Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
9603fe30a5a8cbc6e787b503b97b37f3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9603fe30a5a8cbc6e787b503b97b37f3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9603fe30a5a8cbc6e787b503b97b37f3_JaffaCakes118.html
-
Size
233KB
-
MD5
9603fe30a5a8cbc6e787b503b97b37f3
-
SHA1
b3ec3fd3158d00f619cfecf5888b80f9c6065811
-
SHA256
5fda48715f0f8303042d502f615dd14b13e6a7a2fcd8ab1a46c40e17ced95f9f
-
SHA512
1d559bbe0f4078f9888e64c97c1b569168564920935e9d2c2e7066a930f9e97fae5dfd93d95ac1ae6e4882927f91773543ee2d63d83f8f9947cb87dc7e0e325a
-
SSDEEP
3072:SPk9rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ2:SCz9VxLY7iAVLTBQJl2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000050eeb6a1db1977438712c8a4f718fafe00000000020000000000106600000001000020000000f00b7e6644ce10c95ca1a78906156b2681e90387457392813925a5c9c48cf09e000000000e8000000002000020000000ecd45c6dfa5dddd0d98a23924ec419df5caa1881bd90f03585b22d89549973a220000000007d813dded094f9438e429a492870658b8d220ac60a3e57b61967ec86672b1e4000000094f2b5da924cb174f2506e948f5615e0edcf72f272c000576a7553c1175fb6175df1566a9a61226f2e0df34ecfca920eaff25ef1a696ea40a42f713eeff8ad14 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8019395cb6b6da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87B49171-22A9-11EF-B1CF-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423691567" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2268 2164 iexplore.exe 28 PID 2164 wrote to memory of 2268 2164 iexplore.exe 28 PID 2164 wrote to memory of 2268 2164 iexplore.exe 28 PID 2164 wrote to memory of 2268 2164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9603fe30a5a8cbc6e787b503b97b37f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8fe26547cde7dc48808a0aba249b473
SHA10d625a7ce1583aabb7d211dbd122f943a9357b06
SHA25664ba169ceb6eb14b11627783420f48f473b20a6441b586e4927b2b5abda902da
SHA51221c512f47e157540e347fb5adce27ba44f3fde6307016faa586507ecc8094a9ad411d4414c3da8551edeb13d56539ac7f155a0ffb36164f8318636c4e3db7f04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5771aa372956c83fbdda23751be6caad9
SHA18326fe87f337dbc36796536f2dc66a457c5280d7
SHA256d484697e1ae5296de3c73d13ed61831ae43680daa192c8fb0285152573ddda4a
SHA5121bb5506ff04dcfa6138299634be1114a3a8421d0fe4f1d0bec784245f8cda05a40a04806e9b29228d695e8aaac7047cb1acc5b69c1ac5d7cfc04feee34ec1d1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d655d71dc85b2e23e701868d07a9d008
SHA110cc8f8d18f6b78ce9e2b1b34c63b6d6c67d4eaa
SHA256bf8a6ab0194018b2f8c1bf36dd079e926544b3304c5030fa46c0a6c194cffa54
SHA512c7e238e3fa2a996a015b56612df139e4cc1cec40462feba6e779e74383d4ba266c7ad7df21f80a9d04558ddafcf14a2d1a81fa0010138180c92f47118837ce1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf25df4d2e3331d18e8c9ece83fb0d8
SHA18144dce282a345e5a47abb9d94e0259fa9660697
SHA256ac48d9ad11bc3d44e906d39030786958324e3c21015affde473ee2185070940c
SHA512fa9a64294016b21900af69097e9facdb6e6513ce2b24b42dd4d93a9c3fe4a3e9e303d1cbb8b6f98b42cb2c1cd1ba0858f8272becc4aa7882848e8e645e6b426a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2ade9a9a1a87cf323951d86ba6f314d
SHA1970b979ea43b1c9d95f935267a1248f8650d5259
SHA256b3fcc8b8c18d9f03cf09741196012e5ad0ee4fc2827e39e89e64bd9b39bad46b
SHA51281bc012046dbd41a49d53be51fd9ee39ede9dce8f567a423876243cebd23d625d3bdbeda4fd7754d4d7344578d54f1da42167b5005d31f13924c62ce5dffe455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c228072ca8e55472ca013504f64997a8
SHA1df4cc77b98679239c23a56767c929609e40ce137
SHA256fd41370ecc72dd339880230495b8674974a7ee8bfc3da85df644d25600648bc3
SHA5128a923b74ff3c535df5eff0534eee810d3406e6ac5b6306ded767b3d7fe181622c12db2af222bf0a05ae29fe54ebed06b1740b8bcece0c8aa678f0f23f5e587dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515a8d8d0196f6c7e747c1fd18a948c3b
SHA1ad538e38e730575539b1ee4791d79d2e00ac1098
SHA25692eaa67583f4769fca1533f21df4e971c0fc6510f35353c4549e6311b05d7c01
SHA512a417ac91951294f1c0317f35cba2647d19147b20ddf01b3c7a4b0ed00c4f0cd5db6c39a9720b652a9e51746a1717757605ef219e3a789f99dd19fa3d54182482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5832c093977dfb209664703ec0b826d63
SHA1a37b8718848f502338bc4ad58d7d00ea1fa83255
SHA2569ccc93a72e5a94b15b8376a1001ca5e7fe52a12eaff59d1f84f4612f77d9c293
SHA5129cd3239e0763b0ee34190ea428eab945f6f0756ddb12ca213e422d9cb924e84e0bbf06be69b3a70f5d4804339b5a0733959e18bbd881f612f52391b01f643b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f240cd91c3405c7ff494352acfc6445
SHA1f01d91906ddb5d7c468212979cf71880d552a760
SHA256541b084301677d9a4abadbefd71214ecb5e39c0a214772b7575917a6a26dfac1
SHA5129200dc6f7a8daccbbd8cad5548d0caa08d48af9e67e55155543b7409b3d182d8cc4f50ca0d4ddd25c18ef94c06912ff8dc17a49234e7e3ea521ad5fcdab9011b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e93a0808d7f3b0ea50e4b41bfb57ce2
SHA1ff27e6cb90fbb6243bea3fc1ef17859f764a74fe
SHA2567adf8749e552f4fa16a4d50168e789d5006a0de3a76de9a199bb0f09d140f5b8
SHA51205d14e9ff80fa2546dacce263affd10ba405e163adb5a3789ecde1aafaaffafde889c61fd5d039b7b62b027e1aad58146396b1e13b82a45c2f811eebfdf8a00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5063b904677841e517665ea1aa85f78e2
SHA175cf1c9988fde4369abe87ad9f52532a604eda2d
SHA256b7fb8a9a295eaee7dbede1e98f98e2f17d9d6ce782ba3754a19c85e65644d1f1
SHA512fb0daf226e8a9d7f052e7f1256942e3d76a0891240590d62e7f9d0ab084640d86e43f7e173fdd42b8d5f545d88fea56d3d29b2e6af7aae7c30975c4e609c6a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad0a4fb6fb24de8a8bc6de0580bd7f6a
SHA1c2651ecef2fcf7b7a5db55396df2d5607976fbf7
SHA2560f7d3f40fe6b0f843b5f733ccfc7793ef3b824dcf37a66b202d1ec10114e116e
SHA51236599c623339943905f524db58311188c58e6194b0ff981d33ea2feec21c63fe5db9a4d45e0cf734b7d5961a4aa4f198d77250730d317bbfe176512758308e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a9ad26a70c42ab3afab7785da3f1f3a
SHA1dbd9e43be8b76388dcbebf23de83e6d82681818f
SHA2565689d8e047da63554cdd8ae75e8fdd8d724fd08f4f9500041d6b3bb6420ab4ee
SHA512bb747b9526e0692333eda2309c70b164472e8da72be40d0ae1a58a503131c55f1197bc7e293864bca06f818988a62c7e4599164abb318bbfb7daa24eef2309e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550ea6bb8b5e07e6fa2b6789739ba534a
SHA121e629f231ce47821ad0dc07a5a736e8eef3a785
SHA256280ba1f7084530463ef762d6401529af1db1887b9aa9507a6773db023baf815d
SHA5126581ac6155326912da34fe03949cb430fa3eba20cfcfe34f08d34fbe3e6a635a01304b89178515c7d44ee6f732deb3243eb623a08effe241253c0136751c2d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf2d13bb04eec109dba9ea4811de3219
SHA17eb47f96c61b10858e8b5d68ff586e84f6bd19cd
SHA25611db9918cf3552d9ce7c6c68208f30c7f435bfc507862ddd8aec61644c20ac28
SHA51260e35ae9dd0d494b00994449c25d7a7f595289dd40846c17e0e33c4fdc908537aaf2a93c9f6c362f83b1c1c6d2794f2f37025ccbee0788a9671d0415ba1aea96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d2199e764a2f3e5d9ffa82b478a3973
SHA1e5574be551a1dd23a09025b3a8a7eab4e4316a88
SHA256a96c737c78310d46a1d58813dd77fe0b93b7d3fec63f4a06817632d5cbfd9d74
SHA5120c60a02ce142f62dabccc112514d27f136cf9c3a2eb97041efa850f139fbf39faa4aed4d3d3b8318780e6e6f0bf6e33cde340c8fa93ab71bbb1f561c8b5fa69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56394e799ef92c2fcc9a7d34921460966
SHA1e453c64357c82e7a7e9f1dd31fa4a11494230356
SHA2562104835822950d4426ad901c84e8dbeae315eab9bc3843fded627ce63c294207
SHA512e0c31f42832ad7116053252536b75b60ce3a3956243c6cfb84ab8c5b911872045e87dff2259c3c632cdbf2c5e2205a326cc41713c7d409e31888dbe2bf4cfa4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb81874f13a6c85610ea5aae1f69c487
SHA107d4c0290872e72d7f00826cf6762505da7b88a7
SHA25679495d5049c2ca77b0900a08adec542e7ce35f9f6a85e12565ade15a577946eb
SHA512f79ee89e4f5b008ff0298b31e187b271ff20a2f4446eaba3dc0c98df37548f45f5468c0d709c37aaa8c389e66cff14ca9f13e0d9ff676da43439a593c46e7651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d34af292e9453d6a84b9fb88e8e8125
SHA17dd45a10523969a57549c4ffe9a4273ba20d5b36
SHA256376c4015ad13a0ada190c5fbd25cdbbb35b4b0c196b8e6759f9fab22f0d26746
SHA5120d7773c54c76b653c7cdc2616b59c4c9be53d1874e127e8f3114609af1c7e626d6ec8fc04ac04f7f77613803b2bd6740607608df9b358506fce479acb3a796d2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b