Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 16:34
Static task
static1
Behavioral task
behavioral1
Sample
099eed901e51e6779bdc95ccade2dc1e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
099eed901e51e6779bdc95ccade2dc1e_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
099eed901e51e6779bdc95ccade2dc1e_JaffaCakes118.html
-
Size
26KB
-
MD5
099eed901e51e6779bdc95ccade2dc1e
-
SHA1
3c7ed09ce39a27dd2f2bb6564441d452d3c4d4bf
-
SHA256
d3d2924cc8a2a8384a62590e813a823761b07c1c28ebe90bc272c0eaff5a1aaa
-
SHA512
09039a4a857f7674f2b4464b82662f59fd651aca7f1b8a19db90cb6c3d7d11d7ce36981291f75ed3b459dd10efd724521036d8a17066f1fc591084fbbfde79c5
-
SSDEEP
384:PqGdaE8oDqG4OQqd1j62XroUa8TVhOrqamRRYR2GMCYUlx2m:PqGIh+qGbFFX8UN7v6MXlcP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9273EB81-3247-11EF-852B-6265250A2D3F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1018e86654c6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008e0f61e3ff897d4abd577143d5e7732c000000000200000000001066000000010000200000006d2973550c43d84f91994d7a5b05de62a280b734c15172db32a522626d98634b000000000e80000000020000200000003ed01a5a6f25b77086a8f56c04c78e38e29002091326b51913c09dce98b41cff2000000053321f97f74a33385976cdfccd275c10020fe89571ec402e3e7907ef49d2627a400000004b2605d9bc393489cecf4c1552c09e2da04389ac8202da739dcf367903c3ca829836cfd5abdb15ba6c3d683e2e53e1d23a98d0fa495d788de653672d6b163ad8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425408712" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2260 iexplore.exe 2260 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2768 2260 iexplore.exe 28 PID 2260 wrote to memory of 2768 2260 iexplore.exe 28 PID 2260 wrote to memory of 2768 2260 iexplore.exe 28 PID 2260 wrote to memory of 2768 2260 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\099eed901e51e6779bdc95ccade2dc1e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecdc25c9062b6951eef19ff488987530
SHA19df6ec4706ae8fd5b5691d8f63bd3ccc1f2e6cfc
SHA256c1ba71c504c771682d19cfaaf012c562ac6c33658b8781de0ea82b1eb10a7b3e
SHA51204d6f986b8bf7f7df89178ba3ec912589732c1a146b7ebb9d6603b2adad4184ce03d4967aa5eaabc3ebd1f4933a9bf2aaa36501d9a683a79ad2f95c05269f019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529873721de4529e3bb0b575f45888d9f
SHA13577ac7e8204046dd8865f5d16effd46de1168b5
SHA25639df8dc2c0e9b6e94d4551e1ef2a2fb7bd007e2ebb7311ee27d6992fe7253cbc
SHA51203a2d326907edb09ee2aae074196aa75b9c1977a4daeb56886c00f387e085f973e31529959371bdc31dd165277a7c35c2bbcc53dc78ba536bf100426c492100c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff2139f9da6ce22c503a75f609a5c63d
SHA1563169198c46cbfc52f51b5b9d704d9edbc6da34
SHA256dff8433c6390fa9a655d28f4031593dd9226542268022d1715c8bbe1354401d5
SHA51222115c7386d95784edc3074b5c0946fa2d63bf3ddcc48594982af815387f38158409ba544e4c3b493b61aebed405d6eb3899c0ce71168db4c73c1fceb560f3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbba520d52004ae751d51cb1c5d3a7b8
SHA195b680a6ae8c47180727aba6e5b4796294871488
SHA25611ed91ae4f33280f4f9a017ffb7846f5a4d6ed3229c0f94c35037584cd7aeca3
SHA512cf1bb79be97e1efc2a8d9590b6685d8f183acc0f4d55bdd594ec5472a4044c06d27ce4debf9b131e6278b90d87f9c0bd829925a6016dd8e6820f20314ce5760f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b674afc09bcc8789d6d09f42ce039448
SHA1125965c4e060dd5a31934514f2681afa81073ddf
SHA256ed0c75e3942177cba4c0c43437bccb40ba2f24c4d5f314e980569a9f9eb2c6b7
SHA512b888751ed6948873a0aedddccc6351d902279ca9e53ba437c34bf95d0c342972a864409a3c1a2d90f9dceabb0cc9ba8f821edd5f1f9f0ef638170805581996dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d00320b759d309064b58f6a3e5e21d17
SHA11d6c89e1a70aa362c68ad1a84280fa6685a23475
SHA256f867f0cc9beb91f25eaecab9ea8efc6ff2dc4e0e709a8394539cc37bf81d9e1c
SHA512af48cccb05390b9f0f509a01033f21e04062d34759d0f56f29ce52372b69dcae6a74cde8635aae637afc2dd1b88d27fe326a110afbbe55d2c4390db7b4c0f2a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57604d92933c5aa8229d16bc6326a3e93
SHA18018d473a994fffb7b68f9ee02382a3efa8cb391
SHA256d699f6bbf1c409c0189fa77909301536224c0730f531870c652a29d27be55d65
SHA51231f851e0013df81194ab038a6799a52262da7257f618839608f4d105857c26f7683965ce4e7505ce81b8e45c4bff381e8382ee79f475bda343b2bac17015cafa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5235c730fb6b03638dc2151272b5f92ff
SHA11729a3c8da1ff016055c515ebf812d03506f3861
SHA25616e195f04cfd7ffed6c1440a89d996edebdd20aa7c6bef6d4f09a6d2458422f1
SHA512dd9c210ec9c16181f2520b0eb048569003555ce6cbfdc033495970064d3d6ceaa165027f77e80fc30ec5c2f41087f94b71085ad663aede8ba78d657a67901629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f916ccfd785de74d862eccac579541
SHA1740a14c682de42c5d87a66950c7ec51d93b376af
SHA256b2a6f2f431ee5d5c15e30b690413faa895dec643ca52de2d4c5df115d8370b49
SHA51236acac766f026c9ba4dcf82fc371dfc06e5855f02800a5581c6ab281cdb787c70e28356f678637e45e50ae771a751d1d87d9a78b00ee822517004b9ada8570ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d12fab0028d884eb1419ce003d5c3d
SHA1023b58aa4afc77d9fb71cfeb0c201b958f1ebfc0
SHA256e9b2c216a18f2257ae516591328678c51ec0b46a2c57dd1ae41113dabf203f80
SHA512940f34fecd7fef4df9af9e3a50a826d2c0dbf2b1851e7dcc5fc8ee1de6da147d2ecc7dc20999842ddf49e419b3ac2e19a3fd2a002b33f2d2ec515347e0713dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5715056a95096f2decb395c1db67d03f9
SHA1982ab36b3eafe56de14b635ca5a9e3e9b38d371a
SHA2568f61a7415d9cb25453e7de6bbb0d0eb7282ba5e8c7c7ad881d864e2791f6fc05
SHA5127c8ef2d0da41415b5743215d25bd4f43a34ebd1027363e83fdb9911cb58715c4895bb9f30e85f712f6ee79070b860c9ed100c491da9018e4004291fed213163f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807e12b5cd3ab4bd74a6a3c819d48dbc
SHA1107ebe36f0a056c32ca91b16b076e46e3f12c559
SHA25658d78cc432888652b6a4e8d69ab6970604936c12a65f3b7b09b3e9bc77dcc771
SHA512d95cda50a0df5aacd0268de0768cbdf13f3b706df1e73670e373a28a4dad405e15e2ac7a7b3d350035a9571c946e792ccbda1f99fb2bb19abc7d11802b95591d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b657d9f766af7a68ac597cbd264cfa4
SHA154cb1ec57e03950274c71b46501d132980ba7feb
SHA2563d5f8174ec16bd86b107f929895558f82eb5cc80c4e070e634cc315975804404
SHA512703b9be8711036b7d7a886606ea013db474ecd0e17e5e8bcdd472883ed8d4bdba8913ed30803573c082ad7b841317262b19cd6c0948ee1d2062c4f2a61080382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4389fbd034016e2ba53f175bb241b06
SHA1e98739f67b92edc9d427afe2c6a8de21d98ce6bf
SHA256c10a54c75a84b605c5f60ab7ee2315602446becbc67027f086ef043386a60dcf
SHA512024689977ce64e2de473f7097758ab8f78fc8df4035ec65b4355b0d38a18c200881f1ab27345ee95a324ed7a9055d0d24a971360194f860ee9dc51bdb755665c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5708824e5246b64ba6d04adc0047b4a72
SHA10966cb9ffe626d0554ab043b1b1377119e92096e
SHA2566534a04e67aca0229d99f1cc056332d1e968d30421014a70d6d34b390e624895
SHA51221b91c494c9f282189a45f3d2e4b3f3eb1d435d50af535fba4dcc5eb3f29505082e5be9b8d34c641ecc04485cc03f5ffec17b718bdde5155acb99fe6cd293d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9c74ce8ee25212c123574d72836e48e
SHA199741610337f9a67e67d427da41285ef3a979011
SHA2567e8dea2343edb277e0375d0cc8cacf42a9a7ab900be9888a33b13cc61a5ea2f6
SHA5125453bfac5a852e4f4befe245b2bdac6989ed5a90641d47cde63b708f7a8a326ef20f31160db464cef8b3706e80ab1188022bae12e14761e36464e7219359ceb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fc1bb4da3b37df6e118be08e4502410
SHA19f90b1874fa6d8a14178928dd7325a97d292a2b8
SHA256b1c388c25aad43747972dd86fbcec91937e514507692e5d16b55969d53933be9
SHA51298531e974c4a8049ffe632d2ce531c5f9964223e470cf06db384feb849f8d552db3bab7d3341139cc0c886eb9fa8f7b77acb5ace3d714313299d56a45578ec63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd16bf6c4b6398fb455dd800e7331633
SHA1c6c32dbfbd5364725ba74cae00e8f415b187c64a
SHA2569aa1f9311b0850077bd08b332680d8d62ed41d5c097b3d325a6e730088722fca
SHA512e076269178a46bc89246f8239f87b95f94ed1ac96c1da31e16530c156c94a040ab3e50e366e51d871f8cc575e2b091de6d05e895fdb55efd4433c2b78beded86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f81971af006705f92b40089a5882c6d6
SHA1aad06a07f92bca4c085123384d2843a478493f43
SHA256df6e3301dbc95a8ccdd55e99e0e9be54a4f3f1c632d623cb93e9a1d076d046b1
SHA5122f3195ed3beaad504f4aed31f026e05755112d408b0936e733b163be9f928b651ce601ad0d203abd0915744997a78288ec8aa3aa325764cbe016648f6aabac4b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b