Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
0e49a6db752c1ab30e7e8460571f427f_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0e49a6db752c1ab30e7e8460571f427f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0e49a6db752c1ab30e7e8460571f427f_JaffaCakes118.html
-
Size
53KB
-
MD5
0e49a6db752c1ab30e7e8460571f427f
-
SHA1
a1f7c306f9366b177de6743b5332e0db98c626e5
-
SHA256
594069c29d7fe47e81ed455d89fe10f0dc421befff45612695bf4884f4552f75
-
SHA512
1ff7398b144a85bad0440cab0f3eb0f0afc5a2f708482d87ffa67efd3f39a3e10ee5883408a26c8c39647312cbd9143b612252ead88d62e6c13def75dad660b6
-
SSDEEP
1536:CkgUiIakTqGivi+PyUTrunlYt63Nj+q5VyvR0w2AzTICbbRoW/t9M/dNwIUEDmD1:CkgUiIakTqGivi+PyUTrunlYt63Nj+qS
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c06279b005c7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9F5C4A1-32F8-11EF-9EC9-FEBBC6272832} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425484827" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000005541e2b898b8d7a7d708ef35ba7714479262b99bc5d81f9eeab4886ab7a3d709000000000e800000000200002000000050a1c27cb941db2003843d534a419365cccafb602dc0824f98b749116f3fac20200000008855723d57b68e30bdf4dcb73f98724df07d9bf83ffeda847db6e5dfc134141540000000e25c169b9fd1417741bbb7c6639825b0aa6cd5203d3f59e8c526571a0e87896b6ffde9e9dbc6e402cb4c13fb928405383094523ff25ee01b1d8ef7f0b5e6e08d iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1452 iexplore.exe 1452 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2736 1452 iexplore.exe 28 PID 1452 wrote to memory of 2736 1452 iexplore.exe 28 PID 1452 wrote to memory of 2736 1452 iexplore.exe 28 PID 1452 wrote to memory of 2736 1452 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e49a6db752c1ab30e7e8460571f427f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593508ae181985464965022a6e1bfbcde
SHA1073fce327ea4d84b86552e8d02527f83d69c3a38
SHA256bbd9018616a0c229de88fa2218034a4a1c01e1fa51b1ca3655428d421d417e55
SHA51264879286b6d18215cc1c1fc3e62379dd5c23e77ade18fd128e7779d59ffbd129d0312d1aa27ada459f2c520703916ef458dddbbef5e8f47692ba4c46a067216f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51594a54c6435685ea5cfc1fe0c76190e
SHA117f4bda5ae97edde006a35fcfe5e4b5ecf019374
SHA256a35cca06ae3cead771e563f45a5fce29adac1aaa8c5b50ab1bdc65343e66a6c6
SHA5124f8101c7cad59c0e173ae3b0eb437bdac30c2185d5bb852df2ba9e2319f746b8cb3dcda8c9dbead108d35b4d57624aa38f0fac37a742108aa002faaee0faef1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5938898c33c73b0d72caa6e8264829e0c
SHA12d1bdccb8c9ea7f0e66f9ee6825163ad0d029cc0
SHA256b5acfec30e7b63479d2183eb03c6d94f62ec4c544bf9ec252700dab6bc7c4c93
SHA512508f02c2a09053b20ec104352bf09f7ffc1f5f9733e2d22d00e1cab9d94efeddf0818c856e880fd0075770ffae64d9ca8934b6b262f6c8147454888d017ce0a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aa494100636a73926d9198feea312fc
SHA1c990a9114f74966c2cc0a4a342bf1d058e5164c4
SHA25626a0c2b38f7c8b7d8d20daf0304d29582b0a184bd168f80e5573860ca990a7d6
SHA51225cdb674f916d15afaff757ce84515d53c6bc3d3f9174c4df03b86979ba8b77a16f89d9c7d75a6a99ecac4e1708207cacfcbc0a783c4d58a3468f918c45e83eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aede81a2ee65224b474b4f344ff0cdf8
SHA105ba01366965926f6fc914b96459c0229e279c68
SHA256d27d6c3991b161cd7d348f4457da10217a0c2e9b9b16a7ed5b713afadf228135
SHA5123be8686f6ed55fc01a20583c0b9a7166c75a526bab45621d6c552a894ed0f243344f86470b0d2a877471d4323a45f58186810273d72da41d7b3304ac025ee1a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fddec20dbbbbd708c78acca11c8e2e1
SHA1e0921743dc66a5918c79fc67b934578d752dc70c
SHA25693f14cc2cc6075c13bdd0a7aba35a6a9e8da017d37fd438ffe0fea22d0572068
SHA512eea111de7994228bb70c4024b14f642a9a24f1e148e33a120126cede17c3d7584d106b940f1469d27d7b37e1a83faf2dfc6ccf4f329c8d87a6feb134db074e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a44a866dbdb382d786da0d753c548fa4
SHA1ee5cd35a479280e82958d45a1db4648b2ba0d344
SHA25663f8fe504069de929482674a2dffef470f36681eff3d18d1e5d1973ad974f559
SHA512afba4c2539365a53a21505b10261c5155ed688bac779352845ab13b9b09acdc68120d4afa397a9caf3b8c06df0fdecdb3baae66537600f606671ec4b36cb8ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3e48ef348f35e21494e89263421eb31
SHA13b06bf6903a9286bd1a799190bd41f2d9690c1a3
SHA2563dbacc2323284530c96d852103ef712a7127cd1ab50f0d026afa740702ba8848
SHA512f4c7f506c9de6cbb9847b2ddd2f6ca87b19f24a64788643c07b771fcf1f7d2a876e7c1bc4a23e4cb7e3182a9e589c301046a262989570da94d754cd9195c3a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec1228542106bd7a669c1caaa86ae4a6
SHA11cdf053e9e152a69a9df1f5ba20676cba464572f
SHA2565a10a4a82c67fd1149758e7ab34fcdf03424087d40a0e6add1dfaa7faa104c07
SHA512ae1cafd050f46b90b8b792e9f89a937f81f661f2d27b26f0b5d112524f7f1b37229709808ed2612fa991ee3bf70b31113c2598158b1ebf97c313eee185240123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec14baa050e8165fcbec1b9ee97d9164
SHA105f7c57f47841fa3f098e06c85ed26054b63b754
SHA2561c2814d8b339fe3256f0bbea169517dd7d80df936ad2b52c57b2ebd0cd4826ec
SHA5122548d5739f8ad40c0a5d058690dd753f6ab1f1384f5b9726ba584e9f169565fbcf20225d1ac0967fc4765fb0cb5870756ab487de3a50dc8569327c5934044eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dfd51a612d0a5da8854dda84c75bad5
SHA157f9eec5ecfab7c33776ab8ceabea7bd190da321
SHA256b90a5988767009105a056b896263db040964fd2b872ebad6409f1d580b781648
SHA51211f8d87a633a57550fbffb635f202f2681d167de6aad2d3ecd50f3285b085cda8f4219ac5e449f79b99dbc726e107656436f1f2e229db1fbf136902163ce3224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556dbd1c477134f5e80f97c13fb0858fa
SHA18bf5b7fb82000c91815e940ee0a3ba11a5dc7699
SHA2569691530895da5507bc95dcbfe9cb0a0d06b41f17a719fe1e5dc4ac2c491895a3
SHA512e69383540794201bee96107f64de7db4095dfff1323e74fd7d236395d413267f956f1eddca5080ce97ceae70fc30e655c920dc2d4ff6eef2b7380c2c49059243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e995215b099d874d7c71ca45924d18ba
SHA1a46f3dec63600bbaa01d0f6f910039d354d96383
SHA256a437c29285c00c2b6df76a5b5e3cb104d96553c8d7265705aa0162b96fe202b2
SHA51266796f05f00895accfd4d3af4b40e95b2ee537dcaed086462ad039e41aa817b15d1faba5c5a626ae38a4756592ece4975ced1186c7a12d3259da470f74b5ff9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b8e576a9fd80208066afa8179fd744
SHA1daa33f456f03c244a3ce72c5713732e3911ca4b2
SHA256df2c32e74f08c11158ca29e0b7e0889e3ba51985b1068a22a9253d5c1bfa1d1c
SHA512586a1856a5edc9c01d27a21e55f9a1227c9401410419d4a2bf9c91484a3a9fdcb46172796408b02c8e81b641fb51515411b7bf8025e987447692799650f1ddf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e4e27dbbdb4ba8c8ec8e8a26981c51
SHA1f004d62535e573882f3856e8fa96191943b72df3
SHA256c2ca64fb236e2aa9dbe745956270bee675d4ef85e9cd37766b2576e4a6696491
SHA51258834b816c6bb0ff9aed2ec63a7c5ae06ceafcfee83b0bb5a35e253a656735c88e602573788a73d9f4ec9c64836eb02939ededf0071d401ae2726bfb94077cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2537baa9420a886fd92f7838097fd3
SHA1a00e7db7c6b7d7fa690713c83c90ef9e1487e696
SHA256035010e758f91b1bd92eba37b65da834edf57b87fe35e3fea94cf9573b9cf9ed
SHA5124535d3c350e3e3846f112e2df508de9224ab1c4a40609366ddd807145cdf263a3741620477ae8e4216f66329f99346be996cba8884684a5e52214ab269fb370d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba7cde072e3b960d26774f554b271cf5
SHA1233f6ef5f6baa8c2eb152474b0bcb87f15f174ea
SHA25693827976676e1b358bc76e6c03e852f1fe35b22ff251e6be83884fe1488b3bd1
SHA512dc44d185c712d61df1fea1e88d821badcae7436aebbb9327ab82837f4dde2dc806a938ea82df7780c9b76c20148db37a3f05c105f06574e088ed81a94b695155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55848aa98bb17b59cfda38cf7347c8ae5
SHA1d35c4256b676cfe2647d1b71636f3b3f65e4ad8a
SHA256b1feea57d0c1b108f063fdbe3a34640755524a6b0f631ee7a40820dc908c95ce
SHA5127535f8934d5834d3313d980fe3e49aae522a2613ba05efec02ee99bbc24e2feaba8d150e08648679048334b0d63fca69725e19514abd6deac1a1f312ff048ced
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6F0O117Z\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b