Analysis
-
max time kernel
144s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
2bc66442a72407e3119167100c2501c5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2bc66442a72407e3119167100c2501c5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2bc66442a72407e3119167100c2501c5_JaffaCakes118.html
-
Size
24KB
-
MD5
2bc66442a72407e3119167100c2501c5
-
SHA1
bc7601640c22ce0806847d43c0132e86f62ffeb0
-
SHA256
aeb26d941a09d8b8098ace02d6069d4f36e686bceb9fef74dad4d1d3e0a26ad5
-
SHA512
d6fa5f0d38cfdfa79cba67c651fde126cc53bdb74d259232b9154652e69bbe1fd1debf117a1e1a869379f865310e2e496062904e1af7508c3044c00cde65108b
-
SSDEEP
192:WLZLwKQzUOH8/h1uUdQ/uQe/lCpqBl06B+W1Th8Pi6bp+L5WafW8OhR0Z9L4UiIP:fvU2/INEy1TyfeZ5EVm
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A19C7991-0E4A-11EF-B671-4AE872E97954} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0efe07957a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000009bcbf86eefa030a93c3d9200cea0b0a800b631836c25de5c6846389a545f0a89000000000e8000000002000020000000a5ee425616b05624bc586fa369eeeab1ef5e161831ff3780bd841f89f37434362000000027d5c7fc962d9e068a7a42c4bff89f208ac09ef279979d7354e820091176629c40000000da5d8a30678525f22df16d98e79d5ac05667eee533d233ea349d9cfa718bc9c5c3c9e1b5112ad1324f7bfbe0a5651a450f881d5c41aaf1b4498c1bfd72d8f059 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421451786" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2484 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2484 2988 iexplore.exe 28 PID 2988 wrote to memory of 2484 2988 iexplore.exe 28 PID 2988 wrote to memory of 2484 2988 iexplore.exe 28 PID 2988 wrote to memory of 2484 2988 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2bc66442a72407e3119167100c2501c5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522dba2a11c06dea778a160dd093e58ba
SHA1067a417c4a4d9ae4ab84aef775bd90a6e1d09269
SHA256cd2cb7bf0c1fb51e4ee45b326e852760ec22a646e3fe71ea1ee110294a683a65
SHA5125c52961483c256b4be0e0daf197dbdfc85f87fb172689e8314eabda1b9a09df53c9cb302680e8b10acc8a6da2ca96630ed3972b5026393b1ea927733456e9aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7602625f7bdb2830462fa26858ee194
SHA10931f427fc4ba42061145071de31d2d944392ed4
SHA256df8d29c1098ef71c48e0a77adba080cb84b725f6f223518a590b9b0462b616f6
SHA512594ac8e736d5637e373c2de5c3072a0550d0c06c9cfdab1d62ae2a7fbb091a1e26838cb81039e94765950209b4e01cea3872f4548ffb7d8dd2a5dc9661f95b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e71d9125ed3d64f975f528ebb8496225
SHA1e24d0d11d27a9bcbeedde66016f1d6dd651ded96
SHA25627f96fe9684753943acba5dde428844d5f9f6162b06e7bf453bd385f81df820d
SHA5128ba08bc8dc83c94e35506073253a78455f42c54687f3494d659154690ed589de906b254a0215d95b9848f681e712dcd408994ad40d0eba427b48a972bb961a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a68dd1487e63ec973c2a6668ee93eb7
SHA1d90a48e441e5a6dc5b4f83558fa902a4b492d63e
SHA256968a7049c80db1ecf79867c69f3496875e31087189ec25e9b4d201a37beff7a3
SHA512b034078c76165828573e897591a718fd82437122613e34a6c185c0b7d1280f984c94db68d45a0adce889b88e2531522c18ea716ffe342b1dfcac1d28fb8453d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eec2f30f74018edd7743d439214f4b5
SHA14e2e59b140d4ea4099771766e61ee06667e8e0ff
SHA2560483555fdaee328aa2ab4c61ee8dd93cc86facc82e09df6cb26e495519853319
SHA51271830ea4ffa61fafaf703518628adafc2d5a7d62f252b93117521ddee93d4b0514c03da8877c839cce274541333325ae803cfc5e8a7ceccba4ff156583dd35b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5521767f411e61d58db4ea9cca544c6a6
SHA1e0163d43e3032aeb2ba856cdf5058186ac17b96a
SHA256ee54f6052d1c8dd154c899fa1fb3396b4d1a60b2ea4dd30aa1cafe573109cee1
SHA512c27d79d8e966885b91084dba798e3fb4f6a6227cba74450782d9b40d8c957b255a32e3279d6b139cd203568a8c7955fda00b475e4ebbf71548a2a4e046187007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbe099cc1bd5a7d2f27dc11efb69acbd
SHA114ff4b26cda24d00f3af562883ef045fc352abea
SHA256a0d47931d1cfa7fe1f3a8dacf236a9688269e466579c377067888ef6032bbbb8
SHA512fab1a0a34d4faf000890c1eb7e729935612c43edf17d910c1e26c91c981a3d065613b7bffe706910342fb3cd894981185b02b4e8c60645284e5e4fd51e44c44d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6c6837f69272f468ecca10bd35868fa
SHA19233a0b05e080c22320159c373e648c3af2033be
SHA256b93286f330f386dcd3b2394231037d8f20c0625d8bc4303a98d611b8bcd62c78
SHA512fde5790bfa56dce2bcd22efb35a43e8916c095b364acb419669b2f197ab75fe8a4cb2daacd70adb366b8276afe3a83dadcda855562011681f095aaf7f2b82be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533212c1b4e8637c6b0b18604a76e0cb9
SHA1fcada03c1a0d39f36b40aea07005f42ee57eccd4
SHA2561cac163cdf9f131d0755d399f65dc39449e49c9edcac236e3d8071a277ed945b
SHA5121f73c6ac2b981f76d1d2aa2a714a74b1d311bf8fab7781bebe59825a975604cebae53958b1d83afd2da0969ce52069bd351a447e308e35dc60f6655529357c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53abc7adb36194a97803c8ce474fdba8a
SHA10d82fd27b6fb6af75209dbedbd681fa7ad95425f
SHA256810b33a70016ccc1080e164a93f207240790714fabd61682a50f060b362d5fb3
SHA51299d30c7bf1ff1c8add5e19bb727a8b4470f1d06496c7f73525ccd771dea61cdfc207c1ae79dbc01e1a5d03bfeef3190395a9bd7999ea1947e87c6b435ac9f6fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6ad39f268f7cb948e5e121a57043269
SHA1a105324cd66b09cc6e5f3da353096f824ca51886
SHA25611aeedbaec7c6d665e6d6c424ce47f1fd2b340503d83761ad6022d70aac1c0d8
SHA51233879ed94ea4f4cb935702c14756da016856976c2fbc6ce81c72aa6e792822f2cafc0616e06c709e4bfcd6323952484c4af477c88b7d381b6558e95456a5e123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51460b4442cbef0df9d8b883e2ca3b570
SHA18adc11621831e59e28653bd22f429ba33d5a1a00
SHA2566fa73f05ec8cafc53cbd55423948220edccfc8d8f87e32a68e27af9987e781d1
SHA51279e409595243661e1a17596262a6bfc65e70acd1019393607abbf3e93c6aafc9cb651d1e4565ac1cae155726d545fcee791bcfcac11079dbd1cee900d0d3f9bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a81739e7161f8a2805c4f284a495c41
SHA17be153ebbcbe5ec23f6746a00c32f2259301aedb
SHA25612020fa9578eb81e610501452c67292b764362c3cb81c88f15797ea4b4c2b61f
SHA51219e1c4eefe8138d26c4df16aa00f9a44c98f08a1b7b956ba36830537e4a28748ce94817a98f8bec575e510603939c8eba2f9a238c6ee163bc41a06e702521326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af4ebf7a02a43c0a1a3509b477c727e3
SHA1b94937805ec8a72cde2111b5df9507cd20b97bb1
SHA256cb3c0e89282cb7a7b696168c975f5240cda2a6d88064f0851892c0753306214f
SHA5128197b22de49df5017cadfe68ec1655f2310a7de4a4f4f3e1890b925d240efb3d4e9fa4046a7d730f5dab8224b7c2cfab79df5b0998108799f4f038db4b5b060d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56200dc516dd3eeed6b724776a22e4c4d
SHA17f1f1c2f4c232440357e5ef3925329b4ebe77c4c
SHA2560acf29ed1cd27771a46966c0116fcb64b9da0ce318a21525256fbb7ce05e492d
SHA5120bd896b9f3f520efa881383250c7cb1cb8efa0037f4b80877b22032157f93d04640aecda208ef83ad4d390531c435e667ba806c5f828d5eb8457f52704bda809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed39d7f4abaaf18615000709ebcf46c5
SHA1f8046210623ca3d971f59fa344c5ea770bc01efd
SHA2560f6cde116f84ef2353990196d2670841a6cc94008e6ed1c7d7935c8f90580457
SHA512dc071012d316b759a1f84a851f1537b6b4a64576ac3ceb57cb22b3f579d761ef5ba27eac9b22b5a7eda570aab4c596d092b096316f76a70d9ad28b319c33d6d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7982cd8ba16df4b1c4eceff46e24a4c
SHA18b183782a2cd23f8d7741ea6c649f6d9217cfdd6
SHA2560d9bdcf79db228a6c2ed137b9705ea729f250d454dba17d31b3a1df2ae651cdd
SHA5128d4a8271c02cc3ed466f1ede1eea84d50fae35067956fff8ca2640075bf2b636fe171d81ac1dabcdf4e5426bda69aeb05c56ff742c73f7665e5067e42017c5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5235946b20913743ad8bcd7d5b9782632
SHA1181298379f1ac42846ade9eba653c582a0563169
SHA25687c7d57beb3cf4f6f5b71be1ef9da71362cfa04836d8caad441b8463ebf40955
SHA51239bf629ddf06a7c5cad4c5fe4f43b855f6ff7a464d8dfc6b77bc244b143055c998b040b516354c0be2b70e65192739d624087b1d77facd52acce3f6b75fac20a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba80f5848244d44a2f8a1fd27fc61381
SHA10b79d515ce484b89dcc8a9f3e06eeac82a63c630
SHA25656c817775c91390625da0332102ac5de5b1d10fc27149913235516a3549136bb
SHA512d1a65a3e4451bda10257b4fa1d4ce129a4b708d4dab2efad5d5e06396cb4ea444dcafe914d80b5c6d54cb808ce576ee0c1d40efdd4be8ff7e3fea143c3cb6529
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a