Analysis
-
max time kernel
136s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
9f520b5eb1b2adf0e575dedf7f54094f_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9f520b5eb1b2adf0e575dedf7f54094f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9f520b5eb1b2adf0e575dedf7f54094f_JaffaCakes118.html
-
Size
12KB
-
MD5
9f520b5eb1b2adf0e575dedf7f54094f
-
SHA1
a55fb747109588d41508ec84f09b1859c877ccab
-
SHA256
31fda3358eb1ea7fd38c380712e9400351c758138a2162b71a55d75d4c008a35
-
SHA512
5f4a9ad8cd49e0e6bfaae4bc9150a9e2477258c9273794b8f02759b3d195d804e80cdd17f5d1aae52e91efedfa7ad0257019a6a9298702b680e5cc4c239bcb58
-
SSDEEP
192:SIDXx+cynvyd+6+FQRUEVVyaV2pPXHBmd+hLUuS:SIFTyn6U0VVVaXHgohLUuS
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{943BC041-282A-11EF-8456-F62A48C4CCA6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e168c0b68180f34bb739f4e9be54f47200000000020000000000106600000001000020000000903cacb2fdc49263e09f7dcb038aab6e66d738f1f2e743a7afb6d882127f20e8000000000e80000000020000200000006c2dffd789e273b4c12721e601cf276ffa05c565e6eaa82964b0cee72ecd403e20000000831ee9f8b0712c37ad501c3d57d8b030db9d56087e37ba4ac234ff4aefb1713e4000000083cbf2265989b951a452871e3c3b299d746d8e6fdef3f6e728f80e9a242052e672985e10a38cb3c245f13fe94eaf2430320993253fd8fc62e1d9c705b5612b1c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424296757" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03a10a837bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 836 iexplore.exe 836 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 2388 836 iexplore.exe 28 PID 836 wrote to memory of 2388 836 iexplore.exe 28 PID 836 wrote to memory of 2388 836 iexplore.exe 28 PID 836 wrote to memory of 2388 836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9f520b5eb1b2adf0e575dedf7f54094f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54f8fe4fbc4546b135cd8ade9971f933c
SHA1760c06e346485b51605bb2e2ef42c0937c53ec81
SHA256c95c85db08b876c50321622ef76f548bf81bba58f96568f8c381bd75dfe1ee75
SHA51286411a059554d94520f52004bfff2e1dd5334d57fcf896439dba6a118d2aa86426e90b1daeeb335c4d0544d8dacb76a0890b221cb2e053c9dea7abcd9abf258a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ea87fe81cf60f39f193f2c153a8d605
SHA1b3f18de72647844d5ea9531436c4af343964ebb3
SHA256cfe7d211f17328ed5afb2b1749761f49502a19b9d773c8285e7216bfc80a86b4
SHA51205ed23bebc5fc7ed1f74c61609368c1d4065a63e277d831df4bf70708ccf2a25855699c9cf3a60d777973fc43ab528d14104783a85e3546260a955a99fe72ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5049f2f517a990f0db7c94be2c9db6fb2
SHA18fdde72750a59a6fed22aa640a3d3b8d854cc2d4
SHA256beb7dfb5f543545ba9878e892ae99ab9631244bb9da1f2cb8cdd1f0e86ceed1a
SHA512062868971772aeed5e983b09fa798e557400847c55a28f7a2fb9c846194a59a6c74b51c79fd864870bfc83df2e722ff8f992b91fd0099087570450364df1bbd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfbd3d7a141ce9cf40ea5ea6cc54ad08
SHA17a42ff3fa8420662cc8d69536b630e47f9cc6e3a
SHA2569bdf1a023bf387bd96d7bcd7c17d1b9984e70b3b63ac4a27a71ae48fcffd0478
SHA512beb1d5bd12cce027e5b65289b8f6452658291866511ed150dab3afe765a16791a76863774c6350fd77430258af8e0d742eac7c4893243f926d3464f8f91336c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fc3bb27489b5a1820f20a77a4911bda
SHA1de2d85a3a56067963fc147c49252718b54842fb6
SHA256446dff15353e5a2e9e1c048a52ca886f14d082d345a520a4ec85c6a5f2f699fd
SHA512407952be86b3302a121aab84953a2b9c8cc1d1e520e2bdeee4055702609d8dc44e4960214d6d7f67e14ea7f96d96adc1137709ec2ff34af36b568280dbc161e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5488e087b418d9c5151c386f318265aee
SHA14ac9d23c1fd37cb58c68f291374b959f0ff68bf6
SHA256bd7468e99c223dd018ce3d060d81de9fcdb357bfe7c124f9e620b4b59fca9f22
SHA512c7cdecc1f3c92bc11753ff7eb42b26ece2cb9c328a65200203976af456e56a5462e90c2c7ca49d99c582c2abebc0b6567d73aae53c81a33713a6ae0dc53e8aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c2845216a819528c15105db2648dc7
SHA1a2fa92e54b605a09019707324025616dc1c1df72
SHA256c6db08c402a61b7b8ecb1fb1168d99d53e4597fccbb9b8e669e0141d35c53134
SHA51289fa7fc7c06cbc267686dad415e8466f13716ccd2441b75c0f19f2f8d8a432d7ba754e7c8edbe60a588cffe8b37fb9a1c45f20c8be748b618e23a6c1bd7a18de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d978f19434e5cd7f919dc490a4d3dec
SHA1f9233c48c6947ca806a84b2e7ea0d83a01760394
SHA25634617ebcb431516ba0bfac919006dce4ec4ae0f5d4d3cc0330d16377e01774de
SHA512e7b4d41539478f49904f9fe90433fc297734312e554e00795730a6fab252e9d456ae70dcafa42a48627d99056f4f4bdcf1e5456b814ff9af59b1f82b513453ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd75b4f77e028f8aba600f1d28db0d22
SHA1f8db66480c837d855385cdef3af81253d9c35618
SHA256355ed307997baa9f70057931668d3ab206f55703838989ac3fc0c0fe02f91faf
SHA5124b1a0574988cf295674865f8b607d4e5212fc493cea8f8d245f1ccf4556a7b74a9396c1b8b78cf74ed9a4a21950e16f70add04367f805387749595ea64bc7e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c21198ce4ee1e104d5312be8d597326
SHA1098c66d338e67396501f1db1de434798b3460526
SHA256e41aa4dea072935ffdc3f9d5266d7daca4ae500be128b5add2446cfde97d7274
SHA51205418dc4b47cc78891a03f9d0ab10c67250ebf606a3faaa07b854b1400749ea81ef7a056c5b5195d5b1068340253d8157fe2d8cc61a362218a67eaf1094eabca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6a189f9a202ce5f0add32282eb95cf0
SHA1fb379f7eeaf3c2a8a64ae45d7550acc6231c95ad
SHA256493e74dc371c596d9362c0894e480d312ee103e6af641fa6bfd8ed6be2927087
SHA512c8f8340517c942c7ae7864b3b5a9de5e2ba09c9ba45af2baff4241c3325e02b774cb2b4574084f61ea7c499035fd034b0a2d93b36db093c14f10746470d0d18d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d7f56442c8edd39b9aa625be9033e8a
SHA1cfe883f6cc1cdfdbc297ffa38b24a7a97e9ba76f
SHA25678a6b391770749431852d2cb2ee679418ade5bab15451170c5108103e45a0ad5
SHA5121b1f5f3c894888e9fcc485409b8aee5d3511b40064382ffcbf87a4a7d56337c58320eb2943720db0f73e13c85a19973079776d26e2576096a48d44f4b5565c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582dfdec09d7dd3220cb1da8fe03969cc
SHA1c26520ca23c971bd4d7f31afae07e25df192504c
SHA256610852bf42b52a75f63c9c9a4e44d030cfcc44ab74254175f985bd4ba025f6c9
SHA512ab5526cc0cbfed3a02e0f7b352a5b6368882fe62ee4d5e1eda87b1a228bf6d7c066864620d86c5c1407690032c1ca0b08084ecf329d6101a6a3cda2549dc6b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5eb0ce030164ade89950cedc506348d94
SHA11c98b33bb4d4de1aaea645341f7a642ed31b08cf
SHA256089a1294fdc232153fa19a986b63fc01f52f07829b45c9b5c8329d28e76965b4
SHA512b0c085b3217a52dcf5a227da7cc3c6f2c228b76e3bd3e42df36364db3ef7c75f05af096ae04b9fb3df1c65b3c6b58ea6bae14bb88e2faa6eaff47d8f01a620fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b