Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
2b00d99d39b0df10efd07175c6d0c7ad_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b00d99d39b0df10efd07175c6d0c7ad_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2b00d99d39b0df10efd07175c6d0c7ad_JaffaCakes118.html
-
Size
461KB
-
MD5
2b00d99d39b0df10efd07175c6d0c7ad
-
SHA1
b6c56b4cd805f2caaf8263bdbf09d9f4f266a46b
-
SHA256
9e8c2f91e13cda02f16d4a9e0af51cc5dfc44865e5f99494bc4a77224890f9a4
-
SHA512
c8144b3a9c54dad307d2e36a6f90a08a81b1a4146ae20031e9987f2fe3fcd522958316569e3c403758814f6f2f11ec385c03ab5582c7f2fe239a408da7bd7b33
-
SSDEEP
6144:Spy0sMYod+X3oI+YGo9yQYsMYod+X3oI+YA2esMYod+X3oI+YLsMYod+X3oI+YQ:I5d+X3c5d+X3C5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421436497" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{093D7231-0E27-11EF-A01B-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e002c0e133a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000080a1f9249484de1e97df243b156918c8a46dca7fcafd73eff596a3dfa15e7982000000000e8000000002000020000000708faa463f4a2cd19f2245bcb319d22924c5b6fad3f58b1388393cec760a26f6200000007c44138bff9839a5ba41184ac7f311ba05fb059110b876c2d466429db65cea84400000006a2f18cd714f13ac11ac0dc2d2c4f6ab8f87c74d1768aea3fc97c5da580c0cf36466391b33e5c6d3bd8597335f91bd145491750cab3c093960ed32892cb08eac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1044 iexplore.exe 1044 iexplore.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2980 1044 iexplore.exe 28 PID 1044 wrote to memory of 2980 1044 iexplore.exe 28 PID 1044 wrote to memory of 2980 1044 iexplore.exe 28 PID 1044 wrote to memory of 2980 1044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b00d99d39b0df10efd07175c6d0c7ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e28bde16d56541bc3e5cd10029d398c0
SHA1cb5cb236777f7a323fd44fc9e80a124714e6fc5e
SHA25610210bb3a44b200e44729d4d3542cfe66a37cf1748cb50e92f13d996eea08b93
SHA5123360894b70d8df48893994ef8663dcd5b57b1583bff124faf261f903eb3c5353c80858ba1f5bc4ceca5a5ecea359c9a917e00e93acdcf5a3d1426c4cee059f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c317c1c5a856b2c3b8f8b0e089b79a83
SHA195fe283932413798be7ea502a5439b3eb878f246
SHA25659d8ea00db25f76ccf49f80bc5c12ce11c3702500a0d6739a738758be43cc980
SHA5123ca5ca8346fd0656032cc081ec53b6bf7c4ace28dd85e07867ff73121bf1578c3b9083fe473e06bfe648c7895c0db021eeb533aed5dc9a5afdd846c644072b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c40e756e9a61018edcfd55498a56f0ef
SHA1986e814f07e6960c8647994c092459d7e0fd8cbd
SHA2565f1c38a54793698ade930873c17600d76bead5863ccc657d9fafdcbcf471fa3f
SHA5121b65e54cefb5c671ff21dab8b8baa43bfe72191d5b82e82f939901c47f401b49345872ffe9e0049e032ff0a161398efd50f7848499de3109a8ac37f32236e52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1793d370de920dcf2db6467a0543dd9
SHA18a78a5a18a860e486658ecaa49048e0dd11fdf9d
SHA25688f8b660269145a29ba0a9be80bc0880b0c8e8e908ea3d03cb27aae3521012f3
SHA512b81388a73126cbb7be4f975864ef9b6ba7cb0882f5e2399a140abc478523e06f11ab89a0d3e713b5c016c18f508266c45d4a60c9f770f4ad896d863acb029d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562816a7446124e09e1ca46d8c693d18b
SHA17d21688d3413719e7dc22888f2533dec3617e30c
SHA2560e39a204005b0339ec67525ebd80c50fef3ec192c833d6fd47d22be8c0419d48
SHA5125748808e7f63fb02feb2b771c2f16f9816b3e7b38a0d91451181d96896c93f16b5b021854f38459393265e4172247facea832b652f9199474f60fc0c70bdf84a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db379578fe00d517a8cc1911cb0b042b
SHA10047a34049e00511657ea4efc8c0c66d0abbc0e0
SHA256306fcb85cd21677bd011845fafdd6c272e2a27a455b28ecc73ab5f8d4a6f2c2a
SHA5128ac03616c312adfdda363824c9c1ebd2128b5108d0619acc0e8b6595bd26261718af9fc52f382e1c679c51d342fd5979a9c10cadfc72de5aceaa721c9dac78e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6bda16e607e1e6aecf68b1dfa099f27
SHA1310cd19b46cc865931ed0cbcfbc5e6c891f4fdfd
SHA2561ff37483c99e7e90c205ca33f7c3736f5c7c2f1d9e020d5915ba52c5fe1e184d
SHA5122f84ebe16785f61d97c1ad59abdd10507b8e6d0893eacaa35757abd4ed0032bed1cd49756f56514ead5dddef6fae049514751966921970df75580dcdd9c0139b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8beeff896d644a15a5c95722a7e882e
SHA1fbd586a2688e41eb288010b54d9e0ac6e5ae2b53
SHA25614c1bf1e3e2e0f723440cd978dd1a4171f5ef79d37a0430c54209377a19db9f8
SHA51293e7aef3b52acf34690eb72ff319f8dd215b9603790c097c1b0df9a74088c2401c3267a3c7f04e8c7ef5a5ec7e45dbec17eaabdf43f31e39dd88bfe6fb560be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab367a1925c83f1224e65253f657ba03
SHA1e52e9368e2d1e32d708d0974e4677ad0e0d64378
SHA2560748f13a45857db9b3a698efd9fe721655af0ba43d4c9efa8f1fe2d20cf07cd0
SHA5122b0716e02c8b8f78bd7aad42ceac08ae626c0232a175ddc30b32fb0a75f3240393755b11415065a57642bb12244332fd3023f1cc8c9caf63e0ac0312e23b2f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520541b81829e4eea56550a43e8247d8f
SHA1fc50b2e9e4fe49a458e324b90243f3d3787144c6
SHA25631b2b6de05464672feba20ec24d89275d679e1a982b4fd2b6bf508f993a2bbf1
SHA512885df4dfd233ea9494cd47b88f51749cff9acddbc6af412feb22974ac746577a838988264eb2806437c975b53115293054d239b8f65202b529f7d85966cd1735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5963d3b8ad44e2730330e5288a23f5be7
SHA14745e839bfa56faa0393cdbe4b918d80942a3713
SHA256b40b98178a583f84d6d9f1bf3b73cf29240b6dce9ce20f56191fbebe5f94d814
SHA51213997df3c2f2b1830949fad9c53f02837b261fa8f9cf7080b2516aae5be847c4d31ebff426364d1dcd4b2985c640600647c9580c86c4f78170e1418a7a327c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5342d28e88bcf0e87a7c3933a0ab73d79
SHA1590eea0bcf451782c43b9958cd398236f264e5ff
SHA2568b3b4d011c0c4977e6c1d258c8dc9ee454c9c62aeb89b417edf2639f46e80837
SHA51293ad27bdcec9ca0ba5fbee3e07357a85ad0322c12a6ee95242f3e65ad5e2f651295770de38f3eae53ad9897ec4ae8934328266a672ccae947af61b69b81821ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd78488bc8bf5f963934cc0bee787cc0
SHA15b12d307ac575ce958f10f393bd5e8eb81f56c47
SHA256aabc941852b5a5dfebb9e24f1b8545b7313bb6f700a12f14b3b791c8ed3265b8
SHA512fd7f1629a27456c1bbec071b5119f09fe5b34d4a94e663b31ecd93e9749ea7e123821e16202bb13dddd7842b47ca05a808c124e25b2681ec4f59fd9ac79eaae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7e8311d249f67b784134684e18dc2a0
SHA1312c46ac031a32a3725deb76833d6c536c995698
SHA2562faa3a62b3747b870168744dc7fe624b7bd425e4bfdc7100dfa3426499a2e42a
SHA512596dba649a50d87830aa9c31af5ac4ea387d2fe21ec07866a672d831ce0f2e31569bfeb6b59086e6f4721d4419690ee665153d62dd86029d66e5544221a5ee7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530c678e60924a6da96cd1262a2ea6523
SHA1edfddf9a239d592477fb792e493ecc975411b430
SHA25657b3a01c2cad1597b7139466d8e85ce094424993eeb34371f94f0fe8e35e06cf
SHA512bc8989ed8ead7f2f7f6c31fc2b6e2958157549ab591a0e43f536bf45b921f3d95cf77294121779d16a585d68284113726b386b8cd772d9c0a56d018c97eb0140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d7efd902f32208c1473ff670375e574
SHA15c19439ab08adda63850b5981928c0bbb91de569
SHA2568b37e64f36e66da20e12c755957d5d5c0c9380403cf11672e75fff9b5a74e7f4
SHA51273392b58b4d866c93e484b9eb02c5d45e1a5738919c4027899d71150827371f6f5d17eff1361e7c78f84b6b0a65e8253273d87cfa1b67cc1755d3dd2bff08888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590040495c762ea9e25525af89623f447
SHA1a9981b1c986524483ad8b980218300f552c6fe1b
SHA256d845bacc106b97e2120ed88ab66e873540ebf59dca26bdb1dc2a8bd41f33ebf7
SHA512b4516443cc75804ec3067718e6dc1e97695f4d2f77fbebb6526fcbd1e37a5e0c0a96f763a548498fae067ab8555302a967bd6901e99eb69027db290bb5f67012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ff580ae3c31fbc75e92e68fd7c0d150
SHA1d5cd3f39887fd65c9af0bb3fbe33249f21a26f20
SHA256bf0afaddb0d2decc824667276cc0d8e797882fc31b09887313e071ba1767e3b4
SHA51260b0550950d069c7d9aff01127c50649695b1b356ca5bdf510977630188e5f888b61b98da9917043c3d5285d57e8c578acd658f84dd918c870e68caabdc17bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b62b09632e2da5534f29940ae9d3f479
SHA1a7c258ddd70e3946f548715c95baf071a957b984
SHA2563bdaa1e64d59fdc8ec51c5f4fc3a7c20b5e8b4a6de35cb17b29492411fa5ab6a
SHA5126ec57a62cba3e0699180a8adc688507d15a77b2193c5bf7b97c855e21a44fbdbce7509de059ba0ebfd28af697766692ddc554417a660980ba4c58e8a88b93c36
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a