df6e071cea7ed5ee8fe27b2461316da728e2caba3e131dd897fc478d44358bd1b79da174df41ae300be31fc7d8341d57176b79fea3e7aa3e2d316e112e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535e2743bb12ea32c7ed41379bc866d50
SHA16ee2c1160481f3f137501254773af5084890ce73
SHA256fc58c1c9e364153baa785a5e8da5ee04440bd3590292b09da49d010febb6033f
SHA5126cd370798b2a127280db42bc0af5c9cdeff583339e50d6e73afe74dc600d1fe08d7e01b3d10bd110656d4848facf50b2bd1f656e5ea3d67bf494bdfc67216969
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b