Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
9b953c0261376cb9b1fd9a0a6b1bd8d0_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9b953c0261376cb9b1fd9a0a6b1bd8d0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9b953c0261376cb9b1fd9a0a6b1bd8d0_JaffaCakes118.html
-
Size
12KB
-
MD5
9b953c0261376cb9b1fd9a0a6b1bd8d0
-
SHA1
f59d3cd05bd3153f80c65a72cf923d2d38fd2985
-
SHA256
60f61e24a2e66781ba87b178ce8472ef23be39101d6bfdb163cb44267edeaa6c
-
SHA512
d9934698dc29a290e52f64e8b9d1479f413eb169d005e0e074d648d75bde216f0965677f39a7854378a857d57f7b33009c4d5a013722fa33261f14b2b8ded7bc
-
SSDEEP
192:Cyi1nGftjM5kEWziDdjbX235vp32wQFCVCf73xy1wovMCr2VcUvIF0u2eaFYT:Cyie93M/iLQFAi7hy1wGMg2adXD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4575E381-2755-11EF-B0F7-6EC840ECE01E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ea2ad82da54ce1408930470d1176b6e300000000020000000000106600000001000020000000a9fec2110e3cba23e3a443acd6ae42e262ceb7fa865cb342659ce38ad5a995af000000000e80000000020000200000006f5599f98567ddc15849d94cd2364228b4fe24135945fe239b53d30772157c86200000007afc9423f61616c0db8fa9e540c0e471ece0995c35ad6ac8d5c41de01cdab9ae4000000035dc5cab58ebc877116f01c4f75ce86ab4cb9967a03e8de8a932da20cb4e2bd386d7e5f3ed07b3ccaa82f454d947b7168c2abcaa4a14d156a74f20024cc20132 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c073211a62bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424205135" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2508 2972 iexplore.exe 28 PID 2972 wrote to memory of 2508 2972 iexplore.exe 28 PID 2972 wrote to memory of 2508 2972 iexplore.exe 28 PID 2972 wrote to memory of 2508 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9b953c0261376cb9b1fd9a0a6b1bd8d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558db343826574836618254bd199674a0
SHA1225d09e017396de6281d7cc5eefbb880dab1398e
SHA256e5c29672734764dd40dbe4559f1a257e2e4727d89827d69ff30f692581bb422c
SHA51296c8b11eb84f309fbaac709d2704c9a2453935e978271a0fa1571b4054591b623b78f07cc4c69b2473751e9e78162ed56d9aba5f9c72600923624e50c4b662e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dfd1030b88231b03a55ddded25ed506
SHA1487c1b50e60c1a75b3edc3342a64879ebafcd76c
SHA2569291931016e80d08e342e83729e56f6587421b531bc7ad9c2bb960ed58b15098
SHA5123bab3a6f9208e340b9fca186bd48dd840f2b04b979d0b4ae061dd5033ec8439e8b7f996b84864263c60cb61b8d3bd82c68228c81938d1c70b787e0025daf9fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ed8e3c8c93b174ba798f4865c505686
SHA1e1387bab3d4608c8fbf78dd6572fad119321f2c8
SHA256f2d6d42763d93519ed8c5500d45f350a10996a8face00e77422a569ec9d907b6
SHA512ce575f346c31afa8c216f645598862ff4df2e3251a648d3f113e23100e339c430d5b7889d5eb82e88da6a07f69809bb124be1a4710db549e53c0ca052b60bbde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df852222211b0294611f064e853b6733
SHA162391ba5447e8d8c426fbda92940413c87aeb55a
SHA2562cd3e9d4ac680571da888e0046517d2620e2f6033cba9e4d7b7ab95299e69bc2
SHA5126d9fc6ef1f34a9dcb9c7f5aa0f42cb59d014d3567306a6b561fe82f55f409c8ce929e98f9c0c9796d6895ae61d926a78547dc865cce213c2814330c1153e2fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c73178191b8658e1aa2695363b9dd12
SHA1eb7e9e64250f780b4ed2edae76ef8d9754155698
SHA256af7cdc90aa4da2e3ee26ce4addeff2297bb0e74be9b71e06f0ec88a6e069d920
SHA512620757166c4ee678a076e21dfbb30764415abe3cc75a66b9b32fafb28f7e6b0f57febf4e25b44e5306c2c4868141a703df8ddc67523c1069b2aafd6ff25c0c32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b134b59a92d9a1b997fbcc03f14b5153
SHA11ee076a916c362f741d140baf29a5f08ae1bf634
SHA2562d252572fb9c45db9831019f9a854452202b1b2b06b4c126b3578de13c773b16
SHA512363fbc27eb3af3fd72aeeb0302dc9567fa6b3a26a0cebd3de77fa05c45a2ecc7c34d7d6f210239ee59fe59614eaeb2ce35ab519f0ca43c9fc913054db65c2520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3184ac3e71bdc09be1673346ec93842
SHA1a33b7c95c9f008edd0ea4088ce6a44c31e9ee15f
SHA256212a05ad0870cb625e222bc0874709d71e660d286393fcdf5052aca11fed9d9d
SHA512cc6a98a92265ed74dc5e0cb959352f8217ec6357c02fed7503e4150466df358ce0172c4a14b98061226c38471c6ccbb2fe89e8ecc3f6c65aa5ea28db8f730351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553deca626254a33d2853ae70ac296bd2
SHA1ee347d74a24a96d2353eba85b25c36ae343c1667
SHA25631874dd085ab7d1e40182154e8c2e32298ce95ca2127b9428dfabc7e1d8127d9
SHA5120847b955887610f8a1961e394e3b4c305e05bd8469d7c91ccc283763ca23bace7fa5f18e35438427c6832aca616bd4d272fc56662a2df5c428624ff83e46c9c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5521827028744b63b89e7e0ef441584
SHA1baa3f53d325c302778ffb661c4f6fd101ab3f60b
SHA2563f9a18f64535caed4cf7f06c8ef06838677a070b31f55221ad3482de4975581c
SHA512a597ecb61928f38f48fc0ff491fba7e0ddb71d3f680d3506c81c6e809edabc7ed8c000dfabddfb9a675f480e02a37a3f6056109c5ef835867eb76448617aa502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe41b47f3555c78153bfdd0c76dfb11
SHA14b3c39ec69585f90511686f7a7833f4231131aac
SHA2560d161d73147dd20fb18d64e7374858c72a4087cd3b3ce3b921cb29bfea910f96
SHA51252ba326bec25a9001ed8a5795ba2ad62f30d8577caacbb477767d6139a03935248893f8cfeb7268695213663ff063ad3d5cba9dd7224aad6cf99243ff77905a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e9c2afcfd36cb8c842b203685fdeea7
SHA11af48267f1021ac12dd60f496cadd28186d710a3
SHA25693b9ddaba101dffc0b0c096c46c406582dd3e734fdbc9a8365130a7659c8a9a7
SHA5121cfc55097082ea4b4fd4484780eb65f46cf2163ad1b482e02243dc17b91c894f7324ec85996c08c88b9b3e830f8d2597479feb0f3117f0003def57e436d898e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59312afd161d5fe210528b570424cf6ff
SHA195b6fb3f515c4ff9e6fea912b7766898f3ebc0ee
SHA25691895b88d86d1d536b83591439a78b7803fe8d830e07a75cc87b995e6222c5f6
SHA5121a20f061da7d322c20537089f7685490110f1a24682cf7d7811a47694675b0173b8234bd4c2d6a86ff4316f9a9fe1f4adea49b6eb5b75ba66ac48108e9f550b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9e703a54e97cf6d0ac90a10d82ff57d
SHA12000e440a7b8d4d88bea86bee8bb7068d1c08edb
SHA256a641b00918d56fa287e5d6c572825fa274ff31392e1993a2649c48f761183644
SHA5121ec35efec1a1cea40a770be8768fef37e1916e6e7fb070de31188e9400796583a88c92f1b2e5a6f9fd3c658f241b887c66fa7db57f5c2f3b46c00e5e9a315092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c3b202de4afeadffb8d0cf58a340ca
SHA1b138988660833092d41a2d4dafadf6716f54feea
SHA25612abd80bf3103511a56a16a5bbee7e8c52c0be2958896b9b955e7730e338bc68
SHA51209e492aebfcab84eb6f5be00e4554361795b736a8d7504ab0ee5c8c03cab3bebc4ba769008518d37ae1a46b60c8e17c56f41410c3dfcba1a7b76208d8de7d3f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c0b45873db4171b1ed2a7e35e535138
SHA1a1d35a6261a69e8152d40f82434398334cffd4cf
SHA2565a580e5412f2f328d4e5c312561a56b9abf6201ce612d6aecbb1abf86ffd3be7
SHA512f82bf7ef2f7dac272bc806aff8bb1024351c989e12010f833238b603e0c55f9c477c88a3dff2963d939279ce3604499762978effe95dc23fed8d882b72a5a673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a46112678701fb85e8429e1cf5372a7c
SHA179a9c048503da5d804221a72c96d144b8a5c68af
SHA2567a9ad7eabe548654e6fd08cf3ff84b18bca10c1908b4c9f190fa045443ad4033
SHA5122e15accf417afc5683186716888d8a4b3d7032edaa25bc5ddb62462a995a08095ef427c304ebe9b0a3fbd0e462b34686275478205503f5170ef7a7c17dfe0417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c1b4cf095c4881ac474a12ef59f26ed
SHA18a8bd21299b6ba2f43e00d30b536c2cf338ab826
SHA256e6358c9ba71685cce1c75e99e1df2e466bcf75e7fa17854958f340fc2a5ee672
SHA512210f5e6ae23eb260669d98f32298d1cc8121970096358d274cb5464be9940cd89e9d5c5249ed4ba53880e260bad79fb3b19e6a0f0274ac6f45c20a3b4dacce60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50264eb8a9c635bf3052815db5720979b
SHA1dcd12ac9ab3605d45b7bcf4262465133b2405d2d
SHA256f8a31d0e76ca32f5cc1c0ecce3f7e03b0cfe88734e0a96a36d290b1c6e9aeccb
SHA512b6b44c433c03fb60e6cf3f824bd6f4e4718275096575ab318aa043cb0115ed46be43908c9bca320082da3c5d11eacd68b72364a3c83173e9fca18471202ac933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f45926685d00c7b8df2208ad914dd1
SHA169c8fdc529307a0060b7b5991c548fdc7d7be7cb
SHA256da7d9e09e05a7ae566a98656c7eaa2cda7d72603ed37ee4287d482cb6e8bae9d
SHA51296880c7df741ea8d758d0edd300e89c90e61aa2cf096df01736ae2437bbdd89c0a3caf4dd074548e297a47640b0f09226d6aeee4d35b6dfe6bfb26118241bdb5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b