Analysis
-
max time kernel
118s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
2a570b7809594a320b03d92669a4fde5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a570b7809594a320b03d92669a4fde5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2a570b7809594a320b03d92669a4fde5_JaffaCakes118.html
-
Size
25KB
-
MD5
2a570b7809594a320b03d92669a4fde5
-
SHA1
8e2f0a83acf2e45dc71cfc4180a3570d228a4374
-
SHA256
3a124e20935d1e59be13fded874272b672af9565715cb65a355c392b194a76df
-
SHA512
a35c9e2821821b1a8bae38d839bf3024b1ec5ecd4bed9c3a4db626f836b974e64b5316836c8b8ee52f604da8112f817c313c0e1c7b3f5afad85df4489ef0099a
-
SSDEEP
768:b9jD50OAn7nKMjI7Z02IfeAWvCc20h2WNAr0AhcF1ywOXdEZd9eGi:b9OOAn7nKMjIN0ZfeAWvCOI/0AhcF1y9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C5DB9C1-0E0E-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40988b5c1ba2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421425899" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000002db509858e34bf5e4cce44b8cace2d0aa4073728d339da447da39bf58ebc71ed000000000e80000000020000200000002d7a95766ed07483b8f0f9280efe06073ab9978d6b23a2a2b18d7bdcee1ab556200000001c83ec16b1f7a27c4643718dcb9d901b2cee7074a0407639e8c6148e1cc76a9240000000454682a5ad7fa9018369da60be0f99d096cc475a4c914b03896a04dc43273ddda4f06f412df3b1522f20da455f15c39c5a4c719e0f04ea7fa62924a35ecef4b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1280 2220 iexplore.exe 28 PID 2220 wrote to memory of 1280 2220 iexplore.exe 28 PID 2220 wrote to memory of 1280 2220 iexplore.exe 28 PID 2220 wrote to memory of 1280 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2a570b7809594a320b03d92669a4fde5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b0cba5d9d28301346eec5f9f8bc7992
SHA19933a26f8d84fb4fa4c6496b298845d6ee74773c
SHA2565444c6dfedd510d67261c4a30707504f72bff86c5fed0d7d46d37449dd4c960c
SHA512c2bb7ebb4ebed8b2af56f8a7e4b885fc017462d9fc2dd2d7753dcb6a3770a75e31aa02db7095f2c15048e544698b6203376eb6439b9b1ca7665252afcf0ad693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ba77473c46f15875ee6e26a9b8f2894
SHA1c5eda932f1176feae002fd875306655ef135b17e
SHA2562b9049acc6f34f869776fdff86065b1f112448a73daac2066ba0908104e953f5
SHA5120241169a45e66b65142da815c4130e5bb636111258502e70137cfc4b1005e5ac55a661c816af3109f488d458c3f223a418244c44f14cf768f20c75934469112b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56040c89a5b8b1b270501a56602757c8f
SHA1c10913e96d191e1031dbc23b56dbd52fe25b225e
SHA256f755bf442f2e4b25500d957916cfb22b9ba8fb90c54790072373874e175d1088
SHA5121ebec36ed15939fe05e76239642c28895d5eb0488536cc9054ccd3fa0640334e8d806e144cbe923f5c6b821a86cb7076b3426afd077e06d0a55e0e399ed300b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527d7753f613e6670224b6493e7536b1d
SHA1fe75b27ce9448596cb0fd2a9bb9b099fc90bf150
SHA256cbe538bcff8bb685c1ff974d05c69ee6f3ea3a7349b116175d9ef6c3b363fa94
SHA512ca2197d66c68143bc039abc8b52dbc2f5360e2fd0197e4a0fb226a072b05e5e206109cf66ce6dfdba401028af8141cbf5880d863982cbbb243206857e2286262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585c4541e4954810eaebaf1de299340b4
SHA174a942ac459eb7059338ae57979351fb6f82bd0d
SHA256534dfa02332df57c5e73bb814757badcbd53d54ff6737cb75bbf78806699f88e
SHA512f629fb79c8ba279ee487f4f43bc18f6a7b1b8cad2d9ea64cefaca31496a0b976abd9ed803335eba9ec0c60b02a0061bcb116cdc1f08307168fba5edf9b091bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b66f12d2aedea1231041f719ac675a39
SHA1a0428ed6b515bc464de10f0af1c04b0bb84fe985
SHA256aa6b0b6aaa87bad47e9a8c5c4fdb5d7ac5625dbb73de191fd11a4d4a6ce727a6
SHA512cb8af0c762fc25f02d0428b15bcfb6bb6424a12acb59653ccd39b7c78c1c67e63eaafd5ab799bd2fd863b8704d90ad32b350e5625c5a276f1b285073e95ddafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a45975dec4601f353863fc93afc2c68
SHA1c27ba5f21a3e22070fd67c91680dd7c598f621ad
SHA25606940225fb1428277e724e10da8b9f18d7099d7a0e3ebf3e2de7c2fda87266e3
SHA512587fb761465bd10cf7b797f0d86aff008971168571a8622064eac2edd5a3690e50a4962643d295a6c086597ca03ea676b1b86b5cd327f47c13e3e8ed1820270a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f40e9b6e67b057543e2835e66eabfc86
SHA139aa5534966ba020255785896d69fca00651e0db
SHA2566e7b78209b0fc2dc3c5bb77da65f278b63a11006cef30430974ab1d628312289
SHA512bf4d722df4d30c765052d3b96a6248f1693e6a00a83d2df554f3839cedc9ba1333e6553ef9c44ce7f45dfac1de6bc63e0ff10a16f991c5b41533e6e434ce6a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4d449f3702d0a9172efb1ae5bb625ac
SHA1143213bf22db6d9b7b5e1b90a78f2f2e304f4591
SHA256f6f409f8efe0b98a9a420b6ab6216c8712ada46e3b7efb50556af368efbb4375
SHA512bbe647222f837291d25a2bd92a45ceff3506a8db476ffee20788015d652d9f35416ca8251586ee58c6c6158a2124b889901ff9bd67a073109223e6a245fe163d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dccef4284a2ffa9a3d55a9839e6f2381
SHA1111aeb3807adbacffe384ff6fdf992a2bf5fd045
SHA25694d5358ae3de01c8aff77edb992cdc1751574a0db18db3f6ad25802ff1d5efe6
SHA51253c5eba9ddb6e47b8ff591e563b7704378c3f94de5947578b3e079627c0c9188f84ff7cb00f3e9f0dde037fd6ce1dfe92f535edbccde24f928b624be30be811b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578044c33c62b1d52e2bc38208774088c
SHA1beadb1a8700adbb448693ef0fc92b496f2594e41
SHA256000e15f6688c9dc69025d555527253f3c0edd55eb0a8f4b2de830e5813ee1992
SHA512478a1fab90781add481ba3ebed74b9bbc64e543420a1cba74f1247849e15d5e804f737ea6935a7738e9cc2c3795424df97a2280879e1318e2cdc19b92dd27746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b6926ee5326cbb25502345489abab1b
SHA174e21f618ee08fd84c3b779b3469c44fe62d063d
SHA2564c6cbc41e068aeddc214dd142394cb16e6fadf3b84cbaf81632dff864170f2a6
SHA512404013420c4858669ea0a7fd401384d73cd9e519a5a00d5f393812c110f64e3e92f81b8419a08e10e00804bf6b8134631b7cd4dc779703100c66292a3b43cd59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e259adcc3b67182b6c4ecf0b4b659ebb
SHA1f6c8a848aec98573b139db7b0b8f516fddb8926f
SHA25624fe360c81e95e8cd3c7866e6cf2c0f4569f2550b9246ceb195e6f393ec5c3f5
SHA5123a39e01fb5bf7b6793c8d2ef1ebd600b68b23fe452755ffa14dc668c8567336c7bca478766d486580a98d06af1aa27598137c4f007ffc64e1d7ae4eeeea4c99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551a82e3979770aa647e694a55ab9ac81
SHA1dfd1ab4ddb6942c9826c8e5e9cf0312f9f035428
SHA25693f43a74364ffb83c9a7d902ad7a39421d32911a4297fa123b7d240443df52e9
SHA512075e1c3b26d43707d723290c0e6aad53c593528add290f6f3a80897a0aa1eb202d73b936590fbf338b4043a199e276a8684c7900e37188c4e420b762f3c156c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5c8563698c14bab9f128e148857fdcf
SHA19ed37b28c1b61324079d90677596806619375127
SHA25607916b8ac902a26d8fbd816fa928b44f1592c157c9587957ce3177c65ddec1c1
SHA512a9a6178e19bcc2550d4e1956dba59af3fcf51a7cc57b6769253505df53b97518858569984af8869a746762ca1b09146bde4ee2532797d76049b9a188de31c527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55285784bc238c3e4ced84080f187b372
SHA126fe335c0aaa5e8a8a3aeb32d1473722bc31fec0
SHA2567f90ecf6a456e5b1a3fb07c3a43c8b8c53de399401350b4e1d5ee79697a86982
SHA5122bd45b3aa920950831762079888387da1e05b522601de06cb2ca0a51be9e578a811847710f09428359e2ce356f4b0672e4cdb16662c9321bec0b0020ea0c59ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590f06b2fed5b65c0e2294199a726e8ff
SHA1f493c8fb545abe52479790e64ce0ac79d98c9e1d
SHA25649201187eabe27cd25b27ff467f6cca7c867008810c839e19f2ea189927320b9
SHA512b326a27d92930f2779d6e11295108c879038f57e323c9a7346ecc6e965aa989744654f58d8a8058f28fd4f7b51a1afe5b7f00c535808cb7dc8ab6b2eb1e32351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa05415581940b81983e5e00e9312859
SHA1145f4ee5f44f2aa15429333776cdcb7faac82578
SHA256d1ee96518ac155791ac103be337c4dc7a53dd73831567af0d7e19557a2f163fe
SHA512b8f3cd43c5a777edee815e6d84e6993f896c130cb02f86e2e565cef0b8c313bf2c5805299cf76d39cc0a87f353ad852d104d1909b77eb89e22145405a0b7725c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c4e4ea2f997589db29ecd0842193d08
SHA1f653d9ac3f975d7dd2071112564f497c456b462e
SHA2562f2f2a0077cf53b6e2745d3900a031e97f5a7eba4f548b05940441e60ca66b9e
SHA512943366b5530aa8d4e9a23396d090b8db4e3794eb04ece4eecaf44eba6835a1526d6833134303ca95b658be38015df7ee4767a53ec1a3120746051e3054b83e84
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a