Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
2a7cae3a2bab15af2429d0e3b84c63f8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a7cae3a2bab15af2429d0e3b84c63f8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2a7cae3a2bab15af2429d0e3b84c63f8_JaffaCakes118.html
-
Size
4KB
-
MD5
2a7cae3a2bab15af2429d0e3b84c63f8
-
SHA1
d0792f80e72dbfb852de6994d7f965c01b49da05
-
SHA256
c32cbe9341cfd7ce3580582d08e1906df967aba8d6ef82a6fabc7e4df88437fa
-
SHA512
dcc1564f3e63b811e1ce4446f9d4814d04147fffed360f688d3fd7d93295435c73d0b33adccd4ac12ecf3691f49ac71550c36891b92ba5ada73da9f478e02144
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oU0N1+Fd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94AD2F41-0E13-11EF-A7F1-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421428140" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000027e246ef9e7b6117e7f4cd0c57b64bbe6e00ad2f5881d02f8dd14992e400b4db000000000e800000000200002000000075817097233a966d018faf80da025a87337ca9a35eb831af3e83e34ad63bfcb220000000c40a71e5121de9c8c80664a6ceb1a85e84b7269ee3c37f44084b22f4b2f60f304000000013edd9e0213ec7f676f7261af7bb25e8b8a1608a68279a7ceb80d241bee23dfd34dcfbbb1fabc98001f26303a3bb082793526b46537b20274d1d6e0240524748 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 101b316920a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1092 2352 iexplore.exe 28 PID 2352 wrote to memory of 1092 2352 iexplore.exe 28 PID 2352 wrote to memory of 1092 2352 iexplore.exe 28 PID 2352 wrote to memory of 1092 2352 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a7cae3a2bab15af2429d0e3b84c63f8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df9ee7fea24f57aaee6536c4c7866ffb
SHA1cbd498ced1afa0e877439167f3bf7dd5eb58f152
SHA2569534441e7246cd711471051e4cb3b73c7269f5f24c7afa484fde4bcb4bba0877
SHA512c51a03592328ae8d3762ecfa45e4898d606c5e0de80131927b7593baaf7ccec3a59767891c3aab907d32ae16459c011e698e0254d66b979a0bf752559de5dac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536925d0e4368cd8ee7fa62e6a6f83d9f
SHA1a9848fb284ea4942605946c6e9aad51c4fded66a
SHA256216969a27c7635fddfc4975ec80d05e11858ce70663001feb0d3b2e2508a2042
SHA5124ba1f005ac6cb414abe0e1983ac7317adb608010439469a0b898c7a5157ca2389b57975f5c71cc586343ba7c313fd18ef4b929cd6d2c0f673efdad0e32844b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562981bbc1c1ff2a5846a123e51e2713b
SHA1760654ece73b33dff0d247f6fbab61f02fe16e32
SHA256a450530b60bed84bf811751977f1d2fa07a7e81e77f93ea83ac934be39359bc2
SHA5120d97ced194f35ddf3065ef29e1dedc6a30bdcf058bc8c61fd816c92bf4ca63f8bfe04ce0f5dd77add48d37c7f82b1b45d9f89bec864af0f25ebcfa8289217ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6e2373c4a79457fed26275510bc1f4d
SHA14642c2627e516f9ffad2283e6fa751def2e0712e
SHA25615d190c0f62a39328e38da93518e1b3f5ffa456ce2ec66a88c3de226bea12896
SHA51241c84a99752c3b3dd1d7030c98ad363e89b13c95924e5e9ac9bec972e0a2b3d38ff543de7e1672860705276b9f9216684057376df409d1371a3f043358c8f1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a68073464be2f93417f8b32ff8038da2
SHA1bca2e80d0ae66c0975c5e9a81a804e613738c10f
SHA25651516a0883de156a040acf9bd4f2839902e45b856523768b1584d3602f5905ec
SHA512a68b991a7f7213ce71e0ac1ddaf121dae5383bfa9076c6c34bc0aa24a15702e0d363bce7ba047e64c4abaedb5204298b7c2f4fbf15943c373fb2cdde70f6b7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58278aae5b3e0b97c8a80f7855e86c4c5
SHA1f0941a382b755d07e03f079866fb12db9655f814
SHA256061b98e80c51f0f8f299ffe31d0829d7ce115d5cacd45649d824d7f17a02c4c2
SHA5121f5e0a3899889afe9d4a25488732fa88b8609c4447b6097099dad4915d2894d205961525354141a84c0846e61ef4bf98ac8f87763f2cb371550d3664aa1743fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b4009d7518bbf69c46ad4ea1f727e44
SHA197ac46d9d75fb1eedd5ad48bdb2055f3a2202ba6
SHA2564e157c2172186646b6f8d23105faa0f2b81a85f4f37832ee15ed370f4e044122
SHA512ddaa821d26fa1e67ff045fa02aba6dde9788b90ee9db9bdb9dff60d1f0f16439915d023c02a186483d5cb07982878ab0070d9f9166025797da988bc9f088bcc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536f55d25066a9a9e5ee733c5cda2f1a3
SHA1ceb68167fe714bec0ce2be9e32abf704e7e23934
SHA25663a6eff4122f9afd1cde627a9298e38b3d20c117d86a9673de1f4aed74cbfe2e
SHA512f96392a8129bfc86c7ac6a5e84064c13e7ccefaf2ff626181ba3e97f3452233b1a79efb9c1eee116854f2a3df025f7b03b5e8360dca8bce78976e742cbd4965f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5833eb9f1e0f6150d698b6515bc6620dc
SHA172ca43471c9e18ceff936ef4855c58fccf3f0e56
SHA2567ae3a61f8bd9e9b20272ea767757f76da521930ebe03cb63d7bf03582791d8aa
SHA512d12307ed1ce26c39471af8ba9fd979fb588b562b82185868008422e1ca7db270ea324e05dba6799c53af0daba2bdda92b9d5028e94cf2606b3a263f5d6b32f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5254d48a1b356238511dd8a4a08184a3f
SHA18477c35317dce5dc8d9918c17ad06622ec7d164f
SHA256779e42d589ee33d189aa71f6c07bdc0caff938353a4aae7506e9203f8c4ff456
SHA5124f184c774870638f8578b1ef1845444a6423bb3183ec3e92e189fea5c0d7d44407d92fdec5684eaa96f7db4d95c14de06fd5028728897c0afe33189eef421ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f674c36e87ef25d39aecd96e5d36f7d4
SHA143eab6be3da1e895872153fde564f43cf3959631
SHA256293945a8be11ea125686281ebdc79fa08edb30005f3a41a9677cd673dfbae746
SHA5128e6739ae6a4972c06d53d6638abe967bc334ac3fb80b9e881e2872db07976c38e200e6d04d72d68091d78e1f78c87443d5d29c55256d2f596137ce61b6ca3913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2388b723de332df90376173c3ec65dc
SHA1666e977969e5709f1f0de5d234fd9a3360eeb178
SHA256185fb5bd86f5b952bca8da6e70ad5162a46c9b859afbd1da822a55ff3ab5dbad
SHA51209b1be3ecb13b55094a89c095523a6de0557b3faf9d468fb9c4e02275f2bccf4df1faff0ecddfa8c53cccb88158df07b143dec47e0c38130f623ab745858a03f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53fbf879f3a32ec6a3723a8bb2d5fb8aa
SHA112a3760a03bf7037b27e22b1f0ba883a15120a3c
SHA256383dcf6c3b0e0c5e65f6f630fa7ff05082412e7566ecf5ef5f17fe98cbbba354
SHA5129f08ebc46420681db39ef4a25af38febfebdb3dbf9742a3b0c643de4296d5d1a84ddaf3baafe7fedbbea0fac001eac285761429a10bff33c47d91de9b98626e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cb711d0633673e39a580cafabec03a0
SHA1aeb1eb2fbccc2af8d7f4d98d4303fa70b5931368
SHA2560cb4473c10c5aa1e0c7669ccdccd92f4dd218561e4cd7d5f8878e45ae9364f34
SHA512b71281a2229f9c97f400350882f2e5790208c3be7a17387933b77b0c7e0657e208214274aca1e4e488eb7349828fa545186e87091698c6187156120a077cd3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c493ac287535e87d901143a6a5877fa
SHA13bdbc5104e5152726232b1905465fb94f44fc74e
SHA256e1ce4424ce87cab807caada3172cb454ee5c24267cc45419b87a199ed168605c
SHA51201457690bc6f80c9b94578af896379faf9b95af0fcc1d53421bd4431d5273ea90c7cc70ed9d7e1a53fc24faee2f12843d620672b7a83681cf7e40d87f70402a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be9f6d39bff1a0b627d26adc977b1b9d
SHA10a2e1f27f7fff6efbfe1d525fb9b50d2c71c0bd7
SHA2561b5831a1afc4cd3e2bcb6c08853c074b59b99b9e062b41d46d4dd342d42d2682
SHA512eef7ab778e23af89e371620fbf34650be945f7bfa4ee32cca7863662aaebf952cd6958504e8f4ac857c333a1ac5badd11cfe1810846ee36f99ad64a4114989ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3b414af7582e936757b40bb60961602
SHA17297e97c4f6d3d90f9aa76acc9451e9345570b17
SHA256a27c6eee41bb23f792bac720a873df826c4032b09a7eb18d2513ddd8a7bd709e
SHA512cef5b8e9d3ff875c83c14a6bf231153339d839a6bcb60a5e71e8781381149bb226c40673b971addce5e246ee3c32a32780a70645b28a3b73058e29493860cf8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8e4633989ecb7deff8b086e094302dc
SHA1979684dc0da71805c13f960eec9aeb085c8e2303
SHA2568810c48053b2bda25de50c257c83e5f7335f81544a32811d03506124fd4ca954
SHA512174e1966fd68bb020e11ebcb274ca9e585b0a4ae0fe26e29359ceff124f3a4517cfff3e56ddf0ce3cb4aa757d3899c68a6d2c249966cb5c45d4c4a55e1fbb706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3eb0a658d607f674800ddc8d27cbc75
SHA198083a426261e48d1993e47e2ca519c0b06efd6d
SHA256d777578434758b304b211369a55f36b0d52674110953e19a45aaeea424c53596
SHA512fde1fea92a7adb6646db88310a2f8827161a153dd6fa1a8984a26779dcd5c9e357a4a23be504404aca01926192fb8e8bc38ae031110770821b134e449b289b26
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a