Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
09-06-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
9a3ad07aa301e03afee5c9bc43d66d24_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9a3ad07aa301e03afee5c9bc43d66d24_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9a3ad07aa301e03afee5c9bc43d66d24_JaffaCakes118.html
-
Size
51KB
-
MD5
9a3ad07aa301e03afee5c9bc43d66d24
-
SHA1
477739b8324289d0ef1a9203e0a93c1501e0a007
-
SHA256
fa14d413cec0b2912f523b6065d809d9d5b41e9d0664285888b3161547ee812f
-
SHA512
bd6f4316cca8e77450676b80a92caba3bca71d002c2ab1a0626ea241b12d0fc540b0fb0d8e1a4aa543b90883777723e62a4166a83cca3af96a6f4bf8460a6b23
-
SSDEEP
768:oGR+WGr7Yzj+rfb2gT6+HR5plHGeDZp0qquB7HIOJHh:oGR+WGr7Yzj+rfb2gT6+HR3wesNuB7B
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000d9a9f2491935ae29ef5112d63e8c6ca1c2cfc1125d245a5c138ac74b1f6d62c0000000000e80000000020000200000001a75d3332c52636c03b7703cfc10a14eede9e6eb2354eb58dcd22ec434df1597200000005f5f4df5c5a1c8258a1e0ee105f0d3dae538374f56990ffad90aaaeeb614c6dd40000000aa86eaddfdd6f030c57fddf1dec12a9c3f5143a4229bdd2c51119b2a1c1a65d03d54e5b428a37f59713dcf2d3d066327eb8200d19d7ede3f19002e9cc319735b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ccda2bb4bada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424130429" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56774651-26A7-11EF-91AC-F2A35BA0AE8D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2656 iexplore.exe 2656 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2628 2656 iexplore.exe 28 PID 2656 wrote to memory of 2628 2656 iexplore.exe 28 PID 2656 wrote to memory of 2628 2656 iexplore.exe 28 PID 2656 wrote to memory of 2628 2656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9a3ad07aa301e03afee5c9bc43d66d24_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51496a7b8f42d1459bafea41f319ce357
SHA132fe50c365b2b90e9d4fabfde97c2d0fe71ecaad
SHA2564cdf8f9d463e2a936b5ba141528ae80d94e03e742ed886947828cd17d09e6c55
SHA512b62e21512527ffb46692d30e283d8cdccdd7bd04a4b011afd50fdf2517d42adabc36ae44ba18524bf35981c3389e344e854433826837d6999897a8d81282b750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e924ad3d349c86fd4a6afa2e5189fed
SHA14e9a2ab4a68346f5b8847b068ac6c5cde5a3fe84
SHA25631eabd2354a1d8e0e482e96f2b61adf282315c539a155c421616094899f1d731
SHA512f55e97a42f0617ec5f0c80755e5cd8be765d5a12535188caa260d6c5c92968e539713f7149e18fc33150735114243e56af75a79422e7cffc60a68a056b55ed50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b880a5ca46ff6a81ad64d9971c7ef5
SHA1a7679ded95354d8322874d79ef0077ec1305fce1
SHA2560aa39e995f3fe983a21016958b145cd7e29cdd11b7b9371bcaafbbdb205b57fd
SHA51201d75cc4a0bcb800da2e4ad44dfcf0bf65b9810eed7938193e4853b982d83750090f53e2ca9d3aaff2ae68cd1e15b5e7a964fae7df810f0b0782c69a1efca8b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a536af1f2f333a11a96ddb34c686df30
SHA13b5cfb96744e1fcf581395db64a20c3a2170c857
SHA256f000fe92ac456b4bc3d8e6c2a5053ec5ad70a3fee9523aed7f0dc7854bd5bee4
SHA512bb97f541c14ac85a10553d552b380415c59ce35ff25e4d22aa5e0c72eb96d31373804bc9d4007569a9fde91157fe4bd49651470b922c5466e8a74505d2dbc816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af55b20428983ef47900eb5bfd267213
SHA18a36794f34e08b7a2e0bb3e68266b7f380d32b16
SHA2561e212c5efa9c951da6867d1324f54a93bb3f157eb135c48170413da3ec9d0245
SHA512aba301b3d4f7581f1d6eafb07008c267e61ba59910ff70228dcd4507f134af1dc239fe496d5c5646f1d5aed06c6d9f88ac501848d352377394920576a72db85e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c3fb45bf6dc501094ba70df38e5080
SHA1f4c916af6c315823f454b4996f4f7aef091930a1
SHA256ba6df7e63e98d8c9248ddac01c55fe15ccb2b01ba27bc26104ac3483519cc5b9
SHA5123df3d28933564564f170009636c82a33b3215aa314ce702c40df7e68e3bdee0e828345bdbdde160ab72659912e3ba7e66880923a95b609065996a6999a72cd0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73afdc3783b3f75edc3aeabb62a7327
SHA10c830378f014843869e540bef94843fb2ea9b9cb
SHA256a3401328b1fb160e2f98f42d6d5f120112df4df7a6e08ad393772100853c60e8
SHA512edd6d1dd893d490e2123c2d58e75d6b06ad12143c67e5443f64f0dd3a96c7e0aafeff4d15883ad75f6435df7dbccf3c85ba051570d6d3b872ffb4fffcef78b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0dcfd08363ec686b1ba991acc9c048
SHA115405495a24a5d9c5e5e38191ec491bd28988d8e
SHA25696bac184a470d4bbc7da6ed05764440fcad556c821ce159b70609fa29fa410b7
SHA5129cdeaeab683cf33c3eee7437eb5e02374d4ca744641d34a107671b27e29e5166800af9af87bb4b70dbafcc2df053d6ed5ded91ced52b40695224d68f6d592a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b5a89e0d98f9a1ca0762de92dfc9fe
SHA171a4f0173622511a2c01ce9e0007557c72f28431
SHA25644cb16ca95e4e01ebf95904fa8d1615fcfe522e09e768a5f38434b2e55e53c9f
SHA5127c546e7e12008caa5cd81bcb5ef48bd787f70210e92edbe8b50cca44e10ede61ff184bac9ca4ce68ebecb2fa837024634341f0fa02cc729e08e5cc85e0de1741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e238bd7560bc9ef8b1eca2ab8e7c0544
SHA18b93c882d3f0db8bbc40fcbc518fd584f3f7ba8b
SHA2568407a624eb9c5453959c848505d7bcf710d11cfe110e75c6eabf98c09d81c1fb
SHA51239f9213c8ce0ea30a5e5c669f5d92d91e41155e0468762409d7b37e60269fd4801bc5032e440d7a587db2fe899b0f24116743d14e36c5f5916a0366b15fe170a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e43c13ab7270e2749ad03a2e3a497bbe
SHA13c34b68a757872c9524226055df12fc0544078b4
SHA25669d5f1c506eb9005d51707718f763cb3495c74f17ad97b0b3d5af87849e66f99
SHA51200369d72fd415471988e49542b337c89ab9524339240565d17013718031ea25184ba2b5548e5be06c0e1dc6b35319a983aaa69739f8055bbd137275cc1af34e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513f0b6165ca3ec219b2bd54ee7af2e54
SHA18246f9515b3a8fc75d3eb3658fef121da365828f
SHA25641a5b45f7aced970aa0e842fc9ae91214db41ba5f600881090e661e2ec8924e9
SHA51206e7aa3c95ee7f67f84c932bad34b3cc5cf6aa73dd9b4f64f7875021b28720cfd92792c890a4d1c6aac094e7c21f7289be10f54e8b6d4b55e0fc8e4bfb635e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5737eb57ef9ca81c4878af6c2333d2248
SHA1f9bf9561f05fbf27b25293990d638110fb2d5a12
SHA256ac78adbd00aeb179a6548e7ca0c39a705a01df63a44b1a5838fb6ac46ba48e37
SHA51226b2e4335aa1a74cb4c7efb74b96792cda7aa919946aadcd1e40c15318d06ac1de5fee5960eef509ca56ad1efacb05047a552d8c1f29a9df240e449dbc267817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb4ae3637125f352bdc9f5e94fc3b15e
SHA111a3120f28bae8e0fb61de79ec5f0c44bc8f597c
SHA256881e213cb5a37cada2eb9d8f5e7338ab584ac17dbb95162bc9cf9a36a932abd3
SHA51209280e8269c64e40c684167386174cd9710da8ba9dc7d69dbc754a27ddb55c101ea218774e75a060022e7ffaed15d33107b157b1ad5d0fab957cde61c1198aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b8176e97b6d7a296b2947d9173fad8
SHA1227b8ed3ef38057c8b39899dd4e2d5a81b96209f
SHA2564ce48cf59971fc3d9f15ba7a589efdeb429930d454a26e77df908119033046f0
SHA512efa90dcdd262116bb22e19c067ca6ba15b8c4be02ea948d196fa32e4e430a0aa6e92abbae5bb2e4d4b7d8dd992388343dbd39c48138884eba96eb027e6ced501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92535b8d34fa12948eb759c7af513e5
SHA140f538abfca0dfc02b860b17e49380586d5d9b0f
SHA2565c51c35900d65e84ba063548747609c06a846b2eb97ed248a363abdee087c7ae
SHA512fe035031ed97b5b4d3515e066cd3f57f1267c3a42a6e7689df1dfb9370ddf379cdf71823dc3184c0764fc2333d06931b0557d2702932fe382ece9819ff037234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570bbcdb685c0015e30398047d17c9de2
SHA14d6a771a2a95bc0c9c5c96a1e7e7e67f516d532d
SHA256d61154e120be1371e9115242857392dcd3fdb047e57c2fdde0082ec288c59e85
SHA512300a76eb62697565b4ab48a039b2fc01239fbe261c2e90c557da22982f4ab28c4378427acf183c6575a1ecf4dd46d55d6bd520e644e87a3c4d7a67a646259e4e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\528EVS6A\suspendedpage[1].htm
Filesize7KB
MD573cf45395d5c02e11f9fabb2bc2a5b55
SHA145c21f3053dd6158a09f1f3b89a8a22e96c24cce
SHA256327c78ddb12cded9a43bcacd69e7e62928cb2ee81588a0283a0f500bab819864
SHA512f67399e41dddc1d35433f3d681fedf67e0ade3da873eee4ce7b6a6815d865f6067b341e1c2c3da2d6d7008de66bce95dbc03fc5fb0782ed96152646485218bc1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b