Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
0eb4b615edee45da6ec31935e61c5236_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0eb4b615edee45da6ec31935e61c5236_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0eb4b615edee45da6ec31935e61c5236_JaffaCakes118.html
-
Size
9KB
-
MD5
0eb4b615edee45da6ec31935e61c5236
-
SHA1
cd4409e8cea3c2714ab0ccac52035cf48f3fe731
-
SHA256
488b7416d848b62659906188ca1c64783c274831255a9b63d9fcdef7e2393584
-
SHA512
1bdb073d18e35829cd7afd31766b48efcaf2479bba4bfb725540ab53f50bbbcf4194ebbb66a7ec0c0d211caf71fe07125b3594f018776ffd37c4ca02b8a145e3
-
SSDEEP
192:YRigqtt/w3Ya099YVIyBY83Js90e+vex8J8Mv+KiFvYLc+3q3elTfwSbjeqZDlzC:0igM43Yaa9YVIyBYGJs9Avo8J8MGKiFl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425493696" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000338c81d13e5e22468b0b8607978de1830000000002000000000010660000000100002000000074dd0d4d1891125f87a0720e45ee2d79e251fedc0ce7170675a952d146f51058000000000e8000000002000020000000676daf8371d9070e961db109c35e45d2097b8e0363e5ef74a30d3360c9d6fb37200000002eb217b5b45c01826933a354aa93f8f9540b4a37cba2bc302528da89d32015134000000056f1a13afc9c04f48044a746dcab86889d6d7627ad52828f76f06b23de80a649e23ff24a7299ae075b5c69853dfc3708b6e6e425dc02b964415b0e2b7843d3e0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e6cd331ac7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70E230F1-330D-11EF-9BF8-4A0EF18FE26D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2736 2276 iexplore.exe 28 PID 2276 wrote to memory of 2736 2276 iexplore.exe 28 PID 2276 wrote to memory of 2736 2276 iexplore.exe 28 PID 2276 wrote to memory of 2736 2276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0eb4b615edee45da6ec31935e61c5236_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff78b193c3c5f5dffb5450d2094fd016
SHA1ae1ba6bf738802c578e0d5dde824664814d37c12
SHA256a23b3a385a61e3c3f9ba5d8090df04a5149ff181debd7915d922fbe26df915bc
SHA512cc37a9c058ae0e06ba6088d568c87d66577058aa18dd52f4e39f616636a5dbe1b8e9dafc3b861e93c1ebe2a6f1d922ab8bf99284f076a9612698e4b75ed393c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5533b228d4edae49f1221dce0af498502
SHA1c6b5161a36d535edb6937ae3ce205885512e8c2f
SHA256874bc60ac85cf72a16e48263f22efb9cab41bd002e001424a8dccccd2d5c5266
SHA512b2057392e84c442d3a971740a589b6938d40e8b6007379fc77e74d0bf00dc9df2adc4279769f926eff56b9803537faca0efdec5e3f8f742ded5b7ce9ef7ce0d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543676ad60db91317c202f7a8ddfa5eb6
SHA1b9d59343cbaa23cea29c5c0d43b58d8679178a82
SHA2566de758c454cf8aac86c023a514fddca1a6a8cedb6da74318d333383ee09c1149
SHA51279823c1a74989f99f795cfee714fce1a7e18b1f40fcaa4426cfea6b1287d82938b31ae42ab01e30f2011a983dbab57b791634f838d24a0e57638c97305151d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571d1db55b9edfdecccf9599849e8f148
SHA1188685686963967e25b1bc93f97f1491127467f9
SHA25685214370af14ec0623b51484b7ff17888735711bc6cec08834c9a6a6055c922b
SHA512d8c23b0cb8d1745173e12dc3d7abc9a6796e86dfae108a6cfa05b87eb2aa7fcca73dab64d3d94d0be359b0d498861398b1e0f8f64ce307186b4cceb78a44d987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cebff59ccb5f344f4e257e1d268ed7b4
SHA18bd2ce01d686f9e83df08492b95378d09a08b729
SHA256d62e417d4d811063c7ab30ddbee437c50d051b27df65314707f48774749969f4
SHA51201db31c07156b9b839c052cf84437ef99ec526c3e648db9c36112aec217be4f11b26cc80c4ea65ce8f0822d6a903115f7e01689c9f5bc9e90058e216c2d7dcd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fba6518cca63d0617e8f54a375b59503
SHA199a6da2b84324a87c605c5002dd0575eaf0b97b0
SHA256a9c94bbc2c88f434a4149dc3ab5865ff4297b052b6a10478a631b349a3caf213
SHA5128b21235d32d1b3e149936bbf97f890d0c7f3068026463b7513ea63341bcf44a055f24a8869d4c7e0500ca790996421538f5b154fa9f3ad72a66a33739fd803cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58513bb2246c46a6916035a3c31239b25
SHA12ef88982968b19f055650ae2c4ce9d8bc79c6ba6
SHA256385d4a133c882c66bc7fd6a4b9a0ef24aa5484dfb2263e6fda7d816fd953cb2e
SHA51283eb4eea6d95e31ba9a077e07493a617553b458364e2b17eeabaa805a504842498d03d306893ed6c797e0c5171fdc5470c87b116fba72c35be26551afd3f6610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540248a821a5f4266fc7f1da3fe6aad8c
SHA1d15adfd18d622aa556a484e960d7f2ffb7b24af9
SHA256cca8cfd5921b326e86246c2de16ff95feff7c14558a614c261940a7614a6423d
SHA512531be714d69857436d240fc11a09d28d1943e5e74dd1910ff72f204cf1b250655ddad80ec07a6851829e448b91f2811ae83f7952d38629bf9d9968be0e54ce59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503eb17a90fd2c42cb7ca2b957d3d953a
SHA1e4ed76c3cf4d4d3ae89ac7e3db90febcc4914f5f
SHA256cc60453ad36e0165ca7b73c4e168e436def5fd1d5cb63afca1e80d7f854c1c77
SHA51253b4620859829f706132f0cc6956156ee0fa27cc9e08ce4fb3c34c8aaeb98735ab906ab183c1601bfc4364d477561ae97cc49da6ea48a10ee6877690e9709f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec747c6ce0761be3021036b57d3e6518
SHA139133eccb6cf5aae686d14750617b7406ed46a70
SHA256f21a951abc356a5aae5a6672031943df73d3b117e4203743ff3a0f4a04ce7223
SHA5122d42d0f155412b5552e84d3564f5f17f67611e94510748b9a798fb12cb5eb144d75756dce0917866ac67d143974e29b913091c165fb026b528ca6d658ca114b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd7a41deb73c7d7b9a6fd63336e8c42
SHA1e49876dc8c9f7a9bbf67064c398a32d73c6d41bf
SHA256f1422742cfa6a17f5a2552068402dd40081fd630c9dd52455458e2cb0d2df083
SHA512db04492c52f62a03a86b6c86c3197c88f7f4bcad418e92883c46b272c98323819e215b3c51153e1290708a4337dfe0933be3762400d3ca7b9a9c0f48627a3494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5288d22ef07b15bc89a01c8072aada1b7
SHA1dd98ac5e51ad1734821780899a74178b395e3b28
SHA256f1fb7cda4d845227585fdd2f58502426bb4aa8248e2fd2f9ddcbae0e05dc9c2e
SHA5120d37f6bf48219472450a441a56969296cf99376c91465cd6d5805ab311ed166f4f0c70ad3f1d4da674984adc3da67893a5a1ef93a408732724ea72ec0394d3e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575e402ee1c52b6f863ffb4d226117491
SHA100572ce6d315a77e56b1d701bcf775456332afc1
SHA256ccd01dab5462638c7214f5d2f64970f081bddcb33a3661d27d1ac4dbf2c4e794
SHA512dfe847502e3cf6df39e8e4ef5e7420db6d0720d292d78f7eaaa67787de95197123af6e937e5d8fc4087a26abb2a8424c29a0ee9c6f2b2b3a7f17e5d42d7bc423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590d1e4edb751225faaf86dced5962b62
SHA139019c027bd8ecbeebaa57aa1409581ac5e8bf79
SHA2564f28a0e27ebd18a173985275a4e86fd19cbbee130561ab9fba6968204c11ea67
SHA5121702d00d201ab0a44955ba3d7e81c7e014b91a6ab64955b38dcd4d67247cf1a7b78f8c7d743756cf6bc628bda2026938504462156a35c39c8d499c2a61a48719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5051746a22841ddbb00b48becc0b4f2d8
SHA14e6ee99ac593853f8bc7f6ec008399a373cebc3b
SHA256a31cc9b4eeeb37910b1249de68cdede739901693acd2562c9cf8290c3d84430e
SHA512e16b70e059343e21d99d622877541b72e5361801dc20ce48cc1ee0dc53250c250b128020a44c746edbfc9d9af911e936fbc0a37621154f3e4dd65198f0be642d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b4351db52ddaaaaef0773bf034c0ff
SHA1b518ce3f03c6677aa8433a3e3942061f3af1adfa
SHA256809bd773c9ab10b3453c9602b72875dde8e1b414999fe942147a260cf02a1be2
SHA51228e385602c26c7d1c2893170116c9046998b260835c916351f635b558d1d35ee43f591aa94288345d1aa74a77670c582a2ecf01b632596f09b7aae58aa6fc81e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3ce64b2882e014d392cda56f1766c4c
SHA1f1f14fe9be7ae9cf690c8bdde1561e7dfd270989
SHA256cbdea4a37c18641958b62ee22ab8b61f860c7b98220d31a2afd26365f181b8c2
SHA51243fe0679b97579abb6cd648a2fc1d9888dbde66c6687e1ab77d4411bde237a151a09218a18710b3eaf6eac23f180c6cfa9bf4c447eaaeaf433ddcda08045e8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc836b5bf65bcf41092ee1783d033e9
SHA13de626de1aca1f23ab849cdf0fb376292848cff3
SHA2564e98cc4852ca0ebd4e437fff75777aa046cffe0712656b9bf38fc9644d3b47e8
SHA51216598f4794dc9b454adb6ef74562e03a6eeb43182014fc9ed55b966b08c548e0cf5201879febda0e3d6ba79bc0ae92389ab7a24b913eb1853eed6cae5dae3323
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms
Filesize3KB
MD592d43b6012f619279289a29210c5fd63
SHA13442363ef3d92bb709285765db0da2d9e1614813
SHA2566f4ff1d555282e83447abc01cdf4c1678d7d4c929d570dd2a45e7af46483d4a0
SHA512a6090196ac737cb3ca359c292fb3e55bb5bb65fae61245d25354732f1004dc276f47ea4e98f5c9d8d5ac58dcb165e62bf4856fc93b55fa40a94b928dbfb27bee