Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 04:35
Static task
static1
Behavioral task
behavioral1
Sample
2851dbe12c2664a474147028dfd8fb69_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2851dbe12c2664a474147028dfd8fb69_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2851dbe12c2664a474147028dfd8fb69_JaffaCakes118.html
-
Size
67KB
-
MD5
2851dbe12c2664a474147028dfd8fb69
-
SHA1
89e64c727d330e702f4134ad522ebce90679abab
-
SHA256
8d2d9e0b9a1bc6b5f792dcd7c88824a23b284293c6fe31a8471461f596527129
-
SHA512
c1842dcec9d2b3d8706afbec6c5fa40482afde94334a6382da238263a10e24dbc3ebc15b525f8efc93f972b53283f944fcba824284530c08d1dc6469f461c5c5
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6sD6gooTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JdJTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31E4E331-0DBE-11EF-BF51-4E559C6B32B6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000038590c7215a9edd0f7ac1b6641e529404341973d5d88d053d81f623edcc89e64000000000e8000000002000020000000a7cec587f0fc008b5fc7eae633d1b0fa6fdd6f3c426bf00b46dc189ff72ec231200000008d16472cb7b6775db92f83e1a516b8d6604fc144036fe3a1fc4e5dc8425088b740000000c224a14f973901744656cae6dd752e639bccd1824ca2232cb7befa18ce744bb2624cdc9ab135cf09131cc9ca00195574e139cef6694b834e0281305ed38a9b35 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421391468" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d38006cba1da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2388 2980 iexplore.exe 28 PID 2980 wrote to memory of 2388 2980 iexplore.exe 28 PID 2980 wrote to memory of 2388 2980 iexplore.exe 28 PID 2980 wrote to memory of 2388 2980 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2851dbe12c2664a474147028dfd8fb69_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dccfc0541c0092781aa9e214eb22b3e
SHA1156a8eced60ea6742a9ccfd45500c05f30bf80d9
SHA25613fbacf7a66f5c5affad3164ee6edc4f3cddfc24d7f04de1fd905187a2e37ee5
SHA512174ec4093aac23f866edda8987dd917f6b35a4b262fe47aa2d4ac97441f85eab8052e86ec8d58877e59586f571e8850daffd388c9cc479afb45f5ffe9271aa35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569ad82989ff03686aec7871516b48d4f
SHA1b3638274339309f0dae21ef75eea8bda33f84ec2
SHA2563fc5710f67c3a0386e326acb9120b4614520690253aa05b363ea2cf5b42b8f0e
SHA512a4236cfcee822ba298d46fdf45ca03a437d13865665e04cbfab471c7c510cfffe7d31e7e300b80e5d2fdf8854722fe1e4a5dd092990ac001f568f88421ea2ebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58132b974251f5b6add48260f66217672
SHA1ed3b99a6fd1b79119e98c95831becb4a4889d9c3
SHA256489b698d036e179718bfe28e52443da213a3f8bd1f47c71b68f5533262b81323
SHA5121356bbda81c5d470999fa08bfd1942621cfef96465735664e683f3f6d8c0fd8ef48296c1bd130aa5aadb7dfa934b7252af4c62ff83e49714764bbd927433902c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a2ef349785ce89d6a14edd014f3d946
SHA1e605abe67b0b0a800c0b610f8b9e63e756c731cb
SHA25683824ba2be9d11ad8dd1b4a8b96e14cdd5eebb4eaa43daa6f0a58b4599295300
SHA5129c85ecb2e0bbb703b09c1496c7e2972dccf4ec0aa8d3ecb40245e50701e6a6963abad11472286dacaa513dc37b7df000effbf6dceebcad2005e9ce000d7c3d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ea3e2447b3346e97ae1fa6d3b4bfa0a
SHA11f42408fd9b8f475842469def47a6bbc451c3a67
SHA2563f445012d630636a568938992290a4852bcdab54ee578a3cabbd1260ddb7e44a
SHA5127056acf14f14ba4f06bfdcb7eedf10b5779fc6bb27973c01dd1a15e97ab3720d8332ef9ec812159659cad2d76d2c76ca08ddcb31b6ca87c668caebf0d5ec3db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6b308ce519f80361d1bec80ecb3bfae
SHA1155f580cf3a3a63ffe2b49dacbc8eb604de37b12
SHA256bb67c50a55acb568fe11b59c5337cba801a25a74fb847009b5c3d5fb6f6a942b
SHA5127af117939320af6f7b4fbf51d399e14e0b7c4f3f8b85a7526882dc99610f2a19a036ae5a879468503a0f1baed374f626fffa7e89d4af7bc7ac37938d44d9f028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523f08b19b413efa040067f687c4eb125
SHA14186233fa73c1b38daa17eb4417090875c415073
SHA25692b1ef5947f837e33a51d8c998c1e390e1a704ba14b386e642583d1c152ecbe9
SHA512b2de2f548e7e70ad635db308e07482390a8ac07f2c8e32d6a45e68caf3704a5d386868722ea957daf149fe8eaa4c13997032f8d57fea79e33b094f888ef79aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5889647d513ef91dd7ebf29bac28689b2
SHA195bf1d5f9a80e13f87be4b7ef7283ddaa90db9f1
SHA256db8db1acf6d40c9be8b3e1b2445b7c86d49286be243fbedb700d5c454a9dd967
SHA512838bc026e45e4b51f71844b14b6fbfb19e0e9e172718702f7fdd1315eac152d820338eb998ce4283b4c1eb9676f55f03f62c8757c5a7464c057f12b49caafe76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5486b8ca6579358b344a22ea01334f021
SHA192347fa638d177c3b53f78898d6337d4282202e8
SHA256314e81d298f8339a3e7b29f71067b3647feabe3abd902de7f3f2bd4dee429803
SHA512f9310d11608e3e875adf5cd8d76b9957c4262f7a0b0598a898b6b6d3367b9c9bdc31af76036dc9f289c1616fe95d787d8276f9f24baea5110df1f15f3110947a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eab1e9e56d24b569a4bbd1111bdceee9
SHA1d5955d7d70a7f28975249294c686d73b7703682a
SHA256397c65ee6b389b74b5523f53413d71b7fe4a72372df74653ad30c213fa1bc9d9
SHA5123de7eb7193e8f7e963a7c4e7a877c4f6e5dd4c5376ddf8ac81f71fd2c66144ccb0e1347836fc318f8308d9b3711200354672f758658ecde08dde8b9da443c6e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd961f5fff0ec4c0dec58e003d86f3e2
SHA1e105fe83a1cbfd32d1b4e84d88ffd55bcb368797
SHA25691b61598df747d45108af742f781acc31f42da874d871a6d37799556c79b2f44
SHA51294dc7b8c814024ef3a061a37154a9158e7544870d8dd9f5e9f5f807f57dfa4c6f24c229db230b951bc4db703260a155d6e7ee19142fa3956cd60c67f0dc1178a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e87aa719be04b938989817a004e87dc9
SHA1f7b27c6dcd3cf48df6cfd149a49977ce9a4bb651
SHA2567f6368a9b55c88483d2afc851f19b4eef30baf24f0699c6921f2605a8e04fd89
SHA512ba8737b214b5f274602588ada802dc744b56bd3a156aec0ed26eae7f23b74df94768843574c6df100f3a78110f056e2f204e2ad883a9cf16657427cd19dd7a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b2f4c39084cc7dbfad64048b41f5544
SHA13b887ef75d13de1d02c7e51453b8065e3013f29b
SHA256ceb75bdb18c66f5b6597ef305299ca487ef9750d905510e947ed8d1cc3d015e6
SHA5127e4df5fea1164533d8067c569caf7468f182a29a607143ccea90801042134d59af914e4a23fdd8ab6105e08498a5fd065bc715e203936b4842501ef829d7aea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d1826c236615ebeed7715cdb2885511
SHA1f88c78f77800a95a924b85f773802de8cb4e5f71
SHA2567973e79577235bc69bb47301f363cc84ee5be408ad9fa3561e33e1e119d7fd8c
SHA5123be8edd314db1a5eebadc70d91e66efea66158303687a85af071bfdf3a21f88551ac537891dc1c1f9cfcdf8bb5b6fa719cb4a2179fd5b4dc7517c0f0848d220b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e986c709c003ab7380d202d4ba798f1
SHA1aa037ac4d2d1f9127e2d653ef99eaaf2c09e7e2a
SHA25608c745755fe67c8f19913371a2c7569bed20e0f874c3d356114476459a6316b4
SHA5120e79da6fe5ca4eee6eb3478a339b39e12fe3d138aa113667bdbdb27b14fc0bc75027f212fc10668e8f232a254d28f0546e1c2d9566ae0ba7c718a154a9653b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51beb40c59f0c507f9b2adb2a9dbc5627
SHA129c4d5d456384158d1180fabf92c3ce76e4c0510
SHA256a5dff67513b4bbbca149d6eb5414b92b42ec5116ec9d766128ac8500ee77ac50
SHA51253e7f30acb04ff497bed91940ab766899e6ff6bee1b65d7a3804b4712af84e488a4980ae9dabd31487b8f6f23c5a41834ed841cc470b202cae839422c856cc32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541c9d9143dd53a7639d5ba48ea90ccc9
SHA1740197410e419830f58c801f39671efab4ceaefe
SHA25689fed69fdd4e0269ee5eeca99dd6f6bfafcdd42e399bd1de78098f8a624aa0b2
SHA5123a6289876100fe28a075356a4fa6aa7277d73b8df0bf64494579f0002b1286f8176b2faf92c1e8418181b457a75cb79b1df0b8582326764602367fb82e113985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58233251a91651bb38ca8859a68b32491
SHA124a23647292ca4354fbef118faec26200f6c2504
SHA2564f6970f91ae510e20c3c23dd11c0bf1c5179114852f81eddeff2bb5c53b1226e
SHA512034d5f682780b7958a8268aca5c3e49ea07108e87ab6f898a92dbe344a7bce517cbe56d43e53cc469df9170e5f065e45dd9e5e890047dbdba58d260ee26241e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5398d651890a1aa06d02489e945b4d0cb
SHA17cb8b46591e04e6206c8e2981aec79cb48a9efec
SHA25692c4084a48f84a8388b672b2f69bb981c2346268bcebfebcbf9197faece01f02
SHA512c1acc5adb277687f2e2f0bde47e1346c5b5307c878edc28536c0ee46255de4c1b6c2020b7aa5b3a27e0bf622661a7a3e05aac606cb4c4dd8ec87109a54ccaf91
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a