Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 13:15
Static task
static1
Behavioral task
behavioral1
Sample
2a21e840e134d952ff7cfdcd15d388c0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a21e840e134d952ff7cfdcd15d388c0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2a21e840e134d952ff7cfdcd15d388c0_JaffaCakes118.html
-
Size
461KB
-
MD5
2a21e840e134d952ff7cfdcd15d388c0
-
SHA1
8e4572f3fc7df65a635139f3740d1d90e9485be8
-
SHA256
2e9e6447d7a641bf0ad5de70331dfa2759df7d5024780a97f0ba7bc8becb0cbd
-
SHA512
1ca38bde8dcb8eb7e9356ba3d9429d34f3e0bf683a8404a31ba5ffef13c418d8c2c22de52567f291b7f78fa5dbe79b9605d0f92db3eedb91de38b7c21786a77c
-
SSDEEP
6144:SnsMYod+X3oI+Y9UsMYod+X3oI+YOsMYod+X3oI+YLsMYod+X3oI+YQ:E5d+X365d+X3S5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000024059d1abc12733f37bb4de544375d8dbf43bcd8fe3d8bc5acf1fe66bf6bf08f000000000e80000000020000200000004c2e814e064b0653839a3dce8514da2bdfad1b31e384d52c131762d90d1a37a02000000019899ce0fb875fe49601f672242fd6e870dc3e6c8b3a71253018546e5849c86c4000000060a4cce9a269ee35637210ac64485ef58e044d3639f128ae8e198d730430833598974b85dfdd4faa932395a48231294d7a21d0939a57e701c24e812439662325 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f00e7b1713a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D0C7551-0E06-11EF-B35F-5267BFD3BAD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421422411" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2084 2148 iexplore.exe 28 PID 2148 wrote to memory of 2084 2148 iexplore.exe 28 PID 2148 wrote to memory of 2084 2148 iexplore.exe 28 PID 2148 wrote to memory of 2084 2148 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a21e840e134d952ff7cfdcd15d388c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddd9785f513cb2758914cb0b97ca2967
SHA11404a8d1effaad06db07d9f962de546a37ee8f24
SHA256da65ea6a8c13ed00d2e0e42828a7e0910fd84f3491302e96a055a867e12184a7
SHA5126db744457ce18f65febf7535ab4b293c66408a977d48e9e958837451180f6d54a14901d4baa28104733b1f18e5c4d08afecb120ab946e46ddad9aac96b60699a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a14798c2fee05148b5babcc90a3144ae
SHA1e1a13e1ea08463e5cb1a04efbf54ef4af81bb309
SHA25661970fecb32ea237a1ab12bf151c9a2cec82ec1ec9516f54b6b4b99803ed3480
SHA51282c3e76ebafd9015db4a12bf9debd45e5b0c222ca5d189fab59eb32363cdf1a0a905872d3985f5823d0bc1333130de998dc4712c7b49454a3d5b5fa72e7e15c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5662b3b353991ef6ba41307173de631f2
SHA1fccd607456842821b86aeaed12ec8b8d9419bbfa
SHA25635f68985a2aa7f3c9653fe606fb8fa97ee80e909a796b4d7e0f7b1d182ac6607
SHA5121f421d2d61b9eca7140eda75f1171503e7ce54d557487d95342ba93277fc4af86b45364e0216391e6e16f507d7d4b88eda14edeaa415fb9fecb8897089a75b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d1a5e0413d756fbe955ff4859eebb3d
SHA12650bc2dcc35e0368d82a23f740de137a6892d24
SHA2567dc1cfdc59904931cb1758ba4be955f08bd627a9e77adbc90a216348e57e85f2
SHA5123270171c2a442e892089fb9a50fb8979cfc33f97e0c4a5f83d058678e9fb9188805490a8b36804949cc7e856fe9233bdb283506aacf626abc02773cacaf0d0b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57761fc0cf4a300a5ba18b1264466139e
SHA17cbea847b55c56775ba42a608c2eea1970659397
SHA256205991444598758a6ed1041e69700b458175667aa8d3db8759b59e7dd484be37
SHA5127d680bbdbccb0a1b52ee56c670dce7d850d0ee367f1c8868c9da612d73be429b3136a183e91473ad2c19f60a33104bf0920eca179f7c577d4d398ad82ad334f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcd62fc56f1cf269444bb66e581c02f2
SHA10b272df35b9cd1248f7c6f810faf0a31379c74be
SHA25653fc0654e82330bec5a57ee32da0f2ac143551ef64e884cf00406b5ffd5a9146
SHA512065eea47f5bc1d7402e158632cf187c2e63614da7846d8acd233e7933227fc8e95e8d57508a913efd3b1b23d23a867eb926dbbcb9a7ed53d72134d314ddc8ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fd732fb15147f2e0f695cd06ea69c0a
SHA1ce871fae258a28fa338346d4721acff9a71f3225
SHA256b29453bca3448c7a2073ceb2ab18624d220b79e79484a8d73b397ceabd0b6f2b
SHA512b56d0983a44effacdb1d182c05cc4943bd27b82b7dc11bd4939c4663675665d54dbacbd68bdf1108559880c880371bca4bfe1742f198e5064da1109a7235c46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5489572fff43d41adbcdcdc0332b4b65b
SHA10ebd0108f54945df7daf00cede443ba09f0ad542
SHA256bc4a7390d7a601796285e95c65c0859ee2129fb347186a82fdfaaa2515e1e749
SHA5123580c9fde45d46574dd8d113022e063469745f3e6cd1454287f3966471f38b7e235b5d643fd7246ebb89437147628249fe88873b9c9dcdbfa935320827f59e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ae4535ae293b33ed42af8d690ca2fd9
SHA136bdcad2bd23f875d657dcdd1ad2a2bfda3006de
SHA256396f401d645a4cfc56b7cd5f197b43327e4b69c7f668df06c20dc856d217793b
SHA512d8f85fd092f5d7135c9d778a64923346814e447088fa7457d7e600b621a279d7b0da0ea40ef3a9ca6d6ab7ed13a5d8e7530285af380e556a31f666551761a16e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad4d0e363b44392898c938b3481936b1
SHA157815534789325b966a29579d6b172035cf3dd48
SHA256f9f1c238aa2ef70c42100e45827cb6d6778a163559663bfd83c327ddea38768c
SHA512e1853f507149d05795309550f4138ea251772dc982eb29d153820eee1bf2f477521ba9abdc0449d58dcf13ee74235eaef7db2849edf7b0801cfc35480d1be483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5470613d480e952f06f02fe2def47f6df
SHA1e995e9ea422b28c1129cc78fd7a247d1aba79320
SHA2564151190a6effe3d3fcff3864ee3a3ddf8b8f3c53395d48f5226725ddecc61453
SHA5129fe6e690f24bccb710cfc8f51ab448879cddf457c167d1ec4dbb1d03b3d243b5ca9272982616c496839b9cf00ea4032c25c72f5d39b3e852e328169eaa370f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ec46d866e157e2ba91a55fd183538a7
SHA13f2d1b4848d676f3360d85a354f888e24d58a986
SHA2563765b8b6a6f2073da0b5828c5a57e9f405b537b42f9fbb71872041a0e42ffd70
SHA5124ce6ef598d2d6d1915917126083460d87c8d10eaef29da71725134d24ae45000849039643f2515c5c5741a9733d75b338bb1cb5fad05b4f7ee67b3827ddffc6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57054381e46555b9bc7886d3cd98f7b90
SHA1e7a55c1f47463f430290e39ea10ad6144641adf7
SHA25677751b075aff68a4a6d27e89fc4c37c02fa9bfb490e3b56c018d658e7a4816be
SHA512ee2fd3df8d388607d1532bc61b7c0c7ccbf4c4618a4042826981909872b6b76545bdaf9f481049560303c6ec47065ee3f64e5aaeff64e12858dd57d7f3769493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53724c61ec4e06e100a4f748d4ba35fbe
SHA1130a49fd7f11e4dca36cb4747ad7b0103aff82ae
SHA2560606ac8100859d95a9b9fccbd4996ae3e4e685e39545cfa8af52ea13d599e881
SHA51233c83a0c26ba5d7879bb84bf951153372b723d48368dbde759bad97c2803ea9697d3272cc9f22b6634d36449f4f6f13dd84d35a47ebbd5aa0b6070bf2020a0cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d8477d12e5ac043d68c90948a9bdff3
SHA1d16462972d7d489e20a079dbabcd7a4a7fe03acf
SHA2567ba12e8f534ec610c7d9b20aad11eaf971c47f2556dfae56310422cf3277a9d6
SHA512bcf1d2ab09400c4c862d5bcfe2b6655b831bce8732f94f907c54aba4760531e6e672d4c233995d544fe6291d409a2df203dc2b5c5f960741cb005cc314caa71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5742eb23709decbfdcadb35f80e1209eb
SHA17f8489babd6b8f8d7cb63030ecec253a640f3e98
SHA2567c4b3881a56a6a2db1868ea4c29924744077716253032d9322762a945a5a64bb
SHA512d3614a4a3983b4dec964eeaa499af7f7a860269a366b27e79f7b159c18e4ec4a859dd09c48ae7d9c85c8ef717930344d3228202b2cf4a16313eb4351f6059097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a87af3fa479a173acc17d5fc87df71a6
SHA1edfa18aa406b2496c554ec2ca6a80184e08c758e
SHA256235178dcc3bc0e028b3b065197d4af8ca087d99c50ffabc5553d8f26e53ea471
SHA51208fb7e7a90eade0f6a6b6523340cb6d1a0121b7c409135617ce2ee4e064e47f8781724751d176b9c17cc7f74cb3cd3251fe24f14e830288d07372286de8e0b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58778297b5966535cf3e50896712c45f3
SHA19fc187974266015d8748c2ded292eda93b6212d8
SHA256aeb61c6c11e0ce18cd6f92ef2c022714371f90856eed88986fc753ed3c0c0335
SHA5127e6f1694b3abd2f2980e91485dde728b78309e66142adfda837754ba36ca5009f3e244e648f2538d16170004fa7525d6d69def7a6e9df283fcf01718ba9d6c01
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a