Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
99a4ecb46c7c95e4b2ef5fce011cb2d6_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
99a4ecb46c7c95e4b2ef5fce011cb2d6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
99a4ecb46c7c95e4b2ef5fce011cb2d6_JaffaCakes118.html
-
Size
823B
-
MD5
99a4ecb46c7c95e4b2ef5fce011cb2d6
-
SHA1
21d0ad60865fa0e3b816ab001f1ac5d55a9ea8a3
-
SHA256
241d9b73f1205c2f059d6e05ced0c8a88164f2d674df6a7e5459923eb240c259
-
SHA512
d7e36ad3f4a01e7e127d585a3ea1d779343c676fd187f87dde313386abf71ad7bf763c53d2caa27197b4bd9a35948db5bcc8265b2d1bd4891e2078ac877b35aa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90965f9aaab7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6D7C7F1-239D-11EF-8D12-66A5A0AB388F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423796497" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000000c63a8673d68fe5e7a9623382a0aec7f0bd1d68ed85a29fe5753ba6522e47432000000000e80000000020000200000001fa2ea93191ab8e72e7a1d2dcf25fc1cd6f9942a197d0b765ca4f1a598ceb9f220000000a86178468a64da825ce6c23bf6c9d3310cb2cd381eaa902254f2f50c30cdbf6d40000000bbf59e392f115b18df775f4b6887c00e69c1b678d385f86463c6652162daf9f5cbba9d21c1df623d11fc23702e93437e24252889b2a3859aa4b6d50e21c43080 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 836 iexplore.exe 836 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 2112 836 iexplore.exe 28 PID 836 wrote to memory of 2112 836 iexplore.exe 28 PID 836 wrote to memory of 2112 836 iexplore.exe 28 PID 836 wrote to memory of 2112 836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\99a4ecb46c7c95e4b2ef5fce011cb2d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b22701391030cae479217c019e00c8
SHA1c4e8aff0250a935fd90f8bee36b5e442b9bbeed5
SHA256348697890b863ac73e60363fdde2e5c70b387267d381c1aa848bc593e432d753
SHA512e10494772d160245b576c345620ff5e682f0386310e5de7b925f09481362d77fb2712fc2046a2769b92b58214b382dbb36eb41dd628b9ab3cc1bec1717c7d8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85aeb6c103d2f15e5207d73f25ecc19
SHA1f641aa7f8eca641054e6c420d1379e30ce25e35c
SHA2568d4e7a2790ece66a732c24ff2f574c895a5ed94e886599a92b2659478750fb24
SHA5127fdbc4b184b9fe29e73e93ddeeeb0087cd2d10e5dfc937ebd882fb263f5810bfa4e3c023dd2615845fd154f3ef1c179f125c402f21dd906e794329e79d3f26f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d3b3da8df76ec3e1afaf1d6a60dca50
SHA1ed3728bb70df6197af91b8a3608c192984465c14
SHA2566c63d6131bbbcf046a6899866b628b5868cb573dfe5033ba37868a1dd4ac79e9
SHA5120a69445453aa00b359537d4a232cbc29ba50c56685bebf98b97c52cd58e4cdf42690fb32447f79b5f6d8b82017e55cf912046b96b19eea662bacf12a77a7437e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f7ccfe0f8af3d8850e5f246c1c0879
SHA17d8fd3209f78bc0581216f165d613728e2e30aed
SHA25678a3ce7f23ec9a3fc985f240e0d24b33983515bd3a3e17a0c1722dd1a506487d
SHA5123cf60765910488d0a7cc68a707f7026d32d1b14b3998bc551666639d2a3af9b7a09f8dd45fe89ce9d994984047e89c5a1b6f60fdd5f62bf7873ff6bc4e093d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63d644f434c365f686018f0d5b6c995
SHA12f816fd39137e99b2bd8b146a815a609ab60295e
SHA2560e516ed28d5af3510c29dc3fef9199304839c702f12f6e55e85ecd1d59986bbf
SHA5120d3298adc29829d738efe81b6af26cb12be18ab98f25099a35f183ea381050e9aab5a182d0414875d9b120b855eb0dbfb96755731f213f157a297f3a81e2754b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55afc0edd4da287e321b04660c9d45be2
SHA137a511faa0f0d864b61809f908fc513d37d5325a
SHA256edc852a14835ecc6d1b195144f80967286f61c9d9a31fbfe239ba577f4391695
SHA512ceff902196323c12a05465a937d5dad5c40c224b7acd2056e0555d342acdc68962fd5b4e0b0bd2500f5b61aaa459b2e067245b95fa7a60b60a57a58ea9d91831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9ca407b12520b8b1978ad361b3e329
SHA111ce6a178c003a8845a88187fb2522bce43c7ab7
SHA2560cbc3ff147e5955a023e0b44d9790a99e895b792b41a1c8ea2959dfad62dcd2e
SHA5124b66a1933bae51d1ec20f65123d16d2a93a8f4dfb0f0b94a76a3d7f2a146384ec6eb5af9a0648b30d9b05c5832aae991e3c0b3ced3fc3b19f1986d893943f35e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce99f43c14994aa1220283dcf781d0de
SHA1ef06d1c172fac4e5cf539627d8da7d858f93b34b
SHA256a80c4baf5c8a81352ba76df037f398e5b657a1b434af745c50df52ab92b3426d
SHA51201bb3c6c0cdd22ab1abac1324d28bdd9e44ff3436cc974dc2cd9d4016b7b7183d4fea039bef63a3573069be668d98e0a4edb733995d2054f01a33fdfabfdaedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546acdaf5543921a3c7a9464e8c69c74f
SHA19c024d81a8d61794dc2de08ce86dbef6bf0fa7f6
SHA2560b9f3707083fc0126508b5b1426612e5571777bc38664d315251c28d755ce3a5
SHA51272403aabdafd2eee31c094c65a4842ba545ed3c6a385e9201dfa4644f4c880e6114e86783e67a35462d6e6b2338b180c5831bbbbae224956a46ce7957330f180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3ea70fca912fc419bab45a0570e5615
SHA197f0df5f59bc2cb4159636ee6a06f3215b601475
SHA256d87741311bae9c9af6752d87a24a153c1f2bf6d4fda9a0a743b0f20bb77e6e37
SHA5127768735449e970180afe50f67c4cfe5330d2cda50899e8855dacd9c513b53f20e0bfcf9fd2d0df4c6a9303a8259c0560215cbe8afd51a077d0535377233e6a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53775be4d886a20c15454d272a3acb9b7
SHA1637e341558ce7569c017772fe34e302037eb7dd5
SHA2564ff1eab315c55bf991da58156a1dae1303ae474feb753a6222398a2705e4fcf1
SHA512329e8a560b0f119ffb473a40a4a8aa7adb6fe035c96833d7d92e42635c023cd62321c0430b70e4134d2692d6ce6301c256ea7bbcb8cae1ceb1b0310a905553e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb5b4dadcf5ba018c352fc79c6e16a29
SHA128dca6a6bf366ecb62d5608eb694e866796027d9
SHA256eb891991c95cf2b2f9438b557995f1f6747a8d5d2a0a971b1e39335a18e61adf
SHA5124728918013da94e83c73119d34269f84d13877c9358714a517b8be15d3863d8981bffb172360bd7758ac9608ec78e936c1b75f04e98950c104162e945996cde4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeff2684f60ce9a6287437c3f8b7d0fe
SHA1d4ef951a5cfed400b4cd52e5520cc1708fbba266
SHA2569ca73c0d856b6d2c9128b514945f2f9f366d076f1e6e15f96800697561bc2a8a
SHA512a956ad570a33f1fcb799c4fd38d4cef3a449900095ddeacd565dc3fdb6ab74880fc855a6fdb9b2aff1cfe555c7fe226639249e51f095eb9b13fd692ecdce598e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59df51561c1f246b7394e3e50ab8973ce
SHA1f0b016a921755de75458489fc5a801e667b2670b
SHA256bdb49693d04fb1989e848d92323796a4bea49ec120ca62dcbd79423d8035194b
SHA512348c165dcb2d150d89c17643fb08deb9bb061e39f493b0c1bd68deea35580dc052cdd5a9c015852eaaafdb5cbfd0b602e7145841b7ce586fb69f593d9552d74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5594e14c4b5e6b8cfc05ee47336ddcba4
SHA1117905b3d617430b31751b3f71ef0860dc54c435
SHA256410588726056c2d08e4ad5596578ed62eccf1c48465c67c6f8dcf060f36173ee
SHA5129798f2e3c4a2deac5cdfcb8f619acf4e2a8c4de7db467bc033233d310b62f48314549dfcf5078a524aa44d3f1344b5b50d1b4844ee746983c3031e2aa199483d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc59d69f0a999caff87c546c24f8e366
SHA14c379666ce877a721a8d1264b5fb5f97d12e04f4
SHA25687b6f25410960d43fd3102b2d0a522927cdc110981015439950a810f3374e799
SHA512aa7124b98db4ab5122253170a96a217760bbc1d347d4f743f4c24f0b4418b0597d9aae3a6ce6c6aadca55cdb585cf4583d1e55ef3d89f7bcea33fda15f6dfbe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564fb7c243d86283bd4d79be1dde33950
SHA1cbffcc27565f3964c71a3f112a2b81f6f2b1b81b
SHA256cc28ae5f429300c9cbdf6d1f1ca3d51bfd224f56909d915f1d59ff70e5be10cc
SHA5125294f33a629cb71558f7de63f977d62ffa71ddf7206b366f854c50aad725ff7b58d13b3153b8a1fcf5272431d977d850664d324f8f18b4deab0687bd59c27354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512845e38a3df5581f61bab3f3afd83c7
SHA15d2b254155224758262c0858ae0ec744a1b6a8d8
SHA256743d221695816219c8b1f25dce7db84b7d8865799041f98b1796fbefa23f7e49
SHA5128655db265e4815674d82bf7a0c24fdce25d3cf3245faaa82dcac8d4e71f0aa1a9b314d41fe18d4d5456aeb6d020167b35f26c2a65d9795457f5bef01c442b9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52211fc919d56c5f0797c3d1f09db864c
SHA1c2ac997623d7f41b9bf1df7b420a6db119b64351
SHA256626d53c04a80e4abc22efc9277fc606716ac172896b3fc459a8bd6c320d48729
SHA512c0a9ce8f9b51122ad99a88320c1925e44e948d93eeeefae838925ff0979b1935da41053c6de0a9f04260c3fd2f55961e9104e958a14299a59a70832f0e2de49e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b