Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 17:54
Static task
static1
Behavioral task
behavioral1
Sample
9f0d4a1bf3e6595ca69901e1f528324a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9f0d4a1bf3e6595ca69901e1f528324a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9f0d4a1bf3e6595ca69901e1f528324a_JaffaCakes118.html
-
Size
111KB
-
MD5
9f0d4a1bf3e6595ca69901e1f528324a
-
SHA1
50ed720ea17e7c1028db3c87fc040e5463e97d07
-
SHA256
820ebd2f5d99787746baccb4a679c6ae758fef5c329a6442e34de8ec41593a9e
-
SHA512
047a622578c1e6c6b1fa52c54b48330bcedabec76c5c600e89e794e9d8e9b28f1f4389056aed298f13e4b7a1991cc02eec553030b4c770c0400f33ef6da509f4
-
SSDEEP
3072:+e77UlDPKyiWLxSaYSQMcH0SMPM/AJGTNvu9FVgw71szHb:YNWnTNr
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006530a617e1e84e4996adb42f2a06ca7100000000020000000000106600000001000020000000f35c73d9d438c2abf9d092b00687352ca4c18fdf17aa1a5b1a9c24ebdd43bfef000000000e8000000002000020000000febac8ec7b33d2c2d45d005ce160cbdf2a0d4bb723470791c4ae9960e0539bd620000000d6c00b245f8ebcfbe67db99e2a0c639923309bfa005d75e8020b0d69667a97c2400000002a1ff20cc45504165e36ed00fa6a84365138bac746c748d79e0d44416da289ca021fe5032d5e336e911cd07db0935fc89060e6d997532e8ed9eb1356f8d278be iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424290337" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A66AFC41-281B-11EF-92D3-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01a0b7b28bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2916 1976 iexplore.exe 28 PID 1976 wrote to memory of 2916 1976 iexplore.exe 28 PID 1976 wrote to memory of 2916 1976 iexplore.exe 28 PID 1976 wrote to memory of 2916 1976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9f0d4a1bf3e6595ca69901e1f528324a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e9b1c7f4739728725c36f2c700fc7a
SHA1620ddaa39443d20c922785bd8cf8b62b927ffd29
SHA2560c06308b31c5c549228f25e8b5cee1f84c1976b76616bc6735c8d327a669f0f1
SHA5126781a8d888844fbea26f4e9813e62f88a82dcf2f1553a5014beb2ffd4811b7d1fedb276a5f92cfa79477b53d8c28bea1c746d5a6feac44e309ac73949c661b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac9c1a022cf9535d3d9a6683127c6f1a
SHA1ddb3d1a1aab8f7c2ec9501788c4689a1e36cdadc
SHA25662513abed0da19d2294298010e22d531660c1a7a8e8326d73419f3d208b19ea3
SHA5126cb2bf80cfea2ce3088563637632fe4960806fa0d9e00953c5132d2bdb2ea1ce74f8b4861b224d3f12543e1a9c28b4371b4a3c5901715cc57a5b4f1c3f57689e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dd68095bda850280098a2a31fa4cacf
SHA1832cbd22fc5c1bc285e188a3e28487b42c1b6105
SHA2561a54a8e67f7f8edac1f81702dff5e346fd60d7ac41264ac20e93aa2d830b19ee
SHA5123a6ce2d84c205d51b912f55dcac6cc778056a806778149a3771ad81600bfd624ae22ffa2a594adce7993f66cfcaf679e3043a59cd32e2fe4491863db69d18809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f5dde9c0fb747297fba666632cd1669
SHA1384e58d44b6aaaecb9d21c39d9b32beb9cac86a5
SHA256f4575f602f98834754b0f7f3c9466d444505890b159fc42248a6923dbf48dde3
SHA512c405d0bc37baffe9e836d4029cb2c8473633d2d649b63fa6611bdcc804875f144376e4ba5c29cf31708ee3de9bdd4644441a20c8d63d82cb5bed2eec3ae683be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b0e87eefe5eba5608bdfa91e7398791
SHA16d56992027a453d39d29535dd55a6dac055cef06
SHA256b4b6cbf76f66789663d9dc68e66117b4ce5be03c69f3624871fe6c509cb858d4
SHA512165e48105c6c1bbec4ecb7da99506a18f04e5022e5467e79854cb8adefb800d22f4f9f9cb382f4c0014652dd2f393da67e2336709b10cd3a70fae94069de3992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc89127eed3beceb3b7f5a327e4d4c51
SHA1bc5c1a3e7681261c6ace70c0b4f0e5528af9bf19
SHA2561042af91a5a3db83b7a50e83646677b36516fb773fbcfacba2f0cb84f2d475b5
SHA5127658f63564c6055a0ad1d06113a5453c198c0fe9190f0da212c417fb53d2ab9b456f696587624f8521d61ad666d988c82b2744f16d87725ddc927b2aa3891b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1721930451ac0003073b3aa875726de
SHA1281ae6ab646daed663cbc8fc16f08c898e36ae43
SHA25661a1be6afbab8a8447f525c1e1230c266ef4fdad5a57a8427794ff92efdb6f84
SHA512cc48384a68c0a3be207969b1eae874f982bd0935efc7ed82b8769daf8794a336be7479df2d8a46718fec09a7c2bcfbbd970aa253f663376e85d2bd11c14524de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503bb7ef82c861003b3d2d0393edfe237
SHA1d34b12630b809d075147a3bdba67de943a3b6f3e
SHA256e47e33c0a9462ed764a0901cadb7253f81312ef41fa135b7c6285cd2e67bae55
SHA512ee386de5aa1c9a3a60f1dbfee33c1aeadae2d635e221d8628f2b6a6c28915c7d7e0890949d7c9105693696c413540afea392f826754d425b266b9e0db4db68ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2c323039b4096aeab97d8273716d71b
SHA12f3f08416a9f39fc9f3f26010424d03c47bc2f34
SHA256467dee877b78a45dc336f16fc68de34a45bff2861ae01bbd605a2ba713b33359
SHA512f0308a251252438a9e0b9a6c601c75391210c8d1865708350b6b2957956518a9edff45f29b45603d6720673e4a999a86051711629b2e84dc4e230953d774c1ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c338dcc23dde4bfad0d8a0108cc98573
SHA15a61354b6fa45995d437faa7058f481bcdd657d6
SHA256d79ec913ee0357315203a413df12fac66b82978b5f5bfef7129a80259411d3af
SHA5125f03915e7d886ec1fac4cfdc92dbe29aa3977607d4267a0e0355577a5083ab1db3611ff95f9627e294ba21baf72dc8d020d1eb1bc067defa408f8ec312b47cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1afa726d64390d352376987c5fc0ea5
SHA1d67af3f422ed63d49c2bfe4df647b23d58052947
SHA2564ee04c9b06c9762ad1c0e61ffdd81f2a2ee9f3bc3feff6fcc1eab878ba726d42
SHA5120c63d80a6401e50a2b31755892d890eba2198c48db528463f9db634a60ee78de6746fc59d2eaa5646f18e59c883bc3049f14e97615756ab507dbd76291530b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54752474a85616087a28e1b2c75bf1683
SHA173d60eefe7e741f0d3d347510b334f8d62e2a724
SHA2560d0e7aac0e999ea0e62755d9bf539fb182dca417eec5af4098cdab5481badad9
SHA512662e7ee455567f5aefa385fcbbd4721a03d499cdf88e647c414af72bca8e074544cfb73c377b43ba1d538556fe4202188640d1793636d9ac0dfb42b03411d48d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d5178a6d1760601787ead3e50c1b0c
SHA1f6f3cccde3a125899ba50341247afec1aa29590c
SHA256007b00c16dd3306e67b79548cd085fe308d2cf75c2816d37095aac9c7ba8ccc1
SHA512834746a34a150114ecfca3c2df2fe79dfe496ac93e99da55c98d65c3041b96498f099db9331e1b1d79edfb03bc1e1dbc1cb37ff8370a9b8a171c77d2b6faf63c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b08f7fa3592fce4d2fa26c1acdd2f81
SHA13fda0fa4456cc4016df07e5a90a3db6dd8b755c1
SHA256d40ca9f66597145e477426ac70ea2fe2c392114e476649ca2dd59861b6267d77
SHA5121ba548e8cadb56b50d28aaabb57dca07fb22cd5409696f8fbcf9e3a6e1c28a09e86eed575162e08662f3f304b78b9fdaa0d65d1e25a434c7ca59dd345091cdb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed5e9a0a656015f2b0afcb87f2fd104c
SHA120c46cb3aafacdb284c25a391e0b6220d1492876
SHA2563ac44e3796127877c6a7d0fd1f7a5779dfe5397083f16d43ce5badbb0be7ec59
SHA512c74443ca65f93a75d9f8fbd6f085619b8ff98e7c453849098ee1ab070d0abe4d92cecd7451c7eb464c868b00aad5317d7091a88b14f677a26c3b014e47691b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6ae806baee11a10f00ecb3b26ee6f5d
SHA1a27731fd1321c005b85605e5ef2596751bb4d0dc
SHA256d95889ff413845f46a48465fa872c24ec546165088e59c31c8ec1469b1ed2215
SHA512f0a08d8d0fe0884022dd0a9ef435d3cd60f043d4d94d841c98b3f61cc637082fbd53a51a37921c8ebad2f16725d40406a0715be6253af34ec0abe759a7439b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9d493773c7e6741a95109369efe2f88
SHA10954464b875942493ad0b0e4569b5f4dffc33604
SHA256e70c667b15c59a9450cd45aa89af5a6a3ea275097ae36ac52e975648eabcd00e
SHA512bd8f7294565feac7b28aeb55d2d99dfdee3b848633ae5c56e4dc89f7bbec9a5e20c2c44c397f43a7b9557f01382ae8d6f45ce4ec959e7041188979d474504191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574b4d9959d31ab5cbc0c92d987061ea1
SHA17ac063e3070237806293f75832cb13c407b59b88
SHA256e0ced292f375da9036db22a5902067e60b31e28942daf3bf41cc95281cb67237
SHA5122c486c1e12741bf08db66ca2a8f58988747bc382f203039ab4260f83dbbaef859636a2ce5296afc818f5d8b59e8b6fc8c4f6e516b713eaaee9b699b5678f0622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac4b48743b62dc537f191f6613457b6f
SHA1271a1a59115999c6241debeb75bb2ffc28913b41
SHA25649b12dbe0d0e7b2c00560e8630dcfccf00ebe45b51cfe08a5a79ae7b8ff77aa4
SHA51225e7791b2a38b7bf5681e76cef507f3d8f535b5444d830197d52695d9cd3facb8fcd6d1f334cb8dc302f75459d5a98e9e41f01bb858cbbde218d5f0f8e6e2fe4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b