Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 07:05
Static task
static1
Behavioral task
behavioral1
Sample
9fd759527bfa83061c245029b400cb7c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9fd759527bfa83061c245029b400cb7c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9fd759527bfa83061c245029b400cb7c_JaffaCakes118.html
-
Size
325B
-
MD5
9fd759527bfa83061c245029b400cb7c
-
SHA1
0a0c0d6a83dac436bfa1b2157ad866bc43e33c58
-
SHA256
dd0cfe85b0c284a8715a2f649d5e6604ec63dd799e8e027d02db3b783dcd9560
-
SHA512
2f5ca64ab25de13b2be60d1913d88148fbcbb05647910d2de3ebfe1248c6bd8e24534af63e3853ee86dc51c931925c08f6de0f85519d531db600993b31ab9f05
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501a0bf696bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424337788" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000068e2d75946c8ef47973d8845b42d081f00000000020000000000106600000001000020000000244227cfac88d2bdab33ee321b2b38bc8afac4ea3b7df5375305576d7dd2d2f9000000000e8000000002000020000000df516a2cb239ad8028d21d134646e63d75ae078eba15975dea82470036fea6322000000017556cfe8fe72ef67f96cb12693a7728d08453be5a896336ff299faf71579dc440000000534bd86e08be71a338842ff5362a12987b18a1628a139a3c3a34029d50050fe7b5b1f94d8fc11f0175ebb825785017998b8f256458977ea7e6c390e682a88034 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{216AD4B1-288A-11EF-9A4D-7A846B3196C4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 3040 2280 iexplore.exe 28 PID 2280 wrote to memory of 3040 2280 iexplore.exe 28 PID 2280 wrote to memory of 3040 2280 iexplore.exe 28 PID 2280 wrote to memory of 3040 2280 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9fd759527bfa83061c245029b400cb7c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56e67d21a86d62ff5f38343907718b2
SHA11084a2f624f8b666c91488adb0deb5f2a8dc1f9a
SHA25671b55a4b50620c42c53d637618cd447c346e5a0174fbca71dbfc81d4549cf86a
SHA5128e4582becec7e0a0d91eabe2cb95fc3863d232ec99a5e6eb03e657bed98c2fd2cd45feb241499f275735f2a4e8351fb8af10eb01c34b75bbf1cb8809e98cf627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ded041d9a422d095636a215dd23569ec
SHA15df5478f4ed5c2936cb513d18175a73d67d43203
SHA25693d5102e81029d214389318986acca3d1aa568c4d27a1338ebba9c04b563f127
SHA51295c133ced605c5bf76ac7e087ff1a2ed2c2ae8a6b039dc9c4b3802e520f09d494fa1ad4944656bee2e5b336c3e01fb77f3a2708c4ef37aa6a7a3483426165565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a10b6017103c85c58726593e97122ae
SHA16aec870c4d6f34f9bf14314ec128317533902882
SHA2562e0c0bee9ce741358212a1132571cc52a240d6776f58faefa7eabff7ab2e305f
SHA5122ee8f656dfb0ad81dcd96899eef8150bc22f5cdd1b7a3bda79915b79189c36c191fa17b78d894d6a66240d08583caab3fbce086638caaba9a30e22ac08f6dc40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528947449ad319f58b0a7e804004422c6
SHA1bf071e25f87b7aa675b3dd25f8415e50b3fbf38b
SHA2560a63f856331b57ccd32932d32c83e0cd4983b693531c6c11c1692db3dd006ce1
SHA5127011916dec63f4998609407a50ace4da172e7a090b7773d94dbbe60e01e10f9a5fc8af4bb595e5ffe82fbb6466749bfe2f5130f822d9e853ee25631c3cbab7a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5575d6f02c2e45591562e90db7992e237
SHA1875b85a1c2e4831ed47efba939dc9f2d6bbe6345
SHA2560aeb5286c545060db9f79a6b7ba87de88f286f7817d3b7a563a37b9b7f1d16b5
SHA5124c62401f8578656e7b9258399463d6567e54c02ae60a3e4d831b27cff6ba7254087085ecb2b05f045fac835cb46e242e055cd3754adb9c2a06ee9df2ad0f5168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569316e5340fba2b557425570fae6ba61
SHA1673413964607accfd47f56638e36342500a0886a
SHA256155fb193e22f3caadcf788ac05327e0df4461698af8054065151ecdad5d657f9
SHA51271ffc9345ab9f4f5559256b5b1fb1cc4f6274c276715c2a649e425184039fca937c92434ff668323711a92e82c996248072a0fcaf721f24525bd52dfa2bf08a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5642f6c5b03abebe2776144b3062fa371
SHA180b0d8644cdefe8b1dd574baf0dd7583c97299c8
SHA256b5a64ba4ef64116a5bd0ba84f0787ff155295de7b31a57888121a011d97d9b54
SHA512c10830aac0f6e55742a4ebf4d5eb2099af21aa9106e3709c43e5b4dd5f5a671d0c88442279e989e7e35f71d522c0302d9b1e5d5ad1d0b10e0fdad3dd1d7fcc36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5813348c938180df5811976ee14990050
SHA1f1dd3a43d8785dab0803c59c2df09b0d96c431e5
SHA256b6f38ced8538b503eef698c4ce5a52f5b1a03fe8b89a4e456c0e823384777232
SHA51212b0d6c8e5875a5fb8d9613c846faa6a2e6d255119c60ed095611f373537701236742425b99d3ad7a6d7c80726225db4d75895637a2be151a5b20669ff591d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544932e929e23484d22c424c6c5002f62
SHA11058464ca925e2cb810ffee7b9ec5e4b1a11cdfa
SHA2561e87f2b898d294d004dd60f9f011bbad6ba6d75c834ab3964f3f590ac32bd3a8
SHA512c48593b1427dbaf36a3821b9d2eb3671f488e87d4d087a75c1e915ba8cacdb50d4189917b16fedb14f1fcedb1cc49c625420319cbd22996b01e4a40739321240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df36186d8d86c0e03f9eb07afe78d5df
SHA116d9cf471c055063a0916165bd64d73689b8f525
SHA2566b7638226557279feb15dedd5337df1f66b677f3cc6ab24427c4b5b627e6dd11
SHA51260ce7ce8b6489cdd06da15afb5e55f530ae867738f8bbe7dd4362017f521a7197f93a6fc672a6edca85c7a6d91b521017ea91dc425b462fb5bb592642e2f4895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe59c09b265e7f0feb37b731e5ac1ff7
SHA14b6340f73e481c2e794f8764ec2df39d2b7a261d
SHA25637fc6f839a3e8a70b215783c5b87cb38f75aa844413e12d688f6e7ad2b66e9f6
SHA512a5b3abb045a0e1f99f1b173a2ac975e24a74675ec8dcaaf75162b3a092e396a1d65e2117b661ba7f1895e93afe9833a3923abb8bb4b8c7e0064856ef308e8098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a627af0529b92a1fb9cdf8107561df2c
SHA145d27e59c2b5af70ae78c30f85af5e0cde5e760c
SHA2564dd458a8fee30c1ee9a11329b6c75953a7e252b41fe82ca6d13d53251a221dc3
SHA5129d9a1dd343c254af9645dc3bd3b3665591adb339615e290c2421c1a8cbc11d1dfaa51fd836d3507c4b0a4bbf4b7809c132c0d62a41aac87e60fc55a6c9d73705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fc0044186e7f1e7846edaba2db235c4
SHA1b7a576506c8d7c70adbe49bc6b670b166969f541
SHA2569a0fafd21e11c3ef08d7cb05896dd1ac0c143db06d6cb087af239deb353ad1e1
SHA512b534a8dda18729e26928df0be11b257b6ad6316e8a3a6cc91ccc67f75d4ab538f2e41a29d6c6fc02e453836b34ac39f6ca08456579f59448f04914a8e2336e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578097afba86f6c6484a0454dcb69aed0
SHA164bddbaa981378a4662ff175919dc5fa6615835c
SHA25628f1a27381e93ceed02be2fab83b4be80a60cc04e52d368e943cccabf87da973
SHA5121eaa40f8806472734ae3285982c28951e76f68a11d0c62094c00520e62d61f327e41b43156378c907042b668bbe4b4848e087ec4bbda53e2c666d30c5b3fac2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4da28b987572a848fbe00ba1fdc0507
SHA18da1cc91acc8a4d0672dedab2225705589d7a466
SHA256d30406820fd46865023fe2661237cd1bc68366b241511314a0873f495777d290
SHA512c11a9564422a199f7d16dfe8430bd8125ba29350bd1b1979ca2e9df225c709e112195910aaaa327445b90711e14ebe5eb2f8a7f54a447c32803eb3a90e26d89e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c59d2734d621968d1b6a24abd23ffd68
SHA1950ac4236e1916f6f53d4309652f0f974d53b7ed
SHA2563dfa6b83715a789a78fd51779650c60adc69149b7f02d0b2c18c1c14b8a432a3
SHA5129ac4a8a139e3fa7a3d096fa68afed4112726bccbb3a93ff18375921e3ca06f2d79de69ea962171795ac9b2a166d6502e301f4faba1f21f1cffb6151fa2e1bd2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835cd6b79a0113eb75d54880fcab5b92
SHA102ea897ae08cffdc1b005e991efe1ce55a7b84cb
SHA256d01edc42be4cca5bb02ae935a279c765c5954327f8e678e33912f5aaf694dac1
SHA512b6f12014085b7397ce3a28880f193a01d9368c00d1f0265b4060689372be55bad483b8fe68221c077983c05dcff0011dc9adb68936f2467290dea9d01fe75b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eb03031c3fffb621e2c016b5fb7d469
SHA16e4998f77307b9b7b7cb562fc69840e38e778fe5
SHA256b49e7b8ce4ae76f924516b2878535aed542645188ce5898f88111129b03d5133
SHA5122091141b78929e0eced8e707048e9824b9227d5d997ac4174b2b9b71bb2a100a1eb01e618be336bb37b461de9c2b75f3f8707545da3d671ee1bd6ab78fd07a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f03d635843ebc7e2d52ca65c1da87f6
SHA1d5e755e94cc56cdff184f30ec1ef0ab96b5b6b84
SHA2566a0b331b9c8b73b680e2c3411decd22fe4f3c3e40f68540a8a637779b353623f
SHA5123b744c3bd04bc7bd26f88e21a16d010d41eba63d87618b14a630159fb1cfd54c4b9936790bc4cd705b662717d2cf98d6f8f990b09f20ed03e866e2c7c2d64add
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b6b635394183d70330ba537e63b5950
SHA17e0895973930ff58a0a28c49eb06716ceda7fc5e
SHA256f7134855ef85af900f61ca187ef5165e2c528d4de6394abff57f2332dfda21f9
SHA5123919d398fe8859fb6056f7361220574da195e160d6f637258c411ee31dee1fb9b922b6cdb8994e79e00b779f68b3f4fa65bca3b1fcf4ed2f4caf594962e01fc8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b