Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
9e00b902c6df33d69df977f9217d6162_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9e00b902c6df33d69df977f9217d6162_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9e00b902c6df33d69df977f9217d6162_JaffaCakes118.html
-
Size
21KB
-
MD5
9e00b902c6df33d69df977f9217d6162
-
SHA1
14ed5805cd12eb01a7dfec43000d4dc01900d838
-
SHA256
4aebfcc1fb4f56594965330745a9aa21a790ff05dc3d4a43a172bc778e89720c
-
SHA512
10240abe2521f665986155361a3c95b4af23f27eea95a798be3581c05c4c095d3d09e0228d82ee79fdb5e5a7f9a57c5fcc064c62c1b593c310d44fd60d8251c2
-
SSDEEP
192:Hqvl596UDyvWLmYsEER93o2UQB7U09Vea9USdNVMjP0kuI:Kd59Mu+EER22R0aaRP0kuI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1082a6c4f1bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004c4f5f0e6d62204fbccc5890cfd403c5000000000200000000001066000000010000200000009c64666672de5403ca9c6c2494cb84cf075d7b9994f06b40a42002f65319691e000000000e80000000020000200000009f12aa86ef1f9e9f16f016bd6b17c16afff21a3362bb81e3627426b701aa9540200000000eafe2c2fa7bf16aa0e5fdd0e08e8ba2e3eb3d1dc60f4ba362057c21fdfdf0bc40000000b6c5f6a149686f232fe3e40c9d12ea2e6e1450a7c88b5ae6b88735ccd12778dcc4ce0bbc92d55b53010a22d9c9704f33ac54f8157582c7478fe59f629d1ffcf9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF4A9D31-27E4-11EF-917A-EA263619F6CB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424266836" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2884 iexplore.exe 2884 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2340 2884 iexplore.exe 28 PID 2884 wrote to memory of 2340 2884 iexplore.exe 28 PID 2884 wrote to memory of 2340 2884 iexplore.exe 28 PID 2884 wrote to memory of 2340 2884 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9e00b902c6df33d69df977f9217d6162_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c075b33b9288f6ecc40a64af8f842b1
SHA1279a7fb71198b3b1724b6635e5c214dfd1358429
SHA256b489488ea10edfbe0cc98dd7a74f5619df624453c276bed5c8b41e49b5eff841
SHA5121ecb9f9c2f4a01f79afd61c7276c119d1f6ad53c451fc2e9b19745fdfc1700375c800467993d32f0221482a29bd770d2f601381506144ad9bbec63ce07e4810d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518f43c8ac63f2ecc523586744c1694ac
SHA14e093595fddfd9bace0054054a03750b5fd2442f
SHA25660804312850ee42cc40a392c689cca1795824849618114433adf07172501db0e
SHA512c6e587166c780e734532de8e9f49b35ada40fc3173c8e23785b1884ea7b1a37af6222b7d140609c7eddb2ef3020168d3b12bde6997b581c878dfbf0e6895f2fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524ec2fa0b7a181f77e7d6a6b67b606cd
SHA1a736591196dea6f16af79f4173e84e60784cf1da
SHA2563f1c3e20ff2d65b3749bd758fe21504f0e246b81f775306bf2076e002b32c162
SHA512030210b91515d44c43cf47e4737d0430dad14cb1f01ecb597185b1efab0edad0d21b4a319398f59459b31c6689b9582911d2fb2dc120539b87e4e87aaa638426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ade10849c061461934782be0e7b0146a
SHA18f906538ecee52dfae08096136aadda98719f319
SHA2568f243f78ec00bad3d9e864806fc9ef522886b7eb0b0801fbb7ec4995b6a49465
SHA51209653115a1585e40c89f767b741a4ef914e4e8e48347fdf557c9ea058d4867469d6c7bc8676b13e47db7dd3398f14fee217e83ff8abd89469a072e9891972369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fcb4d033b7aa79b1bf35b2062f9f5a2
SHA18de7341cce6fe5294652d4c2a0e1105fb5cad3fd
SHA256ecb55e0e4f537f6f0606eadd06fa68443926bf03dedfa68f3e160417d6b3f8ad
SHA5121013898f1e4887dee35b6b8969d4a7915acbbb4ebbc7dbd05e28a54746b95a4bbf93f47e37de45e4414989f61ee085fcf61bdb501a27d154e8df3f40de16d4b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efeccf931a4ac4b54bc289f1e6f93b9d
SHA13a8d6da11014edb4520182f9b060ebad339d54b2
SHA256825bcc75ed90077d719f0ebe220d6114fa5e8de8fa71c6484dcb5f6561fc14f6
SHA5127d6c6c095c87901a4bd00831f292b174ede2149a9af9dc3982761ff8dcc39a7eb249a70300c0e69991394c16a29a6d60d522166120b1b72a8c5d0ef16b3329c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5055974b7fb22d3b1a81ec4c3bc9f7c3c
SHA1530ffcfddde06a22678a6a8b2f9e584549b63a92
SHA256e39ca5f1af9cd260345def6878327241c4f364c6df2f31cd663891b94c1db619
SHA512f6d7b14e9ac34822a7935b3abe53662e07758c7f72bd09ae87ed873361db6b0d3196bd6aafa060cef0f8b369686b2eccc07681bad1539ff13fe9a062f32a9845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a49b3f2734cda56dfcefdb351f6b5d3
SHA16f05022acbfbc013fe154726a2977417fec194d9
SHA256289c2a9188b6179595f744175cfb25cca15a47eba9b4df9391e23bf3a7929ba3
SHA512fcb780f503475491322e8358b64b6b06fe4ae1af39743e4d2f24923c2ee4813301f5c49f9745946ef3a2252b5f2f608b73585952b3a2c9150b652cd05163d6e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50767336a37de25e4f32518406aab6d40
SHA129f1246f7c53332019e7ab324b9e974a21aec1c2
SHA25655d5f580d9fba5c0ddd03079985fb2460b4b9a9345c13ec99f48d9b6697fd46d
SHA51224ceb9d86aa4923f1c70d43da5644ea82aae20a90e051ea6e7d6838247f8002e2e1fc482b9e7b9b2d3e77703eaf91f6d7c7624c1a5d8ced44598f2fe1e338a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3ed188fe9d27815c5744e058ee1c58
SHA1e9bbe01ff369b9f35ab129a8535100a05c84c2c4
SHA256f804099bd07c34f6069a7f8d35fb7b1f04be493dc8926b11d239d5c65680d7e1
SHA512dc179934d3a24b5509194249a7496d797fa9a01280c29ee253a65e7bffb761e28701e9eb0dca3ea0c3e94254fc972acbee98918548cd3c13f9f79a10f3e5107a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a056dc48ce165d2cb2fb713f87b3d7e7
SHA19731afc8a0549cb5db1d15231f99bcc3baacbccd
SHA25656ee9f051b478176fbf305366983ce250cadd7a720a98398ad50acf7fb789b00
SHA512153589481c89ebdb63f31da71a8ebc5b3130f8c63515704891afc3a88f1b72bf501738973966d566d82423aa7615d31504fe1673405eabba8287556396402ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b338dbbddee292c2876be313340a315f
SHA1b94739cd4bce0f541ebfcac6f892b9a2aa98b9d3
SHA256a525467dc5c4e9bcca28b65ae19bdd62ad547433685a7e73c322d7093a7985c3
SHA512f120e36aba87ddb30657620ccf6cbd88dcd56c3a7ce7136e74c0ae4ffb46fa5d063380c257bff06e077ec7e35ebf29398d54a94053e06d8c6ec5e344d7d97fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5087b12429774253a790e1eadf4a89d70
SHA13d75c6f947580e9eb4eb1ce3e6518696148f3f74
SHA256807aa8595717002316464e374307bca41efc61a83907d2a7771ec35b6a7681a4
SHA512bb503890844d109574a2f9600d45ca131345f99bc12c6e424bd6dbb7ae85c77593b48fa837c840d9fc6109e68c51f764eb53d229ef7bff1149fe4ae9884f60ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a476534bc6897d2d49411746c0d61a53
SHA165cb9019e111991c9ac2c8f0bd9dca6c00e3f107
SHA2567781fe8f28b1e931d7746703d1b6103be71e931a092d93660dc2f1e1e851e9e6
SHA512e1e32ecedce4c7acfecfe8d39e98b1545a07c828f7a62ec929c3aef43fd5d5b775a4dc9b59c8d4595213d810fe40e56db3baa85aaeae120e78bc697dadb45697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b1a74a128c68265f2dd2ba59c83450a
SHA11be35ebf4262267ce191764a1b57f4ce2d85137c
SHA2566ae40265de9af15d00a8b445f542ecbeef91d759b2fe5c88933ebf259fed1b31
SHA512f7b841bc3905d93b5cb0b61bc0f2ef333f267b26472074edb02f3f043a34991a2a99a4d59476f2425398234ab3335ced0e64a9058798a4e2b490036c3d800a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c467ad8824a2e4cec20480fa50b2e0ec
SHA18d4477929d3cf9fd8cecd805ecc90eb23812f6ea
SHA256188c7167472ce37e178dd5ac0082dabc8280d73ee0b5c78b1853244d33a89ad9
SHA512d7ecd912e1c9ac38cefb225dbff55359b57e32d447cc240f87b42adb8f32e527792cd8b3a72f28bbdc226688a199b5f674f8f321655e98b199f6fb02b11204c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5936776fb984b5cb12c9e21c8e3ff7f62
SHA1b53958c8411e6962f44f1a9d09a11a98f4e6c866
SHA25697326718e0856b33a01dbce717daab93255d825cfe15ce94a9ec51959d22ca6a
SHA512562480919be3700e50fa5a992ffd3366925c150b7e7a8ccb6505836cb5c86af6047a1f853b8d14ae20d19f0adf6d916658f67c4a0b1a8e2610c755ec4361d3d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e7a411582e4a48d604642ca168785f8
SHA1b35dae37f67caead342f5cad2f181eb1371c2712
SHA256a2ca2fdd636140d693914775e90f69677aec8aef47296495c03bfff5e8fcf230
SHA512d6756e25d94552f86c1b3bd5f62e3de3bcc490072b0a925b8ed860aaac02326bee1a262a9dafc0dcf7eec0fdcbd6af90a4431a5d547b2080deb7470fb8f2c8e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c31673bce0a19a7d062e191ff30e3b0
SHA14a7a4020908ef74b7a395f1e51b908104051b0a2
SHA25621369463b4499f79473d3cd4bc49c39e2a72e374ee83afe05b7dc29cdd06f8df
SHA512f98a26297dccbc45dcf44fa87f459ca2a203735c0a11fa3a8e3fa54d8ea704f87e88ced1ba135ff891c572c9263dcfb5a880e5604421db6e21686e8e00adb063
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b