Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
0f33a4164c3ec393ae61e41407dfaf08_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0f33a4164c3ec393ae61e41407dfaf08_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0f33a4164c3ec393ae61e41407dfaf08_JaffaCakes118.html
-
Size
3KB
-
MD5
0f33a4164c3ec393ae61e41407dfaf08
-
SHA1
7630fb21d62c96de35257eb56e8b2bb0467280c2
-
SHA256
6ef3cdcdbefca0ed7f55c795b50283cdc82dcdb0ebb1e8bc0500236f878fdf8e
-
SHA512
367fd90a7cd25d79f323e7ab8ee5b22a2c92627b79f766e9797a4da70b0e05bc7239db256a977c8f9126246ffeda7ec0866fe51e03ea4dc0d22037fc7184ab66
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000009747c8dcda5350f0fb177c5cb0f8f51e4ba8128d003843b6656e7de39ffd0f4e000000000e80000000020000200000007210708c99d99b5116c25543e03dc4996fe2e7eb3a2d10fbba6ca2074ad773fd2000000082582aac285da0526fb476731d586eed35b132c77c45f0ec18febfd5398b8cae40000000e0c72c8e6d385cd2cc7d217bb7c12d843b246362ffc0190c15612b6e9adb4b79c9d1faf13ad522e5c3155803425683770c7a28d29a39bda2cd7e38ab56458782 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AEA2A051-3326-11EF-91CF-DA79F2D4D836} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0be238633c7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425504538" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1832 iexplore.exe 1832 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2888 1832 iexplore.exe 28 PID 1832 wrote to memory of 2888 1832 iexplore.exe 28 PID 1832 wrote to memory of 2888 1832 iexplore.exe 28 PID 1832 wrote to memory of 2888 1832 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f33a4164c3ec393ae61e41407dfaf08_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ffec841b4956227a3b7470ccbc78dd
SHA1d723350977133b5752a72d5d8d9463d8d0229b1d
SHA256d6f40915d158ceaa64eb2c0dbd574ea3905d0b85268d27ae3b8ae06e60b006c7
SHA512b44d72e2cfcbc9d711cffb6fe47c9128f18491ba31f5af569a14b7cd3c079a8889579d386d1592d34f6c35d1970ef3c71eae15eea183146a0afc0892f3cfb431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e70602d58e68d6c81f73471956226c80
SHA19ea664fed18a99a95b800cd038cf2f967d9f9db1
SHA256ebb44402780912c0aa3007c45469c452e8d37b14a885c4cfbd9fc015ce8abcce
SHA5121a04be908e7d436c743587ae1c822d177844589d6c38ca6ce637bf5a988608c5b7ec0785f9aae4ec01b74b4d43a03f054f9ddb8210e4fa65722f3c2ee1a0d363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57621e3150598e0acbd35af7217267190
SHA1a0ec69bcbe305bf19d7f8668895fce471a4520a0
SHA256c7db798536e78bc02cb4b8ad1dc41fd8a72b15353eca120a16f490e75aa8189a
SHA512224ebab56f4d41d5648d91eeac6f5b4b8b73ad2400d1e2d6b148a0f0c1605a12d0504990b9093d9cb05be2130b9e5039e64097951daa7e46eae90749e1220416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5818eef17c164358d06d635a54f9413bd
SHA178649ece34319c8cb6070ff34f8dedfa2bc6d949
SHA256d234e0a8274605f7c2c6b6237b604cdc18501d6af9a3168c8b7b7a6af0ecba6a
SHA51226e4d1da5ea38ba1d6f3a5d0c4bec29ab46ca8f5bb139187feaf41f483a27e0ee4edfbe510c158dea2a9fcd720a57a7f08a5debc139c5fb283ec7835c49fd426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2729d0239b8e8c7b655231ebdcc0aaa
SHA103e7ba4b8faf35af027105ecb2f9d378564a7040
SHA25619cc738dcc71147e3ebc7482f0454c2e2a8e3ff5b872a3499c1454b1f49c56dc
SHA512658c2c9748be172ded78ec603477f2d410cae2ec114fe494f0f94f4631c95fadea6610cb1f42799454bb32a590807bb9f7a309fc4e208f3c38d3984c41617346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5601ec9677a4645801128d0e508bd3bbd
SHA16f07e7e0eb6c194444c78636481c2421b70e50f7
SHA256107ff1edf2902ed8e2f47cccbeea5edd3c84ea7d34c24537abf4e7672a882734
SHA5129e02146b96672f790aa4fb7955d88e10df79781a95b0bfeeea2e04b830bd9ebc946ffae6878fc49f05fbe91e0ce48c45b30a76aaa1b76d923a8d599f69471f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5887d3be62487fca3becb8fca326523e2
SHA1095376704ac1da8a37aaac9620674836c5adabe0
SHA256dbd45c3b55c796c417f9c000c8d7ee8a207b06f2ebd3dcef157db55f3c721c75
SHA5122ddd78003028ed26bf5b36925a3b06a8c14d4d35ba0cc6534b0afadb439ec637951083828cdb93241717ad4abfa9e3bf1bee015b073eca18585853fd518f5c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c678cefbfc16829d010104278031a9c6
SHA15dc1e0e887d42ed97d1373580075ff2fdcb90971
SHA25685588ce44cda5400eed948f0370302ed4cc98c20ec7d13d154ca311e464a2265
SHA5123e523b0d6435a0fad52fd42a7214f9ae2ebfa38331e9c1145ed849a798f2e5f4e9cc77b9420643cf0e52da1cc9c4c1abc513846ed130f8edfdd45a1043ba86c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e3201b9bb0a8e302d2a2103197d88f
SHA1617a563f631124823a97651bcdc18d89f654d438
SHA2566b50bcf843bf514e839738d00749a4d30ddbf4306ba2a054d837c9c035b5c3ce
SHA512b04b6e58c7105710077d93e3a989fce211be5defa5226e9e356baa779e0d095f03cb0d9dd6fe682ed6ff3d4be964906ba73e05a04d3ff16b7bc565aac58f8aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c611989347b2f92d7d1123da554073
SHA117807ba438ba721a9e4a0183ed5f6773adf0eda0
SHA256ad58eefec7f03a0ec148e75484a2d0f7ed4f5dcd02933152f27b319bd21fb32e
SHA5126f3957b1457e7b22de5df30e5359a375fac85dfb31d0f5cb9f83d9ba5dcc4203510b5676df61ec7da32800b18371515b4bc1a1307eaf7d07db3221ee38c474b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57343a8dd3626caaa6323753642a0921c
SHA105e07752cfad21b391875d85494563039139ec9d
SHA256738afc590979f280b00de58e4e06b7922fced13728eb79d0692253232f656026
SHA512c06d0c52bd7aaf7ed5a9908d9022c02fa6adcaf6b65002adc67cb97e6e5448eb6ee7b12131a36a9ea04f92350f3c8a4651a47e574c7221dbc9e6c420dca81990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0579f613a0b9b0ace24182a0b02dee4
SHA180a6321e3ca6d8cd198419277625ed25033bf119
SHA256b06c553e70f34e87676cca6546394b763763be6973ea600058ab96793d4f7ef6
SHA51257230b326009145c2870323d83d6f0afe5d378896da676be1c8d1952e811d77cb90c6aa0386963d048df31a465ae11d8577a2cd85bc9a7c1323aa60eecdfb1dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d21aa5d386dc0cbd0926cf7f69022fe7
SHA1647a92ff142cf1dc352ce30680d7d39f5d118630
SHA256823c7ab6309f4bec8d32dfdc5dec5c353689544b9dd8e21e551667bfbe06d894
SHA51251822003f50f281f81ecb6cd45c503d4c97fa9b3027002ada992af84e401a0abc9e508901f5d6771a0f8d784a90f05fd11520aa42f5f7b3e1d30226dfbad4d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b72b5ad11e1f3b65738d606edb88bbb8
SHA1f957b946e310036b5937fe8f0cd915995e0ee091
SHA25699a4b4a706c4e4b2c870fae983167c9f7b5597524dbfc95d5d8dae9badec58f8
SHA512dfedb7951228c8138b4991bbae793a26399e7fa4c610097c7b4a448457414e082844cce65dc00e84147d5c3e01224df1f4ff389c4e870b366778d0646f36e6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd34727c92cd858d7f3ce0e0f82fe4e1
SHA10a636cdf824b576993b55eb4cdcf1e12137c5808
SHA2569ddb407eaecb50b5a6b6ad786bf475b1b25bc27a9b1ef76b685c21bf4dc35b0c
SHA51244e8c2c13ddf8e0ace03c2fc52f0b5cc4339406619cd30350fd356f595ca90762d2dd10b5d6e6f21ccb951c906eabb57a3df745924a6dc9130b89261b2e99313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0a192cd5f919700b4befa8acea1cda4
SHA17e0c367c1e5c55a6e8c90d9065bac440c4ddf5be
SHA256f570dadfe5ce11c3a651934bac17a7bdc15ce4c8d6bd30633f17579a42666c80
SHA512cd200617fd51308d920d1067408dde061b1434f4cd78fa0ba54673a7869c8c568fff9662d2abdcdac4c81e5eae7d9d356f1aea26dac414aa5d60c2a3493f3739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e149ae1f435a8e020422fa59d02dc7b
SHA14c39b12b85d0059dff01b27432666d28a4f50ddc
SHA256138d49797e7bc83ca0cb24659e16492ff1140fe9f832df08456935591cd7f679
SHA5126c7262d80f9f7986fa9bbea8e1fac61eee472e810f45e8f2441fe8dd4682e270779fd64b515faeaf277f3f7f4a9caec6079e40812596280ee24e8988940935e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd91f010d411df8a259092889d2eecab
SHA12e4f219fa33fabb724c3ad99aba7d190c2747000
SHA2569ac2a179640c841af715ad1a1c960fde87da5d2234ae90715716a1af506dc99f
SHA51235131bb5de46cdc353bf757d7c369e56d3aa206084674ee19d378d99f6a38102cf182470a1bbf22f814f20defa476a75e90bc394543f00031ff52dd71e44a38d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f9481ba59aa0c78a94c410cff617d68
SHA138f6a2724958b10578a44d8eab9973bcd7caa077
SHA2567f3c11558c40ecc37c694afc98ed10440189011f22cf6e7a964092c907aa0161
SHA5128d335380b12540771171801e861e28fd8369c477475af8f39d672036fd9e45d1726bc41850143f876656ab3ce1dba72f0392e7ef60e22f304d27784ae81d915c
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b