Analysis
-
max time kernel
134s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 17:33
Static task
static1
Behavioral task
behavioral1
Sample
2b156afd5440d6c89d811fce986df18a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b156afd5440d6c89d811fce986df18a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2b156afd5440d6c89d811fce986df18a_JaffaCakes118.html
-
Size
4KB
-
MD5
2b156afd5440d6c89d811fce986df18a
-
SHA1
a7124ef167ca9761a0df6cec0902b2fbf6774f6e
-
SHA256
819c5655acfcf342bb53657e19a447eacb78df61749899cc00d84afe5568c4c5
-
SHA512
b5c2899447ef78c025857f1385f56ea4087ae0b5aaf6715edf0ef7b18f4abce094238fea2455b04b249aa17a989efc7ef0b64897f2499b934a5d3c7968bf2886
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oFyd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31F26071-0E2A-11EF-BF06-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000a9dc3b89791b4b17bb5b7891ee35a32efc61c63e2e6cfe769c4a25154393dad2000000000e8000000002000020000000072b4738d4791c421863c4a87b2066b70ad2a70bcde4c01d038a00bade1fc1e420000000e2e1ca5d1c44e97ce0abe6843979ab437c120ed1b9751d7a4232b158936feac2400000008bcfdd04b2b55ed5d1c0de1e0594e75c648a238415124ef15b910900587b1b338128abdea511f9f59b559b90b820854203e56936a38b999a7b0a678ea75be8a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f2390737a2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421437855" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 612 iexplore.exe 612 iexplore.exe 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 612 wrote to memory of 1724 612 iexplore.exe 28 PID 612 wrote to memory of 1724 612 iexplore.exe 28 PID 612 wrote to memory of 1724 612 iexplore.exe 28 PID 612 wrote to memory of 1724 612 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b156afd5440d6c89d811fce986df18a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590c43c1186eef6ac974e6c7adbaff053
SHA13bc816be1b3977162b5157a84af3534ba86c234d
SHA25681f41c1288b6f7255a16bd41aa60a6842d363a5641e8267f6f551e18613aa39a
SHA5124227247ac8ace18d5ae02bf64a0e86d291ee42e37f07839dd0dee309fc82894489932aef5702d423ee9eb9d6695d8cd0db52639a46ae46f2c15e8799444fab2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5731a7087b941e88a82699aa2f6e1708d
SHA1fd95143719ce82346f4a163d5d7ad370eacbde6b
SHA256458472ffab8cb2f95457ca6d607becc2623f37215b924f55dd2f9b70b748217c
SHA512ef739d20c849c8709304efe5da3a5d6b2d88c9b12dc1222bb292185831a69764f1860e83c5e7333142c36b6f9605fdc5392037c0ee71a34d66c258ba3dd2c998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cc535c0a227821ae948b6b93b236f2a
SHA131ad263e6f78916ece40dd82a20b0ca700247866
SHA256d763545defc69509200f3f34abee11add625212633edb9db1405cd0f6ddcc2f4
SHA5128e4cc42e50802c6a120abedff6c8b2361feb26c8b626feed613048ac3caa8986cc0ae9120364f83939c0e52e28ddf17af5bf096822f237d618f28586cdee54ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a165e78ce5ee7933559284046e2eb8ef
SHA105f1ed18541f33824aa6cde303a0cb10868cde5c
SHA25614f8c800f2afcebbe30d0c2e7c962d7a8e4971c5de233b1b444e9d48fcb85e44
SHA512ec92d1318064aaf49a5239ce090e8972b9d1d61f87570b54b55b989a9c6b7ca1eb6868a56735ef568f1657094dcd5cce94c08930487ab254d54decf68c732a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dc59dcc4096fbd71fb6108a579963a7
SHA1e54dd87039276180a61dc75c7c6e2679862580e8
SHA256f7762794423a1479db69dd47f61cbe1db1b576b387469149919e9fd42f197f34
SHA512e9c408456d44da9876e14fa0362e0768dd8505c9b4d6c175bb8c23fdb186f56b270098f2134845b1a335b517512204e1a6925fd1e48c9cc4d0ce994bd47a9d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f6535632390150c270167ba2b233bfd
SHA1df8d136d720b526ef476c95753d14f66ea216679
SHA2566491e3db338152aec0749851d60555d7bc046de24993402dcb79e5600402cb0c
SHA5129130ddeabf2a057d89aae7a97f99948827b4a1d97181a5d043c0e3ece8c902974a83644f745726466b56b6500988b39d3438f4f5839c4633c53625ec2691754c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cdc81ec291df52d9426e38a303beb09
SHA15ed1931ad24ca505a1096a6bb011d90e1744926a
SHA256084c9eb4f0b0ef328f722c714122a67d4ec89691131376c6a81ed277121fd954
SHA512265942ba4276f3ca5dfd2425376169f3a8dd7752f31b6494efa53ca46891a449b0a394eeeedc9c2466cdb3620745b14e1efd1dec91cd5b1a6e4eb0c80a8fc2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9134ee28258f5815febd2f87637eb23
SHA19f85289cef360aeb2d515f708b1e0767776f2d26
SHA2569537a29db6620fef790180cb4deca85180a895a080e1e8453f8cb164ebc5b41a
SHA512b6c960767b3bf153dd58abfe67a5ee845a4373b49bc94a4960ec60e18982cb651bb979d6075c77247b54333b1f7d8f7f63ebc688903eacd16983dc568a259d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f16e57fb0ab19a8461eea5c93bdbf68d
SHA16f0ec8e3a7750a89a899899c5317ff222baca333
SHA256270dec81eaaeffbd82c3ed5a1b0456e93fccb8b5ebe607214cc67730b286664d
SHA5123eb5f6ba1bf56699805a48df23ce428944e430d5f96b0e179d9c21105040e79ce08d2b5b64dc2afa8ac6c311103f823e565a979f7d38f009573dba6bb2a9aa80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa3807af020bbab5c298c6671d76bc47
SHA1406e3dca1cf80e8aaffbbd2fb76d7db07f3c1cb2
SHA2565e6412eb49696b9284958304d08df1fac728205ce23cbb4442382c441a5141d9
SHA51265cbf4bd8da068d591d3e325ab0d5ba8dec7b06c70b44c28e83a9f9eaa110ec70cd831e00b2f06eaf5c1c6783d69d2418f0c6922777ecaae957ed2896744eaed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6ff71f4380911d0c95a038121d41cc1
SHA106b42a41f1800a301b27fcd22abe3bc75af50232
SHA256fb23fb373e94f6c02d412f1f51ace5c5628a0f2a4cdbf69c1eb18d25fd340c60
SHA5129b0b76333db6a38664124142fdea3df572446e7cf5f98861e921db46629a2d753f13ea248597e3c8a6810b7a99a512aed834ae57eb248caf6dd8be3df90b6069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb53aad968119cc3af8b35cbdcb5664f
SHA1a353a7e6694817b0c681337cb0a75dd79a673edf
SHA256047a4c4b3b0922696dc666b515a893171c724a78f65113dc071166c4f21c2b89
SHA512b85e1a4e7187eb00da6d2f8f71b4f1ac5ea4a26a8d24d6864f8b779b900689f82803384dd1e739e1d652467924363c0c64fa9080edbea93bb857d03642d1c46c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579c532867442d35d072632400ab064c5
SHA16abe09558e0673fa915f4bf22af7528c56415276
SHA25630eaa0be7a088c6351774a5d2c01e433b59cf3b043fb29f875842f79b6111c9d
SHA512a11e6c71b4c106618d0923cfd7be6a402537d5742493d018d91552af79a509addede9da0ea34cf2f10582367fc4240307cadeb5308c71632d90e82f04e894ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559fc2a9497a1fa08255aaa7b141fbe15
SHA16243cb52d85aea3fb0c7b34ceb3183612507b986
SHA256a0d62c8a19a2bc6e82f70447c49548aeea0b3d08994969d46a2682df47a42848
SHA5123673c0e16f804bace887d0055c44c186fc92bbf87d3d45122cf254ee36463de1dfc635b40abf0cb7a83a834df9f9b936467cc7280053abcf1afd0a7d43224ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5418289b9a988d882061370247acc2f2e
SHA14afe0bd803fac22f7453f71d60ac7f7ab3ed4b7f
SHA25628f2479254a73923b6a9ef560038730512f3f80848063be0320afdd33c9ca87c
SHA5124361cc44e0ae4e0062878e4494eaf4b296c83773bc9febb6cd481a27beb76bb0ace27a598d37db817d11a010c09e68e40734270d6f75fda2e3722d5d939d1ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf02180a4ff31486e321bd7f30fe1b4b
SHA1a31c3b6b7e546669b7a2ffc3b324d548c8d98d8d
SHA2566afce0ad872bc126085cf19f9332ac1694578068a309a2c634124f7a32bf91e2
SHA512de415467e8a51035f57f11c91ebcb424eb111f9dec0ae6ba04e3724bdc05cbe066b335c9fcfa433e234df947e4091a75184d53c3c58ac5d6b9da6f3171285151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5570c4fda56091c58c0f6e20878c56cda
SHA15ef48b16ec67dfbfc024550210579cfb626f190e
SHA256aa1119628305de9df2ba535a2c7bb334f6acba3ff54ca4cee345b22d9199f488
SHA512015a2862a65c632dec880956c4edf0d27daba7ea2228eea08d362eb0d82b042a84cb175da9590bf6a2ffdadb418ed6bee4aebf4b733a83c54aaa999bfca404f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565abb305b59f1fd457031156c5ebbd71
SHA19e27d7678949873175b1bfc3b24fecb7fa8be5a3
SHA2560dbd4cb21173a56560afbf2909372745037e51b1839aa655ee57e646f4c34d9b
SHA512af0386dccf8089d83aee52914a48e6566ee25856d0f60fabe980e1a947e44faf1ea5b37f24c746e9cba92367f6d8b067147d511cbbed85dd2bdcf6ea5c336e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aed44bf1b2f9c28a8f7fce83f75c8ae1
SHA14079a4af21453680e4a0e9c661a57f57841e7259
SHA2560969bc4fc5300390eda26c6c799fb5f42ef3bc65a6b9fb9fa6c716f18b32758c
SHA51275e4a68ca09003cc13edcdfe3a8d16fd2c56bc7f20f96e8dc4de43ee47dfafdcc8f198fa541f49b05d8558f741aa228803b1ff0b9284bfde02605daee033c23d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a