Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 16:04
Static task
static1
Behavioral task
behavioral1
Sample
9891dda6fabe175cba8a54abcd935abd_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9891dda6fabe175cba8a54abcd935abd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9891dda6fabe175cba8a54abcd935abd_JaffaCakes118.html
-
Size
17KB
-
MD5
9891dda6fabe175cba8a54abcd935abd
-
SHA1
c3545aab11c42137adf6b9082e662b80ccbd23bd
-
SHA256
ad4433559a3602b3045aef6551ed713e43978cd19d5061f078fd2f9086c8dee5
-
SHA512
e4bf367aa0acbcff4dfc000383a25fc31169a426cf61c00779081af6996f6e12a9af24c1b80c99118a348c89c714dc8c4af99719c5194fc9a9fef481514c4d99
-
SSDEEP
384:230bBM897+4tYVlKt0Mi2Dk8ytevhecIiYz/nruJs4:HbCStwKtviXdmYz/nrQs4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 305d643162b7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423765342" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D9D7DB1-2355-11EF-91CF-DEECE6B0C1A4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000036b7a18effe655c6b89ecc5f64fbc9c2156510a7ec9e40e0ba69c39b55f8551c000000000e80000000020000200000009e0aa58fd294575c2d475169d817475c70c40606eaa8ac389939eb80536822242000000080e12737498dfc9c1ee7583ece38056de21c432ab310caa4f570d2ac816754534000000071c61b49dda470f6721a8edd4a8d51ae1c281262172eed7254e51d65f851ae848e036dbd56263a24f096fab60391f4d721aaa8997e223abf2eb092f8619bb868 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2020 2412 iexplore.exe 28 PID 2412 wrote to memory of 2020 2412 iexplore.exe 28 PID 2412 wrote to memory of 2020 2412 iexplore.exe 28 PID 2412 wrote to memory of 2020 2412 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9891dda6fabe175cba8a54abcd935abd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59666f543c932992bbd3f0c8f0d8a7f70
SHA10561e5d4124273b3a75a8e300005d35f6ef8803e
SHA25640af453fe1374ed733781494d2c0b6326316467007d0efade3d3caeb6789e5f5
SHA5121a549b071bd9fd1ac9a58ea5f62e77be44cf59ac8acde71167945f90cdd2d48bc12e60e685e6440fcb810718c9da0041392a090ea6a1f374a0012ea82c7d9589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c1b786024b3b4e14ff869e28d76b19d
SHA1f5df5e020a8bd13de3e597a9267f31cb50055454
SHA256cb14188e49baaea2e289a3f5aaceaeeabe9c21004f642adc2e300ef99bc63fa1
SHA5129d96d3895cb4d97a24a97d0d78b11e8a20439f438c1aaa70be1da701d26fe9a404d883c96790a853f817a7eb787b4338cbcbbf4bd5c8fbe339e566f5feefe937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109ebbda2dcfaef45d5c86a4b1ecb811
SHA18e96017f5cdcfc25c9efeff84afbbca9aeb35f40
SHA2568d11efb437cdb8cb2091a8cee8ee95844ca81bc363517808177a93da675cc465
SHA5129f444ce12c17c02bcf35f23b168d680be9802e326b1e2d55481922f72d52ab3906de9400887b4ed69a82401088e0cd43d5a1e26a5921ebda2bded89c316150ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57be8ac74851d0929d19fd0a83ff71a5e
SHA1d216f62051db3d38aa472126f75434cb291ae501
SHA256301c8084f6230bd357ff8857583c78c765b603d0b0e9eeae0a37f553f0c6cdc4
SHA51210fdf783d7a98aaa863ca2b3acb8bfdcd47ca94ad2d3ece7f329db5516f30c76a2c2e36895d1bdd98bde8696378e25415deaf36924abd39d7d7fd282bb5f6ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c1c79f7dc0bf063575662241759434
SHA109121527be72c83ca877d96ec169e40e691f3736
SHA256d1a06a73c57870363c9d410c2dae2f94a233de8969890c3bd80848fa545d9f25
SHA512f3686f75f1ee80b1f52659427a559a3b9644cb7059137c4dd15a2c9b5364f0e3519aebfab23a39a1f2087b741131da7abb15dc3e687327c8a0629d66390f8693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e46d233d7d0ed621f0b8171d193da2
SHA11d001540463e855a006b24456abcf8a67a016d75
SHA25673c381137f937702e379115be2dedcb0cd8539e941780e03ecdaca9e16a56843
SHA512cb4c9ca15179871b0a6bba03efb39864b3cbedc2ef30bacc2d4a25fb44ac5c516445412993638971303679095fcb9404b08e476f01c94b58c6a6bb0be80fff09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573b950cc4be03829d34f86747c8e5460
SHA16d7d6bf76eddd113ef57de121f809a9abb66f165
SHA25640f09b58f1e9e21052ce76afeaf7dc45407df977a810691ead9ca67a7853a01b
SHA5124a4fdac20e91e6421d5967f2f66e6f5ad913cef908dc3ec1fdb03cba04512084c60718a614eafc51cedfc89a722c491888778a302566bcadd675a45f932c331d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e423538ecb31e7eb46a552accf3f978c
SHA1d391a3a0583d1e3f8078a9f5663496932d70f792
SHA25674e9718c9b3599fa5810a5286d0369a4ae3bdd26ce8f8605fa64f143b251ef0e
SHA5124edf9566931d86d05f1bad897f54ba5beb0c56c749979b3a59ec34a054c5b25aacb9981707d5d53bc7fe6732d9278d88a942baa7fa7459ad8934c1a0f7773ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59456513dbaeb28999338e46d025b7826
SHA1cb60b156f9a0de9812a9a3b0a6c33ccc3df8b721
SHA256f702f6a9adb3940dd8af1eba711a4d7cf1a68546d00fcb00c2a455db70b1a799
SHA512bf0896643cf97b737a18192ed09668fb72179e7689b72d06eb768987f7496efaf65b39e3a8bd0e01a94aa40750232a23afc13c589f185321b663a974e820eb8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581be26562128aa8aaf47985a9a214586
SHA1f8110168f826cdc38e14d07b16c92b573f613f34
SHA256043faa15d961d664a7f6f128c551665ebebbec2f2b8ddeead8ce9ac54ebf4b18
SHA512f12c3055135ffbf47ba042b12fce9482b52dea401ddaf133983099f88eb94df7431a24ac18d60413a6f2edc1dca6c7444cc6710c1fa26de1f47cd5d90b74d6a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556b01279f79a562260ef8b19b4f40930
SHA1bdd36431dbe48ef57505b40eba2ea26a77d4e9ee
SHA25634c69ba29c149ff8d718997710d93230010729e581f754c73b9b92f030d08223
SHA512d49249905200a2fa6740a65edfaafe6517e4b990676fd142a8297e5943bc4fe2b4aaa87e2ddb8d36f21d254c0ef32b777215a3eda37d279cb1ec9321c2d09321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e92c53919f2e36622dcbd3dbc5ef575d
SHA16313368c2dc87cc8ac1c52140c6a5db7b5380b6b
SHA256fdea3d8dcead3ef2cfc20385b7c3a02b264097a97f3f9134c55672bdc24a497a
SHA5128545bdd7aa3f2f6d8fc440096c1928df4e86ef2db64ddd000bb3a346e15a0e228563802ead302552b7c49645d6252dfa1689fbc075aa4aba4488cbeebd6c42c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f8b5491a0aa96f8f682c02f2ef6eae5
SHA1815158329a111ce6d6b23b41e3a430cc0ffaec98
SHA2567ed937fa3643b3026fe1b9c0acb143a3eaf35fad361dfac1edcb3491260c5f01
SHA512c47e26def6930c8e1111782e4cef29ffc6f8598539ca37f5344eb13f291d9fc1e9d2d7782e6a04646f79e2ddde0c276a9f3a4c2b66d82f5077a329fdca79d1a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab3d94da825bdaf6020ee77e1b0dc775
SHA1beb80280559f8d6ab085db717e4296a4e908cad6
SHA25666cb7d05c5b526b0a15c81786a49ae84e6c524ad4de7b23d75122776f63606c0
SHA5121a214e751b02571ebfe151078db66b156fbda94675fc0938ab529a4b121bec8e86da6e500d0f0e06e2944d7d4e086d3e7a89a9df6e71207f4ae6d42528a2dde2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd53e48f6164311e98bb03881823338
SHA1e3d98b98675d172989cf41b9ef6ba63c6910e704
SHA256eac77810432ef53f5946f9bbfaea36c1ca66e07c4b6b1feda65a74ffcee876b4
SHA512432deb6961db5bb84106ead6b682d4c9ba6d61627a6dce28f95a8f5d127ffc68fe80d14c0f37bfd2a16a43e230d95ac11d2d98d6fc42f5dbcb63519259175335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e32c6c6dfc0dfd14ca7b8ad615acd9dd
SHA16392571334022b512538ed80c21f316d4975f26c
SHA256dda6d1978fd10e26681c7b360cf71422dcc6ba15686a44c78d2bd63e44cda15f
SHA51257132520f1d168488a02fe6825467357957c3e520817da04d2545a5d7698582bcd8b6ba9d018bc1a28336d69d503087ab0bdcb39770e9f7adc2a32d244aa2d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133f62a3a0a157be2a8bfc1939217f16
SHA1a1cfc1dedb42fd333f4dc816e4b6dc1eb115e40a
SHA2566ae4bcf1afd5c7e10854cbc5a99a15df7038fe7f7d36f73829d0642032c9a488
SHA512370640d5b9612d94eeb1388dd03fef85ca842717d4023017a36a8ea1a9611eabe76ab1d74d9a501e4d35b012605d73c3019040eee9f0ab1524229ba0d9b59df4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d8e0e7a9c3989e8668fb71d57e91a8
SHA1d9b3231417ae74ae403c4709d8c310e76fe748fb
SHA2564be4bd616e0155d51c31c52fe7559700444a6ee1345000b806ca96a3a7c6a25e
SHA512b7df681e51d197a86a6f39aadc75b22c2e86d1ac4d5b499e11da48dd79165e2ca595d94690d42429ff118f685a39f9e9a622fc8c54e063ed920b742590d5d1d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5349099370421f020129349a51e47d277
SHA100a78bdc4f8d0e63f9f5f6f0612fe4c4b44fdd70
SHA256ca4b8570a9cb7bd5aab2fd549ebdb1f6f66ca9fe3044e5de4752f3c13ba1951f
SHA512e5c76eaed68e01444cd6afa4ab9ed2e8235d30a4c8f66b755c68a286ab4b4dbdf09cd97bc826e4ab2126b9476f5ef83482a7fa0df886288b0f018a119f69b368
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b