Analysis
-
max time kernel
138s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 09:12
Static task
static1
Behavioral task
behavioral1
Sample
e9a5e258ee6110bfcce5be4c546e8c5f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e9a5e258ee6110bfcce5be4c546e8c5f_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e9a5e258ee6110bfcce5be4c546e8c5f_JaffaCakes118.html
-
Size
77KB
-
MD5
e9a5e258ee6110bfcce5be4c546e8c5f
-
SHA1
a6e797728f0b3e5f6a6bd71e32ac3879b892e84f
-
SHA256
9d2692f3a25aa5cf7ceaa743aa8d4d9d4878e4866b2e5931483eab84f2f3a5cf
-
SHA512
fdb133db270898a06e0645a8477410dc81d3a417b0218ee469a93fa75ae11eb076a7b9fea23dd086131b06147dde7f7dc243f8a6d9b5620adc6fbdf3bcc9abcd
-
SSDEEP
384:STfAlp5f48rPFkj3DP4tfP/ZlufpLSYuLD7bhQFLBYlAbJ2RlLgPRPRQLgPR6R+H:SrAl19neZ2EYoccqSZ6Ht2c/JAUw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418815833" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c230677000000000200000000001066000000010000200000008629713ff82fa28b2a4f0857be937a2ca7dcb91b1786fd7f1e6d169a90c47ff1000000000e8000000002000020000000a957b4b9b7ee5f8d3d0d24576993203bee2d9e3f6026857082038e6d6d6d3db520000000321d4f7d64cde6044c58fd61bd306d53cece96c6701e2d9b0a167c135b1b008340000000a32c48e0329d6cf3f6f75e2b938c5966305721a3f4d25d83152f7f22682878e9272a45a5a4773e49733546b2c7193dfd7913bf19aee6e2920a47131a56d4fc63 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ca52635e8ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4ED40E01-F651-11EE-B1A6-DE62917EBCA6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c230677000000000200000000001066000000010000200000009b87dde517be755af9a514bb8231a788f0d08e70b62dd5bf69a8631cb26a895c000000000e8000000002000020000000e16e452aa04e4eb34e04a300e868cc4fa4528b910ea7e663df1d2ca54d46080990000000dea632b0eb57ff057ea43ac529b621d85b676f368e3cefdb0e29d433731737aba6804042ec1f7108db1cb5a4a05af6550449c2f984f4badc77149fd65fe4c327420a60bc00d7b4ce92dbd48ec3b9bc698535de68bca725d621e0657e0ce2458862b19b23cafe067778a3698b3264312d895b6e2333fefb0eaf469b5531a00c92d6f6a5d72e51397354f9d585980083cf4000000043a639aa5f40f3a1630bf7621c815abfbaf7b6f238b336e922c167f2bca450c0ee74fd2c35965d0369846ae0b0ebd7cf6dcb9c7a7e4465e9506399e576d4fd59 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 3048 2932 iexplore.exe 28 PID 2932 wrote to memory of 3048 2932 iexplore.exe 28 PID 2932 wrote to memory of 3048 2932 iexplore.exe 28 PID 2932 wrote to memory of 3048 2932 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9a5e258ee6110bfcce5be4c546e8c5f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5158155df97d7371b64a30d243c1f17
SHA17f5ba75909a1871e9d9fa0a1b8b338fe9d14f628
SHA256049572ed4cfff9e514c2482796af7e41b035cf3b1c4715a5c5daf74f4870b38c
SHA512b37507a1c4d63624bf188739050a5e87a7c7ede1c2a593e36c08627620e136a8529d654d3b0a3c27592846d170e109f099f7de1973a6cecabc60929bfafac0bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e57384acb8d2b1d9c46358f558d15c23
SHA1fd36ece8b362d8d087881bc18a7fa81948d04472
SHA256b8130e2def51ea6d13521341171bf324f87fda10b978946d52b9349816659ab2
SHA5120e260cfa89b6833af2242965003c05d72db3510b7bc347cfadc03739b9dc62069c77cfc385631ac4a4049d66f573803bedc4ad4461f257a206608a3679c8aae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bfdefed11f82b733d797f538700bb56
SHA137282dfc652c0f1caba78f746cc0bfc2518c10dc
SHA256f846d23a79a6b15db20f4129ff5ed0d4a101aa5597e6f8012515cac585927c57
SHA51293b9e680f0cf45a3750b40c755214f0c667dc335ce15a01d9fea3c43e42e9c0e04322503e645903c5cda6cf926adbf7540ec58ccc932c7bb88066ce06783b270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7653712b090b7b80095b9bdb46349c8
SHA1dc042acf5e31267ac446ce8e4d0fce918526d915
SHA2565bd121a74d5a1b30c2c250c8128b4b1a15ceb36cc8493c0712b2376de7089abc
SHA512cf3eff091a19da5c8ec4c8058e536e76fd7dd73ac04be0dd5c7fea630994870c0c2fa850799fe187c68129b6ca773b39b9c3f562b653f82d477eb55e359970cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2d789835ae63e540003790188c900a5
SHA168b1ee73893f33f923e641b51d8210056c65339f
SHA256038b06bb3912cf220641ad8361eaa6da32efd1ab3262d08f5f4b7ff295842cfa
SHA512f0eab8d4baccb1e10ab9d9c7721081113f83bc67c867a92fbbed2153e7e2ebc51668d647d2486b0cd0dc8465884db83ad268aac60c5f7b247291ffee2c053879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ed739697c1dae328d0395c656a4180c
SHA19f89fd3b62e54d165c8030919f207e6e17b4ac05
SHA2565f751c71af7358f37ba4e12d60ed455d07fa8fa1889137960f58119c6f12cd88
SHA5122a16124bd7eaebae5d859be3d90d442f6073c915817a8ffc4120508dbc11521383330282d0387f9b17f7b7bebb6c5c72e0ae2d1ce49e5ab81aaa2ddad2afea14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e65da64c5553254569b1ec36cd1ca7f0
SHA1615be40b223f20ca4d248548354f17fb58ece763
SHA2563da9cb3d0493c649699790c3bf4b035057180a8c0e2b7e0b82f34f5b94902e48
SHA51200a7de0b9f67de6a3210e7cd1ac686410902f8e5ff4e5b8b902322d2e85b53d895c73eff32a381f68d8cad9534dc8953b44b2c35bd2a99b064f118c31d7134c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4d66405851f6c44c78fe687c2bee0e7
SHA1e3516869765cebb67957c76fb7b0475a03d718b6
SHA256bef82263122b1d70d22e591443ec43828e46cd63b4e1835f5266d7db54939c9e
SHA512d9bb8fa166f048c9e3a0d13274c2b8ee600461b5d26e832184f89139550e41e7a837ff4af421dd87c02b95b71f26249402564601f982943b2c3324020d89862e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d07e57757a92008856d48b1945ad42e
SHA12bd70af457de48c7dbdfefd2f4bbeb90c76550a0
SHA256359466cb2bc68357b79370aa80236c1342c2dca70d65840092950498d3c66992
SHA5123486ef4abf493170918c428fab556b12c24f207d5e630633c6a94302033949880155c7a4307adb5e7b700a76a71d5bf6080cc551f8987229873902923725de58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567a7479db1025406129b99e31d1b2aaf
SHA106d7e4628a3f0b7b57f7bbab35c2a8e3c1101c52
SHA2561ad458c6b1a87586bd39a1a3d43b54da3fb6f3236a4435336cfb842111b98d0a
SHA5123ebfe86a55bc4a0b25ba31344314b1de826980ef827137d27970355889c8e058b52b8abe1e61b2b986d1e4938c5514a745af3dc5e20dee3c98f5c3b6b0db596a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52edadfa82ed44c34b314f02bdd05bb21
SHA1541578350d1fda836a870e21d619b28225701630
SHA2560af126c09798a52e384357b217eef7d82c1f43f713d796d5de091c51490aecdc
SHA512fece67372f5ce22503795730fc3363f1b3c6d0dac01a847ce65fc377106c0d5887a9e554bf1531cbf8a08e06a0a34e49648d7621783ab7d6430e7a6c940fd2e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58760821e0da56ad1bc393a5eb9df71f7
SHA14a67f6f32fa4c56700c848eba6facaf9e6bd2ee9
SHA2569d91409450a897e96a122fd6107db58c175f1bf14347794b164932365e316d9f
SHA51270a1b0f92e239a2192df1dba48c351ecc7410144417a31be7703da4b5ef6bbe8acef1aff842eb38a1c4483f093782084f7b3b793a985708089fe2f66a8b1ee9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc976cadbd7d6bb4e9733b1c1caee64e
SHA1ffbcbd776c83850d3631ced167d09adbcee23d6e
SHA25626726a7c6c81f3fbff96f35ca2b3018aa69586d90e1fd313b0f9d6221054e8eb
SHA5129c4f591e59d2def82d6634b6c6b76fd0d68baf21d4ffcd8e1ea40831cb9e772f785a8658f29a8226145a613a6ecd70094386316d400cbf278ce438dc573db91c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ea00db2de742015f82f8e91ce617f35
SHA1e1090ebd6041cae11fd5acc567046cb26bae1673
SHA256d0b9973bb3a3f6ae8f5d813087ba5ca8e171cc3ab4a383aa5f0efe9b14e837c1
SHA5120ad0d8b36410725dff3b2378508e361b13bb6da7b6b054a9f0d9903cf59fcb580701160fdafc7bc3ee5fd57db7b42059b7b70c8d8a832324c00e8ae8c3de9e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599533a43b20fc20ffa1ea6c0896d3ffa
SHA1afee514de1d5acb7b554aaeb6de4a22a94368cbc
SHA256e17e7694565228820c5d3bc9692b066335fde5954577dad6b81f7c60a1e43242
SHA512919078f39ade4c5f0315a3e3cb97b9ca95dee203c26e0365a475487e3c06d149c042328888cd98e45b4e2c92d2a832907eaa1c39318031f9a41fd604ac3cc01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d36d39d4de34a7a45ab5357934f603a8
SHA11399214f7c5b371bde8f4f29713308f693770cc2
SHA2566c1bd20e4fe96135787c1641b6d3b8c2ae0d43ffd49a499fa3dbc4e80f5acd78
SHA51267c99d129d7ee338bfb803e5173db5a3b44af5482e6ed6e620d9a7fae9972847b5743dbb833ae63324223746ce4ccb021243cac73ad58bfa46f698b53759e932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd862061dc69d3082695f564a89bcc3c
SHA16238962eb72bb55fa50d707d6555b2d02ff2fe4b
SHA256a99bdf82ea6806de531bc91f9c465d6705f0b1948c4ad7340dd069f6f2d1c9fd
SHA5122a5f428b7457b19e4f62cfe1be15c5f329d6e0d16f4d60a490bced57f224fd6262db0a2cdfd0e1791aaa30d31922ca93c6963799b62258aca965bc4830fa8c5a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a