Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
9a4900e4f1823e2d8092b268c28d015b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a4900e4f1823e2d8092b268c28d015b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9a4900e4f1823e2d8092b268c28d015b_JaffaCakes118.html
-
Size
3KB
-
MD5
9a4900e4f1823e2d8092b268c28d015b
-
SHA1
d1006abd678e18b2ab84f01588faf5037537e173
-
SHA256
59ec196c2c29d0ad73323049218beb18995f4e6c59cdbcbeca361af7cc18f5c3
-
SHA512
e0b50f20e9a2880ef73a7b83aafce5bf6d09b85dadcd56b173ad04e1503b2fc5a64f9e7d173ead7406816007f764f28a73926b5f269549decf33e2f841b5018c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b9eabf6a2e1fe4ea02214ee68f02b1b0000000002000000000010660000000100002000000089c1229b1b7d12ea4f156aeae4074260cb9f60b93f85c7e26f918213b1780299000000000e8000000002000020000000e94806682a5f60705711862d56cb63a6bb04de694326123837de6548f02815f8200000004eb32b81923e67f174fa0bff8edbc9492346f8e2f3e2baf37c246200a0e607cf4000000023b44ca906032757647183a079a42e8005999ec84fa1167b0b16c6b67d17de0ca312083ad2df34a1241ad81a7ff8ffa11ce27e1642a0686fec55b785fb3f310f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0545386c6bada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AF15F601-26B9-11EF-BCB4-4AADDC6219DF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424138311" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 3004 1704 iexplore.exe 28 PID 1704 wrote to memory of 3004 1704 iexplore.exe 28 PID 1704 wrote to memory of 3004 1704 iexplore.exe 28 PID 1704 wrote to memory of 3004 1704 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9a4900e4f1823e2d8092b268c28d015b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2f9ac392380c37ccf416d09c9c4c235
SHA11c44699e8812b4bdb058bd875c6632a5520f95a5
SHA256fd89331b732c261eeaf3af5defd2752c4470751eb74f843c441f2594d921ed4b
SHA512b8c74486068e9110f843f73ba07f5f05dc1f2fd70a6b9163aa466536fe7aace2aa309f05bc0d79236eb5b0ed8f894de7ee673d5dcd9b179e7747afbae22f01af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cdfaa524ae203554d7dd4124567b527
SHA1747334e8981e4d9e158ee90df994eda67308d1b0
SHA2566c7c53bd8ea979e94aa8cedee67476cac245836e3caf697601218902a4d0a9a3
SHA512e5bee2feccc675962f8be4cd75a4a9c10b34cb41acc362e9bb7509d22c3d5ed48db2b72696f1332492b4f700702d55664a346f8939bec3329998131e7c74fe4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc5ec67acd688bf38d068bdc951a88e6
SHA16fd69a65dfce0b321f150df2a169fcb3eb01df82
SHA256806bd054d4eb2655eabc4a2ff031f8ab566f6b98e6ace19237f3ad770f7033a4
SHA51221240dc77bb7c084dd94f28a5b3bd784fe5bd0669543617117799a6848debe9d3f09a1a6f96b27322af3322aa79c082e663590cc7def7c5e0c4a995939350594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564fafd45861c2139fd889c531c220731
SHA17a851e0f22bdd2ca2f27e57548d54d16eb4254e6
SHA2563860e0be201e09e553fe8b28a164ecf4a9281eaa4b8d0618526bbe13c2dca9f1
SHA51242218de8ba628588fa4f837f4d4593852fae45e4adabc8cf51089d4c61e9078b83e2291cd8baa5167be73fb1cb0d8b8c9ed4d0e491bff1725a887eb35d3bc2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b819ecc82f211db580c1c80df2f55e2f
SHA14a93228e2d429d24d1dec5f873694b366dca8907
SHA2563db9fca63980c635d19c7a12b9d1d94ec7b8b2a5b0eda47223fd566f47c403a5
SHA512417c1503311b5e2853b11a0474631fcf0bb93d31f9c96328fd484b748bcf1e4f607e6651484f660eae253c3be43803fcb25f4129300fbce1c408b3376274a8c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c85c9ef1ac833d45abd89cd51605d60
SHA1154ef9d5a80dcbbdad05c9f6a2232903c8a86255
SHA25668ceded2f18e569af3b99fb165daac417190f69015673463c638bc209c1c75b7
SHA512ec1a19c5c995ef9d3c573ddf60a4bd22f3a16473b88a1d73c55282d163877b48f1524538c0c2fe34f46428c417c705df764cb3790f6c0c492120ad1d52eb4a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd104cffc9698ca93adfecc9be1c76e7
SHA19c35f3c20abe5390c64e1d16a1f5aef073ac9422
SHA2565bec8746a22e8b88fd1ed6a3f8758a4315fde80034784657c549120afed15f2f
SHA512ed1c6b3622ad00b6343f2fced103bddf53362044fa80c2167063bd51ad75f87767e9745e0c5f75a72994cbcf26b8ded883d7f8ad46d3ab5b73916705a933be08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5525efec693db356c44d58f6e01385863
SHA1938fb53fcab836f3c0a3486f5f0cfdde287d34f4
SHA256e0d87cea20e4329aa59cad877ed5404b141ffccd74054edf436a32659e1b45c6
SHA5127efff299a26e1bbd9ac9a1c362dd08655eac4d3e10492fd02f67f798d55904ba08da1914a18db7ffe0f030e26d93d621cfaff25c1f61143b74e78586a8ce7d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c690be5f6903de61f0f1bc2241ab079
SHA12667f5deabc3fa6ea7605b72848b0da78d63d8be
SHA256ed6ce64b98b9d72fe1d452faf8f318496084186851ee7fba738d2a1231bb1f8d
SHA512407004b88d2ad585ea35c756305d7de40e5f56ed1b7cb5c9b82a8f41dfec4804968b288a99a71a451132739c356df02a272da6d9376116faad08a87443c1967b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf20c2bc15dac551a4327b9574d50e7b
SHA1ac7874de911c8045a4d2ebf5733b890236f9d9d6
SHA25667ceb7e051ad4d65c5f4f2a8b3b0582d6c8937514cb3a5b683fba2ec7415e3cf
SHA512c2b718a0c4b506cc5f880fc96b82ad8d89ff03f9c5e39c0845c71db07f1e80d85aec26a99468449f556fb91ff4409dbbe31cd5ba8d4b6524fb1b2cebfebddc7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a89d48d54093eb0e40550f3948fe2a
SHA187f3c706ddf5a89a8eda98ba45cf30b4800f652f
SHA25665ab03db103dda2aab928bc950023af8f70dfc0e65b851760df9b2ae31301e32
SHA512ba592c5371ea341f6f302bb6a2af355fabfb1df4c84093943c7294b80e6aa4141b66c09c7020d16b901813d2c9c83edbeb83ea57dd434850c67f7d344ffd5812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51338d6f902e2de8ed13eaac019316d03
SHA17ba1d9c0d387e80e7cac14e4441baa41ebf7dde9
SHA25686dbe5cecec4006f6b8de09b82c37818700d36a09e1f14bcfe1f8918790973f4
SHA5126e9d35cb2a0cc36fcfdb08a79450d43e290ed6e02b6cf68939ad85a95ce353c0545f5591fa79ceab32daccdae4c96665662b20b08a007f4384d5ad22e1c41bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553217aeb640dae410e87f58eca00cc68
SHA16cb3f88c87dc353aefe5b05ddf5371944c07dabd
SHA25684b65b0506057afba4c80ba355fb5839a2767879edb523b8c563365dfdf72e35
SHA512cd7604eb001cfc6cdbeed15ee3a45d889c79a6a561a5d0fdba84f592ed231846b75e377b5acfed98ea0c95889da7e48f3fdd66e483e9d9dfea88b680a45daad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6ffa29d792b3ea10718fff43c82c5e4
SHA1fb21f133bcdec31f5ebe78db0aeb1fd5ad13707e
SHA25679d6ceb52f170249bb4db4b204aa9e56049b787e7379a397b41d96c8b0445863
SHA51208ddccf15dbc9072fda6c800d9cb32c7ba5ba148589c0dae7c015fc8ff7e6d2b8d47ce263fae56957ac96ed0a7e7d3f6b21c5c945a6a59ac88f7fd943d39a238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eb7cb72ec151c637ba2b0f188e20db9
SHA13781139bcfc0b0c7adffa5733e7b86cc421e745a
SHA2567faa8fb446367212d2556f0d596d28168aed63145b9643405f46ce146d6f3732
SHA512bf0802a859f83d993732e3629145a01a3802c624cb3968b998838afa575feb10229fae2dc21f3d5e39c59393ac3eee808ca8ce175992675af691ca86d4fcc160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598ccd6d72df6ac0d0a2934975c40d9c2
SHA19dde3c3432cc094db8f4b27c15fbade31ea5dd9c
SHA25676ce400073313c31f45a54c2b9e2d91a0279eb1c52d84a7e630c27988cdda4cc
SHA5124632318141aff4bad45aae94928883b8c9b2de44ccadfa550b1c89a087732fcde391bfa17d03e0bae02c98fe87c7fdd06a5570d116ca321e7e6ebd453471df4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c576d84ace30bd1f67d473b66ed844c
SHA19fe19b469c5818e404a0f8a0f7ed5d3181de65f9
SHA256d0c1fdbab403b1fd4d81d28077b00f47194f2e860a0e5d90452b511024d2c114
SHA5121da1d98e3cfb6a0e4a2bef88a0d91a46c4dd49c00a80d1252ee10bf8cb38b2ce6f32711bd90778ece74b3681de6a57a2a231976483c87e9c3e740b763c87cd3c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b