Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
9ec26cda43da0e29d7b0b3598d670bbc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9ec26cda43da0e29d7b0b3598d670bbc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9ec26cda43da0e29d7b0b3598d670bbc_JaffaCakes118.html
-
Size
4KB
-
MD5
9ec26cda43da0e29d7b0b3598d670bbc
-
SHA1
09803f4bb65b19ce424286fd2a9cb13cb7ae21e4
-
SHA256
01df7d94077081a318a2d691027cdb94bbdf7e02f55f9e3c1f6fc7ee4e9f1a18
-
SHA512
063a89fdd69d1ee2bf75e4598e5ae09401063563b969fa50fb1031cd80cbe539e7ce19f0a8b94e56524723bfee06bd23eadf0b0d05c3326b23fc9ac813ec48c3
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8orqqJyd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD1
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d22f5fe2a056e341a42d5adad7b12569000000000200000000001066000000010000200000001f67139a0c4cb4d2a7e5d53fa7147ba2ffc371c52b2a06732064208bd1e99a19000000000e80000000020000200000001e65e78bba1b7a4502ce579ff13cfa33d471afd89b10716710af92ecb153791420000000d04ec025f342cf468aaa18067ea1f41f4e4c578b78e576f833a871bf4a2e0810400000001000f32fb12b8b8f1c89731480ed5cb69089eadbca14ad99fa27b22b9feb361c589f1989b0f8a2c63223e0b55b65e7b3aac11a3283238d04ef76a8005ce5d1af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0efe4fb19bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424284110" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2775B4B1-280D-11EF-BC3A-56D57A935C49} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2968 1956 iexplore.exe 28 PID 1956 wrote to memory of 2968 1956 iexplore.exe 28 PID 1956 wrote to memory of 2968 1956 iexplore.exe 28 PID 1956 wrote to memory of 2968 1956 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9ec26cda43da0e29d7b0b3598d670bbc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512bc327b716c8d3a9f417715904fbd9f
SHA1a8f96392fd1802df93c64a8f792f2c59a9819fd3
SHA2565fcdddaec345f83d3e3084684cbc71e6354618790bf080ebe480db6452e15338
SHA5121df46b41ddf5de86f7b5f9387ca9ad6c2f92d8dcb93a8c048a68f87cc368d4f9b0130a654efec3f4f9966bafed56797d2b2bf2fc60ba96f62b47c02095f2c465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9190da2fbacd00c74b585231bd99eed
SHA163798f0c873d405caa553e953be322772d5ae2dc
SHA256c882b0362fcf74cc0bcb858ce0ceb5e9743eb10561c5d8020492b284707b4c09
SHA512bf64159a79282caf56a57ccadafe954b44185c29b1f37362b39f936a350b8cbbc31081a99dbb89214805b16fae337842d2228f44f4924a0419499bc6c673d723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d79c3789371e19f3dd938855fb3ed6d
SHA1c0a74a1b2b5d9494fcdcc140c19143238b1b56cb
SHA25665a0807522613fbe9e2e6aab27422f1472dc609cbab1b25d68ac1523b943f36d
SHA5122449ba2f2c3797e4d93ca50851e43837f62883b34d796b9d3c8dd736b3537768959fc9408b54750c0553236f8de17854598826fe63c7fc5d50be42ddbdc79bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5376aa8a0f3d7e6ee2cfbd4a0c68857bd
SHA1341af59cbe3f41e36207820962e5e5a55babdbb0
SHA25675219dde355e31935eb1722df021e3cba3eb7e8db8bd835fab275881f927eac8
SHA512933b74e4b631c78ba1d20260d6266702428e589833304e37d913ac8d59f43e8dcadf3a3496354ce11f618bb7263dfc8c72a5472d282bc3f642c6a6e9d8598e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c4f7819b8d2ed663a047c041951eecc
SHA1dcf4d22fc72a404b4d3a828facc1f64611c0159c
SHA256fff09fe4418ea8970757ecc67a3f6ff8edf7ce3ff28b17e5940dd29c6b3e05fa
SHA512a6b2ec322b43665a58c524e9151f518258771b9820b3c71023f087b7d22149d7b339b5f89481780d3d920f0b55c0d0eda26a6f03403621dc576d7664a2f46e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdcc12d74df721125ed41985d3474006
SHA11486d6b4db101993f04a951e6986ee7d675c25da
SHA25600f0469f2459b9600324bbe65d4180f2c659069ab04d5bc41be3e3b9737404c5
SHA512c650dab2fd7cb4bebc1c11c4f625564b60bd90c7e9c45f2bf3a76c0811f3d251840fb81514a6004604a469da9c4b42f44ed42e7e07deff0e762c7ddc6fcbb5e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f7dddc6c5c65761b31800393ec793a7
SHA1d13b102e01783c02043282ab397570df9487d533
SHA256335fed995a0756b193d5aa5507c34ec3637f87f1c56389b875885efce9ef7e11
SHA5123476985dad6e57d4e7ee6331b33f830975f4b265bd7547332851a458e99d3a991487e48ef77ce253cc0b780188d70dac6e63a4894818702c91086afb500355ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec05bf7adbd97749dd517d774521d061
SHA13dba33c1977bf86478f860b669e2f06d0a6d553b
SHA2566db8d76c2c0a1a375c372a1f66efacd5fcb91f547199a7dde906d6dcb2682a3d
SHA512f45bcd24a76d92e972c294e30250237eaa90283414ef9deefe899f5f97bcb01da804a62f327be825325c2c9a0af60d0f27d8e08406860ed766906d61efc32977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9179a8e706dcf611c917809ca248ee2
SHA186a1b8c0b6777a31546ba4bd521acdfeef29d830
SHA25637a5d6b2976ec0d319349f94d494dcf5ec75949f9910977c67e73567046c32da
SHA51233061e9f60ba1e842dcc0321f283ef4fc13228f1ed25cef4dbe35e6b0878df216a22ce10320fd02e7ab19a843d4f98e47a23716c96c46d1acb1454909ce29cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b9105c4afc37c1697492546b8a9ec05
SHA17dc6bc213e7d447142fde7ec511c5561aef5d2bc
SHA256c4b549d73dd34aae38997c3a432b871934c8266491f25a4087d32fa09db22e4c
SHA5129135b665c145677f51d050025d5204be017ef622e8267391901811916e81f67f171aea326591f185c45503931bbee8a99a7d9b1607b694d15ff2fd1318ef86d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed2ff2fc6716ab83e8271f5d9babc30
SHA10963ea7d8189c58b03bcde4297b87107ea47af0d
SHA2565ecceca1ac156db00e631a7be761b7fee06b8c02e79b364468191fcbdc57ac21
SHA512de45faecebad8508093821f375e2d66a6dc21ab54dc24e6651e17b5652fdfd4fbf75ef9854f2cb820247309355d84630e4423cfa8f217bfb1df5cc620efc6c1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bcacb24c559aae0a5c158c1dfbd0380
SHA1ee8cb61a65d0a1d5f5b0d9ca5c4b1f4020314948
SHA2565fbceede07089dda488da3380aa5f03e7cda950b9c65846f5b34d8b820fd3352
SHA512277ea919de2976e684e7ca03c5d065fc66f70a4eecf55d78ba520f70ef10fec350b10648b4a5952a1cfdc25148fbd847265218f5be6052fff3f9c2b0ba00753f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5632a87d8dca36ec9feec319480a31e61
SHA18719784ef03fd0ea90141629e247048909651c19
SHA25636355da5039d19400f84c32e34fcbbf61352b4dff97a8080a8eb0d9074748a28
SHA5125cf048193f6578cfeeb91ae376c1c968307fc9ead6055926a8db375ae2dc8499830b5123ea568b11ddb93c861a11759b96dfbe929a451e450e24cf66ca448835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54215c7346bb5c4ba5b508f52544d5410
SHA10ca16b32fc71211d9cbcec2365f00e2c17c90747
SHA256e399ef0fea16d14dbce576d17ae4f50b33b1fee813c4625cd0ceaa3809aeb8f1
SHA512639ae9299570345469beccf221edf3c2367af73e65b39f9aa4812549bcd76c887e999a295416891e389905f278c7b72d56b280c5b5fc7e7c9c977bc9216950ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543126418ee6b6dde926690434dfc20f6
SHA1a1cd89033cb2174e215ded9e3a3f943520f98da6
SHA256a8a3c1100388185f77762ec9579d292751d0bbb602f1b675ad84908bd7a020c2
SHA512c8a8576aa8c9a129bf4048abc34d36b7006fd60fa7d5f8949f7981fd415885a723295d48420d8dec292b427d6870bbcbbcfdd91e9686002f2826e5ce9a06a8d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51979f23dcf2b9db95feb829a9703fbea
SHA18cca9fdd2bf083736578a2ccba3e131872b7665b
SHA2568dc0831272f0914a83dd8c0fb2dbb5b6b9ce7f25e145e5b6d7bbf322242e9183
SHA5127c8f7187a2586d6c36c80ef79ba90e8cf74e719fc39f7c4f238ed9a49adb90faeee357bc903cf712153f33a43130c15e3755766633c5796ccd3a3ddaa41403a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53279269d70c46c630d75c75249bc85b2
SHA1207cc961f0fc98accb2eea34a329fe81d2314aa3
SHA256baa1de0e3163182b005fbe21103d5df584ffbf2ee8aa64d03c996311620cb506
SHA512c410106da4d93bd6430d3db1837cd30b4b099c361b2bf33ffc91f2c904676257f0b0341372a161788a80befff5e29035cb7c04c480180a36720338de78aa6b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557bf6699dbcd86580642fd2bb307c96d
SHA1291841a74747d2c838093d30145ae0bf9ff61aa4
SHA25614e6c90e1b8fe3c3308385efdd84fe6fb45f9ed33c3ced027727c07715f50955
SHA5120d52ab8b929c6bc113100563f1932d0bbbd1f8621c30313cd569988110dac3d8cb184a3a5068917ad9e6207192dbbc74911567c3fac2905cf0651c7d832813c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba6afb9f831b7d925808114800f7dbaa
SHA15301f343626ae62b1261593233bf44981f492bb0
SHA256de88b7d32a662963c8943ea3c5350d0c1c692b0611c6c63c8aa88397a7044796
SHA5121146d194a499e4c700af8e66d107a3df89f6afbb1743bd46606d3c3c814c92e5bbc36e193bed74b76d2c817cc07678e2863bb947d462d58a4673849018e37e34
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b