Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
09574831340944e8538acdfb7b0f964f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
09574831340944e8538acdfb7b0f964f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
09574831340944e8538acdfb7b0f964f_JaffaCakes118.html
-
Size
105KB
-
MD5
09574831340944e8538acdfb7b0f964f
-
SHA1
d3655684b5264edf7572489e9306170a77bfbf1a
-
SHA256
0bbef18a94fd8884d11e5aa134bfb21aeddb0f2c41acde2ae2253273b80b284e
-
SHA512
cf75f3af9b0b6e587232026bd2b6669da53f4a31b02bde7fd50ea07f190e3c4f452441eab52c607704f3250460b7549190b768a3dc6d58367fe800300839f08f
-
SSDEEP
1536:KAKWbg389eC6Nc+ap5eOqYmKt2IkEeWOXHl7M8sA9LkHDcZlsNX:nbBGQeOAUzkEeFXFoBDcZONX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425405056" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BC79B71-323F-11EF-9891-EEF45767FDFF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062a3942ebff4f94ebe5be37b25d76bae0000000002000000000010660000000100002000000058cd78bf0004a75bda47660c1d5e0431a2ed1c9e285a831ec2f6cd0e6947aeab000000000e80000000020000200000002654f0012e77b49d765c12bc1ec4972e4b3cdef0db5632fd2d970854f361889e20000000552446657c1852dcfdcda2179df45ebea6e6cc2a79dcbc87f7627e991c389e3640000000bd7f1fb84e7ec17ba594fe982b80976abfce023009e80f0132c4814f3f6701fee07f091b08f43f2963abf0ca8fe7b9ddeff889e4a4438dbd8289b93984a9e7ef iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2038acfd4bc6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1312 iexplore.exe 1312 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1312 wrote to memory of 2640 1312 iexplore.exe 28 PID 1312 wrote to memory of 2640 1312 iexplore.exe 28 PID 1312 wrote to memory of 2640 1312 iexplore.exe 28 PID 1312 wrote to memory of 2640 1312 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09574831340944e8538acdfb7b0f964f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b49b9b9521f15b7bc0b676270d1b32ff
SHA1de9b2b43a0274a873857514995dde18d2bbd3026
SHA256e257dcd8e379c148062f1c9c253ec3df5e5c4a7c77b6368b801e226465e1fab8
SHA5124bba88c83b04b6a9bbfc92a56cf447fd302f669b78d362aebbf9a38f44263181cba3ac3ceefc3721864727ffd853a410612ffe589dd68407999f299ede3835d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f9aea527f0f7d77d54470fbb0901282
SHA12ad345e8946a9334797fcafe7bc43d0a8d022af6
SHA256083bbb9f6d89010657f2e0c06c07c489fee2d375676b81feb901bf4ed479d965
SHA5122ddb9ce605ef6d8d572d79a05947dc4825e49d7c58a9021d7882aed7cec9270b1549b08a29d024f473b3ff6fa07648926414f74d7eca1bbcad0b8fbf50ad918d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d39dee1826d826a56e3f9a5c65e88d3
SHA1f7c62781cc82c8c10516e52158d21c8974740850
SHA256db763fa40725431466e9531f35cbb69434326af3ad4d8c60635d786494e167e7
SHA5123bc4a649cb849ac631646084232dde48289800efe5c94fcae1320a82ce6eada8bd7ee3bcd8c616f0bac75886eba8fac730476bd72b3c644617f36741bd51612e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6afa47fcc4a4589b2cc98768cc9b140
SHA1f4506bb2452c65005a14d92171ac8e6ce5696ef8
SHA2562627405db84726f9bcff05fa23dd8e5a31c71b95f3df8c4a3abdc36e0799639d
SHA512a8e64117a4bfb4aa6d0934b93d3cc0ea3364c9c6f538d957a4074ad35af0f12386b684c0925ce972990ce1aacb974101b4aa401fe53943ade2eb23c38e560ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55205f14d5109abbd02f85da65d50b959
SHA106d98222adbcb4205570e03eb6a020a04526ed4f
SHA2568f85e1a29dc0165e5306eb2cdce83d2584eb7377dae9e654b421a2298973d928
SHA512f7b37160d78a24b14cd4836b3be4ca91e0fccb4cff3d9e883dad2181f812d97a590b7883374a0cdb5ab5e5175d1ed75252f8e6341391b0c5c361ae85ee2460b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd64f21b9fe844afb3474d773c3a0096
SHA195948f711ae177870b643d0edf86ea88795e6964
SHA256baf3880417da53d3ba904e9a062a0e2dcc941a43d7e85ae06533fb022e3202bd
SHA512496adb086400909af18d4d4fe16fa4c84e1d6a8953db832e47486ae0a3be152b38a33ef750c699cf039c195882ce52b77e658a152f723c5754e566de44b2ff0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b9ff1abe36e4d4f7ffd6b3bb3212731
SHA11a0fe52f0f87fc73f0f6d700eab5e61c80e2ada8
SHA25657c4bb2fe5eea6dccf70f20424bd75e951d929816c7c5b5a4ba53fd27d23b8f0
SHA5128c4101aff9314af074dbef625437fdfe60bd53484d25b537b500c453c17f5095cfcb12c8159927d54bde15f031e8dff14f72cd7f4a8254e6d9cf097730be674d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa2849bd724252c314cba95258d4af91
SHA10b53ca4e611917db90c3a9fd60ce7060f5300abc
SHA256a4a52fd3d7ef4281c1d9a595d95a825a5c90f4ce396516f4e3425f6ba784de98
SHA512e2aeb74ec789e08a180ec901453c462078b9f1ccd3f93075cfab10eb4b125075cd90bc571c6f535069e1ffe6c96afb454404b78dd0fa8257eb46abdf499a0dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a4f1417aba20f63f8abd449e83fd49b
SHA1425ee95ab455ff35445e8789efb6201d04e6b2c4
SHA2564043818e30ca1616681fdab04e0d74f7ffd625bf7eb41e6d5e65a3a2a94134be
SHA512e7c59d765cd37715222a5690643362ed05e11632c874f1383b1f9ad75e938fb172eecf4025554a727800bc5848fe87f7148a7bb4b458b1604a87332f9af12547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56469a1cd13973c20bd8451040b8cd807
SHA1490d5fe166ee069567be5b0f042d7b958872bdac
SHA256d813ed4663fd153d593ea2eba44630c9896f8ea657ffe3f409e980c2d34ce94e
SHA51242c492e4062ed1a645d20889a6bb96d206a5287f75ffd1d355ee87cf86234d14ebef0c90c8ebbeb0578e0dc80c1cc7d69b9a96133aeab51ec480b8deecbeda40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501ef2a9dab1428377d9960bc40723e07
SHA135849f1f2817825babc6ed15ea56fdc524f2ffc6
SHA256ee667acdaf0ee193306c9049ec90789942aafc69b687000cda55ff435532adee
SHA51222516cb24d0687099b9f13709c7715596d7080611d072cfbde4e4a910211dc9607af0c70f75093cdd45dbfb0497a009b2e6fdbe55ebaa963d11cc36ee7b3f2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae47e5ec5c3f0fbd67063c3c0901bdc
SHA1ac5ab2aa17d637a5dd3d6bed0b4e6cbf6952a854
SHA256ebf4395f58e2d9a61a303a5b89e02d9d46299dd462af60c7907db3fba16a38f5
SHA512635cc0839c747bb61ad138e0bb8c6cb951012f2b3be21a65d5d5150e4a39777d11ec783164d3a55905392dcde502a44b70c176788483770eaf8d1c8eb465cb35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5765ed14201248fb3bbb3a19f0a173924
SHA1b38d306aa9673f8e432fe4729d8e07f8ed14ec9d
SHA2563de9a4447d43dc13a323a45061411af9fb3b8c7ee08628dfe26eb4be1ac42341
SHA512d971f06e210c1fae93cb0070b9327ca448772a817ce15453c12a1f4da2d731eb01347b73ff76974022456550d4aac027d93cea752427b2fb77c22d5c249a9763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc48ef85e4f26889156cc97daf4dcb35
SHA1de94010a72b3d659f74afb4a99bb4b6a500fe251
SHA2569c946aab8acd8a23e32c6170095103e13a2f5040c5c2eaf17292e10dd463d55f
SHA512e1f2251aaf212e7ffb70a3931f211791538f372b434b41a8ed25990eaf9a4bce7b86c511c3871c0a187ee9f0cfa41a19cf6e2e20043a7086ead34b62437ed6d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52f99205cb2e43e8346126cd9104702bc
SHA1cf47c627f194c1d75ca7d226c9b2dd9f77333e72
SHA256a152141597f07db625f2e59aae60473fae07a4ca6afc661dd1353e08907dac1f
SHA5128f57e1f488ffb969739d42582e02ab4ae1a11aa1ad4acd3e733b9bda6cbe9b32d97d73c522e1dfcc4b2d555e884e9f5b89a2b5611b8f66408558b27e2366daad
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\plusone[1].js
Filesize54KB
MD553e032294d7b74dc7c3e47b03a045d1a
SHA1f462da8a8f40b78d570a665668ba8d1a834960c2
SHA2568076b082eadf0cab4a8823dbd7628a0b44f174c17b3221221c0e31e7c60307a2
SHA512fe263fe86aea2ba1b86d86305650cdeee45cd1f7b4339f9d4fb81db776b78abedccd0ae77262f45d579751daa26f81385354b3d126fdb5577036e9dd1db33276
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b