Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
9ff69fa88b81abb4881ec77aafafb426_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9ff69fa88b81abb4881ec77aafafb426_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9ff69fa88b81abb4881ec77aafafb426_JaffaCakes118.html
-
Size
13KB
-
MD5
9ff69fa88b81abb4881ec77aafafb426
-
SHA1
773f1df7bef24fe4d92c3bed84f7c7e137bd4b44
-
SHA256
96fb030ad50d6aac8d882615298d89fec34dfb91ee2decb703a2f6b634b7b0af
-
SHA512
0a3759753e51c0dcaa9610b2cc7f7f73630c88092d003c376c59688f71ef87f74047659ef31bbafdaac53a6dc94d7e5b852cc6e20e0e98a3aa320cd82fd999a9
-
SSDEEP
384:3c6qPVfPXnu4mfKYwWrBuxwtOeqxRXEzuEm8VjmFP7R9k:3cXNfP3ijAxezuwkQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26CA4871-2892-11EF-B5E8-DE62917EBCA6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006608ef0a5b98ce4d80e0a748b0f81fac000000000200000000001066000000010000200000000ce9a45acc3322540b5d381a4a4efd46a97879535e66ef0c9df355a38dec33a4000000000e800000000200002000000003b42936ac1bec8401939d32ca7c9c498487657b2f4ef4851f7aa53d1868b067200000005281e8edd93b7c0e92ab3872f591d7971c42fa086fb2def586643f1dfc3a08e54000000083a1262dd14be528912ec0ea4841b9957c3d0c0a86f6676bbfaff0fd4fb8e106ecf82e00bbd4feb23edd42af55d7b1bd400e83a0c9ec3cf0a14bc7605da66b7c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a8fb149fbcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424341234" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2384 2200 iexplore.exe 28 PID 2200 wrote to memory of 2384 2200 iexplore.exe 28 PID 2200 wrote to memory of 2384 2200 iexplore.exe 28 PID 2200 wrote to memory of 2384 2200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9ff69fa88b81abb4881ec77aafafb426_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD536b171a17cb468a0fb8eb1de02f608c7
SHA18d420ae559ca6e984648cd4163a3eeb2385a4622
SHA256a4eb3a8f72cbd3dc5ee28261956c368dc113f84af2ff147365e26da130b875c6
SHA5125706e32a5d77f46f0416985e1c6738920d98306b84cf1e7680d06eef64acfce1e4baec3baa25e668216d5e0040cb8aa667e2cd93986a3ac74a0beab6b11c7b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c45417b2f48473dfd4a2a38786f98458
SHA19f6b6b1f9a7f47d783922b154e4e941bce1aff6e
SHA25664a9153ac1301409e00c4028f7918620359f0694b3e3efe4da02b4b2d6b9b8cb
SHA512292ecbb302feeb3b0c7962cd7fa90d681e7f6827854a423c459c4424a3006b43a6e74c633c3c226ae756e28a880cb7cf0ac3959beb4b7db5cafd50c7a4488718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb92cf17ca5d54ac97c3dcf002246e0
SHA10b9394c8873b8a66430c54c1894328e525f04c62
SHA256f5ca0741feadc83de7fb58c9a1221fd79303a1b372cb7ba4424824009d4372fa
SHA51222a5dbdbb935e16d369eaef24b5672f017c2be1b7684d36f70eacc5114580fbc6a0c4d6775e730bad82e93f0d6f286ddcc4bcf156254afd2b5a910f4bd6ae9f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e70fda50646301c381de2525b66a403
SHA151181b9dfa047f73ab5695139c1516997b2f048c
SHA256909d21360d0224e126f6c2f5fb1b5582a3ebd16e08250100b6e0ff3782697806
SHA512694439501b49740888c524332173204542167af4905c767791a2a8f8d2827b64888c6c67297fac0d6d0ec76af8720a75e4696e8fc535aaaf6a5acc8b9f691ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d087275cd8c3558bd0a34d8d7765ab9c
SHA1491c8ba262e5db0c388b753ac475af0cc1b77739
SHA256c6e220ab99307baa0aa8ccf876bcbfba40dae3096a1b4c8419e2c47c5e24f1ff
SHA512f4357453297106f8a1e7628958f7efd8850950d4cdbbe313079c5f03d1c6e4ceef1aa46f249d1953dff5ec2fef578e6d1e5d281e8a6a5ddc04f9041a070a9047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e76eb27afc30ff44a1497a78932a7e8e
SHA1bb650c16333681ea906886657de6e96353fc9c74
SHA2568a43cc34018a1ea300c0deb2bca040dda05609cc7a96a9795d99752a1b4d94cd
SHA51269dbb661515a66f639809af0b5b14cced865099f80ac339066b4fc714d0f4143f0f6e1270d749886d22d03e4184fc311b929597eb914770bdd7ebce814de523b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577452bbda57aa59d69d49959ae7fdde1
SHA1e71410d01b5ef88160b4a73ab9cd03d26f592066
SHA25666a4dc97a6b98a2a5d5b6204c984b2d4eb142cd70f6962003b33b23bc73f4e9f
SHA512614574e64c146564f389e387a6fb0a836240e18bda7264e7320b6dbcbab1ab92e1dcd6273a649e36905013afd41aac56c83f56c8c413457bbeebb4d135bd413d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cde89cec6f28fb60ede7f0048ed775c
SHA107de73ec8d5228ad7a58c1be8b81bcb88c2f72c4
SHA2569e00ff45e2b7cb58d1a7efd34742e96605602c8aaa04dec54068a903a51871a1
SHA5124823baadfb0a9507ba41ead5eed854035752f4400e12a872d7a24cc21d3faa3981dd1706206874c9733ee2625325a9372bc899754b73be9091f2ac89d75a6361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f071b1474070ee860302f1f07e2d9dc
SHA1a890c8019e983a8c4d82a9123a6d19bd5d15ba20
SHA2560259a48a325996943bdcc1282674bac64387d7b6360c5e576f6c1227345eba93
SHA512a8ee1fc312bffa1611501eaf70fb5012193d12148ca9c9b214a72e76f6f70efffda6c5a904ff7cf5243c23c99a82c07928390d8b2a1512103a44226da4d27ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b90c1f8ed207c4d0998a58c3dd89c96
SHA161e3a7f874c1cb5706c2de429235f0eab7eb0540
SHA256d1dd8c3160405934b55c3398e5f36356d3f80f716bfc61376dd28657ca3ee1ec
SHA51220fa9ea48d86337abba8516a87011c66e1ff069276320003dcc73bfc7a287932a3929038275e1bbeb43f4b66d432dbb0e8eeb102ade8c1a57aaafe08888f1a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d9916dd1952023b5b2c8536fead292d
SHA129cf097effd189fb4b0b76b2852561e73473c545
SHA25659d8c4046118d80b7cd170fd7df6e00b9f1f61ac7b9237fac117d18b2d011cf9
SHA5129b08f1636d768b587d8f8e142e708c213eb04b1725b329f27149a150ad72da4c550fe7499d295974af90e231b2257ea5bd4c257afa532c604eb43b6f4e8bded9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ecb38b03bff9ddb98ada9a2c1f68ee3
SHA186c1a900614ffa5b6fcd067b20cbe4cc8f13605e
SHA256124bb00de3f6ea1b9408579ba1de8409287e073e729ff8cd3bead110051d8c0d
SHA512f36655f0d6dd30fdb8bc3b2bbdf18940e944002fda302e50011f73a7dcea6d54f6e5479e5efb9c0fd0ef010ee25c7c17852e7fe3f616e410f37eaaa51e6484d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1096800b2e6c51e7d8104d42cb6f15a
SHA196fbcf8123edbe82702671f17b649bca179c57ba
SHA2560f21f40419c96ec26120d94aa18c3d1dedab37b0dc358d01f6d81a3714ed9a37
SHA51232f56e4584f0194c952a5bce73a12abb1ff348407629c4f1fbf4fe6e788d7e316610cb29683289b83d519b2b262e24a2547488d74f76f1dad413f1fdbda84675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e8a256aa7eb68067c08fbfa9e0ac42
SHA1ece963fd46579521857436d51e795d75366821b6
SHA25692579375a1b4cbc859896a3d64b29cecf5fa124c9528835e21e0edc5c7907c63
SHA51249b5fb1073a00d39aa51d8a7cdeb2c59e0227939a7babf63a7b2ebe78c7d9d4fc4afb9d9bf250647fc5bb802df80411ccfefb57444badfbfe96baa807384d212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58118a687e56d6ab0299395a2a8d9679b
SHA1c045232d4cbb506d4fe1d18437398ad740c100c8
SHA256dfad9a0a6ebb6679078a7eb9a7358b8389cdc90d1b61b893b1d6f49f9af00c3b
SHA512e998527183173f72dce25bebbba34989da1c7a453654435402cf6d5f8b73f994fc6a0bf434ab6d1d0f577fcbaf131830c89fc02c189daa101a9f1b01473d75ee
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b