Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
9c678c3e599e9c3d798bd2ec796c6870_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9c678c3e599e9c3d798bd2ec796c6870_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9c678c3e599e9c3d798bd2ec796c6870_JaffaCakes118.html
-
Size
461KB
-
MD5
9c678c3e599e9c3d798bd2ec796c6870
-
SHA1
c5ca59f9a7b1f835d89018cb3904519f5ae4a2fa
-
SHA256
4d0dc0ba60e7e136841681460b0ea6ff88d778e8fa7d75e71984b021cc1df362
-
SHA512
9047519d007b28cc2d27411c49171a87887982916aea6d528d44570ebbd3edb624aff77ed29c92ea9d548121c12465453c93d87efff83ee6a28f30bfef642d50
-
SSDEEP
6144:SOsMYod+X3oI+YReqZQJQjsMYod+X3oI+YSsMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X3V5d+X3+5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60affe3894bbda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000aa1c6ca97bf1744fa9820f3d10b788c30000000002000000000010660000000100002000000065c01ac342af283722b5d0b26ea500a00bd9f4d31dbebcc65a50846c726caabd000000000e80000000020000200000006b8fbb8452c94dcd387e6ec012581a93daad90d9e4c2c71bf2cce6cd2b523f6a200000004ce5935a556b41f2efdca2fc11e2ff7b7981eb3d2e27b9158a0d9db742cc191e40000000fe4ee070a7a636980878e33af2b8dd5d477d6678e9d4740436942162b97dcb82ffdfae9d664eadf62521f895389621abf4d21d9c0ed45e2f628ef2ee7215501d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424226656" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{606A4461-2787-11EF-8A46-EA263619F6CB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2172 2336 iexplore.exe 28 PID 2336 wrote to memory of 2172 2336 iexplore.exe 28 PID 2336 wrote to memory of 2172 2336 iexplore.exe 28 PID 2336 wrote to memory of 2172 2336 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9c678c3e599e9c3d798bd2ec796c6870_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e396df95b837f61d9f6ab6dd4005aa5
SHA10d3d0a771c577b88fd1fc5f558fa46100e99471e
SHA256cf191e70b677ae116ba062111933c08245919852c71c25041f3b52291cb58ab6
SHA5120d6c5742c82485aab3deb73b48dfb5535287094743277abdc0eb11a3cbcd83ba066f80245b7b60b04992fbe92dbff22feee93fa549be7f40baa4a845ef7ea023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d39fead30d843aa5507b5cc675ea0c93
SHA1e3a8b4c0c52d55f9fc0292e6ebadcb7e8d2036c0
SHA256a3115e68a4fdd66f05448ae6c74998b44ab9ab0ae8ee6e935a1c388de445a0cb
SHA5120b29ffa36056b726afb7d38372c0b519db2425755152b48b860e7bd172c616b5579c2fba7a261994cfac44d1bf049aa3da25ebbc04db8e3d9ddc1aecf89d0808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d50af3e7fcc50e761fc46e6d883434b
SHA11c6da13f16fbd68ac16c6b5ec65750fb786ad5f0
SHA256521b8f7b6853ba4b6a5c00ba44a4e2dd3e578fb5b161e56520fe1f7f47799bf2
SHA5124630967b4c2b99633e434c66b074c721d2182da86f2cafa98dd9435461cd3c653792d5452ae5d4b1766fdde4562712ac3eda0e19f15ef72101a7942d2370f8a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f807f178a09488214cf14ccfb8437a2a
SHA17cc92d8a0292759c128ff18b09210185a58acdf5
SHA256f8c29ba1c8e27e7b31a18dae84b0250eddef2e57d2e4926d14595663891d006e
SHA51275b22e8736ba26ac8bc50ae56b30d4840898bef780dc9bc5812c5bd02bc54a79a3bf2a53c01d563d0d5d5db367f2a54c44a085e0c57f11e0f30e537b5264a178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d79a6d049251b33c61fb906824d11b0
SHA15bca15959277ebcc92e86f6c564840a84a838709
SHA256272b8a696b2bf59f1df733afc2c31810779d3daaab3d30e5bc9cfe60b1a92aec
SHA5127c09252a2747038c443a5eba922ec92b3a4bd36c998861b3785930a12e7757d7d293eef2b92b61cdcef113012addc3018772d34821de704c0fb0b0a226e64a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57568c7efdc2af3f97874a8af6696b099
SHA145d26e387360a97c5a6eba052d18de06d2fb8dd8
SHA256801922a8abc5999b1a19e5c5e096287e2bcfc32cd741f19c5fb819be116e83ff
SHA5122948024496cd00574978da4beb8ce34cba00dcd1fcfaa1ed946ff2dd1565bd2bcae703bdf679e174344c15201caa5476b86c10a94b56c2ce56730f7a2d935431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5606706d01e4dce7382f86814f1a81c5d
SHA1b3955860d31ac5ddf767a01b05555d425512550b
SHA256d00ec877a6f7832dec38720b5d02523378228e9f9fb0a0779426e35489012173
SHA5120446ba419328fcd9428e4d175c883415306cd3b24c1ec9a07867292a9f5120816ef478210f52664372ff26965c4a1a0d2beebb29210b474656beb399155bfb17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e0385c4b1eaf44fa00cfd09ba0a23a
SHA1abe9f311dc5a0d10ec664ad1f34f905e4c0d4976
SHA2569057ed6e35c356016eb143ef5669ca89fd7533f7883b8d64e903ae5aa2f38a1d
SHA512df063c76800850742d48fa53e785c89fe8d0914d2e6d9ca082d70695d6402ec6a8ece111d7fff340b95100362eb54aaed3de97d6fdf788f2977044f07a3cbd3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edc0277e4c4c4b30befd4fde12a06fa5
SHA11e02cb7ab1877a2f6796714e160b11d38fa85b98
SHA256e1662b882977bcb875785ca54e547e4b35fa21134d89db52c7a5b169161310a1
SHA512ca2b598305d92db23013694c06d62b2c4c7225431e5ee36c729d634935e40fd3f66b602caf3f903cbcb8417cd5934fc5b49b39836bcbdc54df11da7785efe39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf9ff5a6a18211eddbf348219f750de3
SHA1d52ede2fdb3633c10f1c975993e42598fe6aa473
SHA256ea5344364aeddf9e23cac4e7dff6ede6fda165c16478ba599c8a3a46aabfc0be
SHA512cd69d0ce06a49c9e15ede840d7bd002ec7a70df250f585023661cf0af9d59e2f84efda62d65e91f5db9093fd936189884f7c400eff71eb646db4715f5406ab94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2fe457bcff36e03fa272545f6d7f167
SHA141d1d365fa44a47e314f230b674499e24136251f
SHA2564f10a0c4291d6b4d59d7767528e8f207723034bef1c33899df4b161233b2ae0c
SHA5129a8e94e78177835dd1e5e2483a2bc7bab5b96da20fac687754424b8143480491a375803d9034bced031c5eeec42db23e4dd4c0094f1f7f5322a3e022fe80f391
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b