Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
9fcfcab32398c4ff7f6dbdeebbd29005_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9fcfcab32398c4ff7f6dbdeebbd29005_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9fcfcab32398c4ff7f6dbdeebbd29005_JaffaCakes118.html
-
Size
4KB
-
MD5
9fcfcab32398c4ff7f6dbdeebbd29005
-
SHA1
6ae7e5978e1de565dee46e85da6e260927313619
-
SHA256
95fbc9d3dfb35e095eb409440f4817510ac625a8d4e4ce108f6e71ccbd67d4cb
-
SHA512
a6d0e68ffb687e9ada7e5c3294ee5b0af6463d4f4d2ba773c008edca779968e0257a74c9bc2851afcf401225703e5763b0019d3c1490f72d1ee286d487563e74
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oVE3Qxd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424308181" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31B22E31-2845-11EF-8E23-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e80c021e408a1498e5bc9214c5729800000000002000000000010660000000100002000000018b28078b449707b8674a54bdfe9ef90734a7ee374d8c16730f2ec16176c3d65000000000e8000000002000020000000e6f2f7d4c2a7c1a6d15a1bbaafb70be3a115c1ca42feba468848e58b84ee44f320000000402c8b1ff976eb22991e3f0f426db187fc7e4a42f2abb1ac169a226bcf4f144940000000a699fd68e0de6c0f65fd7c006612d7fc40011c592118c8af7ad9a35044f70f1874b0cd8eb6f8cdcbb8cfef809775fbd8fe542c195241e0b2d58f81112c6577bb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90cc3e0652bcda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2856 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2856 iexplore.exe 2856 iexplore.exe 1356 IEXPLORE.EXE 1356 IEXPLORE.EXE 1356 IEXPLORE.EXE 1356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 1356 2856 iexplore.exe 28 PID 2856 wrote to memory of 1356 2856 iexplore.exe 28 PID 2856 wrote to memory of 1356 2856 iexplore.exe 28 PID 2856 wrote to memory of 1356 2856 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9fcfcab32398c4ff7f6dbdeebbd29005_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e755549a96a30fd6fc2c9a2cc45bf4c
SHA16366ff1e70d03a4e6d42ad93dc54d160de1cf9c4
SHA256a28d4a90392ab927b8f5bb5668ea88b75597529b5610a6d2a1d6e292c0ef7625
SHA5128c2c562cda10128dddedd4ca9fa6d06c1edf1e1b18468c81a0d49cd1e494e511759b18e6c697ea499d382a5dc6ad951afd9d15e2ec3bfa67786a765db515a3dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b85c1420deff0572d39c2042267e9078
SHA169645908bfe9938efd16b78d3fbf1c4f21b610a6
SHA2565f98729c4b774b8a8f38ea05dd5ea697bd5e1c13dab8f58dce86b08ac067d059
SHA51295c74e0c3701a1be7172e021f1cabf7dd448dce366003c6bcd3c70aec2f9112fdcc4f99f493a12deb1400c7771f362c08882d9f0ff29c73c21a8090529613a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e637f7c5ed651f093c976c8910f1f45
SHA18d0d03168f8e1ac87b60e0a161ff374589bdb808
SHA2561dc40bc193dca26e6fb7f30676d76a0e28d61ba1b071a0622e60621606ba0ff6
SHA51299b3813dfc9358640a0679c774c81bf78759614a4fcf2c824ca4c90a0e7acedabd7782a8530cfe8d71f1404b26d5fc293b7924df3d542a8e33f1d5764bae7322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53866b6dbd67f6cb63b1f18b17ff61d88
SHA1902f3ec193132f7513420197c28c07506619c2d6
SHA25684b7c13fc71a7f7c3f40a807dd9c6b861ade9e7c33e6b3edf69425d6cd22c37b
SHA512fde914168d1dfc7eeb28112c5de5315597e4471cf79d89a7ccbaeb3cc38e86d4f461a27e220751fde014f14f5e033277f8a0474f3cd73369e5dd6925dcd09ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4d0101683d64ed869bcb035836476ce
SHA1f394666f021b0b6b682115f825c50dfbf2b76470
SHA25690cae6611be1233a6e4a8a9787809dc5c65eb273567e4e912e97f3d3bada61b8
SHA512ff4924a88b35828145f07778e29632cb8c71a91e7973d3e4c4d42e8bd18495ca08574ba70c59dccfb93a81643339df106fb4fc4d2cf0c1e392d65c345da6872d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac256b7acb25ca612743d1fff295a13
SHA1c0c1e99b31e841c9375dc251d840ed1dbe06fde7
SHA256f9bc1297ff8bdc8fdb466f4c9ecd8bc409f9722c6dc077745b6369ffa364e415
SHA5121ffca9308738844cefde3259cfa41c1e2d88458912c4e78eb252c9bfd3dcae8d3de238728fe6c5954af4d6d9c2711d00513366d1d0a234abdc090a4def014836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f961ea41388ba56442ffef35e4bd47d
SHA121e44f486a9fefa25393808be47ee03933d76f10
SHA256633a457356980309626040b359773e66e119da08af6fd2a777f97f560bbacfd9
SHA512ed8a541e6f7bc00935efa3cd490a09e1454b999d6f96faa081e5254b2e106f69703494993a18bc6c797b231fa2e95dc214db39c5bd677c39f15e17839cace97b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538440a90d2ab589ecc51e8b0c933f3b3
SHA1292a295410886dbb0e872a91a4e4616bf19efa36
SHA2566a124010a0526255e172d605bed831d81b62db1af8ad4862a410cb5fb2b7ad21
SHA512b2710d8a2e5565d99968307c46719c40538eb279daf13ad3c3c0b7029834cbb8ab27978264936ea0007623667455b7841564448436d503febebc018283fa0ad9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06