Analysis
-
max time kernel
118s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 12:09
Static task
static1
Behavioral task
behavioral1
Sample
a09e89677803ebfa99a0c0b152a9cb9a_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a09e89677803ebfa99a0c0b152a9cb9a_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
a09e89677803ebfa99a0c0b152a9cb9a_JaffaCakes118.html
-
Size
178KB
-
MD5
a09e89677803ebfa99a0c0b152a9cb9a
-
SHA1
3e1882a761fa615217da62a3e1909a57d71a1e29
-
SHA256
4aef57afd83d4693ad895bca4c2172b2dae819fa6006d94427821fe85f26d620
-
SHA512
9684f4aacedaa0ef7611cacaebe59ffcf69407b08fcc6fdb88a790ea64fed1ff3212853d079130ffe37bffd740dd0c33a3d7a90a3d48be6502c10c0f46f80ffe
-
SSDEEP
1536:EbA6Besou5Lu0sN+NOKAZEB+AJa00U0lGqpD+3OdrGNLMhj8ZxbijpjU9hezrve7:MA6Beso8LdsaAoB3Odr72ezrveS+2h2t
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB05F771-28B4-11EF-A243-C63262D56B5F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424356060" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000007a69bc191dfad4473f4483d590411cf77d3016d7d24a052b1b8fed537fa9ca0c000000000e80000000020000200000003827ef01b0a261c08236c9eb6eab3017cb0da429cd5d477ead2ce6bdaf26995920000000d3ab93ad867cace7d2bb46ce489f5541ed4ce72389d9c25ee946af693d3cfc1d40000000386bc70bbf45b439c2532779357f612e23339a6d9610252e3cc656d440629038dfd9d6155b56789ddf08cdde499bc7e298d9e4f3e4947be5708a7c01f78d8808 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30bcf2acc1bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2640 1704 iexplore.exe 28 PID 1704 wrote to memory of 2640 1704 iexplore.exe 28 PID 1704 wrote to memory of 2640 1704 iexplore.exe 28 PID 1704 wrote to memory of 2640 1704 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a09e89677803ebfa99a0c0b152a9cb9a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f11b37e176b1b9cf7708f57a596e8074
SHA1b1a953dc24192700fdd49df1225d9f0d2be2ff01
SHA256498281a477cbf2d2d3757146c84ebca7a2802224bb351133cb6dd56eff1d0669
SHA512c5dec6afae98c2cfee85e2318df5548923defbe0d0b809f2274e1f5b685eb2827e0d13090c6abdcc49c9556b74420e6c322aa17dafea0989ea08aa87b1146ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508c664b1e87e1a5588609f8bc31b7f1d
SHA1deaffbeed953a37723885e8c90a4f596b4f5aaa2
SHA256a519775ca585d2fbe7e68af499b15379d393fa95eb0508237eddb66f3374b741
SHA512974bdacdf90d4e4f6f58735fc6216f1276bb3cfde1eac4636928796f27b5fdc7fee51c7d3e4479f1112f06c6d47129e0b11b71e7c003b93d51627d541225f95b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d16e8dce50b91629b7b064faf44e988
SHA1140ecd52b554fda7ff4b46e945c008f7e57b1918
SHA256110681a207c755b0a84c45af90713df6e3c39a2dea0d400acd3fc90bec92f5c6
SHA512e1f98e1e210cf94af9cec423b89ab1dd47dfcf5a019db69f1ad5c1f80fa20930ddf687323478e649a28798b0778558018fae49071a2c7ad14934728643f18971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53591bc1437a783a23d8e68e0db0d4a8f
SHA11aa9799061615ce64cb64d1de78b637ba0b91a85
SHA256c399e29f5e5f249b042d4d36955686624023a1d6faf308bb454a20bf0605a55a
SHA512e3e649fab87d103fa7fc34b5e42dfacfdf969293bd478fd353544f36d98cfab3022b8c92d0783d5d917204040259e27df365a2f3628dabea26e0f80008e755fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c37c514fc7d960d002601197e1bd394
SHA1fdffb1b83a62993c1ce358fe5f498b9fe7f27001
SHA256ca2f973ee73e54b3cd454d54ea5c11759b312a5df489a6e99c985e1d98fa272c
SHA5127a649f094f659cd280db12561a472a9831509c1734174ee2b8fde29d08cc9ad07f187ae18d1200f3d33ff7569ef60fc3ad55bf05665308051a42cbb0b955dad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2084de8e1c90eb020db52c9c11f6941
SHA1564fed119d10b973d5961621712b1603d70386cc
SHA2567b0d5b97e1fdc75902e04e5abe4937da066c1aa8713ee9f055442693b41739fb
SHA51205d31090d322cf2891892104e1c0d9a5516ff65282dbd746931064a12b566e56af16f9b34eb909975626d8db8571aee23926b3ffaf8951a5ffe515a8cba75db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52769f1fa8a0eba4c1d9ce2d15e0ec423
SHA15d54d524b313e9df75684a6eac248d77710aa4e0
SHA2567940f901030dd4038e246adf6f1cab04f25f10d0d31e51ad0cab5759e6cb5d33
SHA5127e6cfbcbeab95ed08f0cf2d882a5e2a3177f709cf51c239b32eb5aa5e645366f7704e9eba326afa08bf11ebc130255ec1843fb49c1b6f7858ae2a1e12ce799db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be7eea5754e519572b4953ac80124df3
SHA1cbe69203c314636c16b18570e3bd13472acd7746
SHA2561cb2dfeb553d4ad5a3166497dbce71ff4ffa2cd27a3980e79348cb7fff41f1e1
SHA51219ae984883a2eb3950b08d2df25c39e25855a513ddeff99b890848ca523441b1196c86b1f8f142454a6d9766fcd3a7f2e7c69683e3fc710b9bdb1d61a7014220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588caf2a3d096236037eeeff7519bfb04
SHA14d116ddd2c4036566b0dee94857358db6d18b846
SHA256c51b0ac8129cc5bee3aeecfadc781f27a964e04a3a6ab86b6b38098223833a2e
SHA512e30b20dd194498d4f8e50c780927bb94d1e579ffcdf963fb8838531fa211dd8fb881830621027a7498c4c7109e96fab871646c42df6e240e72f680f961ce17d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56667b159880383a69c3d1ebe6c166241
SHA122c08e4ff0aea3638604cd9d307cf9734b2f7e37
SHA256b2dacfe7ffc70a08115889dc3ba8ea784a6652a6325b248e213c1e31d1f7bd61
SHA512fd66bdfe348b844aae39d7ae459f5cf84b44dd6a531d6c25b350d868fe011ee6b721137a9dee19f3b0d1e4340673199a973db863bd773fb477e8a6f99059da66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59419a297d271b712b6793f4d29396eaa
SHA10f5c03468ddcb233add6d0cf837d63e3095756ba
SHA256e4e58d20566035f16d5c6c4eccaa76912ec9ec90d9c6d6173f59a4c294b92073
SHA5128f7e9d32495bfded39f5969f775752a19fc0f44c08ae59ea25067cb6220676247a6c8b1b96a6419052cae093c738add53ff1cacf4ccda99cabaef5e483ee1098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e79e1ed2a13fd50a3086d1c84fc40cd9
SHA173d6b0b5c4fe3c2ececb731ee363d6f39f0effe3
SHA2565d48019d59ad08b68cc70ceb5f7bab4fa431c933c1eae81b9a0382d394c36898
SHA512a2fc8b7e4160c5b9bdb3cc150f37b38e475f442c4b83decd87210875ff77b4b2f3695a377ae1ae22372d32933d53f4fbbdda1a3262bfa91de224dc6651a41ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cf231b81096c59c6950b41248395d99
SHA113d57bb82d0082f605509ae97bfbee2f18eb211f
SHA25636f25684f6f349e3cd60541c7bc348ba31218bf346bd1492b5fcff57b017418c
SHA512d9f505e09f7826164449c1cb6ebd661762855b3869fb45a0904ff2350874ecc155cab0c3e49932b91fcb58b59029be39a448d43d12d292af19b06694a02c723f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a3984e9c12394b13bafae51baffeeb
SHA176dae346866967662b390c96e508672dfdbf06a7
SHA2561868d2d4ac5f139bd9017a909dca05acabcf24c88c90f265375bd07c8a745a0b
SHA5129b1746af6cdfd3e4497294f80ad8b650bb10c73bd528bfdb2e8af4576b388243c9d220352fca216ce5ccdc00347add0dc9f31cdf547976a3eaa070014e661b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5307ffb810a685ad4b6ed8e5d3690388a
SHA1119ffcd26310bce398238d81ae1ba8e56f071712
SHA2560c99e6f1347e3236e6ff6d3f540ae5c0da0f574eff4b8eede45bd152dc48d92e
SHA5128b63672822c172a98764b9928f90e925991d77bf4f1789f8432a4ec04f49bc2e21292c9a97b0ffd1b0e3d1525cb388b9f9752e5d12ebcf829d37fa08918edd2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879d2ce4373d9e215b6bf0f6a54d3748
SHA1d79d947504cb51a319acc03cc2fe5d241d9ec6fa
SHA256528baa67a44a37d5a11c597df834fe7a518aa7053167be4ebead1414026aee8d
SHA512cba7a2ed78e3bd36361be593e7e6e7103629bafe72f431a70c077fc0694c788adf8c6cc7a8677ce944c608f4b697c0d7f253b3487d417296ddbd7cd1f80696d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa73621be545775c3547d82d794bd603
SHA152f9f567655fe0a15ecc984120e2a4dfe0047542
SHA2568833cea4789ee96a566c09ae0026cc4f863eaa7e3c39b4788153f73b445da3d2
SHA512bfea80c23a142bdd4858fdeee81583b006e80641d1e7a667b2161612cb84f4f070f8007c3fd8a1560e091259422f4f28bbfb306f65bb10087fb9dca4f35654c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50de36f95b2599a98b384cffd48d9afb9
SHA1a5e126b8d2e40006bc242643a7f122f9a96f446c
SHA256d4c4c6bb8e3d35788a08c4946b5dc9d23e97bc86bc0df4134f7da63b933c470a
SHA512e92830ec521f2f71bafc8dda7b07f541dbcdca9755456a8fb193849694b74a85b313f0371ec61a3c59ad7d99290fb86c9c0ababa8c5ddf3ed736d7dc66fa5b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c464993f9fe039187a6a9c522bb594cd
SHA13ef751f4728bce76ce44a999f90b80cc9af16275
SHA2566e4c806d2142760ce9f5544a53bde331edebb4f0e64ea2966db37eb64cca9f67
SHA5127bcabfd16b59e7269989f6a00603dde2ba04eacfcb3517f186ece8a8df1e74893ac72dfdf1d4d7b6bb5d7be6bac6b65b9b3c6c6b9747bb1140ff892c677bd9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a579b26c04fa2689ee29d791b6e26a
SHA18cb118c13150ff4249b25645a4625e0b19451b05
SHA256bb08cf7fe9e8d59ad1b429e5a10d0fe7489c42c9f29190ae66fd468816205c54
SHA512760f544b159963a62977c8d5132e5cb0586c317ca4b00974667f6eb936ee31a55bc9aed8f17b44f7dc2332b08fead0f802e8e3c4218ac24ac9fe7c62f860dd83
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b