Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
0eb56bd1d8fd42f68c791b3cc09dff78_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0eb56bd1d8fd42f68c791b3cc09dff78_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0eb56bd1d8fd42f68c791b3cc09dff78_JaffaCakes118.html
-
Size
3KB
-
MD5
0eb56bd1d8fd42f68c791b3cc09dff78
-
SHA1
c5d8b60b61db80bea885309b684a75ca4f9dccc0
-
SHA256
6eeae4144652a62c1089ad870cdb60ae3ab0f8682701693f48053ca74586d333
-
SHA512
532698c3bf0165714fab80caace91a22d5ad1f907dfbb1041050e52794506b2667e43c94b9babc4cd103053ebb70d60d0d013bef1ac87de0a70ac8c8dcef2934
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000a1ca4bcc59754ddabec106c9e6d6036f36efca1806e9249867e0311c8f34d63d000000000e80000000020000200000009fab0087b7930f022a26cfc08da416395abc98579e034bae32addd25d9332215200000000e0eb1040dde189d797b6ad0059ba9c0468214dca36a518358ab49978af8cd4640000000c778862cfd8ab1e53af82de353d31dceb2229a0aef1d6aed9a84626e18af17d5f712b0a7116fa8eca62444678101a0efc4f83b19acf24a7d0ece5d228febb64f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425493741" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B1A51A1-330D-11EF-964E-D2952450F783} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1098bf4d1ac7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2056 2072 iexplore.exe 28 PID 2072 wrote to memory of 2056 2072 iexplore.exe 28 PID 2072 wrote to memory of 2056 2072 iexplore.exe 28 PID 2072 wrote to memory of 2056 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0eb56bd1d8fd42f68c791b3cc09dff78_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a729821f22082286adc9b1cc480eedc
SHA1a19567e3fbb5d84219e56af8ebd6910d09f6580c
SHA25607eccd4db99f27a8533c530860ef72626a933ffd7ddc9b1b86d3cf4aadd34fd8
SHA51282c4bb2828da87732bbb7396e406d24e920c431525c8a91cd0717f6212c9f23f561971947cfc4d23e9f5e28905dd5b7fee6b07584eb60420b5d392072d5cc317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506d011e877cd52e9f5f4c279fb5cad87
SHA1164ce914c83c97229e66181c7a015a41ee65c022
SHA2568c7b56448553f4d8750d01b618ab8771346e2f155f12379b132b634e4ca879fe
SHA51217358c550660eb3fcd913b1631ba06a0448a399d57e59eb0f4e5af2d2da89b830cb811383f7341b0f05d6e3a9bdde281f716cb7a1e06df7dd9b8ac4e42ea6482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8fa180dd3229175ac9ed2aeaa1061b6
SHA13870ca7557de62f46c10cb3105c3b00985028eaf
SHA256e51f5d3601c28421923a95fa117bfde447701459a64f0e27d7f62a22ffa78e14
SHA5129cc4b88c350b2e12d3776b3a8fd107187a797d2119830b3b75a4bfc4aa4c8703e874d483201051ed23e0188e74228b7cbf82f8c9e503c843fcf5de0b562a0c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e62cf556e3723d6090d4a8a99d5e520
SHA1244948b5481e097e37c1e3021b35e2ffa0c3d5cb
SHA256f7945d3a173554d0544e3d2873c6d1d64da88bf577b6a0a348fe7a565dfb94c2
SHA512d728ff7e6fa459f14770ff3a3e7e6646959b631b1817b3de1f4e0add131040e45064ea8e7c25a322ba9a3891b5f193c3fd9df2b190851fb1f987df54bf01fed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5085e3765706e7b4f027b3ab016a19dda
SHA1692652bf5930edfd3d1a8acbaac2b7c31a903b65
SHA256aac59dce6f57e784dd0f1044b65857ee2f83c2da4bdcf0d53362b1ec2b061a94
SHA5124216aa4a8c013b37283f5808244ed0c8ea17c9f7e2e3a22e805b44a27f2370dbde5c0fc233fc557de25fce49ccd0c65189dede5c5b97abea47d4a895e1544e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57056c442da585b161b5d4415cc9273f4
SHA14301e86de032710e70f895dbaa000d82afeed334
SHA2560d516baca83a652789241a4b185eb997c7ace4fb08471e6fedf92c508c4b7066
SHA512f5eb8ac1289269dcdaeeb446567190eaa940484b9928ed32ccc04f4a8c1dfed336817f34b8eea7a8b682b30c5720dd40e7d965aacba044d32358190c0f5d4685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8bb7e1496db1096cbdd8d3100a61b66
SHA18acfc5c20193892eecddfadcb62c16bbd5c7e549
SHA256a17f0b37b9e09d72aceb9a668256596d2a6cab43b5ede589185ae82c68751056
SHA512d04466117d8f5607834976c52cab6be435d4b89eb7c7e55ba7b1b560b108c49cd34d3f811109e17fea523ab37bfdebec0373dae4699f77a01c0a7b006bd63348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f7788cfe8b34cddcc4b9b1ff52a575c
SHA1c1eeec984425a6537ecc5e788cef0f2277942c06
SHA2569b045d43240f6b98776f546294e61a4429322da43da9226469adb1c98224c69b
SHA5122d59a16a27dda1f96380001428246794cdfab56c926fba1918581b94d836d6310fb4e0cf2fd4d0a222e76394a2c0da75fba54091bc13d3811e7ab892e053a1d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928f0ceecb747cabeeaa9b3280d516aa
SHA19a4583fda63e552e2a84f75dfe79b642f3e4e01a
SHA2565b3ebc911c5502fadb369c8c7cce0062d6ffc7733a383cae011ed53ae470db3d
SHA51294be9356ad9052d4c1e06424c75281bfa8a5e6cbf24f67ec0236db614c346f5db982271cb2ea8ca7ff5d933240eba812f0bf5ac4fabb1994fa48c79951e6e245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048ba25d28fe95a6397383e93004b745
SHA1ed535bb6d65107637c280c291ddac72ef54e2630
SHA256fa2e91dd1fe437b25057686fd9421b51493fbe56200cdfc6a3f6e9522d7a771a
SHA5122ab72fd99f8e78f130d99896bf51d1dd49989db292774640aa93075d5e48229aaf15268c44faff6a11e147259a4c95e0ff3562155177a7e4f5f18bef03dd9fa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b682b5a780627e930de6fd9af231bf72
SHA1014164538e6c7ab30c1024b2e1f2278414e8fda5
SHA256edf55ee83b4ffae8e811185104c4ffd457d52df9abc3c219643d537ed4fbfc6d
SHA512bf02271186b3f173ecdecc31ed4400c2307eb640224d9696572f7f6541e249fd75081cd0d41b347a0fa9e3ead5ef996bf7a8c552542c43030d49c0d4aa7c68d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58647cc625768464dea241c43f47a41bb
SHA169768c34b8a6cc97aef36487b40f3f81d43c31a0
SHA256f5c9cb821a44c1dd5b43cb329c029882edc2ddc467419c219d83a33c363f00c1
SHA512d20a16451a114fb8fb3837f6b59969e514192db7f424718f78e7619537e1271a0a92ebcd4fb30f1dff2a3a0b44e344623bfb1845aff31a7d4b71b7a5b29fcd7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551811703d198bb2bbd8d31ff6bccb1ee
SHA177b51b3d5c8a3e095f21884ac2073b4c22351bc3
SHA2566082e03164dd085a042da74297b9d44d12082297e7549dfb4a8acf0ee7e01ea4
SHA512b8819ad92f61836daee29cb943d77f8cde0cf8a570501f2fe4d422ce6dc3a5c4ee84c120e64ccbdeed6c6d84c2f51d2a3b247b821cb28ec7f9372ddb03433838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec82ac3ad47ba44912401a1a5e68719e
SHA1b383ab4241c3694cd2bd753d573ea5fa1570405a
SHA25620ecf11d72360738c6f8936428c392389f3c87de0649c4a65e69ca6427c273f3
SHA51252bdae03f6217473cc0b00146929b206ba2ccf759db085cbf68d7666c49f86c7b7189575d932cdeffce97f4f23b170c0e278f8cc362fe843d7c1b38003ee7b54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e3f80a1ab7c234cbb571df02f94bc8
SHA11b35b2d9f8a04f0b068aa192d28845e21b35e18e
SHA256dd24d86df5c6aee189d51dd0284567bdc939d305e86a85d51edbce70fdd45d91
SHA5125aef01964e0f598342810ceb578f8f0800484211a8a2ba086b705f22be94d3824abeeafd672b4b86f7544719367bfcdfd276163cee02ed03011ef3c11d715270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7f15178872b05f4be47c63085ac9981
SHA12a7c915c8b99e88ac7326e8393a69740e706776d
SHA256e612275cd5a11d39a98f9ff973854d814173800863a3df17fa019e91d0a1afa2
SHA512fd346dae5e78e50bd6cf4b86958aeeb2c240630a61c896ab55d7c16787f47d6bf37f8a463958e72e73ece2c2e401a5fac914b35c088a177e014476003a273a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9688fbf149d998a4b81e1bab459b851
SHA12b1cc79a6180bcf3990e3b4e37f292373ec2a826
SHA2567322698e2bc8ecd2335c67a873d829732eb9cc5a11b2b7333ac2b773d38c93d5
SHA51267e956af85848a6bf6a79190e8799a83da0ac28e78b5404e63ab35476d3f7995db0041415ebc4b01af2b7f8cafec5004e6e75dcb5ccfa820e4b7f4d65a665ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b2cfcfa559e28c6f8c83cdb504036e
SHA1ee59889aab6d9c9c1ada175733d81ac9591ca489
SHA256939954726592783066f23efd043e1d0ee394825f8344fb82692eeb49f2ef4049
SHA5121579eacdf29420829f504cde8c2f5d31ff1c5d605eaee62b6264d6ba570175fb60dafcea1526b3509b553ed4c4700ad65eb80d862a8b31a21e8d8654404ee482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f00eaa8df17a0a336b3e0067e484830
SHA1ad8f842fb0fd3e36c2e8355e581aa84859661cdf
SHA25693f968ab938a7e7334e24c463fd0a11f36b1aa3679df853b77e182b120077f05
SHA5123dae00609ee3b4c715f271fe5203ff1bf05203f9fc3153348a9a0e5a23894d1bb1432d8357b7f9fe744a50c3ef5522b99958d05e380527a4bdf38d08793f90d8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b