Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 13:48
Static task
static1
Behavioral task
behavioral1
Sample
0e4d5673634bd585e0f0d3ee277bff31_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0e4d5673634bd585e0f0d3ee277bff31_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0e4d5673634bd585e0f0d3ee277bff31_JaffaCakes118.html
-
Size
11KB
-
MD5
0e4d5673634bd585e0f0d3ee277bff31
-
SHA1
dbc59cd39fb6ce9fa00087a75a0f833a80289ef7
-
SHA256
9e1d05c84be475169975b6f3685c4d1ac53558dbeb17bcadd993fc95fcc3d5d1
-
SHA512
3f046d149b9f7443aa80c82d658d1edf7ae74fce68a844ab7246ba7ebc94f28c1c1400e3dd7d36487ea2cb9abf822e37b83ea3d6968a2173d300536eb2b162c7
-
SSDEEP
192:F+D/K7zbSGC6b2INaB0oloB/JuTUEnnE3KnXEzSLwxYIFoJ8sk:F+D/K7zNC0aBhoB/sTlnkIXn0xYIFoJk
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{985B0491-32F9-11EF-9DC1-C63262D56B5F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000004b00f8a5464dee3b24f0ceb73ea45fc85573f954b3ed5d8e2613bfddbff74a0c000000000e80000000020000200000005836f826f37186f5008a324caff8ab357f0e8519e7ad5d23e72529c605949a5020000000d8c75b09f7cc18516497bfcd08fd03204a82f761dae0a54a0adef58daee910e9400000002e00eee92827d2e928a786c9fab44798405feffdac33b544ad45506c43748228dbfc1abfd8620b604abbd2f15447815bb352efedde8dbf6787911d532d2ac232 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c094af6f06c7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425485173" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2096 2052 iexplore.exe 28 PID 2052 wrote to memory of 2096 2052 iexplore.exe 28 PID 2052 wrote to memory of 2096 2052 iexplore.exe 28 PID 2052 wrote to memory of 2096 2052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e4d5673634bd585e0f0d3ee277bff31_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bba8f4cc11ef7a2f4136addad5144c2
SHA15bbd9c3e995f3783c9e62a34061767ac376759e9
SHA25646ed26e3011161b579a72cbd7a1b03d0c920e87df22ad795b98d859d1c57997f
SHA512e7deaa697df1f3d88a4e01517e3b8f7f0fd93fa4347bfb77fa45f5c19fe056114a182e5705103b5ed8301106c8e413771dcb32e43a9b0be62398f3cddcf3c68d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7ccaf91f7f0371c51203c5055265725
SHA18e474d5855983934cbe5ad27cc97abdc3873b4b1
SHA25670510b7aba5cecb2adea5605b3e959524f687d4d40a4af0eef58cb54ddd6ec8e
SHA512584557a746968a5cdb73e5ad8c765622a5461727bb886a1795d9503cc724e4c42d16bdc7575a561914dfa06faf4400d174158084c7f9cd473aa1d15d8434a5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f850fa4403fc72f02220bc9e081b7d
SHA128ef5b7fb67d0df1dd1f7382919936395871f936
SHA256710afa694056dccd697692a5c96533786ac57f8740f388ea9336f4380205ed7e
SHA5124f015e7dd1b267d526e585aef83c7a5d8b8eb8425acf933a95d6093514419f61f4d0c450affe8924dc60974d7db167bafff61c5fd2a6eec604f69314dbd6752a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b23be89a8c8720d0d705874fe301a560
SHA19ae47a4f40437fe812c01b3a29ac96591b0fdcc0
SHA256f1a964d93f776590e6ef5c6173a81fef6c92279611c658e94ad8ab9fd88037c3
SHA5126c4d234e38076ccfa73b0b9f1f7411025145c253b5e570ba2a966924cf35a426a23c4571396045e20059295724d54ccd10896ef3d0c9a4764b6af87291f0f542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8c3ecdb83db1d4fef4d8ed3dbd01973
SHA13a3f564ff11b1fca11717a9e8038cf794b0a0ae0
SHA2566766515cdfe6c537d841f0b4c76f3a7ecb42c85f35b987c32cea24988be161e5
SHA5123acd4691f92c5a17df602f3316fc26dcb56cdc653e1f40edf763a9bae57cb495c2bd89b4d871865d08d0d6e18fdb75d8da76debfedfff58b389ec99d39cd6368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e8e81d4d87539faa6e65a5f183a9d8
SHA1bf7cf9d086d0640f703a61ce034ddf0312c909e2
SHA256bf9d8fb1c46e83cd503176e39819023be0f6b3241c6ac12a6b7b9b2a14809f49
SHA512759c68b0b896dd14bbac97698a56dbfc3e85a9bb7e984186050cf0acb7b7e25a7ed510b9193af0e75b2a0724d45a4c773c4b5fc991a3f089eccbdd8b144db871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50283487c428b204305ed2e2bb31dc2ff
SHA15e0fcce7c1d5101f56203d92c12a07d23dbecf35
SHA256d82a27b5a6cc145b2821a1f154d18355024a051aea12138cef6e4ca75183bd9b
SHA5123390e0bbe5ddd0765c81e6051727c92c02db882d4ca63fdc3758ac9b17439cbdf9e9101b7a285928551687ff5663eb09a35f91c2711bbfbc4d9d7f99cca0fbdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c3d17e9ea779b7292df914d7ecfca72
SHA1a72fe5b0c68d3bea42226488ddca4dcf5e79b5b1
SHA25618416af0b6f4901fe5c0decb1a4b7aa48cb8cf4409802720ba31ad255bf292da
SHA512f550bc3f467fd35752efe94a25828e8184d97f423bc80e299bfd0f4ca4581ae185022f29c0a95ee7be417fd2abf1d3e570c0d0af9ec7efd20a200fe6bffed7e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50122376a09a04d76fc04f92d2dac2352
SHA1b7b8b3c3dae96eced21759c3965ebaa54b5964da
SHA256f0d407beec2bb90cc9ccb75d0d7c7fd8fe8a0250d8e94664833dc0f66ded49a4
SHA512609e62daf585cc05608775c18f279d81de7c33d7500eaf6f7f336b4d40a2519275cb72a153d5791946f2b449850ffaf0dc32dd0689c1ce7b216d663349f21b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595f5ad5ff25c82df14b158c88fc3ba9a
SHA18fa8068ded1cecae70623838a4a776b1049996fe
SHA25678131c57dd83afead5bd26398fc9b31b3b843744024ada19b6ddc75ab412cc86
SHA512e3a4cba6edd1eaa44b4aeeb4501d680f6905fd01f7f1cbf5f07969844e3d58bec9117ae1d8559ed1e3cee5448628797fa284795c43cb75ed6b919390b156f524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573f07ba8fe07a7aaa7f690136fe57039
SHA10c7bebd44cea4b805622c77859b3ec97aaa3bdba
SHA256e959351604b29992a33dfd3d37cafe22b3dc2d508a2e41c6c88abb056147d8b3
SHA5125cbedb9e3c91470c6a2c3d47639ebb5603ff42279835dbb6d727c5d980e7cd14bac0d9c8d1f5f36c4c7cee468403ff9a01c3ead77695e2187a32c29fc0187976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52df264415796877830c25125531f759b
SHA1549212f2c2526d7b86e5ad072c1549e68eb825fc
SHA256cad1c5b27cae1aec4dbf20da0358262b3aab2923062271b96e15dec858e06668
SHA51264511b9af7979ccfb5dc3613257d9a96308389c89706cc4fe1d48c1d035859799447da601fc6530c0c400f84361ec1d94be12a7817904aa1f1540a845ba8c818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54608835da10d6eba2592f8f550084224
SHA14f348f7caff7d9a6ae8f57370e92422520afd15e
SHA2560ea405e41ef47eb5da435f31ad3a5a5af65ce28ec929798673d3402173138842
SHA512ca6abbefe02901e0d4c7e44ac20f053062a5a4d41ea9bb21922f3a3b251fc45aafdd30bf9f246fcb59b2914e48a44551d8e1508d93ba5daba3980f6673970895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1bcab27efbf6a2bafd29d930f07b883
SHA1b912af0fcede2e18325b234c1b751d30fc33b7ae
SHA25637fbc3545c99397cd1e715159f6927e44dd24b5059ecc59040217b5a7c4928d4
SHA5128c39312bc2a5fda56ed74a04face1071268ad1b42ee8b5388f58d66ab4794e1dc14d98e92a1477e1d81e2e88db5f426d267172b0845c2badc4e025ee3a4b5ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6cb4b1207e72e590cb83fc6be887966
SHA109d8e9fd23e324007187dba3d90cdfe9834bfbc2
SHA25607cb0a0c25d734d4b0546eafcb64625443792833b8ce60f17525fd8a283e9e14
SHA5125f6754157f70d786fdbf147daa46ecf59c5f8afd8bc84d1c56118a14bbb0450a1e59833900681909fe476f283b7592fa1e61932bcbc8e471f5581a6a4fde3af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7822ef57382ef5bd7cede6119e80f5c
SHA10c7c7a44287d185f0031f1ec724930f6067f2ab1
SHA256484a005fee4a939d67d8ee9266fea5447254c0be077aa99d9005ed24ce2bae72
SHA51264ef3c66cbf44bcdd92f2ed3862cf0728396c1552f69aa3c54caed95050b22f7538f392ebc47c804bca357411370b5d8be52a1220b4b38df9829bc606fbd99d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124322c4999f3cf3e75069917f9c5069
SHA10b37febdda7a6a116d61e9849fce786fd6870635
SHA2569d71be9ba24f7fd9ff15a5ffd17fb62d75fe2947347817b3c197bf0075737d38
SHA51219541decbe8930b6ee4ed890ee8ed0045c810ee294b3b4155a1f2047df54ebf6be2bf94aa2c38a112604d44cfbc847c392f48be42a4029b90bf777f9e2a50802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbbfe3c718d5a2f57b37043374dc5a5e
SHA1efeafa591180de24c44bdfc70b88fb633d012925
SHA2568d58200f3e996f3fbd913e4bb7c721f9c5697ea96af6c6da36441d459ab7ff55
SHA512db8b466524ac6034087362039bfeedd036ccc67157a05e3f8c27b7413b16567ec22b8cca94fcb41e8c5a2292c0fa7c6ec71dba78f804e7c30072378ab80abe9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d82b0b0578db1e75bc28b593f31fdc
SHA1b1f4df180401ce614db1a2fea98cbf4a5a711ffb
SHA256c3cc13ff3c99b76ddae13870f9ae7f6d6e3eba0c42711a7877a4d3b0ebdd33b6
SHA5120df6bafcc01d574447d22004a80421ec9a51e546e2aa6fc18e6d14cfda1b0eb7003c1fd5d42b081164e050a028a4d23a8e13339090dc7eb8850c85024bb3cccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569bd62098a27822879cbc3236cecad34
SHA18a3c1ec8770eb05fda995e4c340eefee49622d4a
SHA25679d1e754900a9a4fb4a660203794a1fbd60de838a573036be3e21bdb98f48c5e
SHA512863391d1020585e5a979301b4fdbaf5594ed4620ea57b98c63032cfed55a816c02bda87380d35f016cb23a96b14e8b8864ead6696d27fc9ba2d7c444738262f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cbd24e67ca40d41dd0f4acbb4bd1e57
SHA127861007c553c2976010e21d73b9d3fec070a600
SHA256e11cf95121be5d8ffd251a9a0997514d729a6823979e9f958a627512c0e81955
SHA512cb454eee261a015dae5c06b7ee41122c2d45d9e262e43206798d65214eac159e839588569a3a64d6f3b196891dd629406344d9dec08289258ce4de5c83153a28
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b