Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
09c4e40329263dc83b09bc567ffd73dd_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
09c4e40329263dc83b09bc567ffd73dd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
09c4e40329263dc83b09bc567ffd73dd_JaffaCakes118.html
-
Size
122KB
-
MD5
09c4e40329263dc83b09bc567ffd73dd
-
SHA1
af51af824393cff5865deb011d0a6e1849a9dd5b
-
SHA256
5eed5762a464020010e33bb9718d6d8d77f865d11c8ed1d41fcaddf378309a2c
-
SHA512
12c5bdb1ebb34ee40ea8df060244fde087656b01e947173e31ebc4fc27fc6fcb5c4758e4a3b4b364c7332d42eb4df8706fdedf507b0ac07365480e84c3310940
-
SSDEEP
1536:FjwUQitLYr/Y9Fvu4k2Ln4WZPo9TMj4d/wkvPj:WUQuLYrALxABtL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000cbf7861107c9c219c52746f27c5c05d232b5458b83732c7dc23b08a648f3eac2000000000e80000000020000200000009a4e00d45e3516983c6c7102738da9ddf90c9e6d57f9135a419750ab8eaa8d092000000093076570e0c107d209dc79f45886c9c1e5aadce99c895319fe8683ce01e4d31a40000000389dea24417a03cb524bdb7321122df03d6d4fdcc417b42b7306d3b695fdde723bb4df8b1747fa8c231e1d5b80b965a80970307b20fe0bd4301abc25d65e7c2e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{39FA02A1-324C-11EF-B781-461900256DFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425410711" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e9352559c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2244 3020 iexplore.exe 28 PID 3020 wrote to memory of 2244 3020 iexplore.exe 28 PID 3020 wrote to memory of 2244 3020 iexplore.exe 28 PID 3020 wrote to memory of 2244 3020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09c4e40329263dc83b09bc567ffd73dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4585da84b57995c6a26ba997417bd57
SHA171efdd1c0999756bf2125034d9067a0207e80a9d
SHA256facab56c1af29cafd811a140df08025611fb0a46c5c73a319d9da2e30e14369c
SHA512acadd447052bc996babd4913c6cfb8c396427cbb78959b43b4206a8b66f054e3cb2b9ffa8af0722cf5de8e03385410fe067a932b41dc43ef0f5e5fd1472d5e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b65f2642beff698262413d1b89418f0
SHA19b23e96c67b921a9ebe209737e9ce05e7655f345
SHA256a2c36b7cc982c70ef77554e52f4e016363df9a4206186b2596669e188084c55a
SHA512e837a95a0ab655133362345693878830b84b1ac2dd3312dd79e39779a7eb69f87ab04870181f26d1f83f6abf03e978a9e3c43ac958095131b97921316a0becef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4411f09313cb8555c1257659916ecf
SHA1edaa7920c69fe8b6c7e8aaabf5a99cb6659b5b23
SHA25616938825573028e7532e145ac23e3ff210f4a5f99fac99432f6b4c205a382b94
SHA5127a6205dd5ad18317da7ca2b1f02442581b27834c82131a71b89b3c90980381c6663794d31fd774b5147f4fc4ea6491222d593b758962f974f079c9849d2f5cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6c7f5aac8bd2064f8df316a4f9f9fb
SHA1c937984c3501b46399fc541add41b459a6c43b0b
SHA2565d3cc39dd9df42611d401f35375f034c84dfb5de98703097fdc27e4104a5bddf
SHA5123214f53cc9a1e454c7d5e8524a21e6e8cf953d36ca720ce4290f48b3bcda6a7b98b7d38e0af503b4fb79d3d64143d42b437e4493ec8adb1cef33e5fd215d2684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b885f0255b1db8e608cddd4179401d27
SHA1057a69e6dac1780cfa76e504858ff0251b679e65
SHA256c216d56784c41f36367daf14c86c618da9a5d2e374097db8c0e40ed93b0d074c
SHA512a1d26f0bf4f6c65af0131b4e16b45d7dc03245d5c65ccfcde23a58648c18cb7e18ffe8217dfbf41f5b3feaa3baabe2f24c51ee53cd4c1f0a70c3b8d61c64f499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e441de55ee5b75776bcd95a5e5e9f294
SHA1c75dbd1326e21f3b8b526786b207475f5c00c3ae
SHA256ba7f4083ed1ebb626d782b30f1f68a9fa7121abc8fbcbc26d86e59c71a9e8f33
SHA5126341527f82f5d270d6dec74d6d38712bfe320f32e2bd384d1fd4e481ab7dfb00cca2420a115ef46da979059397911d369fc8cedaec1e641ed394cd53be4fd7c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae5ae263f86f72aee90355ec0ed38d0a
SHA1ce77a609023ce3060a811d3ace2078aabb6f02be
SHA25647456b00865a63fbe9be57a4681e8fa4594581940055f43d455d66be00427088
SHA512bcf490c87d0d94645a644e7dcc086b29d444e8fafe8fd8c79336ca62423bd3e9e3f3bc13a6b95b07feb925639494c59fa72f8845f7a8d3adf1ca62d35c9cd929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae3e5a1df8a5453092607af33320fc6
SHA13a7ed22cd4a58b72f6cc95f9d3ffe4c607a6ff72
SHA2560a08fee96d3063a318b390629d010a01cd284161f719c4c8fdfd7b3fc167d67a
SHA512f86c225c438d3bf366b11cc05549427933a94abff3673fb3570fa3878f2f6565a48eb87a383a843201957b2814a09618b99165bf0c6777595c6f8970274a90aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa80f9fda9c50c9a44f64c2b2d7d3005
SHA1a95d71644b1823b0df3023cc754a5bec6d2b053d
SHA256da3d8891101ad92385ccb088a48a03d413fff44a2a95d177e471f0f9af08128c
SHA512ff7eee821684e110832370940c0b38dd5025f35a5185b561005afedf29c58f0fe38e037f02d21c84a12168d02b3eb7f3466feca7bb80109ec55fc30ea7f3b6eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58055f612c513b03c41c0ed0d71cd7c21
SHA19a3258d7529ce3055520330bda364c015a089ba9
SHA256029995d4fb4f77ab6f03b27280db74f16f74411bbf1fbcbb3d18b04e2e2cdeb8
SHA512902e486d61048d9a438c45105adc0a69b67380e538e46c4f6e3ce5ca9eee997b77ea598427c3205d295458123205c3668b821ae2f902ffb774ea1a1524b36530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5790981744807ce13bc677722f4da97c5
SHA181a96e3e7979144849068713bb8bb28312b4de50
SHA2561cba870aea350f2dfc09521014b2f21c9aae000a107cae555520bdadb41c1ca9
SHA512e82ae624d0b933b64749f12d381932a926947315aef126a3626ac8835d901490e4028fd4a61cf732a736c71952dc417d0b053c9699c7bb6b8aab5055359c63d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51757be8e40af7b8a4e411a6a0fbb782f
SHA19da8120ca819119a8bdb1ef217d46f80aa065b49
SHA2562576080126c3e7f297016ba2760e24a108f6e34cd8d92981af57030b64c17fcb
SHA5127d3459a245478c32e51b8a3e038f4fa6c4d707f7cb365c78c5f55e8382e7196215ec24bd9a63c5f29d6c4e04529c971e1716882b70bf81fb666aeb2f153a979e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d861a2cd79783a222f6efa9f4c0802ea
SHA108b40ef5943bf7aed64c38fc9caeeb33a110212e
SHA256826941df288c6bacc5a8f2ae4659a3b89e94196e9254287a61c2e36c3696527c
SHA5128be4f234baee9ab235675213ad0e4f9c83715d01899770fcca4a1cf087ca5b0204ea771b642b1ce70840f4157cef46b218b16d8f03b0ff06a6f4b3772de5f756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d7adad90d1459485982db2fe3ba5dd0
SHA198adf01ca51e37dfa7e68185d8d9bd20b50622e9
SHA25675639721858a16cff519b83712893b05be809c57e52ac40e82f4180913c631c7
SHA512df4cb26bffa5cd747b7b8604450d5844121ec37651a0736b15e45923689d009feeb69c864e1a393d7a42f9a3302d1eb78d7e7b4a1cb7289e10254bea6ef56138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507060a544fc69708b7f617cbd285a433
SHA1881c27ff07140c5ced661ec3abe2c9e861f62181
SHA2563009de595f3aafcbb0fef279f1ce67b7e07609fa0e5cce424d63938a74275e22
SHA512a581c291164942c839a0a4ee9eefd32a35207415da75c61c56442c41233af9e24691b4f7618dbba7d9cd8d4debc7515d61e488725270b1e4310b00319045c0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def070a1c2bfc5619dd1eec8f612c93c
SHA17573f5d3fadd659538593b04fa9919fef24b6d6b
SHA25610da013ebf6dd31d2a23e818ef3d6a97085e140ca1b6a79b28a280caf4fbd71f
SHA512f700774eaa4a8c110998bf521c4419d0b004c3f57f79ea28fee3c067c3a122b52709562bac79d1a54f3f6cd9fd540fe814197e303b00ebdc7ad177929d7a9075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d58a7a5629e77030f777e51b54a1197d
SHA11261e0baaba4d63b6457e493c3507c09b9721ad0
SHA25678daacef4bffdd164c5b008ecc05c5eef16b27b10b4acd2df4701cd90598fc5f
SHA5125de6d410f068ac740fd6fcd51bbe92a84a019b5c83b5919f983921194c674fd5b8b168f79956f9dd10f6ae10b22e7c52b1b2e9280042c61e47aae8d14814ba8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd0c49e6a23769158ebbcba4936635e1
SHA1d25242aef9359af9f4420a4c1882c933b7bedaef
SHA256209becdbe4c3a02108b034e30150176f24b10a6b1b192fdbf2e12aca61f4f7d0
SHA512f1d33daeeaed664aecc4d26df5fe3ccd09ae5d3a8d8a57580974d668c0e7c42bc5ef9096d29ffa504867660ad02c30ec5569f376e5fd519f1785041d5fbce460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ef2fa700c6e1c5916b6427e73cf8f98
SHA18ec8eb8c3c0b15fb525560850abd4f6214588fa7
SHA256815ea1b185653a16ccd48152b138c680a465fec32229faf41996376bc793e4c0
SHA51201189f4ff05507a3b64c205ecd79f635011be74ccf4aa7648cd916968e40edffdd9fb9b000b626e9d8236646b5817006cdcefdaa569fdf588d6c4b49571580e4
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b