Analysis
-
max time kernel
136s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
2b479d9e2e5363440fde7bee7d30375b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2b479d9e2e5363440fde7bee7d30375b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2b479d9e2e5363440fde7bee7d30375b_JaffaCakes118.html
-
Size
20KB
-
MD5
2b479d9e2e5363440fde7bee7d30375b
-
SHA1
0f1172834ae35cc41b62d809f4b35e23b06f243e
-
SHA256
31fed17b3a7b0493a9f298d9309b6c388a2769fbaad57aca48dbf5705538f393
-
SHA512
451162ac8ad8691ea13377f376e256467a0fc1b4b605d9384e1657b16a3cfe5c73d67a886751ab8624f99edcf617c09d08dc36a23d5cb72b81aa8b08d2767273
-
SSDEEP
384:CanlVBbjPqoV+zji0Ft0LOzTQTzT+TCTGmvTG8LYqnJTydoB4Uj3:nlVBbjik+zxPKPg0GmrGEJTydoyUr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421440815" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801cc1ea3da2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000af849d2b8559be0e0d95d26edf53aa6d1b052ce56a09b94d585f71cfd69e4329000000000e800000000200002000000058e30110d30e94d7d7afa66a6bc8bc157bead0ec35480af198e468ef9182c81520000000750a5a52ee75ef7ccb66907488f90aeac7eddd5cb6f5e0152996b8c05de184bf40000000fc17ebfe3f9998a12e7583fdafdcfc1abb8b36218921a2cd49a9d9dc5746e8a4cdcc29fd6cbdb78d479f1e97f8aa00537efca066d7abb2f748b68f94daf3a77b iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14CA4791-0E31-11EF-B04F-52AF0AAB4D51} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 3052 1976 iexplore.exe 28 PID 1976 wrote to memory of 3052 1976 iexplore.exe 28 PID 1976 wrote to memory of 3052 1976 iexplore.exe 28 PID 1976 wrote to memory of 3052 1976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b479d9e2e5363440fde7bee7d30375b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534662c16c7aa9fea8f870fecf9d71221
SHA1f468f6511c1b2a4cf5157e6a3e059f40e0028a68
SHA2568e0b8ac68bfa8047f6639772ec12d9bddb92f87784ad45a5be04b3bcdf14ac3a
SHA512e29ea0e5c6e9c2fa6646103ae0889397ba2d6e593c091fbefe71d028a9aac4547aa5d13ddbfce4b83662bdec6670b8d42c6493dea02927e5137f601128b678ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b7ff6a8580eba7a9e4b47d02e67d8d4
SHA19712c63cc34566bcbca6a5d7dd184f93cea43663
SHA25664c3641ea836e4ca4dad3c92a4f08ea848c4141e0c88959f13503062c2ac457c
SHA512466bb6b5659c05648d1caa1f83412297eadf8239efb7b5d4156fc0e28966629e8f63cecf5e7371b2193e294c1056405bca999338fb774c64a697f7ceeb3ffa76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cac01778d93c6c24213dbee29e4b5f03
SHA173a11d5aa9b7db0a92a3deed3e6cf569e1ca8086
SHA256ba087a9cf4257e77a55e917a98683c1df1edf0185c47852dab93c86670c274b5
SHA5129336281e34c106a83d6d2eab7d15bcde7c9979cc02f92ccad53f6eb9e9a99c00785e68435d69f5d8e6de23268ada567d5bdc4c1c1d55fc162e83757cf05362ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc4cc3d279bb5bf46827f0674998682e
SHA129215c11325564751dade8c897559c70d22ec5f7
SHA256f5aa7459b2dc9d3d52e08db1eaecd828f2155c9f1bf1082f77450f46ae42416c
SHA51230d53ff798d2161e730d7f1471c66ad171efdf45ed974d48dbc9ad7d7e72c223ee28dc655ac78068814daec77b299aa594adf3ca90348ab61d7b67456361e66b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e20bfa38e0210ce648ad3f65cce9b302
SHA1a178be9ba512336a4f4a4cb9a8409ed9c110fbe9
SHA25670d429c7308c47952637e514b2f0aa320e369c90ba73cac08b2c95f40cc70699
SHA512f200f2a467102675115da19a9b74b30d07d5d07993b25481f57252a3fa9065f3278936dba97e49015742c700e8fe84623be38e5f2fcf68d0bf7ab1d1b77b1fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51595ef6d7392806219b8f3e8e1d33a7f
SHA1e9b63decc99279b8e7bea04581ec4c42a61b5a09
SHA2560c2187727762c0aec1b869eb3cf5ff8850423ccbdddc0b3da998689411f392f3
SHA512c46f56c4c4324dcdceac1a47e99a9cc727c93ae889b46e6018098ab600187a782bb05c71d7f00387b096b6d8a46bb7fb671237ee0c6ec7923f66e7a8ec8e26ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f05d03d10833392a3fb5ac114b77c5e
SHA1190001c8ff4d99a6c48aa3a8356a27da9b4e656a
SHA256cf9c8a70b8ed020a7ab8fd253be9aecbe8126c4420d8b7eb3a0dffe76d45844a
SHA5123e918bcc99a5d19187d44ddbc5cde33359c9be30c65f477d4c3504e7789237d7958530dc9cdf17ddd978205f20c30ec2e2b239898be2d7444950e31291bb67f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3e1ed5f54482824d0eb3f5e3815905d
SHA12a62720fc822c72f8f71aa584fd2d1eb8128a2ab
SHA25670718504409fbfac84cf29d50c169ad9f0bbb71791d9b213de7905c1779e15e4
SHA5123d23a0011f7901fa93bdc652c7b0a9ebd91e72a2608d5aa19db58203295d87ef5f0d38689bcfe2e8f493ea1c2e18f933fe292a62a2a50c8fcb639264f8216043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518d98d8c057d1856a9b212c8efaac356
SHA1a9497650f5f9f486d780f26c4add4d2ebcc01a12
SHA2560673d0b33399ebeffd9e0d8b839f6142ebf39629b85a24bfbd620d5137ec5716
SHA512a872f8edc1cc6e712ae617083983c36dc6979243178b416545824d4583ac8d8dbb2c2072974fe9c3ee728b27ecaaebf7c8537a5b14e8c36a8549dd278c30f914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a86ea2d0d1de4ab1b99cefc5e6f9ed0
SHA109673b511e2a0fbee5a4ec48f35ea854f362e128
SHA256766e0b0ba63c97a974f66f6532e6447d472d4747933d7e148d57e1ba34c3a166
SHA5124c3749b5182bc61bb0617e4e534dcdde7073f4d24a92733382da64a9d48606321faa42ef3a3ed61185214db19074c2b2ef454be8ea9f3308f220344b30f61ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54594a07993d5f9b738f28b1390b67ece
SHA18a497a3284b528d5bf127c5ac350acc4ab05119d
SHA25611101a81011b058c5495dbcbd8186cd8f0962113a75adc94728668df7d347750
SHA5125ad137641e34c8554c1c217c9a7c042a7b23b0fddbcc8cf3a4b04d164078ea37c06b80b797c494da23e72d55dfa812528818eafde455030bf2c3f2e6e64882a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a5f2868f41dd912a75b742bd8dba7d9
SHA18a377c1a1faf9fbc2f272df25fb39961d0b1eec7
SHA256548fcca65b2dbb82c1e3ae00c5314acfa1567254d35332c513bb194d70dd0fdb
SHA51287b5d80e33c2a4b5b525dbe8099826a408f631dcfb6943a9576c63ddd44b63713d71f3c8cb1c5f0ba44f092919dc4fc469c1f6d14af104eee8b1760a9e24ea7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579e5ec628dd374eb103e059b038e69d1
SHA16e070839158d562b5265a5393f25d19bad84b5ce
SHA2566d34c32eac57d3258c16469ec0f7c655d73fe0995931ca408eba25b70d2a3ff8
SHA5127d58895ce51bbdb0c1acd52fe4331a28ff506b6427d0864e208745c372621869212b6b8adb067fd6a68b1d8e932f3f71d007a6bc7d817ea5e8e3092a9cb24276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9d8dcefd0eab12ecbb00bdb103536a7
SHA1001c866677e894f8c13ccebe6362bbfd0089acc0
SHA2568377c5d00ced758a315fe9761436fea74f5bb633bc6c424197281e0ea80284e1
SHA512046b485e831b61ce8c53ccd683a01f7711cf430bde6d4a4fa3ec27d579a943b90faeb45041caaf08dbf62c57a692ae5f0c84bc475262e2c679ed940d50a133e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd713f66d976033818afbe6831ac2dc9
SHA1dc6a1d12108e0e0d06164202c5ebe97639dcbc0a
SHA256349c10899b6b84b46f6216bcc5935134833e97777a11024ab0e13102d05567d9
SHA51216c96f8354be0f1bda3f3fcd10c7a039f2e579a8d6d6d6007a6aed39186e65efab2885951e63aac68f060be6f042f76b43ad2084e90f497be46cf37f4718f3ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5700ec907a5845f6900b5bd864054d61f
SHA1ff5cb1a18bd76cfa963080245533e929b448315e
SHA256c3687df4ee0c73eb65d9657715cf295f1e3230acf76870c8a2932bc7cc47ad77
SHA5121aaa4bf8e3f20967daf67ecfaf6b5ec89f257c6acbd99bbf4a8314e1a3557e242bb92e908528d6357c84500b1e6ca7935804367f92294906c73c3bac102b2a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52694ed8ed43be0f27f5dc18e78b4d0ed
SHA1a6ee1e11c3301158d8884466e64b0be17aaa1a76
SHA256d602fe3bfa3d1913cef74cde496b039265b0d2bae798c10251f30171baeff542
SHA512945f04ddc014eb4c72da14a6d75061f77f37ba3227b8e03bbd6d3d4855bbd6a022f4beaa90a88b32a773616e54c94ad77ecb86e01e4ede4a9d32e29fb8523545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530e8c11c84022fc88d699de00f500834
SHA1966c65bfef55a32897ca67ec9b6229ba4ed80884
SHA25661593ff7404124c4c71bf3ab85a612b07a9562874ff8aacbc7a612e776e5f307
SHA5126a8a6ef6b301198c7bff1d91004e01ba259bc1cd29f2af73b291227b0feaf945964d322122d51344578d8ed7a65eb31aca65c4d4053da94922860e5bf6cdf76f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d77f44650e690de2a27baf4b99b89aee
SHA13f310752a1b52e9b4a6798f2ee43e370980de0b3
SHA256a83f4b54b883e15d8d13b4beb151b8a255dfda97251e927316875d3db6fc5213
SHA512f797af9b3b2c50b85d4e7009b640fef77fea212984d472dcf8c4248f07bc6845bb0ea1adbbbe1c53105d997c2507069be39e9683b64b69ba957b9130089ebd92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58635183973799ce973c4af2aebb1f2ad
SHA1c269aab0d49f4462c6c60fafedbc5d54903a54c7
SHA2568307ae890b13e561e1a8a81cf8a72ee19d8597e5020622ad78ee36aa1d5e8756
SHA5126277c5ea7b48c18463db52089ef8fd2106decae9b9db5211b77d5c3b76c4f444fe15d49f57359eb2760893f18604d13d1263d2e75c62c96df239cd5d22e006d6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a