Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
9f2416e49f10a79594886508780d3664_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9f2416e49f10a79594886508780d3664_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9f2416e49f10a79594886508780d3664_JaffaCakes118.html
-
Size
461KB
-
MD5
9f2416e49f10a79594886508780d3664
-
SHA1
9ba0552427fad4ef6d2ce358774d7a205e1819ff
-
SHA256
86184332f0a6af3fe5a8e89f839c481cedfe5d9b85ba07241989f141d7a9995a
-
SHA512
80469848cbc2f493f98f2415d5ae1b182fc6ac3cd071e3268d9cf778c7efcfc31e737d1cf1f1b204e33038eda70d795cbf3ffddc7536d5e804704235fd51edb9
-
SSDEEP
6144:SdsMYod+X3oI+Y5QvsMYod+X3oI+YEsMYod+X3oI+YLsMYod+X3oI+YQ:o5d+X3K5d+X3I5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000022f3a8666a16e949814267ec446bb83d000000000200000000001066000000010000200000005b6338a0663ad59c2c44e9a436f59271c89abf65e48ed3bab5f83e92cf96c151000000000e8000000002000020000000307804cdd1ed475dedbbcf740db7510c406de470758596016d2b38645c0d052e200000003ebbbc04103a69087bc22cba7de745011efa70b6135dbfe2e94d30c64f0ee402400000004bc54cb736b60998d50afd656c7a18e2345a3758ca7300829ae800c582175c312d44ff3a4509466fdb282fc4981de3b44525b561571c9d81a43ca20d4877d8fb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424292344" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{521BE0F1-2820-11EF-9CBB-52ADCDCA366E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3014fd2a2dbcda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1308 iexplore.exe 1308 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1308 wrote to memory of 2032 1308 iexplore.exe IEXPLORE.EXE PID 1308 wrote to memory of 2032 1308 iexplore.exe IEXPLORE.EXE PID 1308 wrote to memory of 2032 1308 iexplore.exe IEXPLORE.EXE PID 1308 wrote to memory of 2032 1308 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9f2416e49f10a79594886508780d3664_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1308 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59765a322a5787767d5d8da5d3193abef
SHA106fe0a2d6de8f316243720383ca635383b1b2d11
SHA256f31c139ac1afe4f0690dbdbb1d8c0f384737fc845dd40d519259078607110508
SHA512c02ca5b485342ee23af2137ee80c915eac31dc80862cd5fe8642b50ba7fa092c0a15e631402950f99316cf24bb60232117f8ed058c4e593eb0818e3215d7a7a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad80880b79f4192d56b270ec08b66d9d
SHA19d75527d50d1f268cd4b93d6c286040763970669
SHA256046f07be36b76e17bc380545207ff97e16965cb18868b553b51f4dd6c0e4ebe9
SHA5123c845efc4e01191caea389d0ad358088979a7db1405b8927abdbc53e615268cba823f030bb6c8ca0b91540d70e2cb6fa7e61dc70fd61f2380de3779dd7770f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f63a11a7b210e6fdf24feac5f06f6e9a
SHA1e7e0b39f1fe98bfb4607d5d8e1ac4dafdae30c65
SHA256837821a090834faf8799a955ca2d2444717b8a13fadb26586462e92ca2a5508b
SHA512396380e666c33e003835ce0429a78e02d5a405889c5fcb11222e39348506477a14d936df96f6319a8baefb89fd4ca45a25ae825e1ef04f609566ee35da38e7b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557121f086a67055ae30d6a4a798889d2
SHA10ec46758aadacd6ca9f0ee1145580db3ad271969
SHA256682b1ef522e437887a70d6453c6669fadd5b08d74ec158f2c672a73ce21e2b30
SHA512f60d74ee5263ab3bba811eef03ed53f0c43c3ab804b9773e3fa67d8f9194c623632772ceb346e56a42367f1ff74a2cc3de3ba2aa56aeac22edd568df7e504d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abf838278242a8ea97afa7cc234ed7f6
SHA1dbec3d02f30b14ce9df3ad4e63fc7db0f5dadbd1
SHA256d571f942547de2a5d916f31fd385feaebbc326d8c92be817d5c56268b2822869
SHA5126d06b2905426012b5c77f26a5798b62a0d24f54355a0db6e4e167ca3cfe2c9d1ef00260ce7af5edd9683c08f80d6ee20b1ea5febb70d249aaacc767048cc7b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529aeae77912437b7e4e5fa15a83c3b90
SHA12aec73c41ca938a81ed6d96c87cd2392e38af0f9
SHA2563858dad635ed8d79e0fc295d8e2ce1fb15dd9f7b9764325afaf19c9e9f863640
SHA512640f6a02dfe08c2a3289064ed95a285c4027a4918846700ba122cdad281394e120665f4a91973951384517d39bc57d025a2c97a739b408bee12a16a259989269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b6408c28916ebd3ff89da294400a0bd
SHA1e38068a490189098bf052f74e6d614cfab006a50
SHA2566d2604af2a8f12644c376defc93ce74c4fc45fbfaa704b22247bc8d6dca35819
SHA512ca6722326d1780cc9221240f3672c9fd0595d6a4c730ce57a930b29d832bc9932f6ca58176f8a5b859779a324b0bef5054bf9aaac3064e8a746b7ac3c72c966c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de5ab65414221bbb4c665a7811d8aaac
SHA12a7281582b39eee1d2e86986ad0252ec9e1c6c6e
SHA256d1d1065361eaf7d9096f5295da22ec62c81337c524aaef15e03f749024c4fc25
SHA512afdb859c910a60fc81d5dc72fbcabe54c7774f37b9d3b4995e433b36c40a16e4d45203384ff631fb34526b53ec2790843021c6879c60130c5d25a06ad7cca530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f229a0259cee1bc5a7db1baae8444331
SHA1ca5979c3feac82465c4d608b7f3b04caa9bff6a4
SHA2564d606475b7fb451d8707c72199ad5e61a234f6ec09185754e0ad37baf390e67f
SHA512855ef4b95dcac018b7ceb9118333dc726ddf795ab1caaa467e8118a0c907cb4667d5a323c9fb1debd3e743915d1fb3813a9839cd59b6c41ba98f4147cbdda972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50223a11b58a2f151502cb1c418d59838
SHA16a829e7246744ebd28f18c2821a0c8f49f325412
SHA2567448f9cf10862a533954701c0739c11360447fbb13a11fc20635563a0e8f8f33
SHA512bc2e8d0466fcdc54b58bc2be5bfd3e6a38dbf915642bc1c27ac575a59ed65b0dd69bc11ccb7c371cdac36e604c9afb71c4e75a57683e6e7776ec665e19fd87e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52543157baee768083208458175195a21
SHA1f28dbf87a8bc97ef3244f114d00568768eaf6e1a
SHA256880be3c62044b5c7ff9a907e05dbbf2a9f9c05f07cb7f4bc3c9f4052afc4c4bd
SHA512f3d917e0dba4756f51b4d610bc51e60ba458e10324489db9e1ef1e7a34bfcac4cdef273b22a0762fcaec2c0befb5234c31ce74cf1ba53896b4639e3eb859a251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b19ea1bb39b6fc74548f4033faf95a9
SHA1aa48870397ace792fb3371e46b9da0caec319f51
SHA256d524f00d9c145ae2f45c7569f18e58698f355dd326074890ee7653801568224e
SHA512ed22d0116d8c3dd4113201977aeee473c659a20384325aa4ed27572b7df621a69eefd590e0221a5ef8a1c2a7d41084db8dac4cd919447b007cb80e160cdfc240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50137bf30132eff5f58b2129dce6921c5
SHA1790a482b62908c64b38cca48bb7b6f80e45fe697
SHA256853793983606645f8b9dc98487957f4745458365baf1559616a96f541e450202
SHA512d8bc533415e4d39299d0b39d108d20ba05eba74bc08830b219410e07979073b2e9ca74c15bbe970b3ab141961c26378f837971ee0cbe76b46c7528b83dea4673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa62d5f0a80e6d05d1c93ea1a450f05e
SHA1175b29106e54b0762cd1d909511389fdafffadca
SHA256d56d6c718933f86c1fb845bcf4e4e47a62aa9f119362e564cc961b49f3e46da6
SHA512ab3c0e9a36373ef6df7b9f2e0d6d3e49d21235773b1b838cc786d24e2b6347eb4bfa630201cca030c2bfd29637838e9d779d5319f6e3b346471eace7c929f2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a7e2adfc05a850ad00406d9f2470b7f
SHA1aa3068382354f9be705c46a035fd54db8305caff
SHA2566a1de56ff8749bc52ae5ba303f7c16ead7543d6930691bccff1a5494a0aa2a5f
SHA512d68b9453ab6614673bf44a2c0be2c66762a59eaf64c26eccb53505bcf1233651af431f3c530cb56db5c27c5df4cb8896d22ace0013027598c6313c2df69f0e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd885e155eb1222e15e67f68eeb205b9
SHA1ac1af19411b72fa1fcc148d8b65f30722b450c62
SHA256729e2d84e1c295078701234c9992039c8e3055f2ca2e937b37fb2e494529d1b1
SHA512c6780a46465949c9312023f367b475d5040bf87307b72020e367135f425c4217a78d869e6a2b12c8e651900c42b9805b881c8815dc368149f66c8da911ef3271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a37e08b4276598a932a0536f25bdcf08
SHA1b59d77c4311c9188967b05422cd1ad5d8a8dc559
SHA2568771e7735f9ffa0747f34aacb64b1a798769b6adf8dcc9d897abad9e5a1154e9
SHA5126a8b27ceedd6c8122b7f2d03fe040d1aae04b2fcb04098276ca95371f410ab43b5a74e2e506cdae3d76affc5933ef86ea2ef0c6e7f7f31303b40b17303e7ba90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b932abf7fcaa8eb18f048db1f76f603f
SHA16e742b22f9a8eb5ccf84e36269edd75c5745df84
SHA2564ee6ec666e53cda88bdb771a93591d1ae0dddea3a210d6acea280994d99be6dd
SHA5124ad0a8d399f2e1561a2d0552a12b3afe60962ea55ca21cb320b0731b4cbd7697835d85e06b41e5c96e383cb83f6e9d002bc8a5bfd25827ff5b1b1f8c9a3d8a26
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b