Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 11:07
Static task
static1
Behavioral task
behavioral1
Sample
4e09bfe3dc23d50f92daa5e6fb685db5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4e09bfe3dc23d50f92daa5e6fb685db5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4e09bfe3dc23d50f92daa5e6fb685db5_JaffaCakes118.html
-
Size
53KB
-
MD5
4e09bfe3dc23d50f92daa5e6fb685db5
-
SHA1
1ca506fafe350949f66c5e478915139875e1b13b
-
SHA256
d5f6b9ad767489986b20151ce120e3b8ba0f141906bd5a11d8d49104916d125c
-
SHA512
0eb993ebb1d9ef6237416e74d83d803050857a2de4bfe7f4b1c77b9d35d981fea1ecaa74d999be91cc78a83d7db81274b198d6c5c1e34701fa7a57b05b7e0274
-
SSDEEP
1536:CkgUiIakTqGivi+PyU+runlYl63Nj+q5VyvR0w2AzTICbbSoK/t9M/dNwIUEDmDZ:CkgUiIakTqGivi+PyU+runlYl63Nj+qz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427289925" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d049a07170d7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000dc1150c9e010c71e478ab8f7c354fcdf05bff5e5e3312152a1746f1f43eef43a000000000e800000000200002000000023c46ef7757bf425314dafb4414a72425cc8f25825ed44062dc038879a3e41e8200000006dbd34ba94e0d9be131798ebfffc4bb8d6ce837786bb4cc2513e5f8876860c38400000000989c712ffcec601d20a1542f21e39128d487665fad309196217099f1260460f14d055a0ec157d456009a2cae2373ebafad19b20103a0cbc799289e3f354fdb7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C3F82F1-4363-11EF-A5CE-F62146527E3B} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1240 iexplore.exe 1240 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2864 1240 iexplore.exe 30 PID 1240 wrote to memory of 2864 1240 iexplore.exe 30 PID 1240 wrote to memory of 2864 1240 iexplore.exe 30 PID 1240 wrote to memory of 2864 1240 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4e09bfe3dc23d50f92daa5e6fb685db5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5317eb08d7d8304456f02dd8632fa12ad
SHA19e4c7954fc099b8c3852fb2e629476c32d41cc76
SHA256db6cae4bb807160722c351339cc11d48568036f8469c84111c040419c20ea747
SHA512cbb7aa97822a0a3a086f6eff33e602face83a5373dae7c23a70fbe5f6fddb692ad97d9adbecc5918f29a53eb37d609acd4079e6931973a94b9e4dee6c1cae42e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b5a3bac5bd74aa92b87394bf36dfe2
SHA1f786ef53da1a3b03a933af68819797b1b713869c
SHA2565e186f59b035cfc4d9b1c4693358f62fde35accbad8b5550699f3a9dce70a042
SHA5124c2ecd551565f61735621476cdc615f98ff8085796ce2e4950e927abd286880f39667d93edf9fa083d3ce80d6fa5af3b7a14776df5038775018b3bae2b11fc4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad7961d9dd386305e246eec6da137c0
SHA1d4bf276a77b3eab7853e389e6c13912e2e4be1ad
SHA256cf665953857d799433cc2bc0149a1f721eae83a843fd2ec3d817561eac19f51c
SHA51248195a5f1c14d9435f16116e516a2688330d845d4ff3711f717bbb31fbe47dd172363a7a9bbbd45353046f78024894d5f0825386545484af8df826f32c00ebc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a90ced5d6502238771d34272cf9209a
SHA145a8b1e3df9b930150d77fb8e338804965a2beb0
SHA256ac193651d5e43b89824b69c8a465e1b1aa5b2742a9f3a23166b9ccbb166948db
SHA512521f26a6ee6afb5a73ad7959a621ab8ed50b64b1bfd963f52b894005dd556e58bf859a49be5ced635f995d31952b106c8794288b0298f7ed96afba14bd70f82f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564e9b493cf7041e902caba393bf1aa7e
SHA1d5079bf7ace99db7974fa9a10fb0f3ada2de4d3b
SHA2566815d4338a5570c9c3d2107e5072198896cc3fc6546ddb1a35bf657e9ab46404
SHA51230251ced6c55f202903501f4f13b7858d296161bd62fe3342729a9563c7bdbd4ac3f34b84ba6cd7138abe86eaa75007a361b025fb856a967186007242017eafe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce9ced89527116f10b745ce3ce9af556
SHA1c7bb53ddd8adda5ad58e409c851dea15cd64f713
SHA25649b23fa5dccff6d694295e323bd05775ddf9ef50b048bb7c97f19cbc4fb9bccd
SHA51210b6a133b25e5b49ac2c47f3ad8f6cd5fa4bb5d8038c78ace671095988b43746e643f64e560d6457bc96192ba1ced5e6b2b1d2a3eae2b03a7c8471bbbb51a397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c5b8dc5d5f956d89ed82f10e5024864
SHA11ac3ada5aa05a1a312bf9f971632a3ead273cc77
SHA256b9393072a2237d123215388ff5f63f7ba6821dc8eabd1343daa9a422af3459b2
SHA5121033939be617f8694078843c18d99130b9d1b75ebf4a3b778b6bc5740bf8927113f89b8c8f5ad5432084c6910585944ea79e23e95d74b8d6ac4ddf6aeed47a28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef1adff69a3b42d0c9829d1f9c45a8c7
SHA1a1c7592b6ce19fc46830b2605cb0a066bea7830e
SHA2566aa11640137e6e9a000d0cd93663a5891f58e0fa879a3bdfe9e1044690df85a2
SHA512355454301932766b6fe0617530d03d3f875e5338f1c3700851e1e7b07d6755732da31c46bbf3b509511ed2de1a90751af60f6d46373a48e8131f3d6dc2578f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d644245a8413172db84d4a617a62b1b5
SHA16814488a3004ad7bb9e5bddaa4d5f45b5d03b62c
SHA2569c9ab5cad4e76a4e71f92aeeee40b6c2584001eff0148cc9b71f40379e717f18
SHA51298f8090d25d37f4e0c02193fd695cc2a2d8e32c44f585ac40a2e21c83f3e5bdeed285f6032d54464cbdaca6264ef35fa478620d75a975c766c094d30360ab5a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5523b188b3f240ade529ff6ccc7ff1d8f
SHA1618642262cfe957aac6646024dcc1bd754a0070f
SHA25660964fe089c0818d7c6146ac5bd90266ced104a8941cd272be94068ceefd55ae
SHA512c2ee32a93b331874af2410671d25070ee6fcd74d0387f9679a9dc78606c143e5d67aea441419cb63bec19cce7bf35ee6a8dbd177794426bc365280fa56675187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a2764fc372339fb0fffa05963af3c87
SHA191202eb37ce24e90a983fed49d93a5a2d18266ea
SHA256e6ef96cddfe15fd2776b512a583a5d6293bad23d1ce29a16465d53adaf11d1dc
SHA5124462837b659b1922328b2836dcfdfcf5c05f8988b8ac4a627ce8f2fb23de111a1565f09146e39490e62c825c7d7a862038935c8f96c3540526c2aa51d4fe3b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583a97c9ab46a8a9f03c1cc212bd29768
SHA1faec33090c43dd69e90b138bac9a9e84db4a12a5
SHA2564004540b4bae5a8257c05c79812929a54e2459c1e63689ceacafabb526bcd824
SHA512f6f92b5e1d6349ad53f414fa861582873ada7d2071d999d0ab8c20a05e2b7102575bfc8f025d508c6424cfd40a2c34bdf7ec505c2fd38652a7966afec51aa27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ae488fcd18df21b126323ee068be16
SHA13fa6dcef461bb417e5686f1906935883b049e645
SHA2566f4954ed255850470141b20f6f76625671df31f7c0cd3c64848d60c7f065b3d6
SHA5122b61a8ce68e803b95c5803496e214284932100c348220a6affcfabecf9c1ddf54a9f1370f20a7c0617cf5ec6750e9386b22a8fd006534089d0d36b2151425882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c02b098def40c4bd71c3ed39aebdffc4
SHA1d3777b4b61d0fdcf61ca61d0899a3fa8e75690d2
SHA2569deaac4da24d5fdb25646c5e73ccf4498e229bdfff495a04e7b480604e27fd36
SHA512f13b71f83418d6788810c16ab8c1301b672582b72cbc192b874821da9cbd15780951ab578317fdcd7819fae32509b5e88f5fd3f2aec1c28dbf68ceb7e692c4df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523c316cfb75c28a8d4d4ddb8c0887850
SHA1a2cedfdc39fd389ad96ecb3f5b91f4c14322a42d
SHA256e92f1ae2d6a08f38a379c89cb212e5b228a9ad0ce6ea431919d28d9865382fc7
SHA51257a1fad5716302a0164e4a902c08cfffa716fe3fe7570229c0316981cb7c60f94f5e91cb7b75ee1913340d7d2a6c0922ebf48e6ed7f4325463adbecbcb56d972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5613ad44bae6a78d73687332271718e22
SHA106617b54e0ebbd1342772056f4f23f3b297a8f4d
SHA256e87d0d0a8aba01982d17a4d0a67e4c4d0518e41c97e9a2170bc87531c1db4cc3
SHA51276b40c8f97e7bf5b909aa8cea061e14bf1d15f8194492c65a29e56ee32b384d511484a4b5b72bbd43c7c2ae19cb1714d050880dc48a30c648d3c670f235f057b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a79e33199c08b23f5c3a06213a99bf4
SHA1b93d09fe8345d70c3e49e6c13be332784adb3737
SHA2566906c82cad6b097df3b606b40cef4ad11b460febb5af412a622846c8ebdb8a1a
SHA512a4b2fad82d3fb6534ef66446cab880a5b9a917199cb96f7393f1a2552f0058fabe59a0b7c8c25788ad9df8d1b3793f109ba2ad0f46b76ad7f8dddf2a171f4894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50381082b7aba5b672a3a5c6b5750f863
SHA1bd27ca2a496676f29db914ffc63827582d81147c
SHA256077ee8eb51e0e3add9276bef3a4c3acd001e38e9d9ae7cd61fbbf29cdea6908d
SHA5129a2a3f203a23e210ceb3f6414be68351e833855d839d7ac6e58df6e2f0460a63c1f2dfb6dc982fea8f3a6599fced91c0b7504a3bb4248c82694c6012e1f7c75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccec695e2eb62d93c8f6814102e1773f
SHA1d2288f49d76f8173ac0c4ecf412a3e6402376182
SHA256e5d095fd0a1608c2243441f734261d2abb1bf65ef9afc02927114f87c295cc3b
SHA5120e1676af499e5bc6ea744e259dc08e3f53f776571d9575bf64fd3f2913a3e8cc85d68233bbf2004c7b2222397577bfb07c3420c0ee24cfa79a8fecfbffebc5f6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z2D3H3V6\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b