Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 05:40
Static task
static1
Behavioral task
behavioral1
Sample
2888db9df870f12acc8e9121a8d23ab9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2888db9df870f12acc8e9121a8d23ab9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2888db9df870f12acc8e9121a8d23ab9_JaffaCakes118.html
-
Size
460KB
-
MD5
2888db9df870f12acc8e9121a8d23ab9
-
SHA1
6ab954d03a1a7b4b9d7acc0ce1116cc6e9672058
-
SHA256
1041a1db54435100c434ec44c675ca0b1a8ce6bdd82dd7c2c6a2cf4179542af5
-
SHA512
7d8b3d3b0417d7e9d5d8794df6562a8c6e1771ba7902c1e85230b2869d972f00053cf3e99ade4f7bd9a257c71654899680be3cf4ac34ffe76354d0e73e247368
-
SSDEEP
6144:SVsMYod+X3oI+YrsMYod+X3oI+YKsMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X3V5d+X3C5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e070a481d3a1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9129621-0DC6-11EF-9891-EEF45767FDFF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421395104" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000ab3e1a6143e4487aa4436bf4a52d947dc516dead9a0d54068f6c7ddb9c179296000000000e80000000020000200000006c10557506c1e9b1a2025fce3ec409b5b7d6543338757dba9423cf87c47493d6200000005675ad64c4fa910421dd9a2cee3cc48184500acd7460b6dcb0f9de74833b24f140000000a6d11272857acb92a6629c8f8835975e09f379c5805b2d52ddae3295c141217a23530f19b18fc913021fdf3114a8eff84ddc6c0c4b14c8989c6d2ef3c675f33d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2028 iexplore.exe 2028 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2640 2028 iexplore.exe 28 PID 2028 wrote to memory of 2640 2028 iexplore.exe 28 PID 2028 wrote to memory of 2640 2028 iexplore.exe 28 PID 2028 wrote to memory of 2640 2028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2888db9df870f12acc8e9121a8d23ab9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583118f26ccb41903840b5704ee3b553a
SHA1c11393470726c19638854ae791357b85afda0484
SHA256457f6c4df88e115b059539db1e03347d4a8f6b3124ae6871e8087b1c2db9ca1d
SHA512027d2107221389f85fba9ea56217ff7b7de99bd5e2399c5748432a940a1bfb8778d870e840df6b9224b1e89ee0ec2de908441d1ccacf96eb3dc86d5a5b43942c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5769acb0f187c91838e2ef7126c576a42
SHA14956b53ab13092878fbb193c17ed35384b66d105
SHA2562162aa64086fb2f283ee1f722b57bfa3052e7d1e23fa904ced51e3d5e9a40963
SHA51250a6e1e72096874964bd4df84af478d72740fc39dc2cdcbf3a76c80c101e292f48d0b2330e4aaed04efbd535778327839060505f531f8113ed0a5c0aef6021f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f079bfe03374a84b38d049f1e251febc
SHA195bcc1f3e74e94558ad075987ee0b1ef43573476
SHA2566ac662179926397f8190649b54a10ba02ca8006d83bda8fe1dc67c4da7fcc125
SHA5128706da0e07b1fdaa02702d8feef6d862189395c3aaa02b5944e45f4d13b5ab6814c5e8d85ec3ac018396d6fae99c7456de313faf0dc6fbfa578a630a5c014dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d245c614885ea96dd577b962ed29b428
SHA16c63158c4f5f28cc6e2027c3de9fed7411c56d20
SHA2566db7a5dfb59d9cca49bd91066d3027f1ebe02e02af4aa08112d57f6581790964
SHA5123de0fa18dc35737f0827db5da7828dc8e101b4a10d9320593fef78926b002118e72546f49e1f2f1549c694cd5f3e88dfc8d69620d01f89a716c18154599d33a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589d642e0aa57a140548cd71749d24a85
SHA1c42118f5d7611d989e68f6ab45cc7dab84cf7dab
SHA25675f250148124e215da5925d4f21b482504d8256f0cd8c9738fe3eb1de09903d2
SHA512b6dc628daea5241ac8b6dea44004af3e2798600b36724983e073371c8a6f85dd38a8c7b902f0e45bfe6729467c54907ca2fb2de89507bc8a65dadaa4bdd7f2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c00e147dc5cac760229e1acb0452d42
SHA1ce1f774bdcd4e74ed2b98fa5e4e2400350f7de74
SHA256737c1742bfa8bc22680af583afe24789cb229527a23820fbe6f4d62bf6fa4004
SHA512d689f2bc06871dba733c5d8527506e061bc2aea2798b1a7c5cd1615b311a93004204480587806a7144ffd2a31f8f920886c0411caa94d3b791ab359d798aec4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56348dad7ed561cc964f19329c20c52c0
SHA1de26904e41fa9eec39137b3ed599db5de8b4be38
SHA256cb3a217b328629f9830e438aa3a303a6a811841b2ee0a35261e2bd6a422626c5
SHA512064dd9f1fc8ba6695712244da14fec66c3d361d4630759bcc4a1e35712d7c2a253b66f2b86eaa0891123995ec9fe468b1cffe49f4bc85ac4856f3cdf46638096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558b4991beda58b09160c2ded5cc51ee4
SHA139e9f74a69d4ec36ef21eb27af9eba706177920b
SHA2568a6cb2f532e717f80be37be7a1120e32e80a7f50e59efbc605d3dfeec7468488
SHA512b0d062717081bdc1e11830f625d152d12e3304181e0f6ca46e5f62243d9c8bfd81f59d9eac23af1103fb3d2e50700087b33489b0d6a1505af75667254958f1dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9648e0f10175239bdf731e9fc2e0d7e
SHA1eac222ade038dfe3a61e5385a3bad5e0a6e8e57d
SHA2560e00628788c03717c6b0d62ff42a03819468acd83572314793f5303632f85fe3
SHA512417d59e1234be76bebb4b4e4d39f3b12add4619402a0fd7b73a8b9fd262b601ab176780f969c3f4a6a17e54563e1bb5d8b4a1ac9e9ff2b5c39fcf4120530b0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57781f15cc14ea34192988fbe4d0c84a0
SHA19a3c1462f8011e916a018bf84115436154f4311c
SHA2564cdb35ac00df063dcb1f340805c704b953168728edaf6f2c8961bc1a4c730954
SHA51239ab0f89657f6decda14ddfb69bc4504aa4974d71576b0a728b36d35a28913ea07de99ce52f046d2f5362a6494dd5aac238edef8895ce0aa12c128e00d81f103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a67fbd951bb55a41e659155228b1b60
SHA142d2de15b29a64713eaeab4f2a29ba47793d651d
SHA256cf0a87aeebe685095e87e2a705727db52d435cd29143b3839b53bf0086c97d15
SHA512d2b4c4f2ec45fc8c239d3b2672cc0281aa75b3cc21f1e1438d02a9bf1aba4f9c616d0d9f16582d6e329b02fa7bd37f1d886b66b1705d487ae2942da2490f38ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c6c8b8a76ace8b5cea8948cb53e35cf
SHA18f219045c44ff067d170f55d396dcc27c008a31b
SHA256b4fc5def2ec3a27f31c9f9d3b0ef0c4ab15ea17d70940ce573f22b36685946d2
SHA5125dbf798a8eecea5b7928fa8c3782654cb491c6a191f9afe5c2c7ca920cb4cbe52f8ec7bc0e7159d9598bac2c217902deaffc69159dd680479ad511b48f0a356c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b859dd797548453d65fb549197e0fc
SHA1856d00c349dc5aa40cfce960839bd238356c2d78
SHA2560812ddbdf93a323a1c1a42ac78c67c32e932ac228a08a62a01db47ce73d4d086
SHA51275da8746f59fa838353835b3f399f1238c46d5d6c3a19b703fa7cb7987a229d6de7377a8e743623417ae44f00c24b142b542c517476d5c80807614c0ffa0e0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56812d66c334a43f50276b7b36c50635f
SHA1fa3b0f454baf4a0221a0510efba5fbb855603264
SHA256499d7d36b6ec4507c7119d4e9797d56debbea1a475fe7a3561a21f2c725053a0
SHA5127377d0899b7822b0056698d11cf76914ec5f49c33c92ae8ff1b4a196715625e84900cfde764284e0e8300a0a7ebbfc6ef3727fdb68cc85e427c5da689aa52a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e0eb96e5fe5385ad1b307f14cdd44fc
SHA1fe521e04d3aadc7b0615b59d4f87789d1df325cb
SHA2566aac249734800f90701ff27b79dc0b5c0bc452d388dfed6c8a5f587f9d22fff8
SHA5128a331cabd4230eb21d81a84d18288ba41d58a0b28e28b4d8d6ae3e33b5b547824dd6fbce331bb14f93cdbe6adca02c534396ee8fdc3cba70acaea91fd12a75d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5505ee72231ce079f54606e7395ee04de
SHA1941d0b82221e95086f288726b0a9403747cfb867
SHA25639c3224a6b020a3e4d49c50aa2ffdcfe25161888ab14a397e446ce983fb9c4c5
SHA5120a96977f108a1f93891d5b0aac4f8ecc45b7eb9bf8da9ee01672e4dddc44d3ba83de2d0609fc9571105f564023b211402b54157e215b944c71963af6f9886151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd9106e379b0d6938d6b9eb5da972710
SHA1f4f395407d9b8ec1aa7c5d2f091e39c6dcb17041
SHA256852f3fb63e52c8108278fdea08e7b69858d303a68ebb9b4f00eb2cae95e0d682
SHA51214374b5376aa0bc27c66809c8044cb54f5a15210e79e63d472f1faf892cd33671ad35c21aa9c9e8daada5b0993fd64c55a4c2f033ffc77c2ae582408212ffd05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce88d6ad6145e04e85dfbd471db3f3fd
SHA1b925846616975567233551ee20af91e9de8def38
SHA256cf7867b14a2074aa0bfb803e83f7e2b9ab246ae77838fb760f79a0e341867659
SHA51205a1f632b0f7c8caa9bff27faf8dd455bcae15575b8d60c95bffe5ea4bde4dda582392d89cbe6cdfa5f6fc7fb52b35589d1c8164ed18c21656dc3973b4e3a65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f29ff6e2600b6bc133eb0c8cf00969df
SHA178ceb68e05579203ad38271048548fdba2a66ad6
SHA25697b74b982decaceea223d9f5a98342cd4c1ba3bfb1548dd24f247d694ee408b0
SHA5125f7bf86757b86001f564f3b88601e89c135e55803a1b672cf165c5a8ec1337e681202f472415e69e721f011a1efa86aca1220bbc98a912abd0eab4a56240dfd2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a