Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
2a0f1e20b6860016170fc51d5085b23c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2a0f1e20b6860016170fc51d5085b23c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2a0f1e20b6860016170fc51d5085b23c_JaffaCakes118.html
-
Size
459KB
-
MD5
2a0f1e20b6860016170fc51d5085b23c
-
SHA1
f7462242233b593160b616b28070d83b68436393
-
SHA256
bd5c9d06cd57f96e58605073b841a19eae03f837d765d4af10f728b747e28a0c
-
SHA512
434839b8c2500ddd43b0b29a12837e85a87258a28d5df4b4950b95c6d136a71b94ce7573e4160865846eacad572e2460fa9690f024878a3e0bc4532a66dc9acb
-
SSDEEP
6144:S0sMYod+X3oI+YVsMYod+X3oI+YzsMYod+X3oI+YLsMYod+X3oI+YQ:z5d+X3f5d+X3Z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a8e94810a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7053D641-0E03-11EF-BA8B-4EB079F7C2BA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000088855d0f6d2364291d2788d12aff5ba161d624d873957692fa1efb3f7982fe9e000000000e8000000002000020000000e8537aa8e56f501c5f9fed639501d913e73c4a7bd50ffca7a3a2542765e229b6200000005d73ec49a2badb1dee078e742d3a60480250dbe41e7cbbd9b8a233a73fbfedeb4000000053467de9d352ed733760ea87a88123d2d77c9dbb49e9d697a8285bdfdb3c57db9943df78dc77380cab6abce8e101377e461596fbabf2d54662c9b1da2cc5c009 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421421208" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2240 2236 iexplore.exe 28 PID 2236 wrote to memory of 2240 2236 iexplore.exe 28 PID 2236 wrote to memory of 2240 2236 iexplore.exe 28 PID 2236 wrote to memory of 2240 2236 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a0f1e20b6860016170fc51d5085b23c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568470e684b72a11362b4bfd544396dce
SHA1c42e410bb3b1d013e2abcb4c628f973fbabfa5eb
SHA25686b48dfcb5b5638fe37da22061ae065b9f0edc328af0ae92b76c31a46ee45b64
SHA5126209eb74e1e9fc094c6d3fc084308ac255fec4125b8a1ea23a9df924fb099290ae6812cdd92745c464c63d4e6369754816fd3215473c30e977ac0731839b8445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f62dc2056f84f3c9cd8a23519b5b1416
SHA1bcd59fd1a914626b10675792bdd4e1a3d27e5288
SHA2568ab5db7bc72568b0497553a607dd3262dae3bed57f193e5fe9485abeb0b396f7
SHA5128c73fafa1c2d601157a56e14a69102d57b66279a88e8073621d8e243b16628c0f47e8c8c9c7831c95796359190320bb2dd8dc51f3f55eacbeccd956dba6ee18b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520742225d9e4e152958c1bd120bc6cd6
SHA115ff6f5c75021a2a3356e73ecbf9177a1b233770
SHA25646d945c76cab9571630c84a8fe8efdd7b887a3a1f7ebcc407e46a626367af31b
SHA512c8cbd0ccbc00a301197376e7be245f633b621c2c6ccf9696da347a2e5627a6b3e0476c74f382f75603d4dc6d281a1cb2da2aaeab328af122e6e1f488fc3bf691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5296acfa5c4175b63cec37de6ad11ba8e
SHA1654fb9a0076eee879c9a764f2511372da77a5ddc
SHA256539e3fcae52f54971631375ce3fb549c26a0bb61aaf94006c41082dbaa9801f6
SHA512ec30628be23a9d070362fb8163303cc655146318c5a107c9300dc5d001814842f51f4e6e0df35fa6f3cbcaa69fc53ecc4e7c000344bcba825b5611e54a2655b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594ae6099e861a9cffd092d38da49abae
SHA14174d9c57b94383fcc984bfc93421608abf5d84e
SHA25663e0ba1a8dc3c8faa646d8a8d902c2ca3dbd9bd4c8ae749b61b592c341872b1e
SHA512ee85fe3f3f755822e9dc83d75ec7cc6ccfb8a7e0de0f244d338ded45dfedf68ee636ba72bbf6b2dbe1078e2686b434f48d4f575dff024fe77593fa0dcb89c471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d139e5ce37917a46cca5df4620123e6f
SHA1286564c6fd39b756bdceb4e74a4be7e8f7c747de
SHA256def956893d526f38bd74a3af2f12eda75f422d4fc1e91a565c22c01a2101bf76
SHA512ee6ad8ec6306f523820547afc13c409d913076c91d146bbb074480331e627bf2ee85beeafc859302a20562f1a360e678b8990d211677e79344e7de67495b61ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508a16a13d64d92395c02332143c648df
SHA1e9c2ece037ca0c2312d7776e492154c8a8e85246
SHA2566f5718405a39c69e7b19637983f49e8553d19db80d6028cce2f4f44c463f124b
SHA5126f4cdb9b1c6829b05b86f606fc18fccac7696c6a20d9ce40c6b5ebe456e3c728a87230c746f3360ea8a2ced3c71791ec782010a71e271807d8501b8727c7138c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bacc0863fde0fc3ed0390af2ef4dd12
SHA182b0df96fa4bf56ad2aea43dd73129526233d9f9
SHA256dcb231ceb84cafa2924aa59ab693704127b74c027f7b593b9c4e3d5fb5d1fff5
SHA512a241dc1e9580bccf6a79c989c4d860f9a071c22c7f2dd7f67f79b61aca3fefd539985c200aaac1170d42bdbc0df20829920082de7138368fb345304ef9c48a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e329940536daabc4fb83d0dfb5c08e20
SHA123c5a15cc3d79c5994c8a22b9bea6d53ab409d1c
SHA25638a26b8ab222cedbf63aca5e0698bfe67f02fcb5f4bf23fc483b8ad68836d1c2
SHA512516c5924f5dfafb1a24fe6c7f263936dfd4fc0be36c613e3dbe9da50e5cd4cfe5b95264c25dc79fc42dd21b02d67df6be323491afe34469c6dffa3283f14efca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b9d733868aa3d5d92d556261106e9be
SHA1daecebf6cbf646e01fc6625cb7711c97f04b0af8
SHA2560a8fcfd3304595a3a76910023de8542cd077d5291203f2a9afbc89201d883591
SHA5126a90c985646f3cc6ea80bc88461b06912c59703c161c967de597fbe8fe690550905e42970f57ddd7484fa9232bffd17575b0036ef525b869237e9f074b797749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fbbf6d3d77aab60c89f02f133e866d6
SHA1646632e49d7abd85ff5d6d3edf3838043c161075
SHA2567a28443307a4f8d94d9d22c22f87b6948fc429154adad315f710eee3c9896905
SHA5121334eaa07f0a8a275325ccc0f57d30b1df399deb87d11ccab5529968ad22c8478644b54d40d8926e1d0eb968c73a2e10bfc71cb3af3ccff765bc56c2c4667d19
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a