Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 09:53
Static task
static1
Behavioral task
behavioral1
Sample
0da01e7e98ba3f930b45fe165c69f3be_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0da01e7e98ba3f930b45fe165c69f3be_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0da01e7e98ba3f930b45fe165c69f3be_JaffaCakes118.html
-
Size
57KB
-
MD5
0da01e7e98ba3f930b45fe165c69f3be
-
SHA1
8ebfad9daaaf8c8f3ab98faeeeda940681338b41
-
SHA256
2e17d1a96e656dfe8f9a05c55bd7aec4236c98acf072c11366a5cd13f7f8f37e
-
SHA512
324261e9ce36e1cf27c510c11070ed7832e75b33fed9da933a5158c3480daa75d391d615c66bd36189d0822261390493c27ef29c333cb5430517ac6b5504dc39
-
SSDEEP
1536:gQZBCCOdE0IxCirWGKJUSvmSsHkwmaH2gK10l9o8TS3YDt+X9sGwPsPIDNiGAjRE:gk2S0IxgGKJUSvmSsHkwmaH2gK10l9oc
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000003a08294fbf64c464af4d1ca8d6211efcd1c66ce46d1c3cd4fe497909735562f2000000000e8000000002000020000000e604d9e982ee37d8a8d23381252c7b75273fc855a1ee4d997902fe90ba60b79b20000000ce78003afea2d733e9c676c2dadb298135fb0658b0e62821e46df9ef929dda19400000003c2d6f709c4292b9b77f97d6fbf45e5ca5aa4bf2cb7d671245550a966b7a81ffd3bd8661384afc406110634ee491682d418d603e63de942573a0925b75a6dd57 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50979a9fe5c6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425471083" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9DC00D1-32D8-11EF-964E-D2952450F783} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2604 2076 iexplore.exe 28 PID 2076 wrote to memory of 2604 2076 iexplore.exe 28 PID 2076 wrote to memory of 2604 2076 iexplore.exe 28 PID 2076 wrote to memory of 2604 2076 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0da01e7e98ba3f930b45fe165c69f3be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c58457cf1c4858d43a105c74793a8991
SHA1f676926bcef74f7103ba064c27bc4d93952407b3
SHA256a3022c1c6347c46f46247a58d859a9bf3253ca73ee24bf10e33a229f52f9c192
SHA512d2178b94efc78a0f348b5b9d560b9fd8b3918ca2422c3d0eb8fea7b3f5b6685f81626b05d4abe080d22ba08d08e786f44599cfedcfe498fa53be134de6f07fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598124560371035ad29d52e0c5f1b9818
SHA1e06e1ad6dae23d34deb30a8d17b4005d58359ac0
SHA256b96062a2741b6a67a992ec1027da582d667155b1422d12ad96887fd95eb2378a
SHA51202d7f842bc3576657c2d981c3c2c82dffdcd10edb4cd2d1063098d2b8c339830edc3cb3aeb3f780694395c1e61ff3c98ba8507f9489e71c664e06ee7cb979645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a79e976af1def00bb0968295f69c5e51
SHA1ad4df083f20a0336106ec9430ff22e97db438a3a
SHA2561e1b2611c7c97397b688dd015d83eabf33922f6c846e9cbcb42fbdb9347e04d6
SHA5123ae2a0522cbfbf22cef0928a5c943b2295763d36ad4ca2c5de990cff4970ae942f503ec0065853961de18ff7b2ea960dec3f076a4b0ab6f4f2c27a6abecd8e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5868d32f9ad7ce99e55c4c7e8767fe281
SHA1656d505caee4dd88be43135133a4c32beb3778e7
SHA256c1081d70f44d3b22429e7fa9adaebbaf73a4cb02f178ccb1a78e40a2f8f2040f
SHA512ea87a846d491f4e9701431c6b706ba71b358e9f59ebc9feec83d07f80380b6790cdafd9ec000ded5b63b7d5682d24301563e33be85cef647a0fc20e25951779c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d36013ac16fd14373cacf7cc9777e6
SHA1cfbc15e4a524c0e6fff110c55776ba2a38bc7257
SHA256c358bb3d31c2f9bae8878615a37504e456a1d35551170e42dfe1ef45065bb0fb
SHA5128f27684f35b60cc6875852a095c7b15f15c558b1f9330030d0850d39cb9bc3f9e02041d4eb9b92f75a089afb28c8ae5d3ad2a728b555c8a2d01b08111485a613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a0fff9569b11a28de54060d29a3ad20
SHA1b643004008c60e239630b3579e1ad40b01473a74
SHA2569342d0c03f2eeadf990a8e42e4178d2e82e23632230dd246ecedc139a20a2d9b
SHA512304cb0c179ef7adb4cd2fae11de60bd763f0062d40dde45e575968294447e32676c8f273275a1ee3bdcddb6f7d0566c273d32d1ce3d6a6905b518ad0d5b5a5d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5487a3f411a3a3c0aa4535ad9802c8e80
SHA12c2157ea1c83d0b2d73026365228a25578c73a6c
SHA256826edbc6fc8a9df18bad691d7aff9f09b7e69007f5dd7cbf9848f7be05a064e1
SHA512f8b897eec879dbf5a5bd972cf54281a10583dba8fc72f028bd8f48ab4520d78ec532846b8a266e04b929c0a885176abe746b3eba1f567c2ac33152ed641f2d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55741182dd17642e85af412eccb09b2ec
SHA197db6779294dbe631f0acaa51f56a4c9acc80084
SHA25624177f2d27116731ab88046f901891b62bc50b211c15d4ac20b8698a3e522e54
SHA512b880f579c8450fabf79d754cddbca963d580a1a25aa9ce2ae4de42fd06b782c0b84084d17bf2e9a89ee29ad3645833df36845f625acb724e8f33e3cf00e2a871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f37a7f33343d433bce87e504f47578
SHA1a8acbaf74d77c411d3d5b9d320ead9e355fc0d2d
SHA256ab1d255906d449b8986ecfb026d7a13fd2b7e936e60aad4b4bb5e059756d5e2d
SHA51209ee400ee15a69766ca2b84b02ae0dddc40f27e2f9b3487de9aa48a36fe777273cbaf5fddf56ca60c7d18dbba6492192c40be7edda77d330e6583f50ed69f688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c41096ff7449fffca6496d807a611dc
SHA1af821d4c5a4fc4fde94f6ff6d8e5cac82e9d6114
SHA256c48c5d4c987ecdb38d49e74d4b01faa4847ba3e3cdb4fdc490805a26af27ba1b
SHA512dd5f5aeb093a86a37bd061104e2d2f80e3098349c0eba9d6be8135b99f6ba970d0a2f2bc22680d356f3f27fef1894f9585e6bc093f7daacd80e42781fb5c97b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5188bfbf9b1c893ef76dd6e5ccf854744
SHA11983e86cec01a3c5778549ae82b7590bf0f80bdb
SHA256fa9be9f457e90f1ee0749cf049b6cf88c34b1237e409974ca1cc4e1d00f04423
SHA512141e9e784f332e9b01a12d4d4a89f9e6913f15ba0a0909af2b98673c12cb5e761aef323f24e30ec7475645118e4f1f3cfcfbd2e375cb07c6278a3ef0182dcbdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e272bfc10dbe6a2ab4d835c25bc1bd6
SHA1558b41d5f9515a061b1f6a4c8818e2c747ea2de2
SHA2566f1a9e8a48aa16924720501f463aea96bfb42fc5a7a602048797b2b3513d3b76
SHA512b1a7be13c6d0a8d72ba5f99085c60055e5c37d89db3d8c8cc245d4b638ce29c7c7eba779b66e83cad8a938c7b13319c650d3e22ba29c18776e8f542ccaf41fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5167cb2b39c68cf9b6016deaae0e145c6
SHA1f8bcd804e29ce4e5118f1e02b183a44308aa5590
SHA256f4cba16d4cc012ac66ea178644330063153a07fe7e290ec0803cc3ea0f124860
SHA512fe2c057536e22a8f916f70e5c1678876d4ae4b3760341d283af31e1e5f376637c561325e337261950fa1d98dab5d20139b0d84a8fbd10da1b27899b3d01f1659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d7217b64d2d29e243812ab3c017b53c
SHA15145c262aa7cc4b079d40e985f3aa3197dfa524a
SHA25626d11bada1fc3929f735a33a65d8416a65085d3cd37c9f701e8c15ffb94bef37
SHA51253ffa3b60d53b61ec1d21414abe407a938a0467481991c68835086059c1735f1b0aa13bf592fbf23d99f5263e8211727d56414082076e64745f9b4a45c932e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f35331cb24647980d08f27c6a6389f
SHA194e17f7fba4091621058c94e6c61e964cbd2eef7
SHA25685e1268a1dac73165326e63de2865621cbaaf2c030f09ccbb538dca2c41c527d
SHA512845a7c72a1717b0f5b9c46d94442b82ec6575008614ff75a8d5a0f14be301651cbcd49138e961fa358ac82dfe72e2aeb3dc782f7ae985dbd97863efff63ec2bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d7d30eb66c20922ee75c0198d51a55
SHA148d870e313ee95ecf97942d34365fd6970d79c1e
SHA2563341d4f62a1f395900e366a0bd6ceb01718fd77635fde196ca6c2e9643ce08e0
SHA51245b7f476578774ced8b1708fe71a1c3228d45f6b5ea905cc65ee85d4f51f55fd4a35c9e7c061c38cbc14cf65cc8e668219f6a80ffc9481268b6fd00853eacbd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bbdf8b38f1b89d687b543f9018e400c
SHA169acfb4252062ae940b073f4e10592f76ee45614
SHA256afba85ba30199a71731d96d201d982c8209ee3e4eb2df2ac1e34a6a843d44f45
SHA512731b5a2ce2d79e8ce1ffef56e01be9376f0dcbdee242f9fef888ed7ce08f38c4d0e24ab5d6adf16fe7f4a479a5484db160d828cfc3aecf0fd574689f63594293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b211f5bfa4a9b2a10e5149ce54a51c0
SHA14324c9d445c2f567a29a6d9d1506972347fb678b
SHA2561abb4520d098a03f5875e2d9df45a5873b02bd37d7d9ff1503f5e07aa4c77a9e
SHA5120dbb2f36700128c4b0a587b8f6d9692e6e47fefdd736e5d8fea10269a69b00512213b1eaedbd772f282b29e366943ee796ae3bc627b29ed0525477d1d60ecd6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c44b5ede62acd71dee4e2715248fcc8
SHA169ebba245224163970c10ab1aad5daa26a3b1e95
SHA256304629d511498cfc5e9a2870c3baebe235719e9926feb0e440236f01f2629382
SHA51289381cb15e8d6f4d2791a7f79288a129a58167e526fb3633d79ac9dfe6bd809b01070bf0345d2ccd60ba4f318ce1adc657030c5eb535d9a19d60c42980f67440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d79f13c31db740024307207a02a8d49
SHA1f9466c1f436d1eb6776cb48f506d3bdeae17358b
SHA256f775d815e5efda76b45ca55e7f017d5ccbb7268618e10e0fb2c6f2140ef08782
SHA512d14f8a227577a20a1d450e8ecfbfd1d738b49fde18114bd9d605c1c11cbd07f9d8306f75689b002aedfed7434262d5963e3e11792ab5c7ada8e8871a1f17620d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b