Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
9761d1c686ab8dc8699f62d448d99975_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9761d1c686ab8dc8699f62d448d99975_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9761d1c686ab8dc8699f62d448d99975_JaffaCakes118.html
-
Size
461KB
-
MD5
9761d1c686ab8dc8699f62d448d99975
-
SHA1
c2de339dc278c4f488c94bf7768ce31b54a499e3
-
SHA256
c025ef5c3f6f28e0b332badf7e5bdbdef82d984faa2911440a9232e4cd46da33
-
SHA512
e18c982ab3e856a885f2486691712dc12305a85943811c42a7166b4fe91fbaca571c15d3b318bc9562895029e95a62e421a27272dc5ff9720e96c10bfbf02e4f
-
SSDEEP
6144:SOsMYod+X3oI+YUQysMYod+X3oI+YrsMYod+X3oI+YLsMYod+X3oI+YQ:d5d+X3G5d+X3Z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000365895346888c540b3fb1f489f95ed8c00000000020000000000106600000001000020000000bf5c92ba0023789b7e5ee3ee840f9f422bfaee3fb705478e0b7b4238ddb9f1fa000000000e800000000200002000000093701028b5691688b218eb7368fd4b3ae9c5a0cf42546654e66956263f369fe620000000d5f3fc7c0199357d71a39fa0497bf642d20d5e57bfd1a96fd9923e076e387a99400000004a3cfcc3832e85aee8336ba1f6dbb5303d8c57e0e8b5d348db6ce583e4383c05964899b9ae1a425ca786da0d6e37bcd42444366b7ed3009a0d5a46d676d155da iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0bfff5b13b7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423731503" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{836D0271-2306-11EF-8FD2-F6A6C85E5F4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2936 iexplore.exe 2936 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2984 2936 iexplore.exe 28 PID 2936 wrote to memory of 2984 2936 iexplore.exe 28 PID 2936 wrote to memory of 2984 2936 iexplore.exe 28 PID 2936 wrote to memory of 2984 2936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9761d1c686ab8dc8699f62d448d99975_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0c722129e74ac8cd12b8747dae7313
SHA10794160c77ea034a32458e862013ca1b353a2dde
SHA2565b50e2b351f17a5608b63c71f8843e88e40580e0c1398b28095f37fb38373adc
SHA5129eed6f5f7c100863847c6e102acf6b71dcbc52447bd1c9146257aecde26f79178ea39abf78f72cf62a031092f76f8d9e24bd92a04abb6a52a10e6ddf4ad78dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57216c5eb8708eae5585213696d09272d
SHA1623567aef74e7b4fa670c5bc3eb54fefe5be7a96
SHA256ce9c089e0a6bf69c76693b30c37ee6e842a8aa9757274b022917b69e620bed7c
SHA51203421c16f084447387f0403de589d5ff7c1fff8fb6fb4bfe185a7d719d58b503da61d99d63de076a26f0cfb931c04514206896a38a152e0e88d8d3b4d9aed61f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bab6282b13961a169f5a798a85d7ba8
SHA1ecbadb280cdefcf46875896e01c788b6f9651cd5
SHA25682d662b16c055517908a4bd9131687fe7bcf72988a76e7fddf7726201179250c
SHA512190a77ef67fab7659eec70e3d5cf97d048e86c597b7a711b3f16628fc46e84f486f5cebd179d2c472b6f727b38f4c07580ee6280feaa620992b612a942aaca6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f887e4062dbc33b915c350aad555e3ac
SHA10e258d3210b15b325144f346f86082f5a5077145
SHA2561134335c2361dd991903ce66e2dbb2f4dfd050cc6f25a4aef53683dcf10b77ad
SHA512c993337017e6887e89a41c4094651f3fb5963afd79cbf9c39c21d071e6f1d582c7177bfee237a8610f00620d0e745d665d1cdac1b296babafbbd2bfe620468e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5395f01011625b720c12d7f1f0231c8e6
SHA1ed3c30fa550516e3176a7b8f6b620fe2ff4b74c5
SHA25661acf2b06ad41c727b5f90d077d6a7e531d41bf5ceef4f4e8a8886bcd2d2ede6
SHA512f3c91616e2a86366bb03585f751e9ca525bdf5c8fbd929199c7923ed2fe32d9c28adcafae5050ebc88844062edbbb9c64ac080bd396f18ad705b275a44a02991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b063d95b79b92d9a06ffb0cb4a0ee8f7
SHA1f6352cf6efce925ec1b7fd18ddae96fefc790bfb
SHA256ae5e9b8161276c556d5244f05eb7701e39598e0152a71e06be8c4c5a23b306e7
SHA51248ef045f5f5abf9dabf0067f241a44c7329142ae15dc5662d83993c3c7efe22ca4f3f92aad80bae7c2c1efc1c663903707fafd90399178024c27c593c898c5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e74fe7061a418b8b5bf5ff3f55af12d
SHA1fe7b61ec0a2cbefb138976c50b03fe5cc313885c
SHA2564e9e6f31f9eeba6360ade4c35d3e1d0ab7d7755f47ead78a1b8efd5cade1e442
SHA512b87c331054afd7cefe912b726e635dd1484deda61ad29cfdd7fc22a9a6b1922745332571d58ad17a236041602ebaae099f67a7f555ebdc895b693fec1b2c9e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdbe1744dbd645960bac47b8f15116d6
SHA17a595c27954673f493640222ca68405f4653e0ab
SHA256de3b665649d62b5052ee864c209ca60c6d20d443d3b4dd06a194f1bf83b6fe9f
SHA512292f31f0c7eb233dd0e03425945619caedc837e3bb1de4c45f84ab5f42ec92ec6c18f729f8b3dbbcae98ffc6335850ee08e6589089ae0c14c8e33331c96860e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559289ea5c6c909b470eb3d70a56434a0
SHA1565cec76a9ee0135aec26bd3d61ea28229bb550d
SHA256dbf30d543d509b5274bb80c31509102d2299f301a81d406bd164032af6db6fe6
SHA512512e7cf486d1d0d3ca76c7f2fc23c3bc03f2b6f76137b11c8fb066304153e1140caed3a941128e7725d0180070bedd90454eb76eb836b7cfdd338fc3fe3d05d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507a8f87deafb0fa2716cfa63b5c1136c
SHA1fef51c978b34a90aebb69721bd9d81f71fd13377
SHA256a9ad0764556f747508d59eb0b7c03e9af64bd968fcc0159b186d0de3bb465da3
SHA5125db501232471af9feda761eb5bbc4989aa12994dba504ea04d3d6d4cf3f0bbc8d13eb064f1110aec9240e7e26a52a4d0872e4d8dda9e2cabe2e50305b3102423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56abb7190df62fc2d31f170aea09d333f
SHA14708c593078c951b24dfc0362ece6d2cda4a134e
SHA2561f9894baa272658baa057484e4db2d0c2b6f4ed2a9f40532f45c3eb30e3a3acf
SHA51273e416b715f67f6806771fb9a89f9ce7cfc64c9dd6403820b7218eac499efc24334cd51d99f1d62cba063b7001621d56e5d67223c64d05adebdee2b5456adf8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55793120712f34db1151f5340475215a0
SHA1968625fd93dec46398c24796ffaf5b9396d2a62d
SHA256dfd635c161a81d9fa357db6d08e81c2ba61069129b92286fb86b32dbacf5942c
SHA5126b35c37032aac8757a8fcf0835ccd12c4c6632a2e34533864ab5df04f16d738d3d7caf58f9bd244822d0927762db8377ea2d85aedb0ac2f699e70e2d077308a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cbe4ebe26074d99fd41643453e030ba
SHA19d6eb2a8c49c78cc2eddfea2da61faab675b76a5
SHA2568b6b17dd564a4d1f7e6eb78ed65466d669e1c98b1a51849542d040fc17ba2530
SHA512ccb82ed24d09bea9d0471377540108505613a96fa83ab823d13faa8aeab3835186a56c823548a07df17b83ea0aa73b67862344050c384153065575bb557019c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c9db33fc8defc52ca98a2d8021da85b
SHA1a5a8e746b378c5a96057bac2234bbb35fca73972
SHA25640e76d1f7a5a7ff8bb26ebda548110ba931f70297bb467796d61cf7d59b40d12
SHA512db8de2904b410e69894a47168d93e2b2bc11aa455fa0d63b437e3b758e3ac57a61a5f1c2b791e1bd8b390db50b771da4d4e0d8945a68ad869bdd3bccb83255c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565771ed6e45900da00c100bdfcbc14b2
SHA1735a0741eb5f3d71c0bf88c322463ba5ac2e92d1
SHA256a59849c0da5504bb5eda866df343db51903fdf180cb5f5cf90bbd7a2d54b0819
SHA5124007e7059c95977b6d8558fadcc78d4bb8f6206092485046410d2c8f381b6e10408e7f065502b3635751606e243b49249ac2ea73a64edfad5e142a16bb62f0a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554a6f3be0aa0994305c9bf12e37746b8
SHA1d4a3bd1f3bc01e658d473f114cedbb9fdf96a11b
SHA256af55a1985ded2080a5545c9fd1693241ace2a19f2c3fd214489a4aa3e0c3ca78
SHA51204a952d379db7311eb94c41fd52df656bc8572c4cc4e05d21aacc838f6b83f5e282cf170e8f88be2f3946ce6d55c302b92f86d80fa5f1c6882412b562ddfee70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596c4e3ef105459307e69fc9fec486fd0
SHA1da0180bb694a19fa0d050d4a6ea097f7e6a073f0
SHA256198cc4787761bfcbea9c46ee2e65885360344a3e420cffc4fe36d984941f899a
SHA512f9c6223d042b820d958e1c5942a9b72bbb29fe18f1c4d1d708d3d72c0deaca1663283cdeac3e768cd31f63b8e2eed543b7545794d30eb888147520c53fa805ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7fc3f52405cba8b20bce3b148fc687b
SHA19f4a1e1b5d3bae231bce1f15314a6b7c4b63ebe0
SHA256632665074f987ad2cc0a33f392042c13bb25a1760e3b2ce7de70890e258194be
SHA512cdfe82f042ddc1e34819404727bfc0c66fd9c7be60054a1f1e9b683135c57cb892b03efe547e90c2acb6f8482967af7fe0a2c149a468f48b80e5ac39d9b999f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a8756f9fbab022225a996ab67b1fc8
SHA12c1b183a1b6bc5856d1e33b71b2220710490af5b
SHA25639baf8eef14a975146807beb78d234113c839615d739901b239c533c6ec2de84
SHA512cc4128db450424d37379ccf97652c4e794151014c160270706cd061ae4cf79d4d3e3e8dbf9d2e02c4271206716ad1998892b71fe5a79b8ec11b45b0922af96f2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b