Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
2c206d8e74630a54254b0f407564115b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2c206d8e74630a54254b0f407564115b_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
2c206d8e74630a54254b0f407564115b_JaffaCakes118.html
-
Size
43KB
-
MD5
2c206d8e74630a54254b0f407564115b
-
SHA1
9d0b910d090de3743d7dc2352d45ae3e72029d00
-
SHA256
42be7bea23f79d87caad24d97a0cde6e802645a9a136cfc948977453bd9c7fce
-
SHA512
59726efa45576e49c793179f8d966ebf0adc4c144c026a1ec1f9f259b92baf3cf7059290204864e974145ec814631ad509ba63c37ea333105b7bb5c86ba8fd86
-
SSDEEP
768:8q3F0/TzsS86VjjMNKOYZYcGIff+9BAm9+KypP4goj+sq+Gn1rE4SAplgMPr48Xm:8q3q/TzsS86VjIbc3ff+9B7+BgvasqBu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3E2A1C1-0E57-11EF-A304-E60682B688C9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421457426" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2744 2148 iexplore.exe 28 PID 2148 wrote to memory of 2744 2148 iexplore.exe 28 PID 2148 wrote to memory of 2744 2148 iexplore.exe 28 PID 2148 wrote to memory of 2744 2148 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c206d8e74630a54254b0f407564115b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a86dbf6a875bd1a63af2b7780c123295
SHA1c7e5218957ea78851fc0e88b386953af01ff2731
SHA2562ba019d3de13e97c6f4dc73aa37602cbc1267ec211df98a8a789fd0e502a0162
SHA512c4d8a8c5c86d106834e83f190ee5c145bfa9e121b770aaa0a2fd259bdb46ba241ef72de10917fee3282b4d3981fad61e40304141258ee80fd0116e68e76c57e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f4c323bcaebbe30e11c005a13b204e9
SHA1f9f6ecb53e960518c1ed70d558d03cf7c95f2604
SHA25611788dce9b27a7ae1f42814056a68c2e95d7a0e8f2f80d5c942b3477fad7b502
SHA512f7add05c2faf70e03235ee8c6cb53040b55092b67997481f66f0d3d8423a5039f05cef10ef9bb868ed507036a8c3bd765fb1e18e70d85a0de7e25cdc0c424deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5314ddc8dee84997d9ffcc2202d665002
SHA1c5c25c509a5786cc9ac854b3aca147c3a3c4dd2c
SHA25622c6c07f71e82e2f364126af031f9f41292dc705ebd140b5544cc32bbd9de4e7
SHA5129817e0b10cb9beae389ae4ba408c07fd5f636584bdcf6a08e7536ee6a5a1bf6e7e1a9b38b9cc2a919a2b0d9463fc5c4723258b9c3164594852f233a353b88ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1e626b2f86f4d9bd6cc616b2dd19e01
SHA1960e9c1067af03c8e93764ae58640d2a4c522e49
SHA256a7cb228c008dd8af61cd3606619306391b0e5bb36ffbfa1ea164f67711cf5479
SHA5121b1372a362437904209631f6e0374376f309bf715f26c8cbed9ec82cd6642b9b040c75095df9594a0b85afdd35fbb7538884b05a7693e1785855094adaf26a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b688615ddfe3a0b0f2322468772d137d
SHA1cafd501170319cbbaffe0e3be3dbb3dd283899dd
SHA256192f3dc24f87a122288185aa80ff882c80a15c242ab39c5636bcaa3db153f011
SHA512784fde3a2263caf5cfe4174f21904b4a4c084d7fbd9d41d376a1892194327e0479126364d99435c1dd62b3faec09bf2ab255a83ac778ecda6667fe176453e30d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b0949bbc01747e2c60b805f21085b5e
SHA1bd56dfdb8a818ffc44d208aa939d4e4d46c6cf18
SHA25693a3dde6b14d1d71add74052ddeb711469c975c1c0bee6f6301adc1a5804e16e
SHA5127ecd163a8a32a405ea8f739682a3a303285b2bb97d6f2dee703b91efadb8281ca0adbbc66420fc1fd6913aa07f58266fd90d8a471e7acbdb1569321776dec2d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554a83334cb07338af42a118f0092f1ae
SHA1ffb15344c688b5adfc1d02f9bbcea66342cc9d26
SHA2560f6dceae430b5c5aba843af7132d67d3647f4d29c0319c32f62a7c90ed7008ca
SHA51282b0dd280e106a5d1f725c9017a744324b7c9953b75248cdc5dbb59e9f896909dd680b05f28ba3e85b56d6422776a08c2cc0d804c924484ea7840916599b6232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6ec0de1afbe4bcda14cb4f87ca2072a
SHA1a832a225419efe3d900204c1c94733244cd7cd64
SHA2568af7e5009b002160ea72454deae827a3fd33293e81397459857697fc65cb85a3
SHA5122d606f917227fecbb42c1f7f391af00aa3c6284f335b74cdf523bb38da5886bd9a39421d7769ea57077feecf286ba3fa42336613a1f2c7c793956551361c3c29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a966c5860ce0e1ae1f05b722f0f9d15b
SHA11874b0e21a30cfbbc96575a9102a258b43b300ae
SHA2565dff53aa1cf82a1a9bf99436af7aa4a6780c0af20bd173db37a0ac4e2fb139de
SHA51261d16919148fd70b3fe72b1c34ac9d6709ea24f49c9e4ecb8ffdd7ca9fd2162ea9755101d5d5c5762fe5487c347bc418b2083e76c8b99c9d25383d672f445cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53758c0b1eb6cd84ad46888acf61fab36
SHA186e7f9bb0d6ca4973b55e3fb2d66c8a7036cded8
SHA2563e2a4192fe1db12732017270aef45b378bf079912943e8c9d82f1dccf1031b6b
SHA51298638ec7b1aac77cf79f54e560ce05045927df801e57c69449c91af07ef13f3835d0c50053dad78e7e1ff8b4eea4049ba10ed8f6103b9e9432af0bcee4314795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d4771764b5adae11eacc963caf0032e
SHA18fff147b156058f2d557b9838ba4e036822a4c25
SHA256890b62907c29efb12991352dddecfa47bdcda2cdf22143c5add44d863566858b
SHA5128c978598d9586f62e9a995e2559e2e9a75a343bd4d57b05147728bc5aabbab4224e19ba3863c430827a761c2c43bf23d6e3eb8632ae396c90b4abd5c60de46e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD558a76c873f08da4b6c0256828bc64374
SHA1e3a0e3fccad550b5092d4b99f282d6e4393d1aa6
SHA256b9fbebfa587edced84a0579984dd51d9d27876ce354f594f734b10b84f759e5e
SHA512a18619e25d5dce4fe8903c558b02e82eb019b377a67ad1015cd1941e0ac4ef9f6483a31c6eb79292370fe9fc509346c7c546878940276078bbe984231fca82e5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B1014REI\analytics[1].js
Filesize51KB
MD5575b5480531da4d14e7453e2016fe0bc
SHA1e5c5f3134fe29e60b591c87ea85951f0aea36ee1
SHA256de36e50194320a7d3ef1ace9bd34a875a8bd458b253c061979dd628e9bf49afd
SHA512174e48f4fb2a7e7a0be1e16564f9ed2d0bbcc8b4af18cb89ad49cf42b1c3894c8f8e29ce673bc5d9bc8552f88d1d47294ee0e216402566a3f446f04aca24857a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a