Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
0e1d6d3c651eea268c11eb0fb851fb0d_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0e1d6d3c651eea268c11eb0fb851fb0d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0e1d6d3c651eea268c11eb0fb851fb0d_JaffaCakes118.html
-
Size
122KB
-
MD5
0e1d6d3c651eea268c11eb0fb851fb0d
-
SHA1
33c08b6ba95650ed43d97df7e98a71f43022d804
-
SHA256
600819f15a2bc68d8938842e2c16fb2235a3540766d08116dac2c6f846a88e17
-
SHA512
0251da2ec852ef8674b6516798ee9fa3a4a6f377eb97d480c070e19fb17d1ad97d81d6213a2b2b02e4879a967eeffe9cbc72b98e7aacda11fff9a70460bbd846
-
SSDEEP
1536:0k719fXtyyjIPOYySHfHjqEerPkw+2sFPhN2NQ:l19fX3je4v+2szb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000417bd124c8f7af31d5acc8709455cba88910bcb16d3494dec55d3a731c0d3f4b000000000e800000000200002000000079802183e412275783ef4f658e8933cbe47e2c2e5b063d98d0a889b5cc387d942000000091ccffa47da93d27c381c9e9bc52ba795d915efdc317c59088eb62f3e7cc105c40000000d7ef5e3001fc7999fd72635fc7378b23568e29295df4aa84b82860c4b8e0373cf6939be1932fe3c1c9f5f14fb419da0aeec8573d7f87e45f5cd247b9e9c39be9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42076F11-32F0-11EF-9B2D-424EC277AA72} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c2a62dfdc6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425481163" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1732 2540 iexplore.exe 28 PID 2540 wrote to memory of 1732 2540 iexplore.exe 28 PID 2540 wrote to memory of 1732 2540 iexplore.exe 28 PID 2540 wrote to memory of 1732 2540 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e1d6d3c651eea268c11eb0fb851fb0d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b1d8d19879d40c15a29cdaa50adff1
SHA1172ba958dc775432caaf2ba54bf3d72400040ac9
SHA256f6d56937b3e89640a334e8c31cbded4476c2aaff5efd33a26749199daaaeb44d
SHA5121722962cd371f682df259b564be4914b419fb36f5c14013362fc3606af045689d0de04fe42707fa8b2a352af51caae7d59a7c6298911bb4cfe7262412eff33fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca7a51c426ded764c752aeb8ce3ca1a6
SHA13b3e5dddab0dd8d5962ed8a2cd06f2da40d149f2
SHA2567b418e54bc41b974d4b7a6524714d884276a6574cad189a790ddaa2172699f35
SHA512df81cb1706bced101e7f8098dda325b3c8201f1afca769734ff4d4ae9f5b658711341ce844a71bdfa0aafef934be7f3fd6c8bcba45ee74e41fb4b50dac46de6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bcbdd2aae1067f68d9f142d60880370
SHA126ac931bb464c89b5cee1321b80220c6de2f2ed3
SHA2567f959da14b498949bb2e3ee6604a496c4129dc9d08dc99e6d7561f92242f676d
SHA5125266e85b001cda1243031d8b90c1dfecb609fe6db277d600e8adb8e2a44f91a11cff9761061d0689c8ec84bea8750b46c6f3f6d34ffe1370ed51b4703ee66103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff9cc58d0b8f9993543306d1d8a22c65
SHA14dac8675aa38ff353ce5bee56cbe0705dc14be1d
SHA2564a6c8aa899ad52b998b30b6e67ebf018bfe80d6892d923794c7a3f829d9e99fe
SHA51255b9f6ba7d9125dc8c979754fc90b358482553a1a83931881b10b631f5187e85d1b2d8a14265c91fc02ac7db5cae4bf0bb7f9d649317af257cac771c0e2a87dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e767704ba10e0f272a570084a9fb806
SHA1319dae67d8c98e32d48146ff17a98ce38c734b18
SHA256d0f2a46acda3ad9085041162fbba96f08db361db9a2093c30b5e084de57bea83
SHA512751ef003bd89f7725eb8e599ddd7c7d617f83e6344a6a61bd9e1954500e72c95f30015a1f38267c9c8ec63a9185b9516fd8720952686142212d7d7e1a95cfeee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faed2be58b910277331cf418d75bd243
SHA1ccd7f8bedf7b59564ada97f2a19e8815b9acb10c
SHA25606af5825854bfa23c5bd84b2768acc8b8229451f36e32a99afdb23438cfad5a2
SHA512b87bcd523faaa0628f74e4d864d4caafdee4181b015b0fcbbfbad0bc6398f3cafd7c3564381b413c3f6b5f92d96951b7651e86cd6bcaa90409d91effd81001c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552be875794c68b35daab0aef901b7e55
SHA124a230e4ae9fa18b84531ccff016c23de3b898a9
SHA2563860ab509452c3bbeed93201c38bcc8c4db4b48fa96f0efab362979721453d76
SHA5124895c60e53f4bae7de69d5598bf1c145177e7a9fd8db32451121005c1dab2130c822cf746151a87cef1da5617f35960c06eeffc570d9352b3cd0e1193ceb2a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503e2a7ba915b860c0ec388a05a85e9bb
SHA1485a1b800f045d41a3832e5caf0eb05a8b9e82dd
SHA256e0ef38a08092f26ff37f86f162cafc0760db08a50d7e5400f1ba461b6ce023f4
SHA512b86f794084320741570da7aa0dc7e98e9f3f6530031016254fa7356881af0296fae39d271f49f52d54ad07b95735f48c155cfe44f004fac9b9077348163febb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529f59de1df14c1c884e4dfb83b105aff
SHA13174a20fc153a5bd2ccc3473e7583ef36a1f73f7
SHA25610db497b39a04abf5a7ec1b0824496bd054d02c92a87b66739f0327ec28f6e8f
SHA512d6eebcbbcafbe3fca76051757237af5b552a8b10d153bf8dab0bde5ec57a9e3a7a69b52fa58f85ac224a1f1e34540a1a9b53dd7a720e087acd02311d3c2f0f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d429919f0918b9a94ef023fae63ec91
SHA1ca2c25b63e8efa28c3b6ae3b7cb57820bae99665
SHA256d95bc722fe95b7872d459f8ba1e4e3559c54d14716781dcdc306cec449f36cc0
SHA512a7467304376724eb8f786071cfb0fd66b6272e328ba41932edce5d5d911678f8110e2bbd6c0448b846a26f57888c0f7fee7ba37f4377b961c1dfa475b7ffb1f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec121fa8248cc0725e7c972552ff0981
SHA1f033548e1577f8b8b549e47bd445045032008cce
SHA25696e57c0fa74ae00240ce5a67d6a3f60204e47a60b4b326f8210c522eda7d53a2
SHA512888e217c8ec5de45dc1b2b90e932d24ebb8094e99bfb258b6572587bae0c34470ad165205a87f83e6da19f2d3fa4a6ad55058e0d1ee62e05b4a3dc79bc878b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516bed04bc55363d6b7cff638da209742
SHA1afc6246823fa7ec9b35625f4b5f2cde1b06a02ac
SHA2563996fb6bc3523a3919b8a726550ee5f32c5710595bb393a5af9da4ad7215e534
SHA51225a8c4fc91fa9b8ba671099b4a192efc31b746b6c92c2d4850f5dbaefaa474acb9fc7bd31d381c14eb3a057a27dae0793a909355044c4c54e2b579aea0220586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584fc327882374904ae450bbd8bb83de8
SHA17b742ef1a3e77248f7c20f058d893a5c48fcf81d
SHA25601488f1099792c8975a576ab1e1f07b5648a731d59910f0bf37d69b7c2332116
SHA5123e5bd495d44086820fa48c9e232869eb6eaf951eefa95dd41ec760b93097acbbe1c08248d191f0e81a5df093af7cbeb57c71a6b460ff665ae78f5a7ceff96824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f07e2bd53b0e59b4804b94f3ff2ba9a2
SHA15d02256c987b23ba461db7982072ad27d1e69185
SHA256f6657a714d9da8d7b84400002b436b9e729fac1c9db20ae3cfe6d137d9407e17
SHA5121ec866d900cd6db40f8e5f66e9393433dc02c11061e6fbb644321d3a10370190d7206d6816ab3a4fe2e3146da0af2fdb0def712dad2836a1db5cc38cb5a5a774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560f4c8b15f590e6a4b853ad8e942ef8f
SHA114670e53457481e769a238ebbce8f6f14c6d4ec1
SHA25605443e5805a67f98acd73403a8657a40588b955a5efc836f833c22f671a21ffd
SHA5123025dea8af88293cf095f61db8caa6818b06b021df75d8b24cbf630316bfdfeddf36473be745ad2fdbabd8feeb7341d9eb36db419200ef15101a62d27f79e9a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a45f7d86b4af499dd3efcafe55e9b40
SHA12b8956e84814ba772b908c5700623b1954c3b0a0
SHA256beba2df0415df8424a5565e746ea09764230cd3562173ee01482908784fc140f
SHA512bd1b1d4da9d43f1e9dd252204825f79d93c3c2d77972c6028401a04f736f836fe8c8d50d3c0f03fc047a65f3176ac7de48b2b9b5e3f2cda36833a6ee1dc497e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4d2eb1cc937d98299d7b419afa37513
SHA15b43d5e986e3e0a4d6d27df2db082bb823429ad2
SHA2566908787d2ac14b01a01fdf27c838e6cc0db5d134ba393b83ccf9dffe406512bf
SHA51245ccbd942c0a1beb35b070e5b7c1ecc9859f2b5e0d368f37f8f86ec76d5c989544cf424b31c25f6d5386baaec0fc69c418f28ae09b80873686cfe8e8f212964b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589c34fb717843b9df3218f855a0770e8
SHA1610391b71393e47fa813f3ff92c486705c5b7ba8
SHA256c384c9fc7b1c235767455137d990dcffba1197af0e85a076bdf7e4a657ec3f5a
SHA51254c372ce8ee6d5be9faf58ba25536bc486ff0da93e6cbf59acb5da741f23eed8d5407d99b41e4d04665d4512991e76c6005415e373cca4fa4e17fee828aca5b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55df4c1a59bdbfe399ce98fe368454ff2
SHA1e18c68475a8407ba047a9029b903625428039c71
SHA256fdb14e7289ae22de14eb211d891c1fd8d16be4735c252087b8dca2273783d9dc
SHA512481ebdca3b5b7c60d17dbe4f3be591cd9bfe24e70103090eb7e757aee9cea7541f41483c23487e2030d0d5a43e5a14c19ad3ba8934fbecd7de038d2cae58871f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cfe79fadc07e131f395a3062fbd59ed
SHA1f34883389edcbc4c310f677209cf865ceded59c3
SHA256769fd06e5ecab00abf399fa7a9df318eb034d3dfffa8bb3cc8a4f77d0f3ec2d1
SHA512e88f4be25f86deb223c2ed4b779d7a8631e0264b0dfae43ba8b8efafebbdbbde2172fc20796e1b7f578b732c97eb600d8d88f8df544f5628c71a420302a579ad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b