Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 01:54
Static task
static1
Behavioral task
behavioral1
Sample
9ca50ddb9c2b89b780e380b254b272a7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9ca50ddb9c2b89b780e380b254b272a7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9ca50ddb9c2b89b780e380b254b272a7_JaffaCakes118.html
-
Size
87KB
-
MD5
9ca50ddb9c2b89b780e380b254b272a7
-
SHA1
841a18171e6c1f795161e13cd8bbe8178db45ca7
-
SHA256
e9d76c608526125de34fa028c0b39ead056bc24118f9030d411a74d415ffe93b
-
SHA512
2abba8b64eb53b5603aebe0d31e517256ce163f6d324bcab076104242df21daa8c42b7932b60689bebfda190d4c7299531f95b4c66eb5900faa671c1508f3664
-
SSDEEP
1536:eIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SBWi9:dWirxq/ozRJzg1yCeWy
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 505dd26da2bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424232758" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003b7b3817a0e130408f0ad439f6e4214900000000020000000000106600000001000020000000e10771c45350c322b2e4d9ff2a40dec2ad4dc808c1aa4ea98ef86db5d95b7e81000000000e8000000002000020000000292c22278870464e2b0224574e87dd226983346f6e32405385685c8d80965e2e200000000f0a5e1a1e57564ca865d492d054d81e077f6c03940c8d1f6930718eec00e29c400000002fb9120fb9f1f9d7fe4da9eab2e73309102046e794e3e878b8e720f734ff7e946e90c6e20f46116b9eb6df80735ef2e7ee3069a468d65fa1c918eed8bdcdacf1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95028F31-2795-11EF-AFF6-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003b7b3817a0e130408f0ad439f6e421490000000002000000000010660000000100002000000029f283d595f6fa83d30967d87a38867f67236fe57fe015becc7f01bab0681f91000000000e800000000200002000000071112076f4e380ff5946c63f6fcd461c2b45c74dfabad5b617421b17a765d17890000000e63f6b13ea9b3e0820e19e6dd2eeafb07c5640c844f76fd332e0ad653d6a50657a90a3e096065cc64fa3d4dee16d602cd15ef36d97b24b5375b42f37352667d3aeeab4ba44454433d0ec71370acf8f3ed3047accaa060b60462c26baac6d135d19f46c0312ac78f09d9d47fc93f6112edc5581f69f86a945e6f2e9573d8a696f79c87b8716a32bb3eeac3cc0ab0e2bd6400000003941733763ba8c4d3eff9f1df68dcdeb11466bc2ee0b0370605cc59d1914a493ce2923477835e70f11e8f19a8e5a3f0b99573f34c17d459a9dcd81c0a9bd5b70 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2312 iexplore.exe 2312 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2744 2312 iexplore.exe 28 PID 2312 wrote to memory of 2744 2312 iexplore.exe 28 PID 2312 wrote to memory of 2744 2312 iexplore.exe 28 PID 2312 wrote to memory of 2744 2312 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9ca50ddb9c2b89b780e380b254b272a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD57d2ddb1609e0e6acdc5cb01ade475ae7
SHA145d35bca99a8216fdc2ecc4854301ea920d65c77
SHA2564c58e5ebef49ddafdededbd49828366c97e1a2d244e484007df9a7c5420e5abb
SHA5125a9b4e28ac7b3ca9fe218abcad6fba7840569c0556d1e2fc418db629e158f9ad48a86227b2ce6f81acd37267e0dd82e41424da535c6e9138d5b2ea9a2b7ac5b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5462d5efd9121d6adbbaca4eeacd8d014
SHA172198e29acf63f0dbff9605e119ecd33057e2956
SHA2563aeb7d9d14f43adb8045a87a6de7343bf85498cbb629130b18c980c64d14e841
SHA512da24675d09fde90aa36c1bdd4a96ba0bdca9de0e486ae43a3f27b5bb0563998e20bffee7ecfdb510effb23ed895038301c9dd67d2d4d9fe48f94bb4e31894069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ad1816b8051a5884db9aefbdd1f746
SHA1ad6be118a55ee2cfc5a7ac30010cd9fa3fb53cb9
SHA256d1321e8ad7af524c709c8e7d81a135d9fcebddeed28bc5fe27b7864333b5e258
SHA51243f51ada1bf983cca31f1065c8fdc02f49cd0f02a9e127240f0e50e3fd1ab73681a59f2dee15b9edd20ecbba273511c71303fdfa1e9af6d000321780707d7831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56147501b8ec6b8e5d27da38fa91334be
SHA1f7aca9e36a7f40173cbf598e08f827a86d73e57b
SHA2567784f0f784a629d31a2e4f3cdd56362d98d29b70e0b8bfa00dc8d2259dcd0cc2
SHA512a55a855e1ad0935e59ec59056b8ec9e6dd69289aac679cb4298bbdf8047018cc7f60cc40e9bab547eb6f2dd2d5e07d52e08fb8d276ed115b7162220e1d3475e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530dbda28d73303011eeba9b5a1c0c8ef
SHA176d160ea701460eb4494b4e1c5f4bd7f2362a60e
SHA2569d861cd5e4265757e3580255399f8384e1e39cf968a59728204e8975e46d8eb7
SHA512811d8f660b83c8242fe2bbf42e438d1c2cfcf147eb2b7e5066b13735f0e935d7e95ad4d4baac1bbea2df72688ad54cbac1cc46ae02f78857bf59c6105220e583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54170a6815b6c13ea19cd173b27368a9c
SHA155ace6cd1d5ca3953e0cb86601c2c82d6f9c007f
SHA25684cfa9e432e0fbcf497d9ddbe7578fdb60f7867db9001f57afb0c7757e44a6ec
SHA512d837387d3bdf7d774f156a2419f3f9ef5417767842519eb497a89b663bbc2595b9ab848767d99ea91fe93b765b837e14c8f8c8652b15b6e90f01f42907aadfe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e982c2149e8afd5c63d854087ac63c3
SHA16f04e8902ad8e70174ebe52d53954bc139d485ec
SHA256114486b4fd3012b3bd0eab085514a3a6231f1c90e463aee3afd5ff8921392906
SHA512a30c81d6f9fd698231b7851d3d4b7262f181f6aa320c1c2856802f3c2e3d4afc8cea26ed1467edbf129ceb4b380b5de8b17d9ddb4cf4e4bd2f0cc95eee400c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5916fba8cf573ea9d470a085136e05598
SHA1bf6ffad9cbc6465035ec8b7fbd91eef1c7898357
SHA2562e27edeb5fa84af7fa783c93709e80ae122c32926cbe921ed9ff8e3b205c562c
SHA51280191473a87b3029438b72c49a18941b8145f95d8c8601e6b8dd4b7a9aac42c75c7763a3449565361a8cb350c0547e06bd5658c0e711080431b6ae59baf68a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2e135d6fe5cbcc1400a94b524c14273
SHA1cf98dcba998582c0134822fb1cddf58cd2ac0f32
SHA256f6779f3bda031472aed26d0b573c58c1f5a865bb7f1be6f158dafdef73b92385
SHA512e2a2934dff707d2ada32d5377416d4ada40a165376aca839046ef3568cac8247b22223e159c655d2b02faf1775dc8d916af91df6a79c628357149758fd9e0e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ae2b5777fa750a21541dc4920892c3
SHA18c3bd5d16802830eeb2977bb805c103b581ee459
SHA2568bf28ba6a8cddb78e05985e80efe3344120f9797c66fa5834506501c49839411
SHA512f1500d2d4cdacda356857a3d9a4cc0f7d43770e6cb0f4fb9888a3e408e4fd6e0b3b9d05f2ff5da82b832c550c692b0f0014334bd876157be49df2e559343199d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52afbe77e4e35331c95dfc05bf8d53d8a
SHA17d9b4b692add39f20e30d72c722e3daa4f31ff07
SHA256387a0b98bf448b7607cf62ccfd306d31db51aa1377fe36eee2c0705dbc9e1172
SHA512700e783ea37bb0d95d9a3aaaee199c37a5559daf822257829b79bba93f8f9a290faac974d30ea4e7bfa628ba39706043d057b0009ee6bbfbf9edfbef9ed6b9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52e1b79f0bad5ab8f61a355c82752d150
SHA16266c0087885a094d8b6718a6cd291a1006a94db
SHA25623dff471dfefbc70c86b0cbe3d6652045e361d161428d9b066aec76701b087f4
SHA512f228f00852a308b78c8e02945d902bcf406ce4a54903d369c13eebf6ee6ed0563273122eceffaeb3efe861e5a7498488a928955d9ec4a27adcb7ec100d720b3a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b