Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
9d6a8803d42a4dc78c5fd2a2fd087a0c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9d6a8803d42a4dc78c5fd2a2fd087a0c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9d6a8803d42a4dc78c5fd2a2fd087a0c_JaffaCakes118.html
-
Size
460KB
-
MD5
9d6a8803d42a4dc78c5fd2a2fd087a0c
-
SHA1
5f747f1a795f15588bd51793d790a285cf6c087e
-
SHA256
594345ae01fc069a77482aaf4df61fed670e6262423eba78b7fe7123cfba20e0
-
SHA512
61647935d964d8ebae8b1bb9ad8a5a06df5e77a56590536bf7b7c4b13575f7446032370b2d355615211a0b6d0793bb4fefeb2e7bcab78c5c942eae242a7b5a66
-
SSDEEP
6144:SMsMYod+X3oI+YX6YQjsMYod+X3oI+YvsMYod+X3oI+YLsMYod+X3oI+YQ:F5d+X3Q5d+X3t5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004b7f196adf51f74aae527a84d7f052ae00000000020000000000106600000001000020000000fc44c6ba9ab113e7d4b1202619edc3d6b7649b33a669fbfd0d32aea66262a1cd000000000e8000000002000020000000614012046079720fdc054483fac9eea374cf278603b686e1e0c727217833380f20000000b6ac8f87aa6bb9ce9ba7ae3f62225d0517d5abd0634324cfe603a5e8e6dd1e6240000000cde8f3a5b011f1a2666baa373549cddc6a8533e316e47c22771f59ef15b00d0d873b930f09bcedcf791303e10f5d4e9749d07f5a2462c7d89db03dfd637fca14 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ae7da5d0bbda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424252605" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCFAC821-27C3-11EF-B73D-E693E3B3207D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2500 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2500 iexplore.exe 2500 iexplore.exe 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2608 2500 iexplore.exe 28 PID 2500 wrote to memory of 2608 2500 iexplore.exe 28 PID 2500 wrote to memory of 2608 2500 iexplore.exe 28 PID 2500 wrote to memory of 2608 2500 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9d6a8803d42a4dc78c5fd2a2fd087a0c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff0b9709e9d9fb507eb263e1ce87d942
SHA1bc134a949e8e8886641fd38302684738ef2f5b76
SHA256295974ad78ac5afeaf5da052ff1524579cb42dc34e86a459ad44254a669dc281
SHA51286771f6baddfa61367dbf768d5df5d3fde1cce0a1425f940b27b12709e5b51866c5eea13b9612b62f6b1a637b0e2fe1b9af29710f163236fd29c0b6b8c2c061e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525fc6f90166ef9e58a3398953a90d928
SHA136850dff05d23cc6fee8629b5fb49618c7177cab
SHA25611aeb27db90557b8e49d2101724cc6944921be952792457b61741b76664bc7e7
SHA512ba81b30453a31085a1cc29d5842a53708b3e397faa306a6f4deaea552ea3ca42d901d43fe37483125fdbef4e58fd1c340cb2be47084004e92c86362ad4699f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547ec821b32a7e3ed057f9c94dfa96e5e
SHA1462f4ee4db3236d332e07b37de7f8449f618f547
SHA256e1c10f12214119b496e85605cbe82d8c1f82930b911d8620ef0b8be3d337e593
SHA51285c4ec834555f7e382cccc800d9ed15672f0dc893f0630f15580921d145b6fe211551f88e7361ec3687412bf10c9a3467d4ddb880d57f7b293808ccfed42b4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51192823bf01ff66c4cd2002847db36f5
SHA104bd843678035a0040c14576f7e199c04891862c
SHA256509a426791efac549197a494528ee3c196f03b74a833dee635afcbffd2041cb6
SHA5123823faabe4277dcd1e4b4b1f704614c380e6afa923047a12dddbfd3640d0948f4002ae09e476ea1bf2ef065bef4199eb8976598ce2a8ea74febd5c3164a6dd48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5907e4d82c4bcc7409ba5d70a5693f5cc
SHA10dc8a90ffd4d074a96884c70548e46d2abdf5f93
SHA256d97f6c998df6d49ec83f38aff7f476e75e39f0c5cc044f38b04f34c77a880c60
SHA512d4b849ba79900f551b75711e31077a62559d904aa516eb4cee7cec27d505ff258bd2830925b05da7867966ad9d059416270712ff2e676350262f7a1914f6e953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac3e09cc3e529e37a8a55dc802132abf
SHA1898d2d441041333b6df5a835256bea7419577f77
SHA256b0c4beec96e6490370a412f5ef550af7f9bad91edf508921727c7dd76c83b8df
SHA512c9c5ca835148852d00aea79e203aeda01c91841674f25bb9bf7d47c626608fa24dbcd6974f57d3b494255db83ee2169df7288404e30941cd973a5496374eb60a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556185647f3c4d2b7eb05c540650ccd2f
SHA10d0b480a4628c1ddad9a7dc153fa1bc6643b5641
SHA2566805c0c2116a428ad6c93cb704594b5011badb8c583d9e0aa603e64e2373862a
SHA5124ac6a6ac38d2f6f3019adf0dbc6c7ab0d12c747c4d98bf21283eccd30c8d36f2839bf913e34bbd9c8e865c645c35443ba4019885dd214a6d3103e08420985ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e01f4709a6bc5ea1a8738d4517c5d687
SHA141b631e512023b2fc0d807b3426906b8068afdd1
SHA256b932147bd85f0b1aabca9d0063159372dbbb2aa03f52c56d2ebc2344cff20a74
SHA512caab4edb7f95a379303015b7ad57c97d79a42b9f8975a65c41745360d2bd515544cdf40b5174c013169f02d10c174ae4caa83cd986355a2af9326ef27779c322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543aa8457844e4825e747121109ae6344
SHA1b7f2c308afd6dce8c5f4126c7b24bd7724fdb8ee
SHA256b1274bd42a6ca512807fa170a3b8572fec7dac476876111c4aba97d6b1dd0611
SHA5129154b1488e448dcc9da9f658f2e7d03b17663ace941aab7e4c80a430f3f5b58e5b0989067710bee053242b5dd642d2c7f6a70ce12cb0c73a14d7ba57bf59f6ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db49588e7d697c4dbf4a769d478b74e0
SHA1d48583d2e4cb822ea316bacff05b395a3d7b0a42
SHA256946d811ea7bd43a8f867d11d8d86a28411ce7fb5381da8d86bdd08f11d2025f3
SHA5123894647ce7b399a979b4a293cac9a5fbdc19caa6d94aec7fad0fa88f916a58908f6397e5bdf6aeb7a92620bd97906b1eb89f462ea6070cef61ea644cf9287ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c334ae8662de3b4878f4260ef6e037
SHA1ae08ba52d130e9b6b1d36bb92a82894b7e499d4e
SHA256f5cdeafbcfe0c4bf87c88269d47bedb5979141b13b8fe0e5b3ec5715cc789d65
SHA51253ebb62d48e4832b129b96bcdbbe091384a20d0dd9561c354932895cacf0799e0f6f124d1f135d18c8ac81102af130c55b5a03bebc20070644f28ba35f57660c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54efc9c6f5ca39db5d4aa76bd138df428
SHA1765ed2db1225abbd5fa2c37980a3f7cb06429594
SHA2561a0d1146c16e38b946870be9340f9383300a438e65677a44c21e4be258d8c470
SHA5129343c809f967173f7b24609b09c99570e6a4263afcfe18f3d82de8e56afc299d06474a4feee3bc8e458c25ce25239852461d7a6f9e393997673696b98c261de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2011c7afbfc34793b0ec1fa5224809c
SHA153f3089947c1a8b47fc420e166ed991eed722e63
SHA256e4f7ba6cb2079e6aa6033cd5b71230d76cb2623cd85f80962f4f429c64d9f49a
SHA512935c9e679606d4e53bc43a8ee0ac9bbfabcb3e5dc65d2f9b70be90679373310918188ee6c08677f603003358423efed75e9e4bc4e9771574672cf3902c1c0522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e655b0e34836ac89b682ed1b624ac5ad
SHA12ef5abe54d807cad5f695018b3c2b243e351e1c2
SHA256d3e0f256a7e2ddecba1d16828b48e8ce7ecf726591418dd79b535adb1c9c9a5b
SHA512c732fea219f02c92c1741557dd7aa35b9a727eec6c1fbd1ce100f93857d2aa0c89417d5365de61ad2fae5b500fd5e5edb07251b2b33208d1fd6b3ad568b4474d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a18e3cd749c9cdd7a6d8bb311555b8fc
SHA1465a9be4567d92c09c975d378c8c92ba5313dc2e
SHA256fc8e1da75b19ea2d5f8bb4653332eaee4cd75ba1a34c1355af7eea5e49fcd276
SHA51217247072ce91d44a40b1022b6c5a62abaa036a30bb320087d0a2017877a1888ed2caf7a0dbec18859dbf37a6fa6afdd6876f7a44c329a044c4e2dd9c12b9c377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ed30194441fb2c783d32a47cb04f89
SHA1ed9b770a722abeacfc1965b6a31c21e0e5ca9b5b
SHA256185e184b96f911ad8ae1dd4ff009c26e0a9f6839c0a8efbed9355832642f9307
SHA512e46a91e6b65507c785c5bb513409b19541460be3582b0d69cd9dad383ed3e122300ad0c870d94c79c1d34d6b4dd43975a104c0ef8d6d14730e07b370e7433c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5521a8be4b5654a0018b5e21ef41e31fd
SHA19843f50bd680e4f5a55bac62509a78de703b71c8
SHA256add6715065019e8e167cb5ded888a0128ee6b25e981531494d9f8756a9c076c2
SHA5121e0e13c85ead24f6b6a0451be7dab9773ef30f372d9de72d4e98c91ec2982f71c15a48f04c259878b44398040953b82b0d2cf1e0afb5a08b6c91e48d05755ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a478c36fba326edb0d5e6e79332e2d
SHA191e9e9c8337dad6418da6535a3029bc887fc5d50
SHA2562435a762d9b4d652b1dee0443e49d5e3139925a95bc0243fe909926c9fe0197b
SHA5128269be162e2bbefc8e9222f95a028652c1494a39f7f2e9a34d0f571d35f9efec7f9b8cc749b4e3033a4fdab88187271e5237aa5bfc7d1875907d00b3d918dda9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b