Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
2aadb72b6826bb305f3ae03843765759_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2aadb72b6826bb305f3ae03843765759_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2aadb72b6826bb305f3ae03843765759_JaffaCakes118.html
-
Size
38KB
-
MD5
2aadb72b6826bb305f3ae03843765759
-
SHA1
4992aa861b486e055440e616ef7a9af6c7af5cd8
-
SHA256
2e051bc636184410395886231e9886c4cfd7ed4ffc2c35706bf25c9d827fd07a
-
SHA512
2e00af8926e55ac615132616a821a99a1a52a6d5a321feabca36cc1e6e63c24438a308cd561964a36998c2ba23639af6b3c996be1e0655bedc79c7d2f248c9bc
-
SSDEEP
384:Srdi9jhCuzSX2MJv4JQdyLCQzVVILgqMOeGahfQjatPssHZ7yAOoPyKUWJ:S0phCjXXJv4Js8zV8Jh4Ye9ss5iAN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AF3EA6C1-0E1A-11EF-8E9F-FAB46556C0ED} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000ecc49d22430badd20ca1af4ba4277fdd5c19d0403cd49c92483c352531a90f3e000000000e80000000020000200000003c1c5bd16b9712dc2dc8e499401f80126955738af8762308162909c7b96fb7d1200000007c8681b47b9a9444c65a40be6385f51f8d2517847f73012c9e14d7a97dcf43ef4000000053b77a21eb9b2e35b8d800209dadbc8f8b93ff444834efbd835cdcccb493a4b4bf949dbdd581e767f867ecdef8663d5e209850e6363812f84b018ef8c07894f5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421431191" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0532c8527a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 1284 IEXPLORE.EXE 1284 IEXPLORE.EXE 1284 IEXPLORE.EXE 1284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 1284 2980 iexplore.exe 28 PID 2980 wrote to memory of 1284 2980 iexplore.exe 28 PID 2980 wrote to memory of 1284 2980 iexplore.exe 28 PID 2980 wrote to memory of 1284 2980 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2aadb72b6826bb305f3ae03843765759_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557a57657a658c0a9f07666f9e17b4473
SHA1b9b28c4cc9f05d685e52df33f5b5aed928014d01
SHA2569478625df4955a0613ac1c39326499d3501eb98a5305d90265928b6e1c5b0758
SHA51258ef7e4c428d306eb950ed6f21f3b2d2d65ad1187c6cf3d7dd7ae14e055198f171c094759d84697eb62bd0089974ff8042c9e94cf758a3d5f375fc344a8f51bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5500e18c980ffb3d57a2ac642cf263e8d
SHA17447557fc60362ef7d3ff3d1985a4db541a95d5e
SHA25629eab983f8287b1e8f88474062bf40f5652b07179b766e176f4d113adc044c8a
SHA512009912c2ae4065b8a52672023929ac2337a213d70b031efce36b51a1684e7bfce397f89bc64a0be4cff231152cd0c52e74d6fcfed89402fc45f7dad1684392a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f1b99491d7958158653a97ccde8cba5
SHA1adba64ebe1c5568f3c29585512285791f97fdec1
SHA2563137f7da86a541c4ce1be455c578f1169f18adc1f9a73847066687b16b2e82ca
SHA5123bc335ad2bb441bf82486c2b56516af672aed1b21c79be88c425de1615d183f04cd1cbc90834681edc08da54c7e17c9a1a441201cc0c9fefafd9b8a9c37c8073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59953a546b2fc581c1f6ed146230db4cb
SHA1a011e798cfd23bba653b207da46db52aa1d6ebab
SHA256d3ff5de5b691f5afea1e628a917b4cbc4010139e6914a45d34213e7ef77d2af5
SHA51292b3674b7344e3dd3ffa2c022e9d81ac10c08f3529412473b59afc9d2b00d7f3757e338dd33c19438d2f789d5b0b6379ac0abc9f79ba53af6c41a53eff6bfd6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5273cf6c6717269a56bc45754b5eccd05
SHA17a6a69ab21adc860caefa262cc72ddec1348d953
SHA2565b0c866b3fde6dd269dbd282abf36df1837607c7f754834101250d98711e957e
SHA51248070817d01de4175c3a5839ad325270e40a99c8be9406e589f5fd2fb4bdd27f8142fce18d234960854a4738fca6961ae73468ff588f017268073ab1258dc0d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a9d537a28a022b4e129dbcd848a546
SHA1aa401ba503fa7921d3ff1e05078a1c8dcca70122
SHA2567b9bb881381294a5d2a224416b4063455279dbaf921038ca7594e9b25b9c0564
SHA512237f37153d3d1ec258f0948265194badaf22bed81cbb4cf178b8fd4f39746f6f6ea0888f572b6c614141350856e23c74bfd3113928414c6245bb052147d5e1f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afd95374b654376d0c396f330448c56e
SHA1990ab772e0b0f5acb96da63957f54feeb5dd0405
SHA256c4db30329d21a5297a18ae05d5d54108f0f480312f0262de53cb57fbcf38e476
SHA512504e6d559f45ae65b21683d6a1bd843a58f61706ab35feace9291d499426549f834685c245b33ecbf648116436c70cac90b031760bb0547cdbc3d6e8836d65dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cde6df181ead82fe75898beb1d68fb5
SHA1340841df0599968cf31f0674caea23294e90d9cf
SHA256158a0cf408bd652accbd6e809350baeb7f919f2b6ce8410cf1fd8fea767f1824
SHA5123c9691bc902acb2ac1c0b72f77c8de5129f5e4b6c3bf50260df784af31a9ec3d20b1df59c72b78ef63893f0f2f96996d3c21eed6696216b3c5c87137fc91ac1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551b13302d57bbc506d015e6a4de1569f
SHA18acdff89f19d45dbfedeb6064f2a78df9266fc52
SHA2561d4ac547e1f79ef9695ec29c79f56fe7b51c99d021f9c05c7d72ab17cee2d6b1
SHA512047ad272e36bb10ade2fcc09f12c8275dd63eb1ddb9b11c35a3c87e3ee5e83732f73bda2877a6dea6ae786f36ca00d57aa8d10e18876f66e41d75305c9f224cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bdabbf0a1d51ec2ef996b7fd30438f0
SHA1a6a10bdf38aa4e14efb9203bd0183d7c535e356d
SHA256cf564bc882c273f9708969c57a79a011a84861c690e876cc66a278e15e7ae36c
SHA51290d92c0bf585b706a7c3ecedd7acd073faacb0956435e32f1289e7eb253201570c0b3305568eacbdcb69e3b2cabd315ec4098ca51e7c7f49750f3cfa4dd39b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5335de8a4728664c40ac8ec377f8e10d6
SHA10c8d828972303701ca0e2d655713b2b51f713694
SHA2567a6ad02c4ae8efca01eaafbf72c67d9231d6d53e1f819ad3b9f5deec5b526fad
SHA512867d1c255d9d9c56ae4b0618d65bdbeea039b11a0a01ea37a5ee32defdc488387cf7b34e3ed5fb82678471fbacfa192c39db22c27cd879c839879e820b7ee25f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5739e04d07cd0bf6324d426fb353f2448
SHA1aa32e0cbade6a1fd04ee733ceb733c7bf6440509
SHA256ca695db7bfffb81759ffe50ce1f7b4ff5dc74ff3adc4be4b623bcf952b416fd1
SHA512ad9a96d3d82e87df0f0a94a901820d2ebb9b1ccee26f8e7412b7411bf0901d6ffbd7085d3b6e7b657218e363eeb0242d468ced1a86aa4d6e8cc3e09b02a0b9cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573e14f55a4540860c591425ae2b126a1
SHA138bf46c46c0740804a12739d6234f95eef50285a
SHA256c154fafc14ddc9672cf7ca902f702e4fa2a9540c1ac07abb8fc35d6d09efc193
SHA5125ca7757ccad11580b53475c527d03f956fe0b6c87a466593beed687a6d92ae12e17a807288969757f6f0b3f803072ac78c13c718265b455d509d893f176e2e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5339bc09829214de0b1926413b7d4f1c1
SHA1d4c8a9d5696e02da8bc80885b1aa6f57df2c5eac
SHA256cc9e62b6e7131f871065278f76c1ee95aa9cf469f13a41c73e638a077c42d7e4
SHA5129feee6f02cded02609a2bb7274c890f9848028749989e2fabbd92b74f66a25c08c0751b6df1cb3498893c592060b9594813beda85398f14d6217243e6a4a39af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551b5b0e9d5ca3841d31a7ead5c4b2607
SHA1863cc9ea5fee57d5d1767b8885dfc31f24e48d28
SHA256805ee1dc1782a0c923fb4ce85078ec7d9a62ec926df7afd5a832ad6646a6c3e3
SHA512d095bad53957b9913d4d24ca8b06d360cc2f423444f80520c6dff9bf086dc75a4d4b5c03a0915c82ed2237d4ac2c926c2eb9a9fc3dea13f3f76eac1b30d34135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2e0eea54a650a60004d970b03d44584
SHA15df13d6329a753259e25f1182c4adf8161608257
SHA2568ac333eaa38df0936606fe641c39f63984b59ce4dbd7bbf19460099f5ac46b8d
SHA512a1e589b32cd8c4acf2df01ecd2a294c47ce438a638e71a5e2e5c580b54b8da159d96426500d557b73e00c3f6a7ede32bb5d4f6d5cffd72d5174741e9991d51db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3d1e22f31ab15ffdf6ebb69efee0528
SHA1783dc7d8f88de6baf8890d79b14752591d4f710a
SHA256d16753b7ad49863b94e99a3ab5b6ac7893f94bc4bfb4adcb819ed7c4989f309b
SHA5128cbb47144138ab034b15c9bb0aafa2f8d45f7f252d8a1ec225d85fccd83616dfc7169fbe000df08aab35fe4d4ef66bcb47c384349e657f34fc6e575e346eb80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557ced7cc542e3e84c4122a2646670ca0
SHA1fe2f98cc0c777ef60639367e32cf3f0e6a70b7e9
SHA2569ed6df9f767775d6c872debd9016e2aecadb9f7362813f203102d6ec60561e53
SHA51241c559228617be5be7faf3513d6407868195cbbea6b98506f22258e64be60a44932e823a6fb8ecdce525abfcd5bb6bddb87faf69863d7c56e52b602db5715597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a0ae4b365eba72ba278ba9b29860a19
SHA168ca8fff8a9e663084971127028d8090a9157f01
SHA256418913985f0660ec1b9ecf070d61c3327bc9df71d4a3070e5d3339592f8cfb7f
SHA5128554bc5ee57ddbe980be01d4a24edc9844abfcc25a98d6c39232f7437aed8cabf3b6133654c596e2c2d18bccd788c6ffbfb185f291a72607099922893207d4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffa1a8aa72328e8fe0a44eea4a41223c
SHA1557d768d9b6d1d168dd09513a706e283ffc9839f
SHA2568d0f9eedb868cfd0369aac481a12bb92ef71592250dcfad4c4d9d9827d66b3e5
SHA512c8ad1dcc64f7a7a5baafb4847bc0dea3aa808b889b94935872341d7e1891c046629efd1309566e8e2ad7c01e401b405f82deca28f91ec0ab7da53629e21416b6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a