Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
9ba421dc95046617e93a48850c981705_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9ba421dc95046617e93a48850c981705_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9ba421dc95046617e93a48850c981705_JaffaCakes118.html
-
Size
24KB
-
MD5
9ba421dc95046617e93a48850c981705
-
SHA1
d4f46949131538b5e5edf9d2f53d23c1f6e6db03
-
SHA256
3af93ab0b6ca92a7a838a67c1cbe12d21d885203410cff6854977425e85b8442
-
SHA512
530bf7f87fe495a9c7616ad49d1dd8ac09b1630c15234a66e4f954b902548869f99fb159b4cfc6f7d7a571c640d565c2d2c516f58be8a0d49e169f6845d17f5c
-
SSDEEP
384:8wqPYSOOzJ2sdCwnAlZMuKG6xiQEuwhQRff2B:K/DzJxHAlmu76xiQEu0Qi
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24FF7CB1-275A-11EF-A68A-46FC6C3D459E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424207227" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 868 IEXPLORE.EXE 868 IEXPLORE.EXE 868 IEXPLORE.EXE 868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 868 2240 iexplore.exe 28 PID 2240 wrote to memory of 868 2240 iexplore.exe 28 PID 2240 wrote to memory of 868 2240 iexplore.exe 28 PID 2240 wrote to memory of 868 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9ba421dc95046617e93a48850c981705_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD52b669fd79d1f47b24f9ef498ea833c27
SHA17f1268b491953e831c18fda94b00e41f02268bf2
SHA25674a47b15c6cc20f1574697bf70ecc5e3470c3fef04a84cbc9ab7aff028978525
SHA5129bd98d5c941bb7dff7c924fff1aebe8027c37cff7c6c0f1c4c7278ae398cbbc1e314825b337028328c4633fc8e05ff20213fbf57d71f1923f26fd245ed73bbe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513cb55beb032e4388fc10f0ba09b24e6
SHA13f06d8251bc20b1f2cfa1433db2e37229427e541
SHA25644c8955db09270f1801b3eacea216434511d496aef8d0952157af1ccbb6185e9
SHA512d16baa78de690a7f26eca98fb808acaa2e40d8398fd768d6b35abdcd12ceeceaa48f0e2c56632ef81af627bc1d1b1fb70035532e41e44a1b967b4fea1bc281e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502d194e6ff4ab7052195b298642f0692
SHA1cbc6cfb0ae6a34474460210601648ac25573920d
SHA25682a1813539a7b375cd64db73e8f17165d3996b12e7e572fa5644de6bfa1ca47b
SHA5121355f09733f9cf77a38cb074bfcca32ba8432491257b9a15adc4805ed186db9bb52c93c177398e72edec1a40527d3770c2a36aff85a8dd7238f5189082ef0aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5493499031ae13a3b6d2783dc2091e471
SHA1648d95c3c9e27468c9b53b3a935195c935050b4b
SHA2566c230668b455e9b3039a24b44d7ec2cab60c7d8c9495e88951aa7e3a308589b8
SHA512dd210d6602d12682a1dd0730c70c2aea54edc16f296c371421cd8e16d8a1f4698e9ec9ccab702fe433fd4f437b2c4cb9d2b281df0ec8be3de144529fe112e16b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579a3768979ac029ac5cc19fd45085247
SHA101072848e65b060b3d7bbac0ff2195bf23b48d94
SHA2561fcbd733ae2b327a833bc9192acb706b7e9c4f8504ce2a34e3a75331c3f2965d
SHA512eeccc068c02f8db1b32bc8ae469b71414f7d5d250f3a4fb3e4034370ad26c426976f510937184383888cd6061a97dc748ef193b1d1e676e40e2fc9f55a0f2046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a286952f560037cf2ecc342f3a428dca
SHA1f37ac68556ab38f81cdd3bfafd22af17817880dd
SHA2564e83adc6ae83ec7dcf060c2cc787bc7e6a4703544ef3f420413adb6d8ac9639d
SHA5126347c00c1b775d53cf53f71760704b9a8ed0b88c7b6194a10798189be9e675c4c672aee8fdb3565728884543f02f5ca026e508290abc5e67a656ecf41461fe4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a16a7e5d2bc3d7949867c3129f0cae78
SHA1026eb294a17d527aa97b8f12fa7a3254504af8af
SHA256f6c2d1a39ee95a14b569c55827d7f37d456e8e47e32d7b6f448b780bda71173a
SHA512699ccfad460463c3a885d09e3af6091170b1c0a2656bfad71d4049367e5fde29a70907c0bcc8fbdf57d241903472feb904502a72e67519bfc3ae5c998bae984d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5355443272a7ca1e72511bf84e1ce25d6
SHA1036c66292f9e02a2afd3a0bc1e9b080d37d5fb45
SHA25684a8124a3a0a55522ebd9ba3927df5cf5b713aa0f840b8139fc45e1a2f358023
SHA512995ba1860f77437871ed496ae6cbce2d09914c4e7800e00b1c6e340f0c602b68c8d12a07e642764fbc4719188d99a1ee2e81e3485c4135d2671a94839b0eef68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e0523b8606f2fda0222df09ceb33af6
SHA18afd14a84ac70cbdd60959f78f1c8eaacaf71965
SHA25680ff5018de0d41319c2186b4302c5b2b99b38abc1faadb20e95344dbc91698ca
SHA5129375f1e9004e21af50ce39de34a844f3a03fa383375b6a20a16338f80723b66f64916f3d47fbd8db888f492cb50c631bc1debfec8a972eec26871f12bc924428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555c2894aa6b27251ca3c27c82c66f4a3
SHA16386342bc1d2d739ded2508e7c621fdce438b3c9
SHA256d280132c5ab82359b17ead1b366724d5341850128e166f67bd8537c17caac5d9
SHA512839269e7b1135f1199bd718d5efa303af77cdf8561cf4be338775fe064c9ee024c7419820350df1985f38bdac83900d417eb218ef8a9e4ce5a2d573e420b3a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fccc05ae538f796ce401af5ac5488d1
SHA1fd88bbc4d74a990688973d37d2433bdd7fca5c2f
SHA2565c16c34357dfe50e3e838a4d3d5ef9211de72c3cd6943d46a5ba97109e22a660
SHA51209869727420b269ff91b05bb341b427eb3872d6c1ce1f00339e6dc84dff41820842fd830b540047d8a7fd86e7b0ce1af821c4fbbcd3f0d101996db522ab388ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD59d5f538ac2340a86024c88b3714389dd
SHA15c4cf24b6510a1424d2003822396560d2b173a57
SHA256fb32730080e32b9af472f306766f20a99a8e4dbe571660d3b29955e249496f9a
SHA51244764d5580df88f45f5e42030268daba40a9063eb7e18c8c7e21594e8e5d97995117dc2371b8b38231fa46370bfd32204ca294bbf0be8f13de213e4a9b83fc58
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b