Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
9a6e706a85f7fcfa808f5d1adf3ca11b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9a6e706a85f7fcfa808f5d1adf3ca11b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9a6e706a85f7fcfa808f5d1adf3ca11b_JaffaCakes118.html
-
Size
70KB
-
MD5
9a6e706a85f7fcfa808f5d1adf3ca11b
-
SHA1
1f2f4d2f0d6ffb098a456819e18b0dab18d61c75
-
SHA256
f05df5addef8f03301138f4d2a4f2729968da42b568ba1146d76f3ed76009c51
-
SHA512
ab105b38995fd2118618b9bb1fd64bdf1289b8558b32c5747035db46db0701095406a5a8790e328dfe322ed6419b03dd11a8579e3f2f08fddac61bcb6a9cc1ae
-
SSDEEP
768:JiwgcMiR3sI2PDDnX0g6so6vDj7rx8oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:J0lffzTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{923D3951-26FD-11EF-BF93-66356D7B1278} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05eff660abbda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eab426efecd791449ec9acde068c146d00000000020000000000106600000001000020000000312b5d138c39a4604af9dab6d5c5b7094aeb27c96f313d8202944bdcbbfbf3c8000000000e8000000002000020000000acf92f68c14a8d30ec6a1483a63ad2b09e410bd3b4cac08beab123f77b06d7fc200000007ac836f137bbc7a60993828c37166634cc656c832a8989aaf37d82361a9b4b504000000002795c53de000d6f7f5edfc05657ed61ff351e017a4e37caad94a05df96ea670c41c8e9a1beb6891733c4ca6c359001856e998982ea4803c0d35459231cfe0ca iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424167467" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2520 2220 iexplore.exe 28 PID 2220 wrote to memory of 2520 2220 iexplore.exe 28 PID 2220 wrote to memory of 2520 2220 iexplore.exe 28 PID 2220 wrote to memory of 2520 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9a6e706a85f7fcfa808f5d1adf3ca11b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57261b5c0c705eda2dc03f9eabc291538
SHA1be681d7c9dfe4439832517dd3c6c554e9885a56e
SHA256073f9373aa7a9cc7ec3ce141ab61a8bfc2f2fcc1cb570c9c9748318efe7cb5da
SHA512b772b22ea4bb94fe9b9eab5b1bd5eaa5ecdea6a52214078ebbbbf506a8e1ce9fcaae230f0a0abed76c5c28364508e2f0f54ecfd447fb03a1b89c17b3ec0dcc5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a3672a9adee3d5a79276c1d46a2e23
SHA1f03a3143c56ce1940c432dd1162494edc274a5d6
SHA256bcd6f0570e26fb48a85e55131cf368b9eb13ad80b00db0b4e7a8ccd0e683579d
SHA5122eed2d333d69b38d923aaf479bcbb718a20f45ff9e8fdd3905a99dd524bbb55662dab7092f96c89a465a8365dc0d90d0b1cc7c57246415d25b47dbda30839586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ce874a70f4ab98ec964be47e322c147
SHA17bccc48660ec916038599c9aab1e0fd12b33422b
SHA256af05fe83cc694012f7f958a466aaeebd3c82840d4cb2c2360c1daa228be27306
SHA512c03b7a28c19a5966f597fada2673e6c75d95a5e8316a8720ab37cf9ee3d478d8ebf2ceec4ab1424674747fef22cb1ad98fb78b582af1726d6199405e951cbd08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aaf98d0a8eb8f8ecba7bdca606e67d6
SHA1993e8ecc761081477b271aa45b3e8aed102e8039
SHA25670e50487efc61bcca416959b3885a83f2efc4bcc03b0cbef0bfeafebd182de9d
SHA51276c9506d0cda188a56810e154dead85f2639419cebb03e58282d0e3320366d3646cc4855c8457290ed85ae1cc7f85d8d6a672458a7c8e7605e59dab96e8b9447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517da8b775dd9d91c8a4560693273ba12
SHA172e76a6016415b4beff261c7d239bdcdb6c7f5ee
SHA256c34fc0e00496e6d2d908986cd95a2412256783a14b90e5922ed68f67a9a57097
SHA51285702e62da4e8715243571f5e2ad5d84e19a1d13a630d8c4ce18f881c02ca237b1a1bc13ff7555ea2a66afff43b5ebbe394a0f7e15ec9b64ab13c7c11bcd0123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d035153a583f006767dc33ea6192991e
SHA1ea2edfe07f900d85b97c775b7318091cddba6333
SHA25656cf93ace2e03fcffc690a361dc42b4fc216c503ceb5d130393876b6ce48316f
SHA5123aa505f461e24a79893b0d2cbc4becd65ace74b3988f6aee9947c0191fedb231dcd67f99f8842c8055584617825736c86c424f31b2bb1b75a0b05ddfe681ef16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57137cba653643912c3530884f6aa580e
SHA1c6e6f2b4dcc600b74865a34bde8ff189ebda2267
SHA256282c2a4500fd477c7a9bda4bb49bae9ed2ead6091f621aac6d50335ff9e4a007
SHA5122ddc66028fc2cd1d8fc1fed5ef87ac46479bcb3b1e9e25834f8f4d573bd86a7612d66828c0fad5c77886b1b5bdf46fb31b826db77a9767b403d1990d0c52b570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aef12359ca8939dc6edf79a7c9fe5397
SHA125ee22f37907a0a5e4191035595a64a6c8c183a0
SHA25697f55a22cfe30aa346bd986b88842df2bab1b4e38e4e9c2a500f522be800d82c
SHA51288790dee5377b51598e57bde0e7334e3c2324b4c897ca0693a19f4012dcdb236dcf168d2dd9e3fff1844a10852c13053af1bb84b1f864b98c84f418203e77a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5631f281a7b95d8dac216257b74b7b860
SHA13c00f37b7d037fa0cb0d92819ccb510c0705f7e4
SHA256b62592d465ea1fd6422ea0fa305455b9a8373216c8c64ce29a586a5b4621dadb
SHA512bf59df76b5a54694bbbbd618e316fdec8a54b6d699f013981b4f88fcacc5b904295b69d36a61c866dc8d42e6c281889136722a1929a3b2a8aa7ab09dd76a4c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d845a5781ee8f4821f5d2815ba153675
SHA1f2fe8ed778e32ba5cfd1923c6a308272801a01fa
SHA25615d20a9928bc9a3a947e0ea672a72481cb694623a262b61931276cde496fc017
SHA512db359335e9dcf70a4c834e9e04ab0010e4d7b88808fe9410cd3e3019550197a428d336ac084df2c7037383e1f097bcb8055f9023a6351b529a6d9251c7cfa56a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f98b930b9dff6b364fceb136df06010
SHA157cd1380fc8fa8ae62c2ffab6d2d1c62d61432cb
SHA256c9bdc8de257592c316317bd4e99c69abce3f525e73a4f1b7cbba9bf89bf6c56f
SHA512db9f781065cabcf8d924fcca0c7fb903e21a496b2a8e986b8dcd2966245ec4412fafdc60b8963e6a8098712b5c2b2ce0a9bab7ac78cc9ab11511d303fe0bc656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed5697450ec405ee56b2bea9e223cb11
SHA15aa1c1981b0d4249969f34babf5607d1ba2da2e0
SHA256f223e602858c891361328956bddc4397f1f974746f41a2a21967aed7a2a7d41d
SHA512965d3cf038a928099344001a1dde94197a5876e0d892d27702e59bbf423ce47f01edc6b87a9265a33af3d5ebd72be01bda63afb562b9ac8d4c0c42356cd426db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582dc318ba98cadf1052729992ef429ec
SHA14e0f29a93facd54d8220d99af9890e1cccf347c2
SHA2565311c4d029991db487c010d82460314d484edebcc6a76fc23c83abbbd6cc32e8
SHA512ed3aecd22b78a1d8ebcf2aaf7d46d1ee57f7cbe9c419d9dee89b9b23213c38b16cb759f6622d8a299a402d1b970e00fdf35096744fc436f4ec02f89bb2da630d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ea4f82b64b683f1cb15efcc7b12896c
SHA1e54a1eabd5475746ee2d44fb7179d623ebc3fceb
SHA25663fbc47cb18cbe95537988373d343cf27b3789ff8dc33a74289fe99ae186bfd1
SHA512fde8097415a15abd4c29b1cb247b34dc378bfd35a07bc8a70848046926106d8db233a6133108d284e0f22696a7dc21bce4ae52a52816549497be4e6ff4d4566a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eccae670af1ccb235422f199fedfd6de
SHA1645b0ff9d6c8058746c29d5b082d79de931362fb
SHA2564765b2eb9deb05c41797bf9cdb3f9c406ff61733410d9c66a3b99aba8d73b07e
SHA512d498cd3e80cf01b6015ec7611ebfd93294f3b24a4fc70879c79ad46991249905c3976bd05b6702fc7a58885e871d323945f3778478abef478293ccc59b1ff5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6767287ee09c8ad52ccb29a37fbb71
SHA1e8a29b804cb5702be90c0b2d85f60d1040f65503
SHA2566248e0019f4687eb2cfcdd16c8395ddd935cbd580a7ca0a06e5be2b04243ef58
SHA512d379f4c7de150fbbe6f31f461e351b8b4d42cb62c94b698700f8cf7ea8700f775b243812233b97f2da663550dee26b01f596bf31df3ff82d6e589994bf9bfaca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539919e4e4fac807327d1d718123f0c6e
SHA1b63632e3cffd3f2402dc1d4e4e90dc8cd7ed40ce
SHA256a293e310e295518c210879f3c162aabc6efb40024ef1326d5865fddcc7944cd3
SHA5124efe445f8a8588d6e09cf360c4140c8e9ae505dbcda33e8275b90a0e6301ea2dd1fabf10601da73cd760aa97b731dd68a9b680e185f4c9753ef2d14e7fa9f13b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2bf5cbb54d12771b3ad68ba83c36dbb
SHA11f160c9841899f21961ff9609eeec2b2e2011c07
SHA256511f26fe42f89f7662601dbfeebab9443c1d9626c151b3e82e752f332812bba8
SHA5122e0cb9f62d9cdbd91e99a1a44839961944cf3b3edc1e8f3769aad3c4ad4548e5663357e19bb3d9c3d74d818284b31d2567d319168b23564548a2059a32a2ce1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f176408c165d095ffb9a1f99bc7c0ca
SHA177005e7fab0facb7778366af0998c0d83260ac75
SHA256256efbeafaea4fbece90c948294c227a40ef978fe60ffd81a52d51c44b6bfa65
SHA51225d146ceec73070c0a87fca2ac1f58c12830a1b61966947f069f309a2ced0a0d400fab0547eaa949ee4b8aa24c3e89cbe9dc08aef49ae8f985943ebd409c1f57
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b