Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 22:28
Static task
static1
Behavioral task
behavioral1
Sample
2c05e492d9466efeca89d87faa0fe6fa_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2c05e492d9466efeca89d87faa0fe6fa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2c05e492d9466efeca89d87faa0fe6fa_JaffaCakes118.html
-
Size
26KB
-
MD5
2c05e492d9466efeca89d87faa0fe6fa
-
SHA1
16a4935539887d844da04d92959da65a1930a651
-
SHA256
0be5b34fbf97af849fb145e631b93b76553a992ee31e39253f36c0bbaa9eac7b
-
SHA512
fb9860e76c5051be261552d211afa2fd2894365a9a3f3db40e143589e5e4f92642f04d4d93136b7ac4a43ea8d69bdcac04fb03e6e6d11ac60afe6dfa2807622f
-
SSDEEP
192:RKcoo3Nb5n6uxDF2RGpidlLnQjLntQ/lnQie1nEnnQOkrntbgnQTbnmnQT+S1m6B:McoMBQ/aljPaf0x3
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08fb34b60a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000c17aeae1a394f9d6ab710d11d1cc7a94d4f4b80a3b1cdff34b0616f7c4ebda40000000000e8000000002000020000000bab8b6f7e77eb8423417e3791e580a65546c71ae748a21224dd002ee8b46cb1b20000000e8a09b30b5085eaa0e39cde2a4fe4e849418e4f7d3ff199518174cb3caa3255f40000000e0aefb8222b0116872108776e98dbaff259b9349a4f2f473793a596721d341829e6d6ffda460c3efdee328424299e8d7d86b1fc9494d8007484e02091d86ae08 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76FBF181-0E53-11EF-B2C4-6A55B5C6A64E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421455578" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 3000 1952 iexplore.exe 28 PID 1952 wrote to memory of 3000 1952 iexplore.exe 28 PID 1952 wrote to memory of 3000 1952 iexplore.exe 28 PID 1952 wrote to memory of 3000 1952 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c05e492d9466efeca89d87faa0fe6fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5416ea93e487ad6b2e4ec01648865b99c
SHA16ba531ac602a7cec984c8ea2571bef77d6ed4759
SHA256ba0bdbf56c6d4338bf6c4827b8da378db8bea92dda553aa00484396920dd51a1
SHA5122e4d723ad9273c58ef1e86068fa98ea0633074aa8fb70174a727602eabd37e43e699fa0b311b05f5a90171b2e0ec6bab97491422c00b87d3823975c29020e0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed5cbd482888f7b95e258fc388b26fd7
SHA1f58890759a77c009aa09c9061bc70642d452f3be
SHA256390871e073d0fbb219b15c30156702365316f9d4fefadf0aebe4398f29c7ae43
SHA512d8c1f27bb70ac8be08b90cc3114139418ebd11e1daa28c892dfbf7b2c24181ebadab767d2a708bfeb1822230d6cde54d42287de6f41c7af607bab9f194480f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527b83a756fcdda371f56b9713d480282
SHA1f3e6b053a3484418db29a4becddf0311668247b9
SHA256457452e7b56a90172541dc1ce922ee801bceee28a3d08bb2d33e4e8cf5f9b296
SHA512c5b49cf9f803e9e0e6b78eb4bf42a48dcc38d1cee24f7bb7ee516677b5dc6b37e653fde08b533a961b682b3506e9a4f90989783dbad4765ed846223c13daf1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bc9bcb0c441f0ec8f0bf9cca1f4e875
SHA1a04cb3161ff433d109cfd3576caab5f3f4f51ac7
SHA256adf56c0cfaaa9811e5494ba3cae3d988556863b1af8c001830bc0bfc585dfea4
SHA5120b08677a4c53f2826872968c3546f5ec8921c8a733ccd2abe0020851ba66d2eb8a6d1b8fd1e2613a1c7e44ec9ed251c1b7347e0e44c7b2c49898b03dcdd38fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553de8ddb0e3eaa6efcce6650cb7cc09d
SHA16530030da3a8906c57a3392e8c26bc0c8ba6d0a1
SHA25657fd1eb0618ce74b1ada813702da7a584993fca34b700b912c27352f37880e05
SHA5128b17ffa312cb444941d0d8fc7e075374e0ea07f736169bc6d7e72c0aee9226cc3730df5ae6cd6250d9c8e4116ae1abc938864043740df9a1712eed6ebf3fe6ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa29b9e4083405f76246623c5418b5a4
SHA1f0bcb677c29002d0a4139f5c14c5ab057773df0f
SHA256c194fbdf07d42a42dd2ca55f0f50a835775aa1bc1529288a0e416b7e242fa291
SHA512e733679f71d69165593f307f2c8a6562b41a1539d305f00432f09f2f4e9d39babe5bfc58110ada2da3c559705d5b2c01ae154b530680b2554053674556370b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593fbc91a52ab4b213b380fe8ed43fc7f
SHA1f0f2491e84e4e39b8932f6e2cd7429497d39ffe4
SHA2564d15bc551cb210a9e8ac20501bbd07744f748ac9a93e953992edb79962f60fb6
SHA512fd95a37e91485d2caa366cfb679a4c5acc7dbc944e605a0bdaecd7b506dfe9fae080213a1ae62c92e423aaa9a806bb80daea4f3ece595fe0a3b390ae2607caa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ced475455cd8e22a4dd57d7d9aa0480b
SHA1babc51942eb2a687dab479fac5cfad09278979ae
SHA256fb4480fd9c68ec15d8b4cc15b78a2eb8c208732560da0e16824abe1c7787dcb2
SHA512efe323525b4f0814edfb1a1aeae74a21155bf540a817d88dc61b6689b07566e411b6cf27fb97eec735f4aeab68ddec21472351393a5355ca5b9221d4546a6f69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e19c4b2ad5edb870b6cf360679df47a
SHA140b42aeb78138b6a38387449fcf074397799c653
SHA256aa2f68dc87e64520b26a43cac7946cd1b202673e937c4a4af2aca62002de7ac1
SHA512ec276f62f39e5c04bd0711f8a0882f635fc4aa7087eb881b90702564fa75d75a319591de22d0fedb35787bfcd80a91f618a2ecbb5f7ce857e1b604c951dad3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccf91f9405b9d5445c1946bf5deb8e95
SHA1c755692e2173b6cae3c76df62702cf9c529b07cb
SHA2569b8a57cd450a3579f6edfa3fce973b600402c921ae6ff96f6efd5fa792f1af2b
SHA5125f6921db5ac04d61c15fb96678ece9cd58adbb183c667cff47dadf66163624edfaf4b507d2884fefdef2ebb8393b324f8833263593d087eb734bf82a0c113c11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7f12cd5e8f42135f2070acbf2839132
SHA18ddb380df951ff7cc92806887a6b72d3206f8098
SHA256c728fee53b8867436c17af8721d1250db806b43f64bd30b0428db319fbb68e7b
SHA51272a53fa0693e1c91519506b6b2f2024c51b04a0309275a5846c73ce16a632bb9994f0fe967311c1149ec192328ac228982dc838a12618d4274fd6c1e4a6b8470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55aa2f6ff731bd9513bbf90f0bfcc572b
SHA187ac8c10f0718d2e8d4b0e260198030e140845fd
SHA2567ded7caeea1f1cb60257941bf564006d5deb64928c54791415b5217aa719dff5
SHA5126b6606ef4923a7e3f15d2bf675c8591f7759c361f62613a78c225756191131d5cf484bfca511a35057bf18c47138804adef43d9840505833d76c9e9474bb64e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5444ac0a5908b6a50f607f8d41fb144be
SHA1379cafb0e9242ea3bc3d94210fc2d0cdf612b554
SHA256be5287f8a6d4e4874d173c1977322d6c0c1a9afc5baabeffdf67f5cee1df2a99
SHA5120b4b57aac3a422c0a7e13c15a4ea55f5d5d3ab2b9d1d2adacff7efe87da39e9ffa36646cf38f8a82b259362fa04439490c00847d54e3189a88396776edfc7347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531dda4843b0a89a55fb0a53c90071232
SHA11258fa122be6458876333c81c7822f286ed4709b
SHA256bcafa79b4f4e34803f1ede71abb56033266d5a23b8da4db89630d2347c080dd1
SHA5129acc90c12200c6c0dfcf577de6e2f1ba0650047ebdc27de3557290f9cd97e6f09462ab8ff6ed96fc22fc1fa6f1325cafd2cae448f0fcf2db1bf1299386473204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5383983acf84303fd13b99d030f4ca546
SHA11eb7c6b7fdce9a818bcf36635205976c36f6f389
SHA2566dff83b5df6f2e586bf8505cc6f834df35bb0c324da4dff11484605495923037
SHA512d6d7f4cd109f4f899f8ac6ac741ae5fc17ee87bdb88d96dae8bd9608f7f71693d2143b3866c8ea907629ab9eb5127843a13127252ff60350d71eaa0c23e534aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ce6dc6c62b706ee35f0a87eb5c77837
SHA1836a0f0b5f0b8df54cfe6256b6869a2318d63e14
SHA256ffe3f36a82cfc006d31fecf3612dd6326d33309377f99f0655e848f82a26def1
SHA512385eb53f9883b864b682ab236b904416186fa6a175460f967ae50170f85a9df7c6043f5f6c0b1eb2b85a3a471224de28eae0acdd00d01c0224af6143814c1968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50324defaed8e8d61ebeb50722bbfdea4
SHA1eb15f526de00db8f7893113b9584f6555d11195e
SHA256496f4f54ba8000bae0b738cdf3d7078b9eea5222d96092b73cefb101689a34f6
SHA512ea7f82db7032854951cbc2d093841084de1c64b218dcdd5186a3be3dcfef3b3a0d077eb530382a925d038bc540066b630ab118683610b4f26acf987413835bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8e7fcc6494dd8792db94ab343c3e6e8
SHA1232cc2779e001e33cee3b4f3e92ddd7ace9057fc
SHA25657a72d5f4109735b365fc5e7f81e94365bc7d41e9c78060bd94c57d2451b97bc
SHA512b5cdb68a1042e72b839f9a32fe099f7f9f7609067bda37ee6176c721ff9789e44d8ca8aa84a14a04efa76bfe6aef3c2279fb25ce953f21e799f840d643145b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543054cf272ecf5cf194f3391f677af71
SHA1ba47e6223c981756fd0f85f2aefecb78d119211f
SHA256cc20d8a55ff88d346775fcad046027d2175ad73178fefc14f48d5a9f767daf5a
SHA512e7aee0fa5250b5bd8d15947dee85f5fdaec2759c7fcddd86f1b96d7abf264e92580ef724a2329765e1a25ef7453ca42cafe26365196033e9a9042d6192e12872
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a