Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
0d09f96b882666f7f99efd9b29fef8c0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0d09f96b882666f7f99efd9b29fef8c0_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
0d09f96b882666f7f99efd9b29fef8c0_JaffaCakes118.html
-
Size
10KB
-
MD5
0d09f96b882666f7f99efd9b29fef8c0
-
SHA1
2377ea99aaaf2341aa08ca796424d7ea8784dbd9
-
SHA256
d6c9c0bc97d10d7ad4081d4e98138bff648bcb55d71d15b8de4b93d3e6c276f6
-
SHA512
459082decbf4046c524606df5910b0e9fdcc13bc5927ca3feab104fd54633944a6f5610035b4da4950b2b6a2312846f6f5c24061e7778579529682a457969f2c
-
SSDEEP
96:uzVs+ux7wmLLY1k9o84d12ef7CSTUbGT/kHIp2UfGZ6xHLGVqqhXGqlVHcEZ7rur:csz7wmAYS/Ce2UuZ2qVJh2qPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000020dc3769a23f3f2750734e57b05c886b8f579ad883bed2028fafb612a4938814000000000e8000000002000020000000069660d5f5babc6bb9e715dbcca8a4386ee546d284775ba2398754232d107cb5200000001996c2c55a3abdf5aa028c0e87179474b99c131bec6ca97ce50a3157e20b926640000000736d459f05f6ee5fb01431e764131e3167b09df9b3df789dbf8288d0916116c768bd66d03731891bd0ec4158d881014e388e99c439961c20deaaee2d3613683f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425458831" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43B51CB1-32BC-11EF-A57D-4637C9E50E53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40029d18c9c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1196 iexplore.exe 1196 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2208 1196 iexplore.exe 28 PID 1196 wrote to memory of 2208 1196 iexplore.exe 28 PID 1196 wrote to memory of 2208 1196 iexplore.exe 28 PID 1196 wrote to memory of 2208 1196 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d09f96b882666f7f99efd9b29fef8c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a406ed3c28b15e48eb0840f2d0348d
SHA158182be7d8ccb54acd667a81efae09fd2ca2c4a9
SHA256fd68ef9b5303c73de0a4fc805c534850462c29cbbb7e03d956d36729a8a7bc4e
SHA512a7ceb771ab648a312a5053b0035399c444cbbd6aee28da443177b8988f8400ca1556e752b047561e15d8a1116ca9cfb6467f9ae021938fb8939af13eb198e0ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e3a72a9fcf69db706d487692a9cfa67
SHA1f54a48a31cad3a03d10ba0d07e269b7ec33b1119
SHA2562ecae1676dc8bc4319c651ec483adad6887a6e58ebe3629fb95b04da6bf06e16
SHA5124abaf5945fbfcb9d94ebc1374bdc0263b2809680c05a19daf378d6d9d6abeac73894e714bacf5a93c07b7579351687678d0016b0cd272696f54638b797d2b077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6ae7d29f448cc88dbfef2b9fa29c859
SHA11545f4f10e855cf0b188f1d00344ef04b606e9d6
SHA2563d361174858b9d14783277ff3bceb4e01e13ea51ff208b929417b6e3cdee944a
SHA512083422625a2b9b6b8b7605fefc5ffe4961cae9e2f4b2331861720e87e2c121499b9fb556f488f0b4c2444d3d2d5dd1139776f5cd60b989fb807984bd3c6769b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a56ef47c736ca1d25497899155af4a2
SHA1c5f7b067ef90a198568d53ada723b2153a72ef2c
SHA2568832f21fdddde87b4105c6d41b6f3f7015ce892d22e7c6a1476cef366b6ade54
SHA512b3d85c50ed1d93df3692f43c3aec6f60bce8d89f817d0bb97758703f0ed8b79cabe604f70ccc8256382e5d364ff30c74958784707ebce6deca674197042097de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb05b1b99d0a73537c8ee58dca74d3a6
SHA1cb8a88ac6852a26f9f3ed4c385f56512af6716ce
SHA256e0980f5b898660e133a3a0c6920841f1e3ee40a36b4894fe75c1ca5bac21663d
SHA5126a9254b7f37bd5594262449485ec2e86cc317eb01eda27e2a6568afcc5a5a9b7855c98887083d3e710f42af820d1bfbef7989bbb1dc5dd59b5116bd54c8a23fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5959d931b55fd259aa7efa2f1cdc0c9b2
SHA18fef8454a4c19b93e0d73a24cdfbdcfe8e84142e
SHA256f94e1f3b67d8bcaa3d3a5b82e7c249c5d42ba5b5d257ff5227be4a3df1a15dc4
SHA512e7dbc84d31d791dd01b0dc078453e431a3cbfb31654841c1e2289eeb4c4af7dcfee2d760f7e23f973d6b733aacbf97bc3d09a72c13040ce41e114dd8d90924a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5406bb0cb86681c5fdf53ef606e24b780
SHA19ce43f85a13305b2d5710beec9c4aebbca7addf3
SHA256ae22245de2ab6d11150fe02c5219157be1f61f29d52e802edbd797f28658ae4b
SHA512abf35ab30af7d42ad361432158662a2c40b47fbf3c443b230c612d0cfa983794f315d3d25357a91e921fcaf1aa91b9371953e34381bd0d67ec3c02647438d25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a4daadc17a04ee6c9bd596ef123afa7
SHA17cc5f38d3979a4abbc3559e85583a3bc9f8230ed
SHA256bc5bccefd16767e955fed2b427663b0a0a143e5e757bfd9b55d7d4fb44a44040
SHA512d26eafa0ee9e025607a996e541cc85744b1e82cd37c183510d9147a6de1d44630ac78695eee149f20d3db77d2b65641a0f6f7605e99bfc98ebe03a7024129ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59afa2298ebfb1b8c9720d65f7d7668b8
SHA1172ec512d4d6fb395113261844f20bfe6dc82dab
SHA25657b454bf56ef966ec6ba8c18e3ab78ee4a37548062459d00bab09d7e52c952cc
SHA5124eb477484a3aa2fba9ac389b2455cf8eca51a8088f9a4d4fb3c061b27a8c8c1a137c51acb177bbe83f910aeafdff8ea38a8f3cd4c07019f5d1586a42da52c40c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb2a8d74516d4322cfd128ccf940491
SHA1f4edd3f3f0b2b59408b2f67b26c99f223e52d82a
SHA25692dc3781e508ce72efc27cd39200a6972f818fb5fa9bc613f5f0803cb82428cd
SHA512538e0c0b5675848343cd5320451ec3e05167d9a9bb12cb649898d66fe7fcbcdbe80b74b321df4d5762d66a821296725027216b3da2b9e2e3166a2d1e90110a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa83441165ee16555f5a4112fe4ebc6
SHA183870eb69f8540ca147bed6c8d89af32b49d5cda
SHA25662732294821785c146e70477aa96bc8eb00559c4b5f424408acb0bc746750d1e
SHA512192b3138b683e44015f39eb60882b935118fe328ed20656aee1697c27238df497ef10b5dd5466b5da73b5857d376d6c803a115c783f9d7cb00aaf1f0cf867475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8275b9719c7491021e7d78b1be6ecb5
SHA18c344796c92c78a4c8273b7d4ff40bf6d08b4ee6
SHA256f77c9b828f5cc88269ffae0a67cb634756c4bc4ec47420a91eac808b982347b5
SHA512bb24512872e8af45b078a5b5d955c8bf8023f66cd2eb3f8a0b649ec3838e2f87a74c538374490c4fc603000f8d500dd9a7a421cf6008f54080425c9aec806e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4b9b73e42e09cd375a859e6933ad0ab
SHA10934b29b5615525696ddf5f7a3f4395f4ac42a56
SHA25687dd4cf65fb0b5a99efc91442b1d58232241d32ea252415b37ce774f3bb296b2
SHA512b89c0d09d8b9fbc22e7186614de80197c677199419985e56b998b27f74c7edb71d5e61c65d244bbd6901939e69e09198a87a529218895291602bc9bd266cd3dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59520142909213f07bf4cef28e4a83a02
SHA114aedaaaeb7a4ddae10ad7afb3c59e059bc635dc
SHA2567ffe038b74f97c2136751cb528f5f9a64f7a3b2d821e67904c05f25c1cc582aa
SHA512b753aa5244c2248f53f00e4aba4f6af3c7b84a7610ae60e6c5509b086a9efed0dca77131faa6b10f8fb61909335357d587d6e51451850e3212aa7d9045e8b66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be9871ad4ad405b2364d12e95c0735d8
SHA168afac1f86dc535a86abd4934b3653bedc445fab
SHA2565b9c441581e470b73bae644387e14615ea9040db686b3177fed2371031ba855f
SHA51268fe75a8e9b69ccef2a126eaafba43369f4830fd801898cd4ce90ada3d223244dc4857345f08c23cf4867bee16f722191c53d7eaf588c3787d6c8c2c16220e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500edbdb20ce8c55f1a8c1ae2b0dc778e
SHA1228f0fc50c20d57b1b9830be5b48d5545b68aa66
SHA2564a5b6c902b941fa2538b1f8ee9b05127e41aafad145768965128ae337e818e79
SHA512daf94459d59c25a1533c3e7f319cf6ad73c1b0782e48c0e2f9eb80a4e641971fb53c01179c85f8cbd9cc1ae41dc1853051a4103350f446fa787f9b46d05f30b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c3d507b23cb5ef80e7a1ef8fa187a88
SHA189eaa14b0301a80456b42855a4cdda02e87f82a6
SHA2567299118695ea8d4951e2fa9fedc54a6c76e596e11a5c6650e27f24417e4b1bf5
SHA512e0ef29a8914776547c2f57684c2ee96a176afa1fa01d7429036f2da4872c1f01fd9ccd154b06b7f0279cc819ed4a6d124438c11a69835a357d0a60f94404830e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509e5345a71c6ddafba94e752757cb411
SHA112770e8fdda067381364d8b2247e9cf56ea6379d
SHA25650d7c5934cd22b52ac4567375d09cb9a80953db273d44df74ede976dc00dfb89
SHA512d1607611bab890874fb3ee25fbb0a82fbe990ce35d6b4ee119cb2264c73d5e1b7d76f9af66d74f657ba9d63e548819e0551b41c10bead6b10d2baa10075311d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5137243f392e6c2c5ccacf36ef69718a2
SHA1facc4fe4b37f408515bf66d185d85c99a982b485
SHA256f0e42ed8e240d91094846838a7021a8cd8d1fc05c30bc21b1d672a1c3e418153
SHA512019e2d6836f03bf73aeb3282bcc2f86bb9401082e8a8cd3a9487a0219f091a693823852928edcc112566178e05fe0e0a069fc1fb11b93e85cd49c2102afbcb82
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b