Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 03:39
Static task
static1
Behavioral task
behavioral1
Sample
2821fa0c2d16e3126ae277c7c3d50cdc_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2821fa0c2d16e3126ae277c7c3d50cdc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2821fa0c2d16e3126ae277c7c3d50cdc_JaffaCakes118.html
-
Size
69KB
-
MD5
2821fa0c2d16e3126ae277c7c3d50cdc
-
SHA1
19d6542e26a66f1c991af03186815271583c4eb6
-
SHA256
e1a16b568eaa0e0afc0e7122b9988efb2ea4c3fa0d54b7db48f4f132ec579553
-
SHA512
91865b9d6a028c5420ebcbb061e7bd42b48b125ae257d0a00ba19038eae32be6dd790f6b4eae4e9a37189fe627bde1f5cb3545a2613c826afe64d81a35cd54a2
-
SSDEEP
768:JiXgcMWR3sI2PDDnd0g6sAaStoCC+oTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQS:JRuoPvTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000005b0809d1524236d6d6d6837ed703dd21883fb73ba72551135f5809845f5af547000000000e800000000200002000000044f0def9334ff87463768b2913886d10ea145a7882a7e87aa0c7c6e4c5d905252000000022da7d67e32c5dd6b3bc82f41c165db91229a6f1bfc7c518ae0daba68bd3ff9e400000009a5083becb67f762709bde844bf638ffc1593960914865cbb11f5cf404187e8ef686e5a35a6c1f603bd8800a694de5a390518583ea31af2affbfe92d0826c37d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421387857" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b062bd9ec2a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA22F141-0DB5-11EF-965F-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1704 2176 iexplore.exe 28 PID 2176 wrote to memory of 1704 2176 iexplore.exe 28 PID 2176 wrote to memory of 1704 2176 iexplore.exe 28 PID 2176 wrote to memory of 1704 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2821fa0c2d16e3126ae277c7c3d50cdc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5627c001e70e5d0915a0733cf3da2bbb9
SHA17e09726a96785f8cac253aaf2aa9baf5460f107b
SHA256cd269b0eab759e6ced50adbe2b4351607e96b422249006b38e182e776754fe64
SHA512cc85a1f0b8177879c63e70983841dfb219a49811eec456924f18876c05ef9d9dceba28044e4b27f62d9c68b944a1bea34700d4b9b83f90391526985833134f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bfdfdb07b3c64c55885531e74a00c67
SHA114d6a6bcacd3a5778d01ef54004ae17cfe5497a8
SHA256e5e69efeea055e4802125cc44ae540b0054a80449640c39efa1a122c7a14af76
SHA512ec3372c4c84fd0b7108d8046675a764284058f97d3f5added14b44e344da6abe1dc03b8477514fb72633bfb0fa626d2f50d66bf622842c431c294acb373aa366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b625ccbc5413e9715be8b269c96cf820
SHA1180c2cee3638d8fcb2dcbc2dc4977af495f57ec0
SHA2562ef2a259964c17be84410b18e6892a55d2294b4e9610a45e7243dae033b3f8d1
SHA512fa051784bd182ba3d31eb8c17817fa6df997ee064c2138417ae68a3a4df594385c8f2decee0551cf4c7dd63f8cb295627f25d6cadea30a675e38d5e8d56bf140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fcfd3da46b805fec8373d53e992774e
SHA13ceb259c9a40c7fa160c8c303fe41590da3d4d5d
SHA256fc2dc91e8abc35afabfa82a3256c1708d614ffe15bcb0ee085082f80aa5af2a6
SHA5120a178c9ca751c6584b2574fd3d248560ee3dfe03c16215a25dcfb7a8b6f0f98bb0a9f6523649657fdd91c0c509818e66a791a84e9a2badb9d6d77bd27f945a84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50debf55db7675751d7c9206a9d6a82c7
SHA14055872f9e7745c97f8540a03e23e67ca91ba5aa
SHA25682dbb5792d899183f6c19807eda1bd54096f1c8c673918fe7a45016ba1883e09
SHA512f9e75d9ec79b76ece27e78336ee21c9a21f1253487dc88254490b5a6dad6b86b11f8102c8d4d077b3ee8a831bc1279d7e966528d05a3e6584d9ea597a9136dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b403313655a23b4ddd5485b9c213333
SHA1f428113c3b50cdf19a83a1d43fcd963566a5541c
SHA2565a8550bdf389d83caabbc209a5fef7c576de6798e7d1246d89bc635e103fb461
SHA5120ca8740f50f539c691f9efbf67433c7de41392850793e590220f3576cefc187907cfcc9a0b379d2c876cceb3c520af905abaf29383825f36aea7003deaabe0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a27c9812f20e7eab39941cdab7f2d390
SHA136b40ad99a3442c68d0824f1c2baa2aed33d2da8
SHA25637d501d4d2649e30b247277835ece2dbb30a7d938b6c459bd9869baffb9991b7
SHA51261be9b79c09c172b0e3827cd65ac63851d90bfc06327fe80ccd3200d6e55201453e39eb66bd3354c8dc890d34d1b35249058492aa9f9600f4fa8b38233ae52a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5699e032e1754c3825c48b8e1b69a6288
SHA1e4b96c6836f692f140a2f494c56979182eafffa8
SHA256f7bbf7dd3d8aeaf962e98bfb7b5998e7b64337ac601e36ef8c099f84f62041f0
SHA512accd4f9c31607d504d0a77067163f05b82a9feb54af728b9a0c0a97c243d81999cb046f704b5cdafb3a712f054dfade8c3a27b3206347e63270a6084870b6ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1afad46246618e3f8c058cfbec2fdff
SHA1be86ab5591bfdfd3f889a4c662ad0d8b54c998b3
SHA2560381cbc204ba76b17ea52ce3c0e95680db86af985c6aa3a75472ce1d156d946b
SHA512ec16df1b99739184f59bda159d65ced307f59927bcbcdc79029fd88215fca1007a0475a1878452d4a6305a430a7015ca22a98b4eabac7544525d76c607d76a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b792715412aa104ad4b84443872687f
SHA15003a16dab59d95ef0e0dc18f2447a0b92de8163
SHA2562f657c9b9e893af1facdf51b1b87bfacbffd88c383ac5c0d7c4d7b62bd17070a
SHA512b91af5630c17c6d195a486c9f4f13e881f92d9c8597aa8c8fdd6037603fa7d2a3da5f68888440b5076066088a0585e315300dbf1e464b851d44bdf4085db2008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5040861b9044ced6ff3e16041765e2399
SHA13d2c5093d6a5a49bf05e4d9302a4b0ab2c9d6c3b
SHA256b6320a342005e0cdfcd67bfc9b8ccd0b540ded83386133482aed0ca9a2fad8bd
SHA51258078dea1d242de1176c11ae909a1539afc75ecf83a3f09e5c0daf2c5fe977ba6a29c8a2e8e3001bedc8d43808927eeaa9a0579cc510ffe15edff76561c97790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550a2236803bf2f6d0b5bd67b82331bd9
SHA1f15990760c40e71ae7ad0fa9f32ba887499c1cd8
SHA256a9d1dcfcc337890b3e6c3aae04392c924c7a52553570f8e7e9fc690c993b6eed
SHA51286669b1c772eb209d0448722c8389cfd8204a98a654d11d93865b2b4bfb1389482805b47511b7db6158170ff42f99d707b104037b595e2c94e8ae13930bb0d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a646a9d9d13f347b634dcb1212c6a352
SHA1e9a23e27cc91cb9dd9ea6cbe4adae745df0f4fe8
SHA256cc0dc595c0b8cfdba9ad7d46117b1ced3665e012b052efeea658031542f8c4f4
SHA512e4e7aa68a2cc6ddb691bca11e7d9af5febf7c2c7568b88c72094f4acaf9cef3a662c33b841c187facd20791aabfc41f666c871b363cc46a5dc74983549d4b134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a031676265a25e644f6bf10166435f0
SHA1cb87928d4654b67d4cb10152acabd57905d61faf
SHA2563d5950182d2bd480a9f2ebf4c4d1e0a41a89981b4276a61ed222f04e4df3167d
SHA512ead474b6444f8d6c34ed14fcf289b2bb940ea995477e7c7a54321d70429ce4c50a74c811adf3e938174cdf9081b036497a6e014b5c7d9dcc4b856f152a87285c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a514d5713700d5452c4cbf912d8a53e
SHA1676252cf67802c05ba02b77f3812bd6df22e3e47
SHA2563a7a2ca6a7d2b3ae231299c57be527fa6d25978138f55c248bbb5a2390c80e6d
SHA512fa4be0623a0647cb2bd48c6469fd578d27a3af51f6e3cabcc14468b966eb0fa207472f50c9991619843ab0ee1b7d3bcdbe81c99a8049835a70bf8e1130f1062d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566cb614cfedeb175f22fb30c4379e392
SHA156433ff80afe5bfb225c3db8b9bb18ce4857fede
SHA256bc5910155a8c22ac1bcac4c32b5c72b6ffc9af64eedcf50b0d214a249f0ec470
SHA512ad49a7b5b160b538d8a039efb7ea5cad237a113091e466922ceb82c12bdfc34c1937c5a4dd797de280ad50a168712a4d8586e1b38fffd086a73f3fc82f395598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e5870faeac9a4031518dd1743e2b656
SHA141f9b0ac724083a4e450c14c53946864055918b5
SHA256817e117afb7289fd6803b8f52b288898131c2f63092e1951f82e9c08b5f129a4
SHA5127b99993c84d772ab3086b48502469ae4018b30570b56e26e77539e8cd34fdb7e9bca2bac0ec734c779ba618b50af7efb0b7f18c0e36dbffed28502aaaf84d0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be376e09553af41d4c3d51102ad6d2d5
SHA19c9c88d38516efaafa0d86ffbab5197d1f8f1259
SHA256eabad0738d611c86a9b9f9d4c6f7ce96ed794066d304cf136231bf275c1fc3e8
SHA512fcb90443850a0f1132b59386f91d2b61ea7978c808c00f44c24d97cb1e31ec9617f4513302854264a94d180ec02164871d5fde856b9947b8f33da9a33b2f02ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50044755fc7eea45f2b38d3de5d8b4d72
SHA1b2532e2c7e94f8b42e25dea1a649966aae0517a9
SHA2565f8f69ac848d68cd279e11ea2679894208c2cf33c550fa54cb291e4fd94fb73e
SHA51289aa9eb5876a3dceefff35a1991dc38973c912253bad4d0a637140a031a4b7c5e079d33c45cee4160383f8aeb647664d13adc93ac6f5c278c694ef8324d723a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566fd82d905fea866ca3afd484a8eb5ee
SHA193a739ef2521300a5f27a6fe67afab66adacf9cf
SHA256d6cf6cbeed26ccda3716226bb624bac8804f3358f386442bb7458228b2ecd3f6
SHA512ba559966f4ff581153d756a8f9e6c44c4fc30a58b40f14e72aa635d4990d9fa7fbd227629806420bcfdce90582f55acce6b9a74cc89997e5ad3de328c6f0072e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a