Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
9954d61bc3ee3301c9d25b99b82cc3e0_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9954d61bc3ee3301c9d25b99b82cc3e0_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
9954d61bc3ee3301c9d25b99b82cc3e0_JaffaCakes118.html
-
Size
460KB
-
MD5
9954d61bc3ee3301c9d25b99b82cc3e0
-
SHA1
7b6dcae812531dc00f42c497571ab303013862b0
-
SHA256
19a470ced0521535a80ce5ab94077b0952103b0fe3f24f4b6491ec9e742e1c25
-
SHA512
e600ee25c2b021d9225b7d3f823c5d6c85c01681e0068c050704dddb2e03d8a013fd623bc560123be40e5ad4e84c3578a889a287b2edf2c894d4f1e2b9704855
-
SSDEEP
6144:SbsMYod+X3oI+YQQCsMYod+X3oI+YssMYod+X3oI+YLsMYod+X3oI+YQ:Q5d+X3y5d+X3Q5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c0702792b7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4EE12841-2385-11EF-97A3-C6E8F1D2B27D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423785960" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000005d382fffc3906655cd14db1f14cec1df4281f11365f9b00c9a9f9f0b994cf1f3000000000e8000000002000020000000abb4cdd10b9f910245650bd234e33a422afc3daa7278fa8865d9539d4db7ac2020000000b0336ee206182056eefe7cb36d4385bac894728f8a74ab3b1d992f4041f26ee840000000d922ac2d0fb636ce04f876632cb56f1c5b48b5b36d986f403fabd35f8eef50e6cf62b6fa72e0a27f705de5c864bf9302db7200c397c68ed22adc74a242895594 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1648 2176 iexplore.exe 28 PID 2176 wrote to memory of 1648 2176 iexplore.exe 28 PID 2176 wrote to memory of 1648 2176 iexplore.exe 28 PID 2176 wrote to memory of 1648 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9954d61bc3ee3301c9d25b99b82cc3e0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51761394f6bdb71a1ba58317f54ccd87c
SHA13192a3111b97514dd3433244d19159b8a287f538
SHA25617b9423f0a7d43f5c37db1d6fafbd7ffaea7b087cbffe8583204efd8d3826cf8
SHA51200a478e653e42c17af7e70d6faf6dd2af345686024732d29eb55a46ebb3633ce19a1a64e0a89d711b6f903d5dadfe801e77eb55c99574cc0f050eee1a2d3da7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5405eb55814448d2b21266deef0d13468
SHA101e95489d9994fa574d34c59f1e270d32aced079
SHA256b8ef9b1907dd76d82ce41a4d4c3d3967dcc1a69f1788611c0cd51f28f3d8eed1
SHA512909ad88d181ef4e5157f572d045282e2019a5d1321a460d30d9687ce1dbf9b82a07660db02a7436acd5330059ecde6f4e76c4488b5778a32f16c343721e89318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0967ecc83b9e87ab6b8224f51d5a3c3
SHA1502736da628e40a583142531617f8d0a963c160a
SHA256cb17d213c6c32d4b0339a11558d01f5212003955a27b809d53bd427d484241d4
SHA512b13cc0a3913c6f051024eec0e67c181d567afc43833939328508e06e239dc092ae149477c3659379451f92da6dd2af3cbfde32cc1ea8a9dc9b12c4a9800840e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cc9209f62ba32f964ccdb5334fa8805
SHA1d25aa3f6316095d7f793cdcb3b897717f00d9bab
SHA25650b967bb35cbc962595912a5ed16bec6da2bbcc3176893e42e6c2aaeb256bc79
SHA512d639b008d2ad7a091545c8bceb3ee3882b78fcc86e5910415627a79baf03a7f8db85142a5b4a4b25368c82e09e6b95cae4696129c39a486110915b2fa6b23ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5d17bee52649abc5143fa19aa37969c
SHA1b5bff3464851425ed140648ee1a39423add4c8b1
SHA256db9e012e1d597af9cad00be5fd471d2a5f79581663895deb062f1fc1988a232a
SHA512ff0cdbf8c6e0c97ba12b464b193cf6d8344ec729169bb89327a22fb47f3671305823a8270782267969566df9aac6a8536fc808fcf8938e209921f89807547d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5266a1d5bbc255f52e392265c2e27c682
SHA1fa75f2d376b809403cfe545ed261532ba7a01e36
SHA256efb97cb774560a33dcc805890f78ae8e36409702e4c685df96b005b6eb065ed1
SHA512f5c6bc6815315e0f0791ce4fa12f7b72ebe7e4e6db6e994cff56d5bbb77a70a1c72f5fbf7f6305bef710553f801ac3412a1595028ef2b98ed3e2bb63f8762b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d8a569861076470968ffcf1af34c039
SHA1200f0230331742a1b0ca965834da5d905f0ced61
SHA25620858d12735d859ad283a015dca171de74266fe45b6d6c63db38733bcd243689
SHA512cbab1b570ee1ce1a7269dbf6fe53517a5ec1569fbecb3f6d747ffdbc01dceee6a0f849281ef49f9c1bbc6c4d0dc6f3272ef234e5b51ea46002a4861f62404064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fec6157e4cfa1e38ef54c731295531ec
SHA13f2541c52bcc5b1658d29eb74d9dd2812fdb926d
SHA2562323fed8d0b86cc7022b4bb64f0bd2fcf5d602ac2ca43ba4be21c6a57e73a231
SHA5128ed508770fa838344bb1121d8f69b5126d02e83c0725e14ef35dc5f10e86f63c7a5af31d71d997cbab427a8b307a59244e7dc8551d4b8d98876368b1cddf0ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550699cbbcdfa8b39dfa8d906185cabac
SHA143045f0ed7571fcfb49034ffbce36613411abe0e
SHA25652be97a2e9edebe995b079393c7f6e45086863539a66c6afbe8e4c3beeea0068
SHA512336787538d13a09ae0bb8e8ac2bec1f64872a41e5d4299ea6d02b3a9e12641a790adbfeff672ed83cc61fe77b230b6e09584027f57d71dfd9fba262290ab69a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aae7760f8e5a50304cc9e582da7194e
SHA1ec6127e87735088923178010c5aca8a6475f5f60
SHA2565df7230c04626f32fc50b2d66f7fd05949c0d67778bbc57ee8926a1a0baa9306
SHA512b2ee929bc1d83ccc766db4dfbafaf3680ec5f4e22a25a687a40fb99f404350c0eed34daf5e9cd19b1518faa5ded187e10f95fca97b152842ec3561ef25acbc67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fcdcda6f0b5dec8c7e9cc6f71e3e997
SHA1ea1b8b7b725d60e8d8b6f9c5bb9c5de4f784cf37
SHA256318f22d182ee14f7a1acdff2ef5da27ef6b71ebd91a894cf31f2ae38f25fec9a
SHA512933274f02d40c7379d769c5f9bfffc036d17dbf14de0e37512bafe548952bd8ed405f2affc20ef6d8e06f3c123d954ac85259103b5cc290d51aff00121ade439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a86006f7be7b0b7cdf4acfad6b006194
SHA14206be023c94bce8b1629b7af6dc44e344c4e9da
SHA2568d76749b765f2b7521ace1c6553f6013cc9aee82dc657525e76663a37b005bfe
SHA5126c7b498a8f24d897e3be94c758e4818034afb0a87519f09a13c0b39792cf1fe758db95c5a418e6414591492c53d21e258a3cb2363d6091c18a9e9e1fe2de5d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eb4d303f79951e718070673f8b56c6f
SHA16d56569ed14e264b81a0264e11400b3e1bfd91da
SHA256c2574785c40c9678cd0e1e3a78d6daf0c17be03fc5f84cd0e1269d581d2f527a
SHA51292ddfd089ea7ac064e4d9468a6bf27dda1b70f5a14489817773399ec7a4962a1d82477f4aed8c5da2652a79f78cb006f6732c94b5800572930fe4ec1e1c6dcd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58afd3a3dfb6ab0eeba15ca665e2345c2
SHA1d380b9b6172c7bce7db3950dd56a3ab8aebc331c
SHA256943916880faf75c8279311024258b127426e4987c91fc294d2b82e694d2ac41e
SHA512dbb45fe4f312e8a13bda9e2e3d912fa492bffb6629646a0e36df5963608bfd0304ab955792defd1f0b678fa230d25837271a4f79f31986566b134b0cfda63556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a2729364ac0d06953e20c7d4fd24518
SHA10c159fe5bd873ebff73f25b6359438d3b746d2ea
SHA2562b9f143c7b502be298afa18ceea9aad83f0a41261a0f51c2d8e00d1e03e87eae
SHA512d180433e2fa1f208e3e84c9654c5eef0c20f0436578bcec72ce18a6d3dfd2fe7ca3af1192c0f480f3dcf5e0745cffaeac2ded02c865bb4252d8cc25174da8a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9369c003f733b56f53b18b132779a1f
SHA1bb9d54b1f3d15b34a70dcf042aed58f30703ce43
SHA256d91ab046266e88b5103e5cbce6467588271a186b692fd79a5df959cf5822aaa4
SHA5121a0f40a1b4fe104ab0cfa702d310f6e51a5d1f56f602f7900f9fff207b831a3cd6579c20bd64ab27f6b614c18f43ddc2a0c23880002c0211b1eb1d74520f27a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a7d6646516fd98803bb411215a25a0
SHA128e411ab68cb01d27ab94d80ce442d23e5952d34
SHA2567105e9eec20e20c571924ce6aae83be62d1b188f14819bac38b39b6ac6229ed4
SHA5122d8676a4f547d418a61a189cb85e251cd1fd05a3452e0f8a0512541207e38d43ed15f004ed75ccccc2000ea22eb83113998c4aedadb736fd4abf9102266eb7c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0fe22e15c4046afeebf19de870365e4
SHA10553759261b9d6aa4e4c17c04e942a5a17f17313
SHA256183a117a6f37483143da64b7495462650a416b68a4d75f7b71ccd8781241918d
SHA512e1636fcdbeb6ef9d2254840b369dfc5c44416b702f438647d694d1f63fd6c30f1a281f938f7f58cfc7be4727493c66231908889491b8a6579b89216050a8f483
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b