Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 20:25
Static task
static1
Behavioral task
behavioral1
Sample
2694cdf435456f7eb6752e3052d959e9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2694cdf435456f7eb6752e3052d959e9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2694cdf435456f7eb6752e3052d959e9_JaffaCakes118.html
-
Size
101KB
-
MD5
2694cdf435456f7eb6752e3052d959e9
-
SHA1
cd5e7e47ece0fd2c2d066c518a065a9622ef0228
-
SHA256
bb3a9514579c0c8292ba6eb4a346fbbecf3df7bc6ccd03e6f99f6edf8002ec5f
-
SHA512
49c6693c548c36ce14b32da3c3a3bf723806a077af40e500238ba277d9f25d6181f2d3b4f3631fcb690b31ba1a13fa6f74def1073febcecd5613be2809ba27f4
-
SSDEEP
3072:c7UcjvG8rMUcXmNRS713rwApb64JkKMtNG:4GXmNROd
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0DAF2241-0D79-11EF-BAE0-E64BF8A7A69F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80680de385a1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421361772" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000c31c7e8e75fec3aa2235eb5f2423a9bcc3e9dbc2ea95b7f7020cb49aef09deec000000000e800000000200002000000006a7c53124358ea0d93e5f4a736257a3d56f48c3d21d77c064717d79233b9c7220000000af70ab301a960edfda1c1efea5ab2fc1199fc71ad532a40d3e550954913b2919400000000335cca3640ac04531a1ee125922bdd157c63f7c85d1b88783fa77b0d87fc9ab66d1ddd09cfe4e96549d5c8187918a034977bad5d65b4593ba19be707458c63e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2284 iexplore.exe 2284 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2996 2284 iexplore.exe 28 PID 2284 wrote to memory of 2996 2284 iexplore.exe 28 PID 2284 wrote to memory of 2996 2284 iexplore.exe 28 PID 2284 wrote to memory of 2996 2284 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2694cdf435456f7eb6752e3052d959e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e60929720346891cf3b1b98140232abf
SHA136296790d9f07abaa4b091d40d8ddc6fdd9303b7
SHA256059d856580dc502f117f71fc06ada87a9bb25ac3b534558fe3a2e449adf13cd4
SHA512177bce730e05a963ede3321e57cc035c8a2cb8c402b87cf60ef17db3b21e7bc03de8983719cce5836d366763f011376459ca97165d1e916f108546dc12c6d113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52017fec91ba149f6613643670fac4557
SHA134a4d768b24a2a8ac578e7dcc9c388bd487c02fc
SHA2567f79bfcfb47917b45c6f4d05ce40435e581711e187474beaf3cc092ff033dce7
SHA5127a509c3ffff0bd1bc24bc60f6ebb7f06018f5955e361c14c6c43afac8fcb8fcb1e2d4927594361de2046c27686e258436487d4ed7e529b2396d5782b50996b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539fa641364fbf55149ff89f387e82a09
SHA1bddc5a3f23343f355aa1691faa2d29829b12e04e
SHA25646c277ab4dcf308b6ec62379e94b25e2427f5d43314c3824169cff81dcda4515
SHA51224da6ff34cdfd12ea1892609d14705f39f87bfa32ffa884d9bf407de3cdd14c392c587193dc660ddfcddff54c559eff2dbde27cfc997a6da72129d377ded6134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51395137bf92d194a4ff77c8ffc5796bd
SHA1547bb2fdaa8f9609012646f7f8775429b1581755
SHA256a2e345059de6a097a7b1724003ce41eae8e50079dd0d694bea8b490936e0f935
SHA5124482259789b1b65255bcd2ae5a9cc8e292372cb856073afd940e14f6a6c5c48fed10494a390037f58081f6086badb96f295bb0bae44e7e14f8c1ffb51fe75448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f08a695c4c0aa2799fc2009f27305f7
SHA197c25a14b1a24a7d5750fa76d5adccb90e2a780e
SHA256b4eac463783569ad25f3dfc1c704442dd20235a3b0d36851748a86d5bdcf4681
SHA512c8fb089909e2dee1e070f48779c7b742c0d9661e5cbb611feded8834f9d0d69fc8205e49468d1e6b2597d103b9c6b4fbe942801b2fd9dfb20f0f2cfae336cbc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fc8741b937fc896af915442e3e83cfe
SHA19644989f50522573eb8ff893946551dd6d98ee32
SHA2560b1f85d3f686b0ab4d6efcdf3e75c5c2fde64ad73c70c8bd77d23db420f7ccc3
SHA5127b6e481af66b0224d125a6721689ed183af9c55c4733d35aaed220e074a406b694506413234f8f889ba673a73391f829ece76f54e52f8482e10dec0c2842c5dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b624e0c208e61290b752c2f3956b6ea7
SHA1ce98c032f9a7ae92e31e3d8206f4e86ff8eba3ba
SHA256d75c6d9d29b41f316a76f22913928a5fa0c20d485a6b60745be1372ba4cfbccb
SHA512cdad6f18bb1f1927c9fde444badd1745786ef45236e21d0d5e536a53148f584184b9543b9cbd9e453e8bd2ef4becc52e699e19028443ee09ff432ed9327da242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f565a8014fdc9c7afb4acec2e731195d
SHA19c80b47def4dfd91330ed911b19d6007ee151f44
SHA2565d728b4df8294118257eefe6cb2e954b05b04188f85e5371e4efbab45517bf0c
SHA512cc0f1069bb191db7025e2a0efc31cef5b18d4f97748a0b3e8e811530c4a224721e6620ed382b66b2dd13eadff8143fd393e5e67c2cf3fea2681f8d5faea592d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5deb7d0d1e380fcd550ae048551357408
SHA1f73eb7bce4feb41df93526478795314b03ab3840
SHA25604682685d4b2f107edaec84b743dd395419da0ed3538d8cd6414ebdabd997a73
SHA51296cff3fae1f15b6c9cd7b458a032af72f1a4155b115dfe5e3a26a81a78bd55285f8a02a5088b2206582e5d1ded6b459427376c34db4f7f35701238999858c1ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7a14f1795aae221ac88f4c27df43907
SHA12de709be543e2b5ceae90b4090db96535181d0fb
SHA256db778ee54efeba3c64029547874b6d84485b66168ff15f21ac6847ee385ac9b8
SHA512a9ecde041c7834dacac2e7df4d68cdf068a7e21acfd90984935dc816d741028bab8656fcce90e1bc08aa749e55512720397d44ada18cd9a291196f2e7ffb2236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fb1c14ad12abcb580d27ac818dd7b50
SHA1a4ec283ef2dc7634cbbd53487fd8bddf913b1156
SHA256a19fbb2bf905bec11089daa680815b5c98a98f935c7f0c1304d5d9847cf4d832
SHA512e523b15fca47712b3256a2de87f13fd8f3e58e84410ed470fcb389d3bd1d14275eba4a4f9ad7d636def09f398e05ca0a46e4c0f1fab580f5968b387eead1e51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536760f48dfb1f58ad76761f0e97dbf32
SHA107f67d4f414cab925c894bdf4bd85e032611c3d6
SHA2565b68568bb7d8d4d4c8a440e53cda12a64ccd5565a4a3be2557d8b84d35364320
SHA512f165714b0e6cb71be59bd3b62ec73375a6f2095b3fa329339b981215317b1f9a398b04c68e1eb762fbb679adb868f2248d41758cb6ff7bffa5383bdb52a64a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5259a9fa7ed7cf03e3f0335aa4fbb5cac
SHA16eee910bdc08341ec5b1cbdc5a0b11dae8f67adb
SHA25683436ea555dd3ba5d9cd527c6bf59c0c2ce52346e2fc091ddaa8d8e6722cfd84
SHA51296104018507b12a9ffad2a24edff7684a26a2c029b2cce6e50875a5d112d1fd2812bdc23ebdff93567689ed5a670e36861093a4a53348330796f8e5935ff450d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585c97b288cc0cb52860121057223955b
SHA1b182eb26d9f50aa726c7c859f8a0919107852775
SHA2567c41d511aaf5eb4dcf2244b7f089a8118bc05d081d04b52c94cf07b1230dac7e
SHA51202ffeff11b10e1a29d73e266658aed274d20440e93285c6ffaa569cbd8857016d47a253eff13ef147b403cc5526e757cdf81c5899e437ef2c6dd8cdb7f9a671c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5851a5ff64c6715b428e7182c75414990
SHA1b800407e0f2ede16767468a384f7b1e668806085
SHA2566f8bd1443c88142067e685123796688d3543a3c1b4345e95dd8dd470c5f5513b
SHA5123fc18049c1ca7a99fe37e63ba510a1dcda08a616f035665672f9f445054a6c92816c03020b137a8ea341c8a32e1f1a467181482724874246865f6441074782ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f87e495f6ebb713080f351c624be6fb
SHA11850554e3a8eb69aac03663b4c01a4b21da094d5
SHA256f3a3ddb154e7e9f5f80b98281c82cc3d57f7c46620bea995349512ae36c4e93e
SHA5121f59419352c3b2f8574090649eee70ec71ab7110264f17ef0f21d9b3c8f171e6f692de1a6d18f26e904c149558ec13dc158cda886e072889a1db0db7ee0a3b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e388edfcf432fa384d3f46374b5be92
SHA1c9cc20de8f14248c2f87a64f2c0809775d8979c1
SHA2563596d090687c93dc55f05a2af4e68d6d8e10d0cbf52b83ef826f9bf53fa19a34
SHA51215b31aa0008c56aab778cfdfa26ba5b8d1b2fb405d61e2d6b3405df502aa534ecb5e997c2df01de3fd6918ae942af9cf2aa28e58f8b9c4aadc6ca173a1b1257b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d7b5ea17ac970c458fd3d9e52fcaf19
SHA183677c6d018168b89f846ce1a0e864dd2ef0ecee
SHA2565b5353da47b2bda2b50ba3ea96123f1e35c7ee71248e9ab25fbe23d6545cb325
SHA512ef2b864e997d20a0d8893adf95d5b34b72ebef3a8afc2885713b234037e6358003b988f22839e9e2e6fc45fa821ad39d65d08097d7ea5cd289133ab22c882d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513e67993982592f86e1fc9ba82f3efbf
SHA1b74c23d507a40e634c1d0a6999402ad8d872befd
SHA2563e03dcecc35fe5a18e8be653914cb32b909a8decbda13156e6f38fdb5a6acadb
SHA51220e58ba9aaafdbf9d2afc807c5ac59835ce0baa8559094813fbb3148dbacbfe725c4f8376af2e7a8424041abc917cbbd04be40925fdee5c427e9e9e62e5db158
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEFTDE7Q\plusone[1].js
Filesize54KB
MD5fb86282646c76d835cd2e6c49b8625f7
SHA1d1b33142b0ce10c3e883e4799dcb0a2f9ddaa3d0
SHA256638374c6c6251af66fe3f5018eb3ff62b47df830a0137afb51e36ac3279d8109
SHA51207dff3229f08df2d213f24f62a4610f2736b3d1092599b8fc27602330aafbb5bd1cd9039ffee7f76958f4b75796bb75dd7cd483eaa278c9902e712c256a9b7b9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a