Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
9f7aa9a9bafea9a6fb0f80110aaee102_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9f7aa9a9bafea9a6fb0f80110aaee102_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9f7aa9a9bafea9a6fb0f80110aaee102_JaffaCakes118.html
-
Size
67KB
-
MD5
9f7aa9a9bafea9a6fb0f80110aaee102
-
SHA1
14357ac2e984a8192791e396c1ddef7d62384cce
-
SHA256
7a5481d79eb8ccc8c686dd68872a7b4d186a0f4b30db62b8bcb61ce34650cf98
-
SHA512
0331b8f015da6c168a98e6f9d22c535bfad06dbd5220486f0c6f2e6d9e15eca6f079055a3040636f48effbb2e6daf6a1abf115f789b9cca04c73e4255b33e0b0
-
SSDEEP
768:JilgcMiR3sI2PDDnX0g6s+CeoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8s/k:JdRTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000033c0879a8abc614981885ec38ddb098300000000020000000000106600000001000020000000ac0c73dd7c8b8450fe1766cb6eb2e35aa0cd7640f8b40469d3b07d65f49fb037000000000e80000000020000200000009d9a5fbc1a1cd5fa3c967dd961e68d10c651f2e116d0c0043f4cdabc261289ef20000000168cbc96d821f722c691ea0f97f9b846d476bde5192c0445b96caa4d897971f640000000e970d673a2f3f5bca7a57ab532a27a2b9ecddafa61e6ee86e0d571147b95a29adcbfd9d9ceab569c6d7f1ac65471d6c12b2c36ea85f96ec4ae5daa42fe7ccf58 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 902e955441bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F989051-2834-11EF-97FB-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424301010" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 3016 2648 iexplore.exe 28 PID 2648 wrote to memory of 3016 2648 iexplore.exe 28 PID 2648 wrote to memory of 3016 2648 iexplore.exe 28 PID 2648 wrote to memory of 3016 2648 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9f7aa9a9bafea9a6fb0f80110aaee102_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531178e4f4ffb22e9e4398f200a940c05
SHA1901a930ed723466c9b9230d6df501a74f6636283
SHA2563d30d926830cd667250b52044f82f3cc373ea01842b9f8812db37bdb87e40735
SHA5126c3045a48f4ccb26bb9dad1cd3065b301e4806441ecd5ac9b37008acf48b712238c78f6a757117de89d238135f3c40aaed0911a0b1d7248cb920bcc734d433a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528f47a7c99a0c15864ba4ac4d5b943ed
SHA15d597c8dfa1fa70e4fac75ab432e991f1d036d32
SHA256f7d243b4f4d6901ba5bdbb3ca55d9318f28cb37de86955c2544731042df9e89b
SHA512fe83706a48a67408cbd386575affa84f243ec3ab0f15eabdc0de2555d805d49f661d64ad4ddaee4003fe00380a21aab773cce807dab10ab707f9bd43eb136ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e80e0348555d605082bcca04b04fa5
SHA1aa901ef48b2a11cbdd03cb6cc339a047b060aff1
SHA256e72f854f36ee9f17fca8dfccf2a484212b9172a66e319916eeeca0d634e56976
SHA51201288ade593e884bd4b535607da58cee992d46482638866b0b924db471ce7fe5da06d65913f54dae5424b442b4e32a07e32bb105ce505e08f3306780c05ec14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588a170eb791c976bc3ae7cb2cc8030fa
SHA1db6b47b526723aea5971a0f9d29dbe8024684bc6
SHA25628f9f0ec913881cf6a763a1f3ca717dc95e19baefb07bc4d28400505be35f3ff
SHA512ca8cfab15d9bc93df7d51b3fd23d5b8e9cd1e2a06333c0b69ff341bc77241b45ed1b122766ab4b66f9116a0688a6a652c3a074eb9bb7d1bf353bfbd1a01afafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bfb7f53ee72900d678e9f28baf598a7
SHA170698e334f593aceb86194ddf2c3330d7a0519e3
SHA256994079fc31ba88c50e98813e86ea06e02803675a06d1f7342c6872fb3977c27f
SHA512dc2724d851b3af1e03819e31b770e636da928d6d5bd980ae92c1a830150b0488a5f0e3e95bc175d46b5312691507365e88c18b4356fbf6d10c02aeb9ace4babd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf8bd596d20ee1050d3407aff474e32
SHA1ac5ea23384d12cecb991b70b8090aa8d37f93221
SHA256c487cc88f5cb2d71a5645756af6fe4094501b5f39a189c798060634d927744f3
SHA51273bd700bd100d736a4aceb0d04f22b921c89e46d0c2a5465aeeeae938159f4505084d90d3da7db1753a4bdcb505542cc5811eee148b07507cf5a2aa44d4dc643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb4f9f0b184226e4b168fc62974dbd8b
SHA1a6372b3ff90572ad24e90ca32b1123eb609bcba3
SHA2562427ce98aeca96957f3281b86c81488b108b87a580292932045247539b819155
SHA512057448becd7c89b8b60bc2f7e0e9d366625bd6b4f7487b3affc02fcf9e2c76188525061afe2bd234e50ec5f1f6223f4b8c19de8ea06dc57d174745e1b32b8f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c5b0ba88d3d3655c9ef1d4fa9bb788b
SHA12a359341e12f58c1802f1fa9aff456b664ee5768
SHA256ae43deba6a81c24014ebd1f89737b4f37b56fe6140d32ba2c27006bba0581507
SHA5120566217d65721522013ac710179ef27cf9452ba82882012bb1a0a02b29ecdfe891a743de18fd911e557e24a4f06a44bb062418ca54a8e0677fe3afda769d0662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7364378c2afd400d595697f58b2f516
SHA122ddf2c22c573b3f585dc85d4ac48c581d7a3882
SHA2569656463027646a9c562066ebaa3b09cf024f857ff20883c838ea593892b3bc49
SHA5122b6f1d04326047dba8f071dda18fa5df49860d700792f1017898182abc5c8068b6624f3c08da1d4cae0e349ea5f1b7d2fabe10685a626397e99b873b918d37ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db9d2a5cd50a9f551b1ce8672805427d
SHA1e2b3e077e1dd56a98b5b1d7065aa10e1d04f3c49
SHA2563dab07c97ef9b56ac55292e3093de3bbb5337683ae1ff6800a614011ec5f6c04
SHA512844600eefc0259604996a1066c08c28d5e0f90211d35e5024f3c1a6614d49ba8cddc217e0686d6af5c1535a36afa698d17ed2141f14ecde90495820b0b4b7e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1d9f112affee6c812b29681d75d6f9f
SHA1582ccea1d29bf784117ddcee69b1f7b73fcf456a
SHA2560f3e08d93a03eaf7d2f8587d31f20c70809b24390fae8896dd0391b7c0e4bfb1
SHA5124e005bfc98c6bef61521e92932c1edb6dc6009facc994adb78e64b24ad01a7278fe1fd5c0fdbe8f00924a437f4fd3d57aad85c26396a50599a40a467473d16df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa7532a0ff5e5a3e999486928f08a38
SHA1e9d381a1ee717425168cb03e38aa16716027bbdf
SHA256c99a2405dae9981babe8e789985b85c177c1b4af29eb59df2306d7cf677597e7
SHA51211ecd023ae59d2c535f9d1d352e4e72964af43e1ccf2dc1a2158f17713cd28e8e6e3ce5ddfb44690f7b35a328d44c94ca324b127e3d05e15434d99cf4a5f6a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581195c3d572d6da396209e00709bcf58
SHA1ca19aa8f1f924a2b3cd6c05d93d3ea594cb2f9c4
SHA256bfffc0ccd1344e3db588a79b69496d7e16c3ae9485541e65697ac186685c5b66
SHA5121ce0f9f5012a7b61f9cbadb9304098f55142a6187e9ee077536523a7b1678379569175bb7971b4804bfe7858b060dab571a0530190c94dbcd7806f2f1aef7406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57503e3ef7a8297fe3b77e7576fa2cb3d
SHA1e82f57e4ebc3480ed9ae710b2ecc6846f00a403b
SHA25608f67a82c5e05ce406d96dc096ffb3345b466a28fbfb7411dcf7bc6f8c6e0ad3
SHA5121492020b2f7f851c472f3d76c89ab63f8308d2655e39f1f07a8f1b1d812e15ee044fe9ab4465038b7baa75c230e4608cb401a63af44499ebd270ceeeb424f0f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5796df9cd0227acf4495c85a8ac4a3fa3
SHA17cfea394b3cec2d2d0c2e26b655b87b21a9ef8ff
SHA2560ac0c92ab539150aae718d9c0c3bcbca81baad2bf2f58ff4bf5c271c6ac9e9db
SHA512accdc65e7e3b0845d3c9d1d3cfd50a6953799b6a5c4c038446464194e094828385ab24b29c263494b43a22c8a7be39d952da65abdb4d855a3aa3ca34b47a4333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521100feddcdc55d9dcfbd480fa0a9652
SHA12337bf2b480268db8aedc42587b82c7f0016cc6d
SHA2563698da3a694c0781e0b7307e1a244d75fe14b4ffc6a36c279e156d76de79f228
SHA512b805bbd5ec29233ab44e76af5cc460a82dc04c34ecd39d8d704706ad426d3a0ee737d83c161ed6de5b7337a12cf3fe6fe85d6c0229770048ed5fc72ecc7e5f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ff262551aacbcaab42a1bf1f577b626
SHA1c5da084805d91ea97b545ed9a513fa0f81bdc300
SHA25688293de9ccaeebfee39e39b89ac8fc7ed652938aa2d910277681b740273256c1
SHA512abec5589d5387f6b6a78bcea3add4dcd7f3b040814a8635e0b4a6479349e647ee09fd8d664241d4740b74eb52a15883ed127bf86298aca925f1d8ee7842e04b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dcd9ee8bf05c4a0a7775dd8c9072d01
SHA1b656ca4c484eaafe3408e355a97329bf897f6bd9
SHA256e8496a476ab60d32cf568dfcf30921b3d319267e31ba6d58edede1d683227dfe
SHA51256a34a6b97a639f78b3e5c8ae91128b0c63d81836823d50cdf07c05b94197d9c3a0d0f7b363ab95b5c87206895ca6c29f8ffe2d8f1f86904203c29cd32aeb00f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b