Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 22:26
Static task
static1
Behavioral task
behavioral1
Sample
9c24a6dd2c9091c303fd3200a3d35478_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9c24a6dd2c9091c303fd3200a3d35478_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9c24a6dd2c9091c303fd3200a3d35478_JaffaCakes118.html
-
Size
460KB
-
MD5
9c24a6dd2c9091c303fd3200a3d35478
-
SHA1
37f54eb4a6a6775329c8d79c4b86b89561e836df
-
SHA256
075f6d910e47f62d1873b49bc7dc7d22f0fc1be51a4dbffe205380a90f25e83d
-
SHA512
551f857560b111f993df5c02cf4cc9869e52bb873fdc8f866f728bb6ae6c1797bb650bd5636afbbcddbb84ab96e31a3d134cd35202dc2845e9855f11709de3b3
-
SSDEEP
6144:SisMYod+X3oI+YKsMYod+X3oI+YO2sMYod+X3oI+YLsMYod+X3oI+YQ:l5d+X3y5d+X3F5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424220245" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e098d14c85bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74535D91-2778-11EF-A7F1-FA5112F1BCBF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000005ea7ef77b90b84da2da48a85ada1d420000000002000000000010660000000100002000000032490f87489c920ef068b148b2b580fb783778edc1697f9a348d1979065efb9c000000000e8000000002000020000000d85f5b2cfe1c1f1d7d37537cddd71cbfc94d15eb845e6606ac0b47e3f1de3bbf2000000066c669d80b948adaf8b8536c51988db65ea5d07f532417186b9e7433ff1ac9ff40000000ed2e91ab27ac52c5ad653114f1ae4b7ed208e45d65a002a7f4d671e1bf9018dff50b6f5d22a2e4ca97ab0b98eb66b5ba2192fddd5a48e6f6d73c712b676d3f2d iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1092 2372 iexplore.exe 28 PID 2372 wrote to memory of 1092 2372 iexplore.exe 28 PID 2372 wrote to memory of 1092 2372 iexplore.exe 28 PID 2372 wrote to memory of 1092 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9c24a6dd2c9091c303fd3200a3d35478_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d462d316ca68b6d0d49e5d66fadfcf
SHA112fd0228251258cfca6aeaee92bc3843f23b403f
SHA2567a15205cfa82f4976ee66f1cdf185301f24f11704837865ef2827036acd38a5f
SHA51217b81fd0449ea0a52682273b92c17dfb887da4bccd61d1117d2fb517b62253564f4059c84010ede90b3eff2137c162a5751517aa2ec552661d52660d50d4a055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf27f7a3fb73ed9c65044b63ce95da0
SHA1a71cd26a3a551faa7519b264277988eb18b6e275
SHA2563f78c46d8cee09b4cf74ff54032b31e4eef75e796493395207ba83b907e5d98c
SHA51255a3f3248a271cac378923965c4cc75b1160f62422b3619ef053f82ca033c946500f669cdbce36c0cffe89b151f4b700aebf59229c91e3e3dd9320846b40b7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b438eb54d8aed2c7927295ace0b26aa4
SHA169d8f6a4928c3637aee61f7d341c8c01d06aecf1
SHA256f50393f26f5fea720219b7c0609543c2ba3cd8eb99f4dd9af09a2fa8d0889a41
SHA5125852affdea7e175326421de5a813c8b8759dd84093ad60d08559fc8039fbe01aa4466d304f3e4c850e61fcafe19200c03dae8240514fce13bb280301a15646b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7e96a88d19240e50c8b531713caba75
SHA1f6ca09389db551772104ac89bbca13d5ffddf38d
SHA25618e4e2b3648f21fe7d8caef398390697b3424150856bb48c4f86832cb8704dd1
SHA51266e7e7b4467304d5d80fcb768e93a1de4f3293f47fb4d541694421bcdbce2fda0b727320cc3233a9cf98e2aedb5d3084d26485350241b261c0a932d028694aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5470b9d34bc61a029c7264cedd8d32a
SHA13e850c458a20da61ee02d2b0f641281a62a9c80f
SHA256652b68a11c657074cc0af16778a0eda4d9a651297af9c3a8e16e9d8904868e91
SHA5127a2472bb4005e107707a1b742aed7076247c02734caf9546888039237083955aaca35e7a08436fe57935db2c08221e32cab7f2593badd1c66411005c6671678d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52346edef60b974dbb9ea5cab3c5c7875
SHA14fded22674814a9934d33a8c33da7e1d173f0baf
SHA25636d8011f08cebcc62bfe8d1e692ee44c6fe68e344b444a8c551232bca8017216
SHA512c1aff5029abe2b3700caea1392ea06fccd9eb398644a51204f884538574b17f09b3e390c72fc326d41389de8f6f2cb9e6276043c1459adfabd9ab0f1a9331d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5330d1d763a26b5524006a255bdcb86fd
SHA13d6941a257ff176f0ff0a84238c035cddb439995
SHA256fb8583e55d7659ca2370eba50d5734019071c94b9a2ed50f049be5b9fa9565c5
SHA5120ba2295650769d738cad0af1e2669360fb2c4bf9afc66549787e527f42f67bf2564fb0a4e7e9e8daa80b2894823b831f329f7a22dee7ced1ec274e780cca5a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a9c72cb8fa6806154d47df8600703d
SHA18722e9557fa46d95cfb9c49513b22362429c484b
SHA256df3936687541449ceff2d0a3476730252daee918b4f2fe0c3e357cc944d9c126
SHA512db22ecc74ccdc6b2f497dfa935db0f9d738a4f3c13082810d02410a5fffb7f952ead700ab96f3671cba4eeb42d5890c25c7c44ae39922bca4d6b4cbbb8fa61b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521fea1eecff47cbb8b772a9f149e0afb
SHA135e0dc62d58c4bfdd2b17707b7df8c0dbfca8271
SHA256275d50aa3394352ec941b48c2116ae6542a6d45382792e4595867a1d2596f3ac
SHA5120762376e60c6a3f291a2f5f03131c6083af1d66215f5b375ce61fce559ec39904b63e49c5bea7a24e120555d9fa6de12847211ba21d85b5bb047c359634f0157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6692c179153e8f0ee88a8bcf7287037
SHA12895318fcc21c42af78d0951b20f90f130e004ae
SHA2566d4689ee2067c85837b5e6d03419349b8758aaf8b438bbfe690cb990791f4a0b
SHA51224398f2a154756413631b6e69f8ea8932fbd7ec3232a863d904aeeaf1d06398242b289c654234667804708cf6942f21b472f6d961018d213e99947add672e869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f9fa0998b7b26ba134f8aee39e46fd
SHA19ee1de8bcf0a1958ab9e7e1c7d42d37c1ee7afe0
SHA256532d077edcee41041ce6074f9f79343a897b41bf7def3db900c405915e486ea0
SHA512debe7d4ecbc2025232e23c5fa1a7ff839597c58758670303025fea008c83c75f3c5caf1ca5a1670fada19e6790670117011b8074b871563f80c31b870f450097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578be8610f18631947a7d63e7e2a59e82
SHA15777b940d4f2b41f75d771bad867b7dec9769f31
SHA25629791d7ecab370e1583bf0837ab7245f5589b02b3e8aa85b9deb1bcd391005bb
SHA51243789ab9c1b476e1620fc53d6ad4047b678c1e5f3bdf52fc1db6701b7406a71f58a44277565ebd084a7108a04b1200906d9a68e6464a450376a93cd1c179fe28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc3efa6bdda738931a9d3f80657ae2c
SHA1a78ddee834fb157124118667cc32940ba9c2fa62
SHA256fb107ad4cb93c2213e92dd8e39ca198c62cf372a882cc5edb8db22a959157dd4
SHA51260f2e5cb29c9e6a2380fd9e937bfc53e1c29aaffafeae33ff8cfc654bc0947787cb4273c06dd68e2ff61c14b13e8dda2734a1e3db0a97347937d1f88accbf82e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eabc6d3e6ee548a07ebccf755a1a242
SHA122d712c8c0179f81f9d3923986d676a24a6e3934
SHA2561219ca95f2c4bcd2349a92eede988917b267c3cc2f581d096d90aba4ac1f5ea6
SHA512f3469cf2f15e468a36f27f0158f8f555cee97f64ca47452d64aaac357a522c65dcf64c95cace036e469e7e2ddb91fb48e873b7d7e916237fc39bcac5447c87d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd327d672105007f92cd41442b9f993b
SHA1178d1b482a165fac416da10470b7ff9efba9ecd7
SHA256acf323d81e834efb10b6d62c198d869046fd792c3f57c27e0b2ede707d925cd6
SHA512712a4c3f60412756de0ca3f639fce49f0dd7488d35911870189757754daa14cf7c96fd2b8800f2417a4f041e029e72a38f33cb9de9df24fa400976afb7c5c6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591dcc432dcddfdfbc5773d763633aaaa
SHA1162ea10bbbc0b2c2215ba3bc209a09b623ef3c26
SHA256ea029c1d3d8f1899814ead57110becf57b3ca9f21446383b5bec5263aeae2e42
SHA512c617760b7675c56ebf2a70af6886e8bba3a71ee33039b71c109ad1821b83552fe99b3c8a92e1cb9505abecef0f039074035c0ebc109a798c86d2fafd99b4f53b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d073ebb37b55a6bf720d17c43474c0a
SHA166842930763dfce8fb4ea2541f1d656b029c3c6a
SHA25683b0501f15809d6fa92ec14f5d78d25309568d3eb3377d99d0af7726fee1a602
SHA512824738167ccd8e65b13ac1bcce85236281811ce8a70d7d65473f0646e17535bd3089d2988633327ca21bf9a1ef2b5fedd42a51a70f3673ac748776b31ca8da01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db6ec08e547dc802d28f32db8bd6946e
SHA154a4011c38b350e2870b43605ffa166ed1629b0c
SHA256e9fc7a2977d017f24e8c769de1bf77ea3df63dc8a90b3b4ab52acded0a8bb1ab
SHA5124676491e65b3e1366b095fd2ed6829675cadd16140a7e32a8becf95392f0f3ea991ca6257dd1405ca7b5638f37ddacdff2a7ec5cf42e2b28064b15f05d906b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4fc7d4a41e2c51fbd0036307c87351e
SHA1ffbb2e2a6708f335e7b5a7d34cd2552ec52ab41f
SHA256c12ef5c08ef9b15607bedec86fadba7a6ce467899a439fd8044e410dfc4fe63c
SHA51240b5884c30680bb2b7e68fd784af35d417e6f6b734a1039f663ce56c188fa77d9bbc7167488822658f0ec6fa979f9d82bf061174767f012b2ff019b9d5585be6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b