Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
9639015d3f8fa65ee7c0753ec9b0dcfd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9639015d3f8fa65ee7c0753ec9b0dcfd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9639015d3f8fa65ee7c0753ec9b0dcfd_JaffaCakes118.html
-
Size
460KB
-
MD5
9639015d3f8fa65ee7c0753ec9b0dcfd
-
SHA1
f6c914e85e841294ae6fcc5c766cce86898ae57a
-
SHA256
4517fc17310fdf27070aab92beb6bf4b883e4eaab01646b5f19c18d0e73dc960
-
SHA512
6610738aeef5a7be6c98328fa2dd48631be7d74f57440fb99cc2aa43232ae15acae9f368b7b6a9058120dfaf5c0a9d22014f3b9f66eb3697da0ba789e1dc6a3f
-
SSDEEP
6144:SCsMYod+X3oI+YxesMYod+X3oI+YhsMYod+X3oI+YLsMYod+X3oI+YQ:V5d+X3Q5d+X3H5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423696444" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000008d823c2ad014d4aa5f4e9a4732f803600000000020000000000106600000001000020000000a5aa7b56cf8055c3cecd2f17d100558ad2093764ccf276bfc82219388f849a6f000000000e8000000002000020000000b85c9d77d16adc9b9fb425376ba521492a2bd1a9ffe52564298f6e9d324ec87220000000026b8d34127d26bd5579afb5a7b96aec77ff7a9e97c8f71bdd6099adbd10248b400000007bf7afd4c05ba511d4ed7a7aee3d80295feb4d962b9a90e1c98d793eb8ec6569621d353d33e36926d87d9894d29e6165f95d5ff8c9e7df544bc7acf698b6d9b6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E33677B1-22B4-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8066e0bbc1b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE 1156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1156 2220 iexplore.exe 28 PID 2220 wrote to memory of 1156 2220 iexplore.exe 28 PID 2220 wrote to memory of 1156 2220 iexplore.exe 28 PID 2220 wrote to memory of 1156 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9639015d3f8fa65ee7c0753ec9b0dcfd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e4c517a743cbb888b74d0e86021bde
SHA1bcc804308afdb0170da0e18660e09b886909e057
SHA256f854694d7a90770106d228d20ef8776693f6abcfb747f1010a12a004554be1d4
SHA5120138f8cef31c66a2e876f6596baf55f0ba662e8fb9aa7f3de980adac816817c7800a8150b25c735f5503c5d1d7816c359293f9c415fdf31e171aacd57b63655c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523cb3eb99974b59a0c6cf425fba110fa
SHA14e72aaa23ff08bf2c860aa27454c5426a6cd198e
SHA25627f3e920dc1dc80808170fe2b773c6b2490c8fe5509bc717fbf584722865cc26
SHA5128b53f64b2b93e18d0d76bbec20c9044a7d1eff24da8d72452013cf84204cac3079bedb141a76aa92ca9d48c20eae717c2dae8a0eeae20a516080559dd3787e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583396745cfeca34757e117083f24485e
SHA12b33ed31067f53f7938e686db58997dae5d1605b
SHA2567e3896920d06d032ff589068ce0f0ada03da8aae82ef388f3dbe0494a40cddbe
SHA51284d201be50455c15c182030dc7bcd6ff59c99257e3cb77e505e631b9fa6be5007fe7ab4471e4c434bd94950d9d8d4047ecd94c307c9378fec7919582fb1a90ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ec115e47299a9d03f740aa518dd3e5
SHA1f3e8ab12cdee0e7f1c550f6240e5ecb3182e09c1
SHA256d450b2446d0aeba03ed85fe67286ec2130db6a5d1a87972b04601e94995c7358
SHA5125a0bf750b0088d879adb23872a825548e76f99a3036fb21338db9d1c1a866a3f415888f371a310554fffe2cc8a3871f8f1da961b6b4cf5453b3cbc253afc0116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f8d82ec79f703f43315db550e7fb544
SHA1d83c68c9edd8e99f8fae7c43c5a6874a402a15ba
SHA25679e8b9e5e54e5918e4fc49c01bbf7c7d62dd9ff148a8b521297268173c0d892b
SHA512659eea0adb30092d4a41298318e1634a3a26c77662f345c5bbfeac7a39674ddd040c793dc9a5958bbcbf1f71b76dcc42f901b9c4fc95b044eb6529a358acff2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d3daab04c25380e05a113699063114a
SHA1229f572063658ac22315aadfa8f02f3d9fb731d6
SHA2564a8ef9b3f04b735536021a369ffd1c3cf3e2220e3ce915c8db99326193c86d4a
SHA51202df45bfdf9d024f9c62b120a9c77a66b1b25076368a8c87d27231dd2b1572a7ca7d16874d8e99ae0b4175b95c5b52eb5f3ddad607d38753cf037361550e557e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d9b21d1be5badbba27c394f4a42a3c
SHA11a2327efe8a30b7720a3259288c65c3e7a66a33f
SHA256a2c92d63781d226d18d35c8c0408dcfdde14d758c012c76d70c55f38e2cd7504
SHA5127f7e1e188bfb6b25fc9e97e41dd1b66ab49f78ac947e5bac9170f4128ec2049cf58437bb965268e571f1b0ee25d3ca7fc9e70c95e545d1be46d2a6bfc7a67976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50385d02909434ea3d9ab13f9b754178c
SHA14e8d0f4c4fac5be284800411d4d9e0db047413c3
SHA2566739d77fff0d539a6bfd1974bda77e17b1846917d9974105717b99efa2988009
SHA512b4e8091485977fb5074f5461fdfb302fa7688dc74ca63897018a5c28993883de0bfb16bd27f1c2d8fad42e63a7380859193f67f706391b8aeb1b5b69461cb552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c626873638765e6801eafa34cd51355
SHA18ce04b0deb6ebe614032da1f694ed77f3a8af05f
SHA256709a7928892bd50a1ebdbf77b5ad1162245f71e87801ab70e7c4bff749fc9c9d
SHA512f02549ec68f7d36e08e38db2287842528587dda90fd6ade48bc8dd6b9d4e09388c7d8d85df1e2f5cd2cc38ae4d7c1fa4c4cd9ed42b43ce4662f74a3b18b14e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53316d211ea9af5cfd32d6306f8107f05
SHA1b7a220050428fc86cb2671590338975a813fc3d1
SHA256a51014160b5119221945e6dc54b808318ceacb2e23aec1ee78fb1f2967b5b409
SHA512ccc906182c847a0f783983b6158f6a1b9486020457a8c46274bba3d3d7f265ded9642f6dd36f57a38a9901f71143e0803b560f8e2982ef39c6d2d7f783740a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85d35c4735df02547226f907d956764
SHA1de23570044fdcf4dc3a0bdaebec8a58625fe18ed
SHA2567818daa65085eb6cec52121182977418955bb1c6074807019fe11a68cba9f2d4
SHA5123229c689e44050bab1e144520dedbd6d832c5c4c3e6c937f1ec64b4973105835a48aec4a19c958932279be544e48938d43ff2daf1ecaa66272462b4b137823ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb785c01168142f41556957b4d8e9c49
SHA1fe2cb145da91ce47a13f8b339f8b7bae3b4bf0b1
SHA256cee659c7044e13ddb8426b987566ae8ac436e02db4141934e2be1d8ef03641af
SHA512001d2b2dcc24e246e4ddde9dd9b7580adf7e0a18b9156a2b9b9f7f1171ff7ae720f746064e898cd7e11a1e6e44faae756d1fb0cd4901c21f8ba7c5a009424368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3357b17b738ca0aeff147209c6777fc
SHA163694039fa7de8705034cac2f3637731336ce167
SHA256f5719c9b130db61021a9c6de74a0604966ee9201a76f215631e89df854709853
SHA5124a4ea7650ca62e91f36abc77be10efc18388eee6d6fe027ef0f92e89461c8b81a3bd23814d2fd5bdb46b62a520b91f339e0f12de767f70706a75fbf93c3f6a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5468342ae1700f85902ddc437c8f2568d
SHA179a2565d625b26dfea9c5f1b36611cef40a19ddd
SHA256cf3559f8b9bcac563f00da7fc2ae6e667e0640b963718476fbbdbfa1fc6fdb48
SHA51201ed8997727dfbdef032a61a7a3717fcf6a6429ab8c14237d477a58fe5a11f7b21b3a0fc2c4bb40c023faf3d480977a22529a928956e7400d71535db22be0e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6ee2f0f30fcaf85a6c707e2433cb7c9
SHA12d70007c01052d0a58edc66a45f3dc4beb91abcf
SHA256962c3252107980dc4561205cd08105bcfd51272f25db2135ef8e80116b9aaf1a
SHA5126d7fdda28c32ccc3fff114117b9d238f7d81475ddb56cd4e8af4b68a7671f37c82c80e86e9013e966a741cc0162031e32bfb8e038d11ff86a9e69269eb0b652b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0d95d72c06401f7e9e3dfd93869dc2
SHA103acaf88523e45d8a8fdd7cea1fa5e26dbdf7052
SHA256afa262ac0d5fffd9626bf292df47613420160c9642cc33330c026475e1b8b022
SHA5128e11758043792cc60b9393636df32efb16b01ce451d9593acdef69b25077eae0f6e47ff088b5909f7d577257b1b77ca21f59d10ad0c1db9a2ed5b4a8f9d847ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b09127234fa67709bf1a7bdf36d29c5
SHA16f1e5c3c68c000f495d00f80081ec824c667301f
SHA256ae3c44e27db871a9e11967e5790c0ea3a79ebe5239aff225a9c80176e8457188
SHA512b52ed9085cad045aaabb9c63bb0b4995bb90913f45aadcdc22537784624362b901e0c7c151b7d47726da25a1a78b0f77291774f2b280d27cdeb5d5db7b653745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566c3736e9746274d0df425823e9e07ed
SHA1232de14b3b105588b92a4470f4f23f2d3b397a56
SHA256eb16d917979e8becfdb4b89942a39507329ee934c9687375f3b6d0489dd8d0ba
SHA51210adde7731f2893c3ac97863d9afaa7502fbb6009c6ab0bad7bc81edf2d97d11beae3533f9769582a8c8c917de708b0ed31f56cc9b0668764c0b2789f61bdcc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c3e24791987cdcbaecd2edd020cb2cc
SHA1f21f1d25d31be8bdcbcb2c8d3b45b6b0de4fc216
SHA256cef9fed2080ffda84ca6064f26c8dff0a070aea0536913668afe1e929c07afac
SHA5128599f84d4489b0831b069306331f2ee401de33cfbe1e16c51e67d2a867cb7c4bc366a1582e657f221c8bba76f09ac1f5cbcd267ab0b98f8745be1df1ee642887
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b