Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 15:36
Static task
static1
Behavioral task
behavioral1
Sample
0e9ab75e1baec0bc2a9f9bffd16ddb12_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0e9ab75e1baec0bc2a9f9bffd16ddb12_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0e9ab75e1baec0bc2a9f9bffd16ddb12_JaffaCakes118.html
-
Size
155KB
-
MD5
0e9ab75e1baec0bc2a9f9bffd16ddb12
-
SHA1
915ed90d8b3b4786d09ac7f13f4674200d7c05f5
-
SHA256
62e310a772df7bd90f97149f2996cbf0cc5761301dbc7601e8eecf98b837ff7b
-
SHA512
971658b75b977ff896220dbbe8b6407670efebb467e6f268e68ae06cf34a963f7feda11e537f0f0418095bd5becd4fa20ce34d675998d860e7e93b772317f132
-
SSDEEP
3072:XUcjvG8rMdcXmNRSSSOx3wfiyHlXBuFy/dEBjLFbAWd:lrXmNRgFXBTQF
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425491684" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09d349e15c7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB8D3051-3308-11EF-9A64-5214A1CF35EA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000000af2d9e4b043c1ec8d484241404727d2c4eaf5d450012b7783be7bde41e21156000000000e8000000002000020000000433be9d637b3b6573ea3e8520bb8450a39b6fba31a1d297625518f6c5da4f2b0200000003ced56f295f8d0e7545c403cbd690ce138c17cb57abb543981de7bfbc83e98dc40000000561267c86d19a7ccfeef9630e2521707591a4081c18b10f933e9db50ffba07ed3290098aa4114d783f9f192d494505c076d4ee4270f857f8b07394f66a089cf2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE 1252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1252 2404 iexplore.exe 28 PID 2404 wrote to memory of 1252 2404 iexplore.exe 28 PID 2404 wrote to memory of 1252 2404 iexplore.exe 28 PID 2404 wrote to memory of 1252 2404 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e9ab75e1baec0bc2a9f9bffd16ddb12_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD58d1040b12a663ca4ec7277cfc1ce44f0
SHA1b27fd6bbde79ebdaee158211a71493e21838756b
SHA2563086094d4198a5bbd12938b0d2d5f696c4dfc77e1eae820added346a59aa8727
SHA512610c72970856ef7a316152253f7025ac11635078f1aea7b84641715813792374d2447b1002f1967d62b24073ee291b3e4f3da777b71216a30488a5d7b6103ac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD579508399e172eef61be8cd9465872eee
SHA1f10de766c6fc61059544395b97a60135b1f433ed
SHA256d65e75c2f6ad932d12079002aceecf4e62f27b42591e1f153d036a3f52a56cd0
SHA512a46d58916ce63a03ee9c647b411b4bd78e0283eec0c3e2ef270d64bd30192dff72e2b8d5949ef6d4632b365631c05a44e120d59f1b81176985569a40099a2d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5fd97f3fd0bcc90fc4ba01f6426201da8
SHA15fa6bfd6010f96ecf1cdc47edee16e41cbc1c97a
SHA2563f27eeeb174d28488d17b5c13031d7f8b65043fcb0f35be3b65258f889654a35
SHA51284732bfeccadd87de44d04dce9e0ced5d5e5511a2ff36cdb3d4c9717d26c7699e5ba481ff4de8927577f60f72c285b7892a79766696ac472d1d75817f5ec1b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58883e7d4149edc5e24ff5e37cc8567a5
SHA15ac54ae27a88348e1037c62ca9a605c617fc7a75
SHA256c5deb45553f731bf3a1e338caba5122441a21d498c7a9eb612920228047460b3
SHA5128bb09de36beacf86774fc736046d0b350f8052834e13f2e1899b8be158beb958def6d7613a617771d692a9e87d197aaafc7d92288d46e7d969fd0c98bf7ed75c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51748f042987431efbf408660bbab951e
SHA1b66ee397041fbb3c36ab4852c1effb165f31f152
SHA25669d2bc91e5a36ca75ebfb681bc533f21ef68b77aab9af56fba8cf83e28274ace
SHA5128152ab325124a3506dfeb2c2aee34fccdf7abff16aec99283148695ebf039c8e3513f5bd11c488ae5b1bfaf3c60413231273b76223afcf17f741e8abac4df53e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2b246917b2ddfc936a0d57ea29f4d27
SHA1a7eadcbe86bf5bee87db8f096bd8ad5717dea237
SHA256cdee2aedea03cf24c06e7f2a7818e585dd088f954110405e461748ce0dab5ee7
SHA512b189da61e5e4af13961314bb9e87192548ef44c260877c8902d86eb715a1faf46112b6ad74ecf583c76f5a83a59413eeb09f5ae5ed7851a0ab350844a91e0817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c90ff50ba5e08bfcec3d9f3d3795183f
SHA15cfb12ae2ab7361b0172e180734d2a5e7619e4a2
SHA25672bd5799219a6f6821f0e183c319c2a8bd333af92c3d5b2605e6ecd5d88fc132
SHA5120b01ad2439a7d18575594e06573f1bb625b140c106da5106b6b823fd6814fd63dab9b8f51ef372f2cfceae23a2a922e9e04769590585523d62d0265fd718e4c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5223068be8d6c043a83e7e2644f9fa775
SHA1bf07b1a4618fcce99322bca2f10fa605e6569ea6
SHA25681a6e5c92bc020fb754c589f51128da32acff60b2e32c92d4457b6531664930f
SHA5127500a66ce661c88e619492c49ce621dc4ac3c514e5653ebc9d46bc2de62c37fec37c6db1ed9b7645035bb002d99fc2a73a4008c362c21a9ee22551d5f15e1013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52749086362f5223f118099554ebc2699
SHA110f3c3fa47ef3f70a8ae6805fab15a4ba6e48575
SHA2561551efe1e0a659d0362cb5fe687f6a87de61853641ddef2d8c340e8592a18dba
SHA512353f09be5135c6c5ffee69a7bb1bcca9f705dbe13d89dbfa7ec8a87195b28fe5204d21152462e5efb8a5d2f8b80d17f41a79786125fe32d7dcbf7bd71f2c761b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5507f9be7d712acdf6beb7864d21f6994
SHA1bd2f7b34c50a8ea507c8c798edace383c8703681
SHA256e7143fd24c562cbe580df5215896f48b58dd9acea72e1a9f3fb9e390333cae33
SHA5121c4ea8149321298c4005aceb72bd358af304d7ef1e101f24bca5e35787eb19a8b30e09ae3101a96a0252ba5b47c43e79ee1465dc95516743648a781f180ba919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c99d0f627c69406f1541cc50f680089
SHA13e72a537baca5479cc7ec8031e47cca6c03dc240
SHA256f204089dc85ffcc02e57fe17652e62649c416ad3129b9ec2c0b0c4cc41898e47
SHA5124a8e24c0dccd655152893c488ac1c2c24ee23e8c01e4268af05616f1aff2f0493ed51658d19c60aeb302c81068c628d95dbee22802acdfede444f7c7f5cfe052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ed79eaf47b4cee17728522ad20083ab
SHA1dad685fdf4463e08cb35a1908d5c45ca0fdebe5d
SHA256230d09bdd7a219ee55c47823cc6ac5416a4de65fc9201111de4ae7a21395eae0
SHA512cfbf651aeb6f445b10279e25a7a57128ef646356dd191b14091b478b5caf0e80126f8c872ccac3b804d492435ef77166f1f8bb96843d03a4c439c22bdbcdca1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c8eeabd379649b8a174a841148235a
SHA1c1e4ab795eb92f4ed9f64378a14aeb74015a7a4e
SHA25607d90bab4a2070fa4d43ba2f3b6ac6830611123a1540b26ff3878faeb247a486
SHA51295982f85c2c6acc2166da463639a3d3075f137938ffefcf1916c5850ca6a2fdfe48b99b46675461d83dee2be56dc76fb2593d3e54f9eaac4cc705dd61607877d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d212ba8a73bf0cd393c9fd2216424ab5
SHA1aa13c59fa542ad2562aaf551be07c768c12cad3c
SHA2567d8aad2ce77c2bfca0bbb506b77454a9c79bb0599f1027a18161bc2ddd113f23
SHA5127b42400d268b00816d0774eb778de230baca5916dc2c3a4ed88f7799c5332f2663a700b85b58d3b0dce40c2b3092e8951b07e861b57d8be639af142544d1029a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c969d65d3f1d4311a378b013592acc
SHA1008e20ce3693b723207ee1f3ed6c1e87a5b0270e
SHA256f364a4c4583a343f835cb867612ea1d196eb931eb050b8b19d62bdcd7f3a915b
SHA512641dcb9b6e9e5f693b1ee716fcac90b14476d0fb4a7c783cbfda46d5755edc56d6bd62dc38294802fb9db495bc8fadf66aee6b8345d2a5e10d9e8a19d912d398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5138bc241c10d95f12297ea391d48867e
SHA10fd809f93bbdce3f9bbc7b021b14f0b1f3a827f2
SHA2562c8a7e86fdaae53201210d012a9373ef8189b97824fc3e9aa48d687a098ab871
SHA512851672ad13141e57b746b0844267a85870197b734d308f9b2211bd5a5a085432c5493ee30b0a0cedcb47da82e0d0ac18fa5b0e25931a7573eabe0994dc9f6313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560b31fbea252ae5ae0b37280741bc127
SHA1b7fc9862930fcd40ede88390fee38f8bab3d4f12
SHA2560cb23d65783fd336f950e2f585b011c7fe567c3e7fe976099e421e1729845f65
SHA5124d8b7bed64cdf6fb3e1706db31d021fe18e4c3b1de05571b3ddd84bbf31ccf2d98d079bcacbc342cc773aac2f39520c1aef4cb85a917715919c66095a3958601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec19ccef8a36556f489fc249317ddcb
SHA14b4e85d230ffb8f5286bcd0b15f89a2380167094
SHA256ad06a231949199749b75c74278a909082bbd2f1292d770109cd2ec373043a564
SHA5121efe817996fa51f83950b29709ba4301727cfa6a089861ddd4896d08ba7977d3be8a41d283c1daa1e3ce548a698f2f54b81d8c702f5a8caec87c32aeab3c22d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6f8a6e8bea039644e5944ebb563608
SHA1ca57bb80d4c17e685fb5fc267f38746e94a87b10
SHA2565b4d1245db66a7516f04b391ea2454c0ecdaaed918168e43fe0c851601e560d9
SHA51264bc2cce15046a0047295045c68fbca2632a163db123d126fbc8e0e144a3614f96a830e48c9bb4034814455a518d858d06bf1f21aaa2ca323e4037256de25457
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\platform_gapi.iframes.style.common[1].js
Filesize55KB
MD5d83afb0922fb4984379a8bdf6757648b
SHA1674788c07167478047c05846c834df8aded48a62
SHA256fcf5ee3a3bf3e4bdd8fc20ade771ae224e7e2a3df1f85c8df7c97b187ef34cc7
SHA512243ed1decb7ad63c44721867fdaf172c3cee950054193b813136ebb2a6b78cbdbba92917bb4f0a5d473e446ea0ec54ce0412bdab0379a9e881ac1e07e696e145
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\cb=gapi[1].js
Filesize136KB
MD55a7616280268d3642196c89bd5a7bf00
SHA10350f9555271f57d150da785524e095a7e8eea56
SHA256276ab13834ac74ad86344346135288624927cf2e8c5cdd589bd4619fcd467c44
SHA51276381e69a4c24798b68e95dead45543e0f685dceda39ef73d49a65261db91d07c8aca0171b97cdb173c0f21d52aef3d6c6699ab62d511e3796dfbcda4b26bc63
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b