Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
9dd11867495924a12643b8f41e67a2a3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9dd11867495924a12643b8f41e67a2a3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9dd11867495924a12643b8f41e67a2a3_JaffaCakes118.html
-
Size
4KB
-
MD5
9dd11867495924a12643b8f41e67a2a3
-
SHA1
0d3aa9b8997a0c330423f3fa573e3052a0422480
-
SHA256
c7fbc4680205ef2b07110016e9924c5cee5b85b0db7e49693f337b1595373160
-
SHA512
4e0ab1bd730b8eafd6d294188c1d93928b28beb973d1e58f1339a5afac8675c42dec235dcafe69b098dd833830aa0b3bc622462e1e244320ff43b811f3208e9b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oeju5Cd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7E1F1D1-27DA-11EF-9FA2-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424262478" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9070c49ce7bbda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8ee701084075b44980b71d2668ed8540000000002000000000010660000000100002000000085a0ee61f08bd2d9035de9a4b5453501e7ec8933e238ef933f60b4b84de8ca70000000000e8000000002000020000000af9ab9fbb941cf0aab50ec9a43bf6ecaf02e3456821158a62a6e977ec5a6b93a20000000277a1049628d1a84ce1ca5ecfec3d93145d978b06d037d8678dd7716287f20bf40000000750f9589385e1816e5e27da53988b9cbee279293a0bc742f1272e1a46da2acf2af3f4ab4c8b050ec5eea52298e82a166022c02649a9798d6a19300ae764d65e8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8ee701084075b44980b71d2668ed8540000000002000000000010660000000100002000000020da37049d93268ceeef62bfa2a4833c087dcf9767db6fb22f98e7e93fbb53b1000000000e800000000200002000000072c311dd87b2c7f782ce469859414998de9464aa7aad5d06d3c94a25a88072d590000000b4ea49fea1e0654292662f27c46f6e395d2f4dcfa32c46ee261a4f456de7a7a38f94c52f60f08489af50b2e1f6f6d0d78a2179b69e879005d7eca580a1be7ad0ee46344027f436c2805bdad4245f2cd2aff335319c2ea3ff2f580a2acccf420e4307abe8d2ade8b892bdbc63fcac6856e80ff6756c9c2097df7b98bf56a8d12c0592f1abe9d157afbc94872d2e7acd94400000006ec53e12c1714207a12f94ab66cd0d8ed024b250e73df960a9bcb203391f59719d3f0d55494da029ed6dd25fc19ae610d3b14f0c29e9a6e87661819cab8ae422 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 856 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 856 iexplore.exe 856 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 856 wrote to memory of 3012 856 iexplore.exe 28 PID 856 wrote to memory of 3012 856 iexplore.exe 28 PID 856 wrote to memory of 3012 856 iexplore.exe 28 PID 856 wrote to memory of 3012 856 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9dd11867495924a12643b8f41e67a2a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD592eaa1623f4947aa26f8e6c11417d6a4
SHA17e809624c309fbda750b3dadc5ddc0fd5ea4932e
SHA25632a09c61e2d29a3cc672d079a00afc50e9a19d47886133cf17878c70ed8c4edf
SHA512afc16f298845f7592e7dcf4aebe1c0821e8f363496dd4ffebfa2aa35beb5d3050856f4265ffa935582a78f8c14f48706cc024b943c4f54812dcc1200274bac23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD581d590373a75c261d47f2dd961637bb2
SHA1c4c3ff1240217e873a1a26949346a632f00a67c2
SHA2566938546c62a4a8a2d49497218bb300b37f3d4484a59a5ac171e00c8de60a2969
SHA512b4a96e99ccc73ebd7b04b4dbac9be22f1f4437bb0b91cc8b0d77475441daf9dd2e44e1e35e1e84323d888544857e50004a4859b85336ebc6706e77bacbf8b555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD553efc15cd1472d684880aad815183ceb
SHA13586378ec76fcf2684d2fe1d750a4157c6e1856d
SHA2562455764c3684ac42571c4e3817033701b70d306228bf347547fd74239649654d
SHA51286d6c4f3e56abba1b48fa2b21479c57f6b7b4cb2a8b25b917b8347aa56f978e5272abc9171d704256c2256cb2e7a1f160f1bcdaeb79ff1461f4d32fc1015db1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b0708883275875b3709bc0648d87d181
SHA1e7d66e71dbd806c4bb460f366c75863c2d5d0ea2
SHA2560b5fb7d58930f3832d0f765c86f157a94172900ea7808525165cb3af7abab02a
SHA512ef380b3bb151bf4a0a5722bef408a376e5dad31758630b99db0f6e42a0e70a19c2637dcfa19107ba5093790d3cdf09f5cb526f4834e204f95214f48b58d0840a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ec24610b610c6f5b455e689ee3f9ca46
SHA1d810ea709d8704f5f38e4aeb6d0f21a3807dea7c
SHA2565cc8e8e4d5aad83270bcf0cc6fa1dad60871bad983e065c7eff323ffbc479ec3
SHA5120e9d1ccfff49ed5af16a1b8a61f0191ac7dbe9e791a9f6e1b5d018270107c9ecdaa7ed4b47b0e751887fe3cb5945cd0a317b010e65590db0fe23257a44825528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD548496dfe5811b90af7c6a96019c2c41d
SHA1b620bd1e83498697b1635121dde385d115b3f570
SHA256873450e52c17b62d309090c0a777e16b61ee2227846e48a8ceeb32a67d821b62
SHA51248e8181eba5097bb87a5abe3f2f83e25a60e946a9249831325312ee4046b8e672b04607e44330e548e0319480059bfe499fd5bc73085d2c3fd10f9e18cf6b5fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce61045c1b7971da12ff060e21722f5f
SHA10dfc8b533f9b00552358168c7c435718d194dbbf
SHA25683d5cbeb4d8d17ede1e29d86507b09b6ad4aaa0b0b7417a15b994c2b3b322e06
SHA5127553b80889b8cc88acaeccceb7d5dfe0b8b68cd6efacc1582b5666f9a15ddce024b956be218661bebb4072358632ff73f333663682912684376e893d037e4500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57d97c32bdabb4627b8961d87b32a3bbb
SHA1141d6190c7dd458b2d509deba94930e87afaad07
SHA25636298dd02136d669ea4bd7a6571c9d9dd6a2031bc67f6bacfebc1a2985752e42
SHA5123564b39e743b8c8950c61a7f08df48ddffbda6e3d027dd1400249aae77012d26bdf9f6a83b3943df86076773d8142a855f8b4f94df29050feee407710cc1065a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce7aa150d8d1b81144351ba9e7c6301c
SHA12ae1d49e3d069cc7c550cfb20216a0094ceae456
SHA256327ae2cac1cfe68761da15458488a156aceb26e1aba7c10fd5d513f96cb8fcad
SHA512c0ca25c6539076bafd0117f8622691470a5ffe82a8f44a395e4aa3c2097343931ab8b84529c757458422b9f3cc15ba613faa2507e2cf0ab50b4821fe843fccde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e11a8b25747d6110764c5d5d3bcce87f
SHA1e8a204844541180fac9b65e8c5e689c5337ddbc1
SHA2563f69e6e3db4d361d39f8d010ae70f6127ae3c773d86135ff9e95baa4efaee6d5
SHA512822f90222796f48802444b99519012e6f82bc10a150a810222db79cd359f43f398558457761a7b1a6f26d60fbb99ae107cdfd9d6415fbe0aad6123593a437905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e466b6de4c7e23302ca68711692318c8
SHA1767fb50689fefa2bdba31f2a972d9ecf3001d90d
SHA256d274ce3833f0f24af372319ce34b210d0543891f456b6542caaeae9bfe6f09c7
SHA5120ea05bb55ea37a1622ac519b15c4f6ad3d3143db2bfa3fe7003bd16d6e5d923e062c664c6da414efa4d08696c87d006ddac49bd0d0b4f9848c09fd1eb9a4cf4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e3cfb33e7e710fd8d86d0b84463c466c
SHA1c127d6c85425c72bfe6751343c35c3254a97e004
SHA256826127b93fc9b2a1d81df57837e03b72c2255341d8a96e341b493bf9984ec452
SHA512ebc6e8efb0a717b1f4bdbff33105ce8b8aeb8065db96df53a76e855e506dfcf5fdc2051caaee825ce700804f084f0d1c107d8aea70fe497960ced448e58357fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e0b966cd42dc99e465e0d6f88f2552d0
SHA1f1d4501ed23e2133dda85940ce99523ebb9b08f8
SHA25603d305f386915350354c635ba297d8ec72bf529237952503ab15b4562dcded34
SHA512395ebe22f90d3f9e266530bbd87666ee5107beee477c281dd3adc60ad963ea8b921144300f4036071f45f94f1859e09b19a2619380d75653ac83e53e926d7e4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56359456a74634cc718d5024a4c8117aa
SHA16b6d7dc8ccb3054b74dde60cac53b63da7fc0678
SHA2563bd65caea4305797dbb0466fa4f8a01d7a742167d87a5b04836132d02cf72fe0
SHA512fd3764554b12c52c9f1ca79c06e984a0701000abdf05b6066a8ab06f4f4e71464e1111c82ec7d225990248453487734a546e4268a7145a07629859dad50bd8a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD597597efcb1aae26cacba4ead550038bf
SHA1a63173f648db822a9bc87a057fff061fa56b851d
SHA256477c3a75411319ccb69b42e5ec599f0a0ef97c7d4ab5e0e735aafe846f9b4d23
SHA51251975da50064995751039830f2891e96cb662ce2224923d61a2d2739d7c182dc1e03d420fb6dd0797eee071bd8ee89c98c9044b5cfb84028c8abd19b6a6f3646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ddf9ff81fdc58f058bab4bb2e41c6a32
SHA1a2ab14b769e0e64f68c9a4f89a003bf82bf07e8c
SHA25672b891e62485133d33b0c26b85db35228bea83a7588c8b7bb1b017db5bb82892
SHA51281964860a66a50338e2ea76f8465bdd82dbd0b63192cb2604ed8ac197b275c9f11ae77dbacd4da05917e9235cc7564aa3c2c93ae97233ab902a3c1626b6bd8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e876177a72b89925d632da120632e985
SHA1647c77081bcc26a229522b9394e99efbc506f26b
SHA2563472892b2eb540c4e96e063755dafde4276c0466695e0d9390a6e8c3bc37fe3e
SHA512d1a589eb36cf324a3297cfcfe06daceaf56a562e963d01a563726e4ca160992563fe984a1721ebbb6bbe72858543d8641ad49810409665c9820aa7b2d14c73a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD520997eb444ba3d6b53e2df73896f5a7b
SHA12d1c48fcef69ea1e002623e84452139a57da1cea
SHA256db990b40c65df24fd94b8b9493a086463f0891a05b228136a61fcbe4b983adab
SHA5126569275e38ee60bbeeb9808fbc82c8333d96ce4f3ca5ba1e5c6352017caf0b444b917c2c9c856d76ed87877f3e947912edf10951dacc15d1a5f93e318f9d11cb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b