Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
2a03cbfbf4af846111102691df8034c7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2a03cbfbf4af846111102691df8034c7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2a03cbfbf4af846111102691df8034c7_JaffaCakes118.html
-
Size
12KB
-
MD5
2a03cbfbf4af846111102691df8034c7
-
SHA1
3097593cdd04ae34e3a267b0e46d5ddcac51cb4f
-
SHA256
953f734652b6bce9f04e2a64f53a873b796460a7e5e06f1c2eb22fac6814ad29
-
SHA512
83ec5faf5f79c4d2fab0496a18f1b0c14a53e479f7f4ddc3d0ab84c1091953f6da65e15a7083c9d293dbb47e178c0c000d31959504c3616e490b0814474c4494
-
SSDEEP
384:lPIT0sV8Dp/G/u65Y/Uu2/9tG0Y40guEEZJKuM:tIT0sV8Dp/G/P5Y/Uu2bGt4VbELK5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59AEE121-0E01-11EF-8E9F-FAB46556C0ED} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000fd9eda1f24007345af77bae8526e2a29c9a586de80072efe22908be53aebd969000000000e80000000020000200000003d31f7dae8d41e670700a64673bbb0692d2cb7de1a97bc05dec5b7795ec6c53220000000311560a44623231283b98bf80585f8e02f81271f00f8c8ebb97a17d5cb269d8b40000000163c756c1fe84a100dfc4d1e69e79065d830e899d8339d8af2f9bbaa4f462a8d55c2cbc47398e5149e5d2448f28f40ae293061527f6b88dc0ac3855d29c64f00 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f1152f0ea2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421420311" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2916 2980 iexplore.exe 28 PID 2980 wrote to memory of 2916 2980 iexplore.exe 28 PID 2980 wrote to memory of 2916 2980 iexplore.exe 28 PID 2980 wrote to memory of 2916 2980 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a03cbfbf4af846111102691df8034c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58579e494fbb40c0ee2ae2d7f6c9215fe
SHA1bc5fac32071f821eb80478182b1b610d79809be5
SHA25626253e6600c3dd0f230d4b67230b27b67a1ebf4c402b428201af99ba3ce9be8e
SHA5127eb55a0f9f3349404952f1529b8fc213983f48f806c79dddbabfb69de7627cddd2546ae6c386c8b43bdc22f560c965e9e6d75afbbbd19513bcecd566dcf9afc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c92f20cae48086401febb3c066cacae0
SHA134da3016b550688ee64e52db80f49b10114efb19
SHA2562805365aa9bb24a72f2cccb9766485d2e13649ad71826b8ca68e68e1f508059f
SHA512f35a3b936ee1351e12d3ef5fa22dd6437dbc70c35ed84b81b4bcca762d8ad10bca16e46d3e7935660ae5c7b1076df0fd7b907abf13a6ab30b8ede2165fe35dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ce0c9c4049e3e6c6f5af72ea1440f94
SHA1e82fcd26d84ac2d3f5c82ec26eedc5afc78f17e0
SHA256786fe6542c0022903f968b7cb92c9bb630c48ad53b00c81fc5b838e801713c5b
SHA5121f9e50e532d31061d8c695ca55c509b36987809e1975d69a112810f8f1dee1321ddc330d2d9da91a41e11ee410af4930301951c1770c61d9758794bae9505799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5544a2a45fd6987004f6ee7f4fab3cb10
SHA1ff8981f080dba3b902563379f7b51840f8ff55a3
SHA256d3eb165d8950c570cc72edd2116d4c7e8153a7f802b62114db4436605c2986f6
SHA512ac7eced2cf3f5ad322b5ba6d1d55649ee651eb57ca2802f0819fe6fe435b3770ae0f070c4dc2cef7052ecbb60e9ed4b773ea0719052c8f3fc9a4a21febe9885b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea97cc8fb8f598aa6e11c3d6eca45756
SHA1aae7186818668131d5e79ee774365cc9e4e3568c
SHA25693562707018493bd8b8d0743d4385526a801c3b7fe127915f8591e3904635fe3
SHA5121e8f998d34eac9ee8fb75eb7ca96fcbd860811b606c6add2dda9a4121ebc1cd58281ee877dbfc295f34428973535021ad56347824ca82d8cc266054a6a7c81de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537d52b15f41a5059067c507a68eaa0dc
SHA149e252ec78cc9380e913a34b7826910673d68988
SHA2564a50a7d33344858caedd7d38561fca7097accfc8d33ede624fb24562651b110d
SHA512880c903b7faa1d651df9bbddd7141e722525ebe6643002050066faf762f70290762189d161bc616023fdb10827c4db6ad7fd8234a776314ed412c0f21f442935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559063be7f4c813cfed5da284941c7a2d
SHA1d90638f27a421fb625e5c9ac028cb2fd9386d5f3
SHA256dbd9f7fb34af638784df6131c72786e6e502976a2baadab04c8c0aa5d1138c3e
SHA512700c00f05f50d0a840fac89a105141719e4478e4e991c5e1eb64000e6c686d7b5d606bc982d8cce9d1382df3f310697fc31676344e4dfd70d2b915e2edfe70f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7f410bc9c0a203323dfda63167c3328
SHA17eb421a63f8377922d0d20ea6de947c71add975d
SHA256a27b9a7c740577f44279dbeac7399f0e5ef6d72ba07532218c22124f405e4e1c
SHA512754e9a5092342cb43f874e6d60f668912d16788a16e5f87faa6adba49f5ab00c24a7620c0d86f2f402a1a4d2f0486e191f6172157157ed4c51289117f8c56227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569db822ad8d0e56dcf9477d871708efc
SHA1fc17504fa60587550943d8c5a98a363d1e44ce9a
SHA2564ce3e4935fe34ce5e54330b7e2454c56d8aa21ac383ebeb5988d04961ad13933
SHA5123d562c34da290ecbac2dfea4ff0972c79145397504ff64336c65bf4597a6e4697daf24ab4c9a114226ab9de68efd7f8485e6cb9517baa0d53ae7aac03afc54b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4da202d957aafad8a93c181acd136c2
SHA16df6f62d8a347fdcb12bffc83ab2cf898369124a
SHA2568c01068779725cdc781460a9fb0164f05067d03bb8406841872fc397f898212f
SHA5125e703b0881808638e6309804058d8425fa8180e2ea6c09ad52d917dab06f6b3de97e653502d0810ac0beb1ee105e063e727fc9f7ad41092b36c6e363c78f71b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56237fbc41d25feb442b8f855e32b105e
SHA1c789174808be8dd903b3e89fed87c84bdbd10162
SHA2569c06cb18f326c969ed5e0910391dc33f73a6b87778d6915e0b548e2e87fc495a
SHA512627f2fc99aebf3644b16ae6e4458862f6a0531f70a2ac06b54e055016ff7769d12f5d915d8117e4f6a846a067a2553a6bffb56b8d17e09959ae817a944716498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc6b3db4e9b417cbf9d0a3bcc3f3762c
SHA1df04b2288192b540a66c320f269facd760e22e2a
SHA2565ccdcc22e39733f436606c41c95dcea65d0ddec14aa14f7a18831af7692db90d
SHA51291bcbea13f27cf0225521adcda9c08ac4bab62124ae59207232ce7b50218256343ab02d5b409d9cb2a4165327a9e7d36d4e52b9c4a74f4568514c2d4cb47250d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590c92c0fe70f5bcb0f26cc9292e2dd0f
SHA1170d2a0e8abdbb44faaf48df67c796d4718d9a29
SHA256de8d91f289b834a25b1da01af61f4c75699080fa0ac9e96ef5ad82e13614f7e7
SHA512dff79fcebb11ae635c5fb34aaef90b000e159d4a0a4bf298322f883552e1802e6028c1fa08d7be5162caab3ebbe64f784f7e18c47aa5441f630bdbd920b8ea3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501209f5912fb3bc3f2fa343a36fa5412
SHA1697f8b0d99ab038b6a08bc52e0785be1bbc3370c
SHA25622b402eefc9704a7c7ab1f02a52bce8068952b5f5b75509e0960f75230d26812
SHA512714a93dfde7cb09866c377b7256b70c2d5124ffc884c73e7bb0d13e1b9c519cc9ec830d6ea261f474d36cc28130318e55a191992310956e0a9cc7e229bf171c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52318e8788a33cb8fb89a6af06d292e98
SHA16bb44ed79840c6a064e13308887f0dd96df6daa9
SHA256d02505c6bce0d86435a88aaffe6279bdf46bed3138af3a3d3b656c12e0004bc7
SHA5122185fd95b5bf99a08bc571930df8708ed4a92659a5ac67ab5ce76760adff73f54f97a63fb3460f7f22004edeaac037914703ce9ff4cab3d8fb451498695b7616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae30d1091b782c736e22e86e6c9ac78b
SHA121015d353acf74f67a603c03e7cb3283b218b210
SHA256dbec2b54dab400520f09e6e81b6deaa37b13f3bb22feef806b0f820c4140d3f2
SHA512f10976af1a192e02926cebebbd4111c393512ac7d6c479ada93b57da06ad913569371f4eae4e0aa4b7385be4940dc124daeaf8fff4f95363a0c0e5a5b0d1b2d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9f414b07b5dd2baf55482d184994f3a
SHA15ccbe09b3e81bcb6e6d980a108e3b88a011c9566
SHA256b9ce8934062c06f7025c96e91e752a3ef1e60b01eb987161ad44cd3915f2202e
SHA512362e827b66df5d6201b2061de3fcf2e6f9a5bf1c4d453e70384d639fa07a01bc4e69aec681990b4b23a3b40156f996e2ab9c637f0175c97ee6aff5e59bb7127f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528597e9a7479f2ccb992b1d211b6d9a9
SHA16dca42d89776f82bfc8d70e5344140a41f3536b4
SHA25672331a08398cb9c8ccc850d789fee733bae775dcf61744120db060ea4b757e8c
SHA512a47848c51ce44a31a05b31e1878f4e7b77ba2bb53eeeff56422bbe8340994e279dfb515894e338532aa3d11e630f7659af43ba6306cd05e925ad2e2fbac14fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3856be2ec4c37e9167b2efd85c7e66a
SHA125db4510415eeb3174fe3466a1498913e46aaf14
SHA25619fbed13096f4f3fbced0fb50a23bccb1ddeb32b28ef0495001b94ac7394a69f
SHA51241ccba5d4d40693b38a43e9e0561b0372b4ed4fbaa0d7b6bb1eb3d16b7e9f3d41a533eb3c3f0b124669c044028c563a5aaaef024eea487f8ffc9e5fd2fcbd8b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fa70864f91677936479e5728173b30f
SHA1c7e961201b5ca72597a0cec393dddf2427461c50
SHA256716966c3da0e90d40d873a56cf407c113d4943eb26623b9b849bac51cb46c414
SHA5120fc8c702b8e2b1ae6126c9bed2cdc97d488bbb5cf8c17d9d372c2fd43b355a823f3f7bc674f2b3ed106e32b92a1ba82e05b76566f6e898fba19c69a188b263bc
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a