Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
09a8f7afd3d529ef0bdc405e7a071e92_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
09a8f7afd3d529ef0bdc405e7a071e92_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
09a8f7afd3d529ef0bdc405e7a071e92_JaffaCakes118.html
-
Size
6KB
-
MD5
09a8f7afd3d529ef0bdc405e7a071e92
-
SHA1
53985018998e9603f915dcd4f6757ddb3e4bb571
-
SHA256
476ce2873925d1bf47c177b71a8eeba64be09ea528180f5f08e4de20170bb75c
-
SHA512
446874fe370bd2c179c01aab64ebcde56cfc8d4432a5bdb9a1f0c9931ba25d1f10aada51ceb5961447a186c912781775e8319a0156d4f5b4c65f57674c221792
-
SSDEEP
96:uzVs+ux7wjLLY1k9o84d12ef7CSTUJV/6/NcEZ7ru7f:csz7wjAYS/A4Nb76f
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000006bb4fd3c102d6f10c66687f870258e83cec2dc48f0ed9a5366e25410bf3dda49000000000e80000000020000200000003f9ad92bb6de4ce35ca7f8731205ef2b4bac3d4c8b3bcbbe8b9d595c3114ef8d20000000717bda2173d39ccecd7f85da6f0304cc1a864bdf3b648f0246c9587c8ed65b16400000005b96ff012a4cab24ecd7b2f792a92d65165733a8008178dd170ee759d6caab1e31bd58b6690c955f40ebdfd9ea8016d374f8e06c2cfeb4ff2494e6e136ce4015 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00630a155c6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B322F731-3248-11EF-AF9B-7E1039193522} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425409200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1904 2152 iexplore.exe 28 PID 2152 wrote to memory of 1904 2152 iexplore.exe 28 PID 2152 wrote to memory of 1904 2152 iexplore.exe 28 PID 2152 wrote to memory of 1904 2152 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09a8f7afd3d529ef0bdc405e7a071e92_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55decedd54d27ce848bc4f9837e2ff051
SHA1c52bf97ac7ebb6dd64cf5e1f7f60a1c4e76e3f55
SHA2566b84f83dd15f0f0211b42f6710a9a0cd0de8db999647c4a1e2fff3b462b96752
SHA5120219b3a7fe8f66d6f8717cf2310a1c486458e49b4ae7c5d7d6579f8d89f90269e0366ab7b492985a04921025ca34f8ba4440792f830a317077d466c668e92487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aa8351fa82a5bb754577279e2776ed3
SHA1fcc8496018777942d24a9f0dbd77750b1a42be94
SHA256f4a981a86853d955fdf5b1382eb61d43b255029300ccc01bdb31b1aa4388c94b
SHA5126efe7b8c8703c051880279cf7b31467cd1830ec19eff6aa72b61fc0631a31b0b0f34455a995e77dd6183a3d9d6e3a6f5a60960dcda68bdeee28587d8a92dd025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5459eb3859d8e4d86e06ee8d88918bc3c
SHA11ee24f112f165c01217ce9695ab846967b681d29
SHA2569c468d5787f1599005b1c27583fbf885f5ddae905976f849341f467d339d4b51
SHA5123c58351bcb7e822d4fe0f84bbeb522373efec2a9f57712f0ea10db8efae57b35e82ebfa5008894ffe733bab8c32bf1c7ef843a6340b7273145ef597c0e924f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14f56cec21b2c88f22b3afa88551268
SHA183dbe4dc227bf902fe308fd5e0ac611291375274
SHA256b60a500566215479754ef1279ed4c319555462f939882e82fcd66b231cb9bdb2
SHA51264cfc76b520825a08dc4b220cfd004d5f99f01a1a31eb37620026e20d48a38f699e98c2386a1c58cc7c8fd919072a2cb4555b31531ab29e58669540509b72b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d742807bc287df34426cdfdd3001e41
SHA1e8089b52832dfa2764c174c67056423c2036bcb8
SHA256daf16bab4aa2ac8de57db0dfec5399af06c400b5eea2a34c4415a5144aee417a
SHA5126963028ec13262e4d0f8da05acf67f62dd75e4b90d1f9cbb0b9a7e87f9e0d8e4a13cf1ec57eb2cac1a9b0a70cdd3b30bc56945efcbe1d9acf91d9069c14bd25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cea2379d963a1e45f87de0104212b132
SHA11928b2fe2c73a37cd69a7936c3970cc9da261bce
SHA256694cfeb7b16d3b00f42a91c27de7299d142bff96356aca9ad4456077985d6fc9
SHA512afec7c77cc415ceb8bbbabb8136dd2c6dd943b15eeba9175051d9ffcee76441dd0759b99d87dde9c985a71c137ebdc8b0ea26409583ce8f517f921d51710afad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536d8ac067b49c57b02a4bd8f1009eee3
SHA155165417bed3c1968c6ac5fde6cc6570e0c6c46c
SHA2567d7e1f6bf4f7ba19c3a45cb3ce46b6da5030c1ada13fc6a62b2f120166ecd755
SHA512283fae7e5201efb45e0363ecc0fad3c3cbac036a105e292b2e4f0d9e10415c38abb09091a8d36139071e51302c6966e96e344814ada00bd325f8b88c688a9c7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5174ead4b61e1a75bfee935f75b0a74d9
SHA16b8351e8416508115b9600f065ca2ab6685e8531
SHA25660bdde82389c74707b19d584402dda2c0569acd46e5937990293ae20fd36618e
SHA5127f3bf8df590ec091aad2ed6e533a95d441164e47d766b23365b3a7d899c54ea53feb805b40d58816405dd69597a9312dc402141b18fb012263f3135e30877a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588356870404d3f13f965f61ec4ae875e
SHA1513b5a0702779394c366427718b8436328509757
SHA2564a0140a1e4f064175fa77ea97682cfb36d7328dd6c009b4a6005a6c9ef522722
SHA512b8eba4b97faf7592d9b66a128f225e6081529a1736e2ecec5210e9e4c0177e822a4be17e212eec734aa1786a65b34f30ab2c63fd7165ad5471537a2982baa0b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588b740c33c2b78a200124ac2c5109095
SHA19a1a48192b3e38b83da5374b0af2cd4a622fd1d9
SHA256c69cc468ab26a654cccd3aaa06c0d62c79b4f7c5a34105e83a5506c284fa5b09
SHA512385e4e337bc66010d62f1a075165b95cd1568f53b8cb8421ac271d539ea772f11fbe592755919f234063da96929dd518b9e4eb68a1cecec98befb3c2c550b8b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58105705eb8fc704a3499ee39c8ce5e44
SHA162578d7539b3c5ac897bb1c34cf234f76cb0c0db
SHA256d1f72af100d52fca033a475b4674c0f79b3dd951e610c33f9a2b75bb96dab5d8
SHA512893278f5ab9804276f9a36037769c1fb9c0f56f715b619ec7baeadc3e882625c9e96477218b3d2429cf1680f5a6e26febd3c81813581c8232ae73a685ab84afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58746edbc9fc26d86b12b108de89306f2
SHA146e1c6ee3cdb1609d2826dafa6ede94259132cdf
SHA256437c520ad4b7c103e2e7da3fd9a845d858b0dd9563d97eac0dd6b455883ec75e
SHA512b3ce7336dad70f9ec2b000706bab9912e36bab02202ca5311a68a901c54486a32f8f3d1a44c620c764c3c1d9b710424868f13ccecf809a8811818a7a46177a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56633f8461548fca7e3564aa37137602c
SHA11d1fa98ebc848b43a9c135bd0386579b03e7aecf
SHA2565c17e7210e8ceb3663962d66c071199d95912d21084035446b7f951b51e84054
SHA512dd16c69971f3569b0ebeddd0b4b49ba0d9b97d14bc10cb2d938395aeef98b103673df1fe2118632104a3ccecd6e0e2fcde3d3c946452e627cf288155489dd042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150dba836cf28bfc11eede27a6111ef8
SHA1702f9f5cb4136cf64826d006af2c1e9f50e864ea
SHA256c9f0122c6181d4975899dcb91cfdde737b7100c13b595847264364eeb96a9f54
SHA512007efee988090f6ddc775407670e912b35359c9c8065532ca25585fe8aad3424d2661e170d3c95cd71ebb45934ff9f122ee1bc1ab913928bda6db6d4a161d811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f5c491d4e0c9cc6c2bd8008b351223e
SHA1ccd07f7235ed2c2e0aeed0d860ef95c61c8173a8
SHA256738b43aeb2b91681814b6a01dedd84cc683a12972f2a8979cfc55826af491762
SHA512d162ba93817e9b4963cf9c6e890ee77af029d8550265b7c118c2f675a40bbb6b22adc0917beed8edabd25c2ee2cd471e1746a7e3089d03bdc904806474f7c5d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d09864737b144956f453626106b17dd3
SHA1f54b30ad40d7f1ef6b53b452b7de144747985984
SHA256f7e78acae1fa6643da70d2faf69c8ad591a602ddd08c3d6489ce61102951f89a
SHA5127e6c7b0b25b5ecc3f0c3aaec53fe92a3695eb6d1c567a127414512a147415f25870de77f3db925163f6dea8daa362e948c814a78cc27e54d7818d018a329a2e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51679b4efdd1d01ed480de5102e3c7c42
SHA114a2fb6df004ebcf024a6fd0be228496bad47a6d
SHA2566c017de08a44a62890fdb54ab343e079ef42d6580867d38d34485134159dc893
SHA5127b2e87bcf66b808e8732450ed79e39bc12b9f8e11ed150f91e9eda4a23f65e305ec8fe8c284c305e4871b63ae0a95c1399d7bd7cc894506194f90c8c4c114e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d77e29cb1504d564ec1c80f292d3ea9
SHA17e6e7e43473ab27f181bf1ef834530eecdec94f9
SHA25634b64e47cf2223afeedab16ecb68ea5e7399a79e9152f9c55f841f9f2a0e9e6b
SHA512708a8fc15f69153a938a7268c2f9f9aad193195d3535ced2f101f5d02e63491db9a70569559f003705e761d697f8773fdf3735981fe3f7fe8eb08ba38b48801c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b