Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
9108fbe77a799923283ee4059b382117_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9108fbe77a799923283ee4059b382117_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9108fbe77a799923283ee4059b382117_JaffaCakes118.html
-
Size
46KB
-
MD5
9108fbe77a799923283ee4059b382117
-
SHA1
0f4df5aa0d673b5059fb473a4f784f6d81df5e58
-
SHA256
caa1c54d1fe99c6e487a05abf4433e716677d2e1a1a489e86f28301e409369f6
-
SHA512
74f908358635202f7a60cc98ff6cd03596b5d2b5906e10ae0ef3e147d7a48c1184f0acdb56d3682863e262437bb60047638eef49e4abf7b3e729feb642f5ec45
-
SSDEEP
768:STVaRVvNw5X3vfB7B/BDCCEB2B3BWBBBaBMBRBNBdLUi9kYOH:STVaRVvNw5X33B7B/BDCCEB2B3BWBBBC
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7036801a8cb5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000334779263160625ab40ba52b2ff494eedd12cc936f21c55495340635e1c808c0000000000e80000000020000200000008e03213e9104095ea30aa0028aa3e9ea281739dad4c3cff065bf3906e0d5b96c200000008422b38a0d4f62453b590dc1da2491648602fa685fa9080fbc439bf5973debe340000000d86bf40bdc677617a10acfb23073449f4923c692593d64d853bf711904c989a1b2acd4fdf6551c9e641e2606b65e16fb98549cd86f0b6bc38e365a9240d3f0f6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D498611-217F-11EF-965F-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423563478" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1264 iexplore.exe 1264 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1264 wrote to memory of 2216 1264 iexplore.exe 28 PID 1264 wrote to memory of 2216 1264 iexplore.exe 28 PID 1264 wrote to memory of 2216 1264 iexplore.exe 28 PID 1264 wrote to memory of 2216 1264 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9108fbe77a799923283ee4059b382117_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dff62b00b0b7f5a708802ebd9471204
SHA10b078d7e1dbc0580a0e5915d5e28070702d412da
SHA256c27ca0c1a57b5c7ec09b280d4fcac20ecd6baa087960cdf82449af18f472cbf7
SHA512fd09a81f42ad17be28e5e1a9f5f435804fee949bdfad13430e540d6fd22d531bba82f51963918a22a9b115a57806ff322cb6846e4c263c4659250629acbdaa09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ec3b388b335d4b50b0f5dc00067e44
SHA18b54bb9088f4992d05d267a99db0d7e1df81044e
SHA256027bde7c0f12a189d738533cc0d32b7f21c8898d354e6a4480ca7226c3c6a1a1
SHA512b5e2c404a3fe34370a34d37e38f4910a249759161abc3ee31079ed6d7357a3247ff66b97d78445cd25560c42bd93fe908ffc751def34c8a4d018bb14018bbc87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e5ab2e540491533ddea0db4a262d17
SHA1d596098b74ad3dfca2512ac42d11d1ece908a2a9
SHA2566c1863fe7f4d7b6fa4862dad3057ed5cfda55ac802355259e17b21706b44dcf8
SHA512aa8d8aa88fd50f33469a93e4d4a45efbc28cff55de953ef721c8ca9d89b84e7c9b0dd853a543d5ddc70c3e3ebaf2650b36d093756a6af7138f5aa819a5ddc56f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc4f0d65860868dd6a97def3ef360f4e
SHA11877cc4efe7e75d58a7e23464f3cc697a8740305
SHA2560db024fadd7ab4a4a5ed9739d3f182166fe1a53617aa01a96e8a903368c1b474
SHA512c7e7ac0251de8725eb6b1708b2d71dc7315735735553831d36798a1c93bcef4bca49d3be533b353892a4e5af2ff849466122391c43965df4c72578fd96a3f345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d74e384169dfe5c8b0fbf8bccfa8b556
SHA165b21b5594d0015f30a71adca64b6d8a015a0432
SHA256e69fa8b655164d41e5d138ecfa15a99a6101aaaff763e45a03830c90e5ed4c01
SHA51245b9037814774c416d816e47c477c6c5f73d671bed4781eeaebb76b07ac6ce7a6a26eaefe98a917830bd9235a7bcdd2f3f38563714973793b864b5637a86a1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e4492eada0f032c3bcd50a0cff2dfc0
SHA10e5343db7f561df3074cf02f27d9c0f2de9fc31d
SHA256b2e8f5051fb796221973cdfe087564f4090eaeb85b87085b623733d2e6360a90
SHA512cba6456210ee121b942d2cb6227236ee03bb8b09090b8c846abbcda44c911ada4f2178c121ab87f72b437c117186dc847f59d13b502b6f4da3f2608f46915968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da8d3e49bef154416c808fc416007180
SHA13c902c1128a429b0300bd1e66e00f53ddcb287ae
SHA25620f916bead8b34e3587044e0e3e4cf395212584fc52446b76afa5a64ece7369d
SHA512c22d52e8b314afebfe51097ad2f6a60e7ea57fa82beda96b68a9ac9fca47b1cff4a44d8319260f75b0df51c69bf608cb905e33835f9ef7a3b4d52730c1ea362c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55df090fd1de7cf9e39c962bdf81b4deb
SHA1bbe7e6ef8aa31464072a71b95e2da30aa39646ea
SHA256c8d33d126b3113edf29367b0c14dd6045388e994f33f5000c64ac7e7db5ce92f
SHA5124b66569e4b8d93b6237816f6571a4ded025e4f241a71fdfc233af71cdc1d7f2143fe52c0feca5915310be7784f2458e39c3e6260a9b8f508ce78757f362df9d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cf101354285ad610652d9aaa53c4541
SHA14fb195cce458fe553eac03c7197e737d724452a5
SHA2567c1f9538406da214b536020cda5bc025b1e3a04ea1e43ea897d48895f184064a
SHA51286c86335e0fd5254915a6dffad70cbe4a49b3fe300970add13053fe7c56a5727d15a528616a51c793d144fcf93b7ebf9446d1c6f4650f4c1fc8348a1488c2524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf2ff6df98e34f18d4d489477a401c5
SHA1945969dc25d3756591771423376610598356c76d
SHA256ef1fa52cf35078d11e2fc9bfc5f2169f2d2476697411389e637411c94d0d86ed
SHA512f34fbf20bb3d467ab2e1eeae85f93c45f8d91107a8ca2f59bf7c093a83f0a0104093d710d99c6138ff6eb531881bf356d942b1e29fa3452432fdbe128805b0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c47788abe5bbb845d03faf7e896a7d
SHA1bb1fac09f07b2aa5a09fbe3b484998dd3a09c101
SHA2560e910e78066a85988197ebd3c74d07d465a9822edc5e2a379c0ff4e3e3dcc96d
SHA5124763bd8a5a3352bd1d1129521b460573ede88bdad2c95900749f201df9651074e2db3ff8c5b8ddd3d862c9be54a9c0723b67f23d88aea406041472a399b1deee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502344282a5f4642de4b42833a6d1bb07
SHA152feab143fbafb6e6ef2899f86ce186bbf09693a
SHA256c9309a1a4a07d05e9b6a58aad13ca5528227ca7a5c43f2b5391a8e15b1eda44d
SHA512b92379205d5e142b713aa3d0d0415e5aac00fb08afaeabc393270776d6d6932347b692709f5dfe2da285ae76d9650cedcd23a300296042d72a59db73e3cea2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f0e996dd7b969e18f1a0952677e14bd
SHA1ddba0d77d51d2a8963ae87a928e3581a185182e2
SHA256ced5d10be8c3be6f8f0751b66b48220f27d5a381223c86a227475a9ba0c65611
SHA512513555848c2e6245ad2770536e4a8f97a32dd12d8983dcdab25fac55338c9df3c880f81d355337f7b2b396d17dab55f39add4da9e5f9dd85b6e165fa86194de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5508171601ef8d9bb4c302e4ba1268865
SHA13e3c2dd251ee7c7560a8ccbaa9664679f4de2989
SHA2562d3e682e928f6e0cdfa91b2f036dda6ccabc1b077d1c8dd48908b069fcb75384
SHA512c47ff2575b8faa066a03338abb9b3489c8f7324fd43dc145cd6bb9f74311743da4137042b2b20aaf859d30724476b3a25431d6d2ed0344469c44d2336df7b63b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5116aa747545443ed2b01fe01159224e8
SHA190226a58186c536a45e9805a1812c0ae289561fb
SHA2565899fb28570f812621371c1db0bfde7d1fa55ae4ac12878f3f7e005ae0ecf59d
SHA5121d915a141072bc66a648ebd47daff44cd3aae519b3f0f4b0ca65f8754bc293aea8a1602f46983478718af7b68aab1d07891fc905980a3d18b4f25b2e714e9ee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91d7d9dee05bd466d7f57fb885e0b00
SHA1c38fa1fd1a90eb67db1ff31bf360de7ae0d23496
SHA2563cbf417c5eaf45e609aa753d22715113d54926f54b4bff52762ac013b4bc3650
SHA51211111639532c896056e94db376b27b9f327d345cff7ebd525ca151ba90b0fdbbb87b09cee27ca573079c0389afba28d1e9dba817c89936bf7d23d5a521be136e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52660528c9b2ad47a5a5e5f41e70ac55a
SHA118b944aac9f602448446b8ecca68cfdcf4c94d4a
SHA2560b8a3c7aaa43df3857f73ae91e74d3e2593294d4b9f1624fd5cc14f4d1c3c9b3
SHA512c1b3b4ef760957e905d8d0d0541da339efd146196a05c243a0d33c02b108594663522389c1c788c5bc72e1e20b42f3ef21d9d33d9a2a7f71b29937fd7cbd6efc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5311a726163a17f957c8d154768b66d9c
SHA1f43148e78c2a63e00c8bddd68c3ee80e2040739f
SHA2566d24d0c983a945d834a2dcb0d36b21e9d9ece81e4ca984ea1a2a2fae8ba15c13
SHA512e2181253d046bd959091d5ce1d20f009d83a9df35ea5aa8cb6ac4dc78ccc529b1c1ce3f3e81b09085365f180a9ce30b4d62b08ae931981bffb9f1a00acc10ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c79c62421b9f132d6ff30027cde81ec5
SHA14fa5a42d77a065b37c0c1561c52608cab1572d4e
SHA256d0d24622d8ca09d82bd510666dda8842efa33339cb41f799ba4cfa32ee0791c9
SHA512b6b5c9e3b02b26f6e425425464aa299eed6d1bfa6c19d9ba7236e8b12ceefbcf3b19c9a25759092ecd6c2d62ee65d52311c3de34b144dde5007736d8dabf74a2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b