Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 10:03
Static task
static1
Behavioral task
behavioral1
Sample
9dcc5d4fc89050ea735e5248c98c5327_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9dcc5d4fc89050ea735e5248c98c5327_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9dcc5d4fc89050ea735e5248c98c5327_JaffaCakes118.html
-
Size
4KB
-
MD5
9dcc5d4fc89050ea735e5248c98c5327
-
SHA1
3ee255b03f70dfda3b4e429618b5cb26a4b75ab4
-
SHA256
9de3319adc8f61929a83fd7fc86dacf088989cb934c801390e195ca43ba20a44
-
SHA512
73d1ebf7cd5064341a7aaf2ddbf4b26308a73b75eb8ee11ec771ab2565264a143e70ee17d76a42e94a929faea0d78d6450090f3b59db9f0f7a6e311dc7480b6a
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oSwd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDi
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602f7fb3e6bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000ccf91b032be0d42a13065c1bb50bf06000000000200000000001066000000010000200000007528d8ed800db7e25268c70b2bc6b8c7c0fc3c8d8a0418ab6f953368f3466e1a000000000e80000000020000200000002dba782af7efb46ea351d30a5020232a4a71e19c5f7ebb67c2823b339ffe5bac2000000003ee11db7c8b593a8f8893b3f586a12e1c91b1129acf1ef068bf8b80a56ac3e040000000b26ad954b1c506cd4cee0d227c5ffdceb5c215f33ba451e34c7d3f4490059809288b8263c75373498e0ce33e353e2df58731dee4774420e4e597954de37fb5d3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424262085" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEE53321-27D9-11EF-A499-62A279F6AF31} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2516 2644 iexplore.exe 28 PID 2644 wrote to memory of 2516 2644 iexplore.exe 28 PID 2644 wrote to memory of 2516 2644 iexplore.exe 28 PID 2644 wrote to memory of 2516 2644 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9dcc5d4fc89050ea735e5248c98c5327_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d5dadfa80a47d4ba074b1d05bb1ef5e
SHA1c3ef325a88947b454aff6ca8e5c0507680d9011b
SHA25677e719c8488e185c441388f48b1069d88160768732367a6b8754e7e49578e49e
SHA5120459c4db7985661f50796e6321488539ce4dec34e3f5c103f6417ba31daa00ceee6797ef70a534f339df54d6690ac4981c23c14405fb92baa9359322a5cf5a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6b1df0ba3219e9b580b48fbef1b8bce
SHA13e314e2597941f0ba9d52a31e9c22b80130451b8
SHA256628d05d72da09bbc571caa9432166592e867c584584bf75e5becdb32dd46f09c
SHA5120129b03b9db9b0499dd4f9202abdca1e663fd3b3295c6b58a94332e1cb17b3e856990b813d5cd05aee3bc3957c345a1a32d70dac2fc17466422bbade71ce36d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f61835562d895cb3fbff4ce25e60d34f
SHA103eeb88004206c5081b2465c74972cf8a88dba02
SHA2569940b939648f1a1f2eca224b008493efd53b403b23dceb59a3f5df983e4f3012
SHA512c43949e3613eda6fc13e1a71dd35279194ed45bfe29de19ff6068798edd99c55ff4347be37496e286f1a10f91e33d6b6a0a2fa949e59ca54e158434f1e318ed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e40066e4b5a6721e02b12b36700ab38
SHA15ef55e537303e2b85a1b0aebf667f7f138cda5d9
SHA256bbcc678246f34f44d195b2f5fe0f78ac351dc8cdf1fb6b25f40f1b3e765d22a2
SHA512ce664657dd68a9d68720056468486b8b9e0bfd1bc41caf1434395784619b087d86305c037ed5066bad551b15c070ede906d9099d66ba6a4ffd15a5dde1806d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b92887f29658d4e075b7c252a9789adf
SHA1cb1666b3cc1342e0c7bd5276e8e2596efbe0d491
SHA2563a143c513faddd928bc218ec827cbbc32e6269bf9908345cded93dfe414fd144
SHA51269d075a81b7f54d828fb8c538cc7a59b5d1b41560e48a7b6f34083c1605298b9b123eacb14319d1415b8bcd8d40e5fae50873f8c9511b9f3eb8776500a10cd37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f08ad1e85cb09b50dbd993cc433d29f
SHA1436d193c898855fadc642f09a618d267862b8eda
SHA256cb32026181685cc967f1d8c066bfdec74487dd9a1d3b044d1252ca590a5468d7
SHA51238072211d6c9b610759cf9b1b5eb427d2bf59948e036f1002851f1a1e346095739c49053cdc5751507c3c8b25919d6c728b37a830c3fcb31ae3b0269a2d9c206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e8b460dd2259d25c9315bc4da1359c
SHA1ae9e305ae11417f3180ed3cdf4fb2e684c10077a
SHA256f834d8131780cc8cdc53c562c2fd12fc71d9d42c352a4c306eb3f4efd598f591
SHA51205968aed83004e97e088ced1dc4f432f89c95e3ca382950ea85591551d8ff68029a055bdf34f6efb44fc4ceeeb8f498d025ca49df6de721173b3168fd266c2a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54daa4fbecfe6185cf9f2870d6eb0dde9
SHA18fc3edee15d9ef0cf37ebf7376f7a01826df82bf
SHA25643eeb7cc7842eb6b43429038aef1296f66347e84aa9bc0a5c075ed1941d8989a
SHA512fad5e890b241a2a15d1fefcc0757671415fc474bb6a5a14fef155f3fe82ba24706d7d1162b73d36bb953387c2950d4089827f4e559c1ae46eb1813094c8a136a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec0b946c534399e3c533a2086f283a36
SHA12e5c5bcacbc4f6e512a7cae5b14d3dceb8dbaade
SHA2567f9106151300dfa1362151f53e80d60af3923fbdcc438a18061cb6e69913fc87
SHA51220f865d805de5c373e5ad13877cb0a00059b2953a006d28a253b29fc35bb65acb5ec5f43b1c1e7d1d3190de8a2fdf1e02262e8a914146d5f44b5e6f379502a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5534b307eb41fd11c36c1bbb6be73fe90
SHA197103cccd0a3ec6668336017906ee88e6042379d
SHA256ed6b0b5d9393abe57359add46b92ae827c3715e313def6284c3577f60b0b7c42
SHA512d0958fe319e9f5cde289550f90fb27124c594fd311d4b241fabd8a1457380236679ac70c48619117b3d1574e9606fdb2805350b28667c2dc4f08cfef22a00570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a65c1cf211a1631aae2ee89e93b6c07
SHA1091d507c5e6ba0f946c13a39d5719910ca71f542
SHA2566b26bccc89950ecc17b01ff352566af047486b38be6ba34c8f918f7013bc7dfb
SHA5127f26805d72d285abdce6f799bea9bc2c0ce5364378275392fe43b3dc0eee88752737cd8be0d0a8aa09a980cf0c3b329207c466021235c928920a2e9d0ea8f686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeeecf201e73f9c53bce755ce9ef3cf7
SHA18fbf8ffc5f57c8d9b237cb19269d63a5b511d502
SHA2564bc8f79f623b02385a3a0d08a011a3b267c07cf24f680eff37084fc3cd0c80f2
SHA512641ee4c8f8d1a20253e5d29b75743d37e783b4b2332b99efcdcafa401bae65d2a06a57ca7f4456fd186f85d4df00269fc6be1ae221117a4c1f961c249f893f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556376370091069bcbca35396ebd99f13
SHA1d2d9a0dcdd672a346101b36e88b03f46e5a6dba5
SHA256150e60ad6ea9c70ddf54238c21b1f16a30143a20061515dfb98a76351c24deb4
SHA51228945a8391229ff8a5497c5e0dc264ddc7c7d3a64ca7858fa0a193691e3a2cc3c25065a8fc6284ca19cf6f8c716f8f163aa0ba945a2dc18bda9865743bba0dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af3e71c213b154ab5d3211d7cfdaa50
SHA10a55479f7474115998deebf10a5639612fdd9c5c
SHA256e7c50cb07f69b28683d390956fca25b3386a9a9fd780967799431d99d9494acf
SHA512119295ed820719ba4d84b5e5d1be9e97c2bd4ee44e3aba1bded1e4595db4b9f367112450dea985b497015cbbfa191118b8ce189b4dab8a8947943a1da20779fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c74cfec841b925f11d163ee39f5e4cc
SHA10ac957d4d2edd8e3ce710b47224916e8dcfc8b13
SHA256802873e451b8bea298fa22a0641745f7ecabe8d73c0c388e69746034bf5767c5
SHA512e2bc6c1adba152e55d0a3cd8ea354e57da2715e4443ba15b2527372afb3da7f7735d292f2f4987d4304e5de72c2645c7a060f08422d732e4e4d20f6f3eaee170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590b4d67021a26d99bef581c424441271
SHA16d8958a87659999031c33cbba060a5ff8028b3fe
SHA25661b9f1f2b7eb2e232d668e5b00648ac4fdfbb7ff6c9da1130f6b6d7a914be295
SHA51211136eee14f41de298b96a3526728b15f3169e05f6c232892a7ceb8046f6bd3e93cf1929441fec20297f0bf287e21b42f9b58c358dd39f563f1c8ce541dab879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7b8e296e9cd16c22d3d20b7c16ace96
SHA102b58add53a5913ce12ec6738ea30a67b9524185
SHA256420c022893f613d91d29cf7c9ecffc930f1ff3da5bf2b14846590ab53fa9d964
SHA5128f2654cb21d395a04c4aa31fe98e4a395369518c211c34a126401be508ce72ac9f8f61a0c93fc8fba0a7fbab096aff8a19c3a549b7901deaded9d07c78c15cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a8debdfb1314dbfa56640c93fa0eb5b
SHA153b20540103c9c032569dc1df938e615cede62f3
SHA2566cfa6b28f842f028785938d140af7ea93b2a2c5d3ded6b66b71da7d7e946defd
SHA512d2c9bdf5c1461dacc72614437b72a36fcef68ab59eb7f1d0690ebaa56e23a0a1a078c116ea4467b5655ee53365e4188bb4aa5072179b08f46aa4fd5b6eab0c86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f15505ed33e2fbb10f2259e45c09204
SHA1188274487e7cdf328d57170c44309424d2800033
SHA256c88f3805f464ed6cafdb55b91b374ef925d54bfeb0de543126c1869f6e5f30d9
SHA512d97263c9c1d4859d1478519dd1cd896a404a0eff6edb66641eb19fa76ee3f81ecc3ca590d6bda7e60e5f4b067a21ed4ed5c6861c56f17f33aef9af80c12951f3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b