Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
9fd9effc76a8feb5c15ae269cdf80e0e_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
9fd9effc76a8feb5c15ae269cdf80e0e_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
9fd9effc76a8feb5c15ae269cdf80e0e_JaffaCakes118.html
-
Size
688B
-
MD5
9fd9effc76a8feb5c15ae269cdf80e0e
-
SHA1
fcec5186a079b7fab3b16a3af1e206edbfb41383
-
SHA256
878fd474308ac93cdcdb3babaff6901bc76b1d3551a35b388b4815e4c54ef2a2
-
SHA512
d800ea7df504d8e769d9b4fc797abc0b36cc896608e5777c9ba16ec0332cc8c5cae9f692c6f01f0d1a97189a7d143da9d9e995c084431bd79a5c37503983286f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b1a08797bcda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C41CCB51-288A-11EF-A1B3-D2ACEE0A983D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424338060" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000ba6ca41c9edfa03359f18f7935c9374a06145e48f16cdd1dd70f3b12259542b2000000000e80000000020000200000003b9d154da7ef80c1a1cb0d1c0c088232cbccfef64591e9d38cedc49e6a752e8c20000000a12344969db8c160913dcdea792630f618e50b6db1873a8458492b1ae856d22b400000007c5853d9827098020e7133d59d783a76e5e483054f989e87765403a01c52f062cb910404782fdb92155a0d0e2674caf3a853f2b67d4c2cbaf36d99ddc947cffa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2100 2360 iexplore.exe 28 PID 2360 wrote to memory of 2100 2360 iexplore.exe 28 PID 2360 wrote to memory of 2100 2360 iexplore.exe 28 PID 2360 wrote to memory of 2100 2360 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9fd9effc76a8feb5c15ae269cdf80e0e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5727416efa8c2f897c81c07110fc5c356
SHA10c27cbef1d1705256c955a52b04c3618c725c27f
SHA256240d3e53e65e0824f40f7fbd9bae1217f5521b7ad2a302c65e11cb3c6d67a989
SHA512ae93eaf856da56c107af570bc5ead3a194821bc77682a6e7cb3e77b3628288b5d85dcb571c05a4cfe04476f076d38ce48f83def1c4c0ff00e89feb73e85243c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2800a67eabd27fc3d99246c8e7691c9
SHA123c390ab27230269a4e6ff78ef6ba857706a7acc
SHA25634f878a854e103c10adc182a119a5c126768f40777d17ca590091d00a8c812b7
SHA5129bbb377639fbae700a7ffa4a7dcd64a6d4eacea38afeb692622dd33fa726ecd3dd68e265cce6f650b49b27a782c155d3de2c51a9687cd13e9a08db6677885f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552fcecdaf2d380b06acb405667112e07
SHA1d503ccfbbead4244fb6e9ae435794cd13aec5688
SHA2569a3049b2d9c3e31f2ee0b19cfea3519d69a2acea52aa957a8759b2f05b51fef2
SHA512b3e7c08b9e1f7396d37ab3977275979d61241b062b68ff494d2a14c47dc79e401c5ebeca72a60136b55f4e10b1f9eaa29642cc515df42028dde8ad0cef4eeb80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e619571dc75d8efe89d99625dccea88a
SHA162b4b417f17fc5d27fcbe41ab7548a124f1de08f
SHA2561b6b23bd018cac0d0dbd2bedecdabce6ee7974a091179432392b4755f9d83ae0
SHA51261462767c679238ff2b4e4d58b5dc28479e44f1a2acf20e55b26a5effd246937f21cf918f141f69b71e690e19dd69100937a63b3a08c0862c9d23ed7611dc3d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d27977cf2862c9ea7575c14c73b537c2
SHA1b035a9c1b562df6b63d896d1297e7ab6de7ae47a
SHA2567fae8d9a4137a49a6fadd573162cb475c4c8d4c4f932639d39951c0611865763
SHA512aef6b2e8c625bf9e9991552e95bf43ff2941c77ef664c684e554333046fa578f12e8915604a145bb790ee873e49923e67590a55a5500995d9e24a9a8bb2a46e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5074eeacca1cd6a50d4a033a4d7cb4bc2
SHA15a4817d5f8deffccd48c096e8897a87332c92f12
SHA256cdd2d51582ee63706f7b39f3d5385c455443293aa92fda491d29806e8bcbb595
SHA512c945d04ba6f9feae6a498b387f613764c0b2776b75d04c2d0c2476c08caff828eb20aa888e6b32d3161b5aec5ff7dcb24b0aead70802986dd0cf924db40bad37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce144ad2a36f8c0bfa06980cfc1d5d6c
SHA1709d20fef7365dfac8f07eed35a4b3306fd37f32
SHA25696ad26fe57bba15c51acad856b12e7d68ff0ecf828275897faa0da53a0a132e0
SHA512f09ae57799f617af85bb1c11cb9d6fdaa14c9c0540caf3dc4b5a36ee410647816d1fd636b00c49c9c8db71b04fa31ba71a5e1d782d77ea2acc7083a00dd65443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65fb7bd59a3b26099a32ff4a14cf069
SHA1cfe04dd51304b71ac9f3d5c57d69691701f8f89f
SHA2566d6d4b8522f2314d6426bfa13a81d7454065d46ddc3c1c806a9f12dc7f6b7da0
SHA512b663313e9902abf260f35af582e995be8e9b81af954dcc96c23c387317d28ed8347fbee20dea89d80380144d63e8c602e1da0b40d60899167f888274eaf2d219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5442e728e2f3670086a7c26561fbb6160
SHA11ec766cb0848d6a080e0e6105ac96c6f67bf6c97
SHA25637cf73c8ecf74890bc8e1ebef8eef30378bf8c42710b85e7c75487e73e91e9b1
SHA5127af86e1da64412331d35a7854ee48ed58ec39b5ad364e7b4932888378fe7f9b808ba4cdd1952ec911faf382c6198c25b6f64c819e74b662224640d31ed76bf17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5debd4c64be156e078133a9d890f0a807
SHA184cad1ea0a49ff9d5947c9df32a52f1d19955a74
SHA25676094be9eedc59b2b6708ec382b4ee6aae4e65446f74c7f93f33d8be2dbc599a
SHA512307f0fdbf0ba23c72815e49bf96b53d928ad62e22e2f81b5e4221be9bde49b24882b87b73f92ba2bc006a00d80af823548bc4136041d988f264b0122fc6aa9ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542607ad22ecd576ea13a3c1acb314eb5
SHA12eaebb953a17ad5b087d68c2050f9590f4dade13
SHA25612c62e1fd4bf6c6d225f74d510a52e5e817249ecc019614838550dae18972195
SHA5128fa71dfa8e8c5f72201572ce05536cd7bcf59cdb6f61f809b76972682d1031d986235102c9a271f73c7c9c9634bee00f567815439927ab8e85eb254f4a8e019b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f51880b0dcaa1ab6231d8d9d504a4482
SHA120d3a9645da786d465eda42f76475efbe40f63cd
SHA256c15291ed8c2713d3a363799275ad0efaa26ee33409e69ce5a486fe3c50471be4
SHA512280a3c0b0678e1a436c9794f703f01c1a2d11760efff0142eb553c15d64b38cfbd6c4fbbebb03c085dfb4cdc7855ff1fb7286dede1c1e2164ac1c813f155eb69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1223f7fe100f48a0e9960b2f776d800
SHA1b43c7b981beb60d45a338c07fcd91e0b197552d3
SHA256b494b807451a8ab55e523e619848cfc02c4fbec823d0d4e561697902a0ee68d8
SHA51235b9d676e70655a6492627fb2a023f9d727384d6cd379b464130de9999dd5a5e6cb372956554ce06297cf4cc4e1340de7a056d9cdb56b33cccbc25e338dd13df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403a3360eaceff4c5f999744f049afdf
SHA17df536f3918886a705307b9e2da2bcd62393f1c0
SHA2565f66a6c8a401985dbecbeb6187d11035fc9596a6e6c2fc3ac996c092ad4a5b95
SHA512f1674249a35cd51f8777b7b4385b22eab5c33f356030cfe0291a6cb34634ea9d973b3992b627b8f2ce05b2a7d1cfffeb35970a9d821eb6a8d51c6077c4aabe95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff08a3768fc1927a2544e835df37698f
SHA12ce6d7a1892eb1179f6f2a1ab1461c76aed1827d
SHA2562d2ebd157a459ec6ce64c221a3fd19361a0b89bbaa5376ed0883b5f1b2c713ba
SHA512fbc0dc1deb3fe27b0da66ba159384d584cd989490906acd1fb3186320b2810abb9516497d233fd38782ec718ac890869523743c66fa15ab8bb96c55ccd6b10c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd02fb9509c40f56813f79cf4dd1e0fc
SHA15dac78f7d0a39d14ddb8a865059dcb10c0205847
SHA25684e88541e3f0ea983abbe9fcf78cd0b03d136ab0944f3236015c92be1d6665e9
SHA512f2a4d8d260136aaeeb1401a66d035ac1857ab526a0be2add2bb646e7feba2e759a16ed28732902c88fac12ed66ea7a440989c20c75333a73b82cf73f8b274b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5758a4e68a1b57c88d5e682259844992b
SHA1265e2f6798558d29f80d36a54cbf2f34abd4b621
SHA256b415de27f9dca19d7113dbfb567e95f2fc3192097e180c03a7876ef6360b0eff
SHA512cfc4dabe3e9af13092989b10752f5847493361fd72040bed4447434a569128fff854da7a04467da396d037e71bab41da1d52740eb8363bedee981bea227371cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d6c0a09c80d820822a970ea53b27821
SHA169ef27db5dc1bb4b3bd520c4fb92ce69f765c775
SHA256708ffe492eb125f881c58e733e46f6897cfb4897d92b2ba257882ccb70b97abb
SHA512c602b2da19fdc87d56a4c0c368ceabbc7521382591c0691a4378865688534cc63de5c175f6c69f97fbb86f6486283a3c9c37ecd405a5ce47772d5b8d8483f5ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e64c8137381e5ff9ba7d15ffba74b20
SHA158845ba102720db1c697e0d63f573ffcb0844c04
SHA256a96ada535fef980a331e9820733a906a9ce0b510fabd36d579c5c9e3d45191e7
SHA512d45715ccf28447470756e3ddbbacb379557f92b64bd0c6d68e95934f0574e4eb7b2a558c120f17db8dfaf2b26e3aa4bb9a27be9d0aaac2657fcb6a1f978daaeb
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b