Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
9a320758d8eaec9153c71efb9cd48ddf_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9a320758d8eaec9153c71efb9cd48ddf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9a320758d8eaec9153c71efb9cd48ddf_JaffaCakes118.html
-
Size
4KB
-
MD5
9a320758d8eaec9153c71efb9cd48ddf
-
SHA1
691bde7f0a75d26215c581543c5d5e9f7a513bf5
-
SHA256
d876513c86dcea40e91c48d68d4028889c7ec0157e002790e5a18f1029a8cea3
-
SHA512
3a2a47b4c27d15525b0a0247b0f5c9705f1e3d1c76a1a24ed79af23b6fa502cac8d17a2e82eed71c2597f3c3b26a6d753440b6c3cc96ea031001d37ae21f2c8b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o35tpd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fc2537deb7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000896560bc522186a6a30c8070a6d9246515edd009f2fd127ead0ea6466e7c4cbc000000000e80000000020000200000007c38ad467b4eb359f9a37268eda6c3a0f69e8bf777222a515a674d70d045ad0620000000f7397f429c5f09ec3f1181db070e7f93cfb2a1b5edb6fd64c9b00348107f1125400000002d9ace46ce40d33d2bc56c9c559fb838cd8bce2cd180bd6994ae8129de799b928b35c242d220b9f9e34995689654f060b58b9e0ac4c416978316406f279693b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423818635" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62B3B441-23D1-11EF-B195-DEECE6B0C1A4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 620 iexplore.exe 620 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 620 wrote to memory of 1936 620 iexplore.exe 28 PID 620 wrote to memory of 1936 620 iexplore.exe 28 PID 620 wrote to memory of 1936 620 iexplore.exe 28 PID 620 wrote to memory of 1936 620 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9a320758d8eaec9153c71efb9cd48ddf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53540b0804677d24279e841de1360d1e2
SHA115cbee08d3bbda8c6d2d4a1c2734d3e8791bfb85
SHA2567b5f78e97b0b5644c9d02dc5aded74ca0aa1c3857923f1574a15d8c4c99416ed
SHA51248d7b021e10c8c508f51fdd24f353de11fe7ef943e9a25f51fca163efbc693dbe8e74fdd1487511fa542061f422193d4670a124b808624a2bd69a84c7a4c219a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dff0628c25e2d6a23e8131a16682b72
SHA1e139e33679731dfa9a986e38f8a20591d703709e
SHA256ae55cf36235179a0a11761706d1325c1b140f024196d6a208cefd0cca6c777e9
SHA512db82ac9841107043bbd29dd5e026d491d4d462c5a6dd0d4e484751ef32d7f57792d10dd2168ac8abc07b91b2122ceb1945718b92b1d86fa098a2c5af8f3a5f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c01bb51c3e3a30aa5a533a1cead85a7
SHA1d1f7790971ae76d48432ba0cac2636dd739d8f4a
SHA256ea90916e6b6ee683abd8e5c8a0269df998bd8ebc0cf46ff1420a24b4b9f4f22c
SHA512f7e9c22b2a316e1d0762517a8feded953d26b2cca6cdd77e52a76c841ae044f65f043078940cc68a6eced62c59038a7addc0b1abac4e406c8438f3816393ca1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a72bd2dd81d57cfcf1ef72e44ecc5197
SHA1603c671a76c92223b17a0dd9a5dc0d072456b17f
SHA2567547de71c706004993ef6ff5bddba4a21fd91288a97081272d42bb397a4ed90a
SHA5121491e8b3fb7f2d93544d39bb81ea0a5c5535b2f38307fc1454c4da3034995e24dc868540c0d454bc76c3ff037fab00029660b6b0b307667297190efc9bad71a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beed765e094beb940986153331e5bf34
SHA1d6df1c7553670c01433897ca81162ce3756696bd
SHA2567ce99cd15707f7368bbc7b6d74a3bf72f6c38e5b824037f2cb53a43543a6b3d8
SHA512329f2a408d4010ca4d75641410f1f5bf89c96f9681db34767263db91a1bbada102b11350cf41298bb5feb8a818b00102c61e857ff2d6e87461b4a7542e6dacdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd77061ef6cb871d5adf8d72356327f0
SHA1f33944723b5af9ee93ec4036ba2c1a82b6608320
SHA256b6f3f06ee07f3c40938ef771c94fd3b76ba42630c0f6f49f403b3b3f3355a602
SHA5123e42ec004c67e1be99e397ce24c1ad7d561fabbe6e53644473dea5754cf516c2305eb9ab27d9f6a800477942e3ebe8d50e159c08e0118df87b7e52170653c0f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5998559d6467e23c452696c00660ea85a
SHA1e69ecdce17d1d0e79c35689dbf9445795e8a0035
SHA256fae06a63435dc5bfb11a1d1e46de1955917fbbc78648455e1aab296c7538b419
SHA512ed18556d2e9fb6e465c64f56706c99f85b33534824f75f15c781d18079ce421a53b1164f432f3f4f46e506d1618bfdd6fbd762cdd2abc68c3cc5391fa229d247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef0b8dd77f8ab8313a241a165b023aff
SHA137e2cea6f193418b964829301b247dd0f7220a9c
SHA2563d51f9178a03b75c4544865293447cba3f76f7d4c043c2110765fad02b5f4795
SHA5124ac5ae1a5cb80a8d70bf3c0795c541171a107845d08ff0e8bfd1e7f3bfb5eb0c1169902404e1d72c5fd62711d5ed66b81a3167d07f99f5c4c87032933a1823ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5274b0e79478837d3c90c62844d637010
SHA1e978f2e16b95bfe5cadac7dc21af5082ed4b4497
SHA256ff70728088b990797d81c48a9c29f4e7bd571d8ea0ccc53365f484b0a28d9fbb
SHA512ba5299492bc5b4d8add8bc4fb2fe2dc8d1343315daec1882375625760f144dff97c616bb3283925b1e924848ec68fd131f76b07efe83e6d4fcae424ae7122b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5206f50f4ce64d9fcd5d518b4aa6923a4
SHA1f5e95f4c9b60012f83e7e2caecf7860cce9f4fc4
SHA25656f40686cc284d15a120a7d2fb9cba5a6404eb9e2cb8172286448ba5524f7fb2
SHA5122ee0581b0fb3ca65e85365b1deff5d6df339440d308fe6f5f7cd73712476b49c7e188ee43d63c080f244f81f23f64ae989995e7306d7ace7aa87274c9a4cc7db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b9c6554c016f7ee954415b11197757
SHA113b28a4726f91e39a0ba417bd30822e0c918e830
SHA25673fbd970b53175e8bc2e0c718efaba436f3e8cb7aae7785f95e8fecf54a2390f
SHA51222f444d92bb26f23d2bee5c70d0ee7329f55a3dcf68a551a62faabd8457d8ac4cb46e04561b74ae20a2c5b2ca7c7fdead4c50544e215cce452386dc97857ee2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e79c921e6598a3f45f2ccaf81d0cfec6
SHA16714b304882d52836c15669dbba28fcc3e8aabaa
SHA256ef530e318bd32e3049e698379fa50129d5f9a43c60a6ae28fbcb19b3d93d8b14
SHA512f0d8ad0241de01744236ac10a1433bb6b60cb7a207dc84795493d8deb94d1cc0084be42d7e36455c73bbb5f71bee1b382d02d0066663d1cde57cfbf7793991c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a4919203506e09d8a02ad542eb79917
SHA1547de558a434a97e278c52328d84c3398093f124
SHA256186f568c944a394ff37da811a3d76152c4001e0432977622661fb3a82c7aa096
SHA512230192194d47e06ddeee64af6759ce04b5d73898ff06b544450b1b4bf25af602e842d3d1a04e9e98d063be0e27d5e3431f41cb517589f02d2098a313f62132ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c79a1a9176148c1f9c6cd3d037ac3ae
SHA1a2e54e2345e3e7191145d4b522d415349d52831c
SHA25679162d3f31c532b7474ba8cbc1ac407505581df5a4f5a738975f044eb57b3a6a
SHA5122c79d345bb6b30ea382394a08f5c204c2d920601e28d61a8a10fe46025eb064dfe541c66d37fa483992d2e12eff0872f8f5d88d2ff284f5f161e5440ddd0dc01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b3d683f5c4e94d5fff6ed95e89576ba
SHA10d004ee31f34a0bdae0f32e1682d2ca57d01eb16
SHA256c34a1add2524352781981d68f19a499378d029601874963c0842ad19f81e8da0
SHA512b3ea9d1b79cc1ee8f457533c902b94976249f9652914685a1f5d64a55ea96d16e763c32c51abe4283ba00adfa89c890ef378e2e78c4880e0554470c3626c6cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931f06f787782a6f0d0ee7de091923d2
SHA19623966cdf2703488b95797321c186d600ec7524
SHA2560d5bd4f32299b747e4a69f716d7c3bc6292d025d2c424578f659cde38de7f8de
SHA5120cd00834f7a4d3af08a2125d1683a9a724c07ec71c36b817703e7e58ea976e9c6d9774e8e20137165b0ec62839e7ceba72501c6b6bfdedb45cc4c56970633922
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b