Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 14:26
Static task
static1
Behavioral task
behavioral1
Sample
9afb37df4d82bbad4604c852f97d923b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9afb37df4d82bbad4604c852f97d923b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9afb37df4d82bbad4604c852f97d923b_JaffaCakes118.html
-
Size
460KB
-
MD5
9afb37df4d82bbad4604c852f97d923b
-
SHA1
9e65179dcbcf758cbd7428aebe89d2df92451584
-
SHA256
2df3ac0806b51809c22a6730795e96ff21adf9e1c8d4aed9277c64f52377c12c
-
SHA512
2ae033d23b45dea78d671339f63d8c3725acde94a8f3409c6138e96e41b99875337281aae9ce2e9b7b18b1f19471fb27f5ca12a30eca89da4ca24eb313b00e5e
-
SSDEEP
6144:SBsMYod+X3oI+YasMYod+X3oI+YnsMYod+X3oI+YLsMYod+X3oI+YQ:C5d+X3q5d+X3d5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01c5a5742bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006c6151daaf722a4ea8a077e50ce03dfc0000000002000000000010660000000100002000000076c1b61d423a67f08d952115a3c64e894f197f72541052d3961f3dc577a2db29000000000e80000000020000200000003f05e1ff5a9510652d1656b2f86b01537f0b11ad63679c1712d08f60e5f664bd200000000ebc24bf9917ef5f0ba4ac4238dbb7d990db43f740ff7b23dcd65f255d5bddbd40000000fde9456621f87a978200bbd527d166d790c0428e155c41d0f37dfccdcdebbf65b0ebd64b5ecd24a409360b9c991547f1ef78bd76fb82c8e43dc47c1daa90a3e9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7EA1B6E1-2735-11EF-815A-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424191486" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1132 iexplore.exe 1132 iexplore.exe 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1384 1132 iexplore.exe 28 PID 1132 wrote to memory of 1384 1132 iexplore.exe 28 PID 1132 wrote to memory of 1384 1132 iexplore.exe 28 PID 1132 wrote to memory of 1384 1132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9afb37df4d82bbad4604c852f97d923b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a64c91019ab990409dfb16b9384634a2
SHA1fc64a1c05025bd1327e0edcfb34776e228c7c0c4
SHA2569eed84b28db3f31cb56b51b53400f67faeebae9a452121309324dd9040827e21
SHA5128ce42070e7b0fff978b4c38510abc4f6d0f6bed9d8e40de9434c552e19551bbd4be00c8799675e2449b02a6f96ea2d7ef7ae2864852d496db2e45d6100c7a860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587ef85567995aff87f52ba3ff3d54565
SHA1b484335ecbf628e594238a55afb71f6f63d71297
SHA2563959218a9679f727e9b6081cad8e8f386a9a34450105739efd49ba6b9b67efda
SHA5121186ebf86ce8adb047fdfc962c6ad4442d692678c9bc129529c4b0fb5efb6e342bb4e0f88038f07557fc3d803a78204a340803452fe22800e10d24e533376a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a5fb934e35680856922080afe2f609d
SHA1df8519a0f3e384cfd56bbf863528d04d6b6e3acd
SHA2568ee89855dc986e76fdc16662812e426877e25fcdfacf8a40b7b6b03b6ee83895
SHA5128c8f223a8ec43c3e9d5c8e38b4bd5bb34e6e7ce3c29018711e9c1c1b187aaa3451481af029a577c9d96f1cc592f5b47aaa07e0396ee9c55fe026a9cc7871a99f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537bf3becc49779b85a2edb33c637b620
SHA1d6560348af510848afd3cd38b53e0604c70d0593
SHA256b78520bdcf99a16714331c65ac98ec88c32821de61c1031208c8586335796f9f
SHA512793fae78b63acfa47dcf31f2053585857b0d0ad802d6d5eab8d77bf548261c1eb849baf9c353f63a91a5352ce1223d3db799f105567bb75dbce0f9b92a1441ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cbef7d07907eb000b70c9dbbaccf6d6
SHA18b383bf24dd8e2b2c6fb25a4f463e86181f4cfd4
SHA256996c438d50dac999ecc60904a4ed590192d9114ca9e79234cd905d4f973ff908
SHA512afd9d2123a76706f4e7638e63cebd53675264685b01a2d91a079c6fe85a0273d0a995a03d938c27608233e6c19b89ab2016c9bbd1c16da629c3c738f3f9ee977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5362c2e1f97f930afa634a19a25d5e375
SHA1831463cec1dd3651690a29f8b7d5c9bb9cf21aba
SHA256c5952a8815bcffa3514ddd6e71f935ca4fefa007f73d9299888ff480bb7cb7e3
SHA51290b70e9c0696805e936f20deb6992f74ba1ac706f0852bf936fed28a44a7b7ff1c748b05ec5f249aef75ac9ea28668c2fcb83da3d9f4a06c17128327831d4879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e1c9710ecbb15501a3ba36945a5b8ff
SHA18d2db5d8553b70d2e7c40dda1d66ac74c706b0b2
SHA256eb0357218f974f335b2b82492fdacbc86b3fdb7b2f6e60b379012c456cc424fb
SHA5124c3ea33029b1c76872ef5cb0026df695647fc7878c114a35195c35fcfe37091470c72bc87b2ce668ab250b221e46763b2386cac68bd676e8b20dacefd8de201e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547bbed996313161129ecf38bc671a19a
SHA1e4b66739886349d3c338d470f69f2ad4f321a6d7
SHA256c1db45d673f225c4219a3a30c978d60f505030054be4508a94810ccb58dca8ad
SHA5127514306847909fcffb8ef06ac799c1e3f88a18591dfd10fa158c4ef644efc110904ea2246be1609a030d382e3bf342064f0e2e8475ad28b256bf2a02fcb38ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535bbe48e3b151719e953ec1b47b820f7
SHA16bdd626685a26a96e5fcea94e3b8b459442a7504
SHA256546206967664c18ead116248031b31bc182636523445335cef22b77c5cc2c78f
SHA512f8a5da7a2ad182efeef8a7cd5aff585addab866a8f1276ec3c9c5e4f338d068aae5706233f7937075cc785652ea2a5498b012c60e8d637b389066e3f2a543d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef2080bb3c03ac36aec65ab6d032b6ed
SHA1b1b223a8b67715403859a57d593f77285b9f2a9f
SHA25616e9dfc3e5586051e9945816665415674745e7fd0b389aa067d91878364a276c
SHA51299d14cd5f28c5bd8aefe86f3a25b9752f1cfc9dcf2ac9d91a01badc74e70e96c427b8753659d083ea0fdc33f94ca0952ca4d8de3702ae38de8f81c6c54af582c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6e380968fa30184885308117102276d
SHA102072f8f5d121d94bc737fac1f33a03ae7813fd2
SHA256c62452a92d721a45fb68b662eee23c0854b0013c3ce2c16aa12e04b00dec7c09
SHA512ee4b337f2933d4a6d534d3f7c1e2eb87a88eec30c0687d7016e7db360824fadf89e01f1de950bdf106b2d41df0933314655a576a570e59b169fbe082e8761b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dc560e28f7a15452d61d523dcd7a057
SHA1271a9400c48d3b9eec5d5d1459db6fb4b2b9612b
SHA2568ead9fbc3d8ed3ded351df216cbbc1194c04183ca86878651f07ee5cc2b1d452
SHA512e985b0f4438262c5a75da3b7ec0ff55ff21d8dcf546b416cf00e23dc6f9e0b0f0a0bb5f972606f2db4d0e02f6a8647a86b6d3255327c28e5031319b2b1de47a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521dd467e8873cc057f10b4219502009e
SHA1e301a296844f8803533b410b75e55663c31487e6
SHA256b321aeb2cc1ca0a00a210fc0c9ac47087953afc39c9cb0b4abb2eb093457bfe9
SHA5125c3bb4adbbbee86fbe139a1bc1e1c9cbef23569b327611aca939d7943c9f7546d37202ad13c7d637044d3e057a52646ebaf948f8fabc2dc153a66e2a84e15bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e018027f6e1a6aadb7e3069575cfa47
SHA1a31ebae452dde8894307dcacd808bed3017dc204
SHA25648a14ed76be63d231b70373b29c5365a22c8276c75527e1dcbfd71b0b7addead
SHA5127e846c12813734b1f00b1fe00f8ab1185cc052505c8b747fe2c676bf9f9d8bc9f5cbe8aead0fbf66f26a4bcbc0cdc5067fb1bb46ef94ad13e37a85d22da7e97e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fcebac8585329473ce7389a686b6d9f
SHA1b7678c28bdadca154ebe742b5f7447fb92d13370
SHA2567b4c3348d0bbb38683689317dc915f0ce6c09a50c647427636d1c092e6777fce
SHA5129fc7b870d934d9d0e3bd0b1fe050d5cdd26e087a8d50a16b676611fd0bcee613bbf897b7837961ce58e275454ab6fd8bddf9bc4c61f66ba37bc0a88655f0d1de
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b