Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 22:06
Static task
static1
Behavioral task
behavioral1
Sample
9c184b12f15cbd4450f4421b69c5311d_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9c184b12f15cbd4450f4421b69c5311d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9c184b12f15cbd4450f4421b69c5311d_JaffaCakes118.html
-
Size
461KB
-
MD5
9c184b12f15cbd4450f4421b69c5311d
-
SHA1
468de3f5cbff3c2be3fff6a83ef13f5584446d0e
-
SHA256
677c4e19f856b2cda1872a7b90e9f8d79aec06ebf5f0575966a09f997efe3f0f
-
SHA512
328e8970e23e15797c235d74f70dd392fe7404f48dd9f3446ddad5fa2f57c6f1896195ee01a0fe97dbc7215ab476a2f0d1a9fef02f7bfa9a460d937d89b26339
-
SSDEEP
6144:SfsMYod+X3oI+YzZsMYod+X3oI+Yo1sMYod+X3oI+YLsMYod+X3oI+YQ:M5d+X3Rl5d+X3s5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0819c9782bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424219082" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF1983C1-2775-11EF-80DF-F60046394256} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b6a4ae6cac60f249a16d22eff48e131600000000020000000000106600000001000020000000cdf03c881aeef8e2b70f3f05dac845786cf189ac9f6d532044a21ea2705fb6c7000000000e800000000200002000000027e943cc3bf86b9fbc281204512d1b354673499ccacbdad75a0b85b3428098f520000000d70065e011e71714cbe58888c5ca919c3914b8e46e30ca72b3cdea2eec5ae9c8400000004d05c652681d8f61c0b9c0eab1ae986ec265817cf9d834876208b93d932f811750fc306aa4294dbb4f890d69ebd752fb0bb2dce692040161edece7af42e2a874 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2896 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2896 iexplore.exe 2896 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2420 2896 iexplore.exe 28 PID 2896 wrote to memory of 2420 2896 iexplore.exe 28 PID 2896 wrote to memory of 2420 2896 iexplore.exe 28 PID 2896 wrote to memory of 2420 2896 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9c184b12f15cbd4450f4421b69c5311d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5793716935c15ed4c6abad0c4f9318898
SHA14a0f4845e438dc37795a127b1d29194bff08445b
SHA256360d6351013c055cd45a25baf58fa787c36931a7dc445ea4f9adce7950768fef
SHA5129d16bccf8c96b2033f3f163664e7b85c4ba4f861fe99027ce4cb44f29492e00446d3267fc87138cb322a0964df97b116e0fcee0ff03d91ca1945726aaa5fb40f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5866a2f9933e9c05d3f28797c3e67fe54
SHA120454203ab5cf6bcd15f30b0ff4dbef8018404d0
SHA2566ce83b9e03c0e59c03d1eb095c19d51a66e56991e80c47002244f4244e37ee7b
SHA5126dbae1eb70521a73ddab259e962cb939647e4cf7e8b8dfc2f93ebbf35266dcbbb2621a5b3c0770af2fb0a7c5fc5a34bdcbc78ead01a302db5d445ad7cd5b336c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfd71590935846c256627cf729f0cc98
SHA1dcabcf17ac11c26d67ab3212cad3c609bc89f272
SHA256ecda7a2e13aed412b02df4cbcabeac5b920acfd128216e43e94a8a24a42def3f
SHA512d9fea07176e65348e02bb077dda1ee6c1beee0641907df1ee2d77b87fc1526907b3804db0e1a39207df9069403b2334627a8e3b21503a4f88874bb7f3354597b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d94ac32216097efdac48ff227daf79c9
SHA19098c3a6c8f5bf81ebe8fcc8ad56673fa1dfa30d
SHA256e9def3e909df4bfae5bb5cdbc96c5fb7a00c5f3e2f941627f43bdb8bb77a0a7c
SHA512c7765fd369d756774a34ee69a1b58315195fd5b85c442afa0c6acb60c3cdb2adad71668eee4995ffa31c88abcebfe9951471e2f6483fe0667054767629a2ea7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3906710f4a6b91fc437e489137a959
SHA16023a4c064202b0bda3cd6842224a4bd9a6217b2
SHA25658d9573359f57670b65030589579af6fb73444785de0a369e5aba512bcef09b8
SHA5128966a979dc2de6f98ae949cf7f7f12b48200e3cd96599f73e655a94dc26d523684c9678c25a0d2c6157e68c31d1e50bedd31baaa1ae94888c79a36cf7e46b78b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcee2c45e4d8aa1e69197b759d3cf8d8
SHA156d7bd3f2806d6ad694d9a95db843adb35453e07
SHA256f4a0d374c1a9c5934cb5231b078a5e1068b991208ce618e456f55e57fda252e4
SHA512a74adad70f768872a068512aacf33ae952dd62518c1f762d613543f648fceff46088ab0ead7c2740a9c2fe59ee71152a03cc4d2003db7c9176ca75a2e8c8ceb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759ca6bf8315a235359ff5b6c66d2f30
SHA1b78a970cddd51157861aa8b6f447e590a1d77cc4
SHA25647c3a63a5bf72c3245e1c395c55c2d4152fa161e77d3f6b0bea8b9dbdc68a251
SHA51276fc7d608d1aea3ccc8eec7c858cef39b21b300d3f687f42f5d47ba06baf439f31a2c4ac085f8a4467096a029859ec56cd1df2880522aad285537ae8bbe6a220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50244ae47336cd3bd462c4c75a3b17960
SHA163fa698bacdd580f55f06d64958bca88a6a564ab
SHA256228cfb86dd3a6e3585b56fec4239b0f04c41eeac2c962c696a57b4b2b543d2a6
SHA512adf2a5936811791db9b230642870168b1baad91643f17c89a1a07152372c0dba211b0d786e9090fc786f572aacf4750b23efe0d1633fde3b747a06f3b5635601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525cdd0c405c67d52733037b6ed1a5c71
SHA187f65889e0c71045ebac8228af388126e91045e3
SHA25679f325e09ce1dede5638ba8586f82ba221aa99f814ef9855a29d55b36f458f76
SHA5127090d0a3b9e30341483f3025d6134f6ff016f545ea8a1b8d3963496d7a88fdd066394226c19546c1d171965827c21fac66ad505a170e7ab4c8f24c61548ea98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae84724fec993e55e9ddb38257bd4e1
SHA1f880c5d1ec81309dd7b598055b9ba10414aff629
SHA256727d015717982e96dc7e4d8cb36d57df6969c0f9ab2f59f20c804687acbf6fbb
SHA512e423b9b283ddcb4ede13440ca0d8520167d86f1b3c1808313fa32440da4caaa0bcfe720c32604cdc51fcc5de756b69c2e665bfdec0f89bec0dc0f79504b2af6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537684ccc719d638fc16c7c4a01805b3c
SHA1513460f9e5ad6532085b92792be52df04090c0b5
SHA256f7482a6e0ca470bd25ff708fa516bea6e1f1d3036f222472a20313f035d0e41f
SHA51280dc627b00510c20c03d961040f66c32da60be21e48e0e4998d770d8807c74974ea8df6731648f428aa7e65918581d61c705daa95457091b4983d8bc6b05396e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c9e32f1d194bb29b7a76ecf579820c0
SHA14e8c82d7d6881ff9d3a953d2fe66996dd00f1572
SHA25669122b3933d0d333c55adbacbaf5a0051b29dccec842334c1ee0daf6ee3f5576
SHA512147e2266d412d03a887385e60b01b0248a50e2777f902a61072f7058aabc13413934110fa67dbfe537513565373426a1108cca9855e1c066a0c223af519ef82e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563fe5fd64a0baf2f4659c08b49250ea2
SHA16a20ec772bb8cc43d2cf58a801b4846eef446ab6
SHA256370870fc30db84d8f23c9275fc84fc557d54777b4d08474145d2fd40342f2480
SHA512bab52f2de3b4d2124853672105d473de3bfd3d4114463ed79fcd20105343bdcef7ec60bef3c63a61d985386340b23e9ddb1c4db2b85e9c1edc6fd8c38b8fcc7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52637c8f96d935cc2a6512970eff6432f
SHA1fd69e9f5be2832a0e49d6875bf72e416d373fc38
SHA25643b89ddd4c9d57e5cc7003946ba70b874329b72539d03904fa08e75a8a9dc44c
SHA51218380bbd7aee1ae37e592192b80687416b41b205f59e1378a78ef6225d251ecd845dd733673ca040217bbe05e1b46344640e888d4a96d2fe6959bb1e1ebb28cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58340be00b2d89a3c45c6dc6f76d05996
SHA13372db69f66ed5c77b5a7ad3b22813d435e670ae
SHA2567208c701fc78482cf3ab7c8b964500a194202ff2af493ad4236d07118808fe32
SHA512bed75d14641390c2ef78c851ac4e2d468571a5f3ab99d0b695d14a8a0d6587539c17a9e05b5b246a97956848574c643621125737cc8da63f1dd0e6d408bd90ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b05d2cfac04cb676c5b11c9fa538245
SHA159109f8afc903633ea70d1fbe95475ffe359e353
SHA256dedcc47ff6f4bf3ec3f51c2de9132b7cca8d83e111a50981667f21d92ef44270
SHA512c632c8b47152afcb29f6f9c4fb2ba574375af3331092132682d42dc54b61f3d680143b74032e9cd797c4ce4c63b5d1bf161d2ef89014857024c9135173862e42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbaf289c25d392d661e468248bcf98de
SHA11afcc4125b3c41fdc4ebfc9e23bc83679d61edc7
SHA256ee8609b15b03074e4e428b243ea7598ae55bd6f705b5438727f11ff21e8ce3f6
SHA51215054a769ff33790e5dd48b87bbaf9b660cf4db9529f3f3bb947eac08bd7fea5a5987ba9b71c6cbac5d996deff2d766f7fc0c369b65cf59a57e1f8c3c682982f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5992bc8179ac576da65965267349983c3
SHA1b4ff21abe3c51af4e6b918e7e010b9b845b5c4d5
SHA25644e94b88f05343951b80bd515e521b9111b0cf4e99bcf52e4c8cd112108eb2e1
SHA512f7664c295dcf561df0710d4f1338423b75042f9f0a25a54ec37f39a4bd004795e7d90dc9c39ce74b6324dac4bb00e39146519698b1d6ac5f9471f3bf26a9d2ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5087ff3462c8d5866db3108d1f307a381
SHA1fafbb90ebc688cc396f75c22131cdc3a910ce51a
SHA2560a547098d002b50f38793529da8b64d5c21291756eee4f717bfa401cfd345ff7
SHA51207290bb18b66a64af7a006ba7be6e3c4b6b224758b6f40fa38078959a48c30c1283f9b1f7fe860524057f6aecf27acc50118cd2c20b491d52fd3fb33989795a3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b