Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 20:36
Static task
static1
Behavioral task
behavioral1
Sample
2b981c295e8832348460dc7d3d3bb586_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2b981c295e8832348460dc7d3d3bb586_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2b981c295e8832348460dc7d3d3bb586_JaffaCakes118.html
-
Size
460KB
-
MD5
2b981c295e8832348460dc7d3d3bb586
-
SHA1
f277e37ea9cfe5a4aa5e874adac0e00dd1edc92d
-
SHA256
932c8ae3fbc6f9fea4a3380ad1b325e697013ffa53fa82aab3f9a527c188e5af
-
SHA512
926efc3599916dd2a27b283197e0c4a923f4e570c65de93292c4a70a4df7cea2d157ecb8a28c30737ab7585dbee31ba8dda0674e02c4e1aa938fd2a85e29fa3a
-
SSDEEP
6144:SCsMYod+X3oI+Y3QbsMYod+X3oI+YnsMYod+X3oI+YLsMYod+X3oI+YQ:75d+X3O5d+X3t5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000b1f25d7ea9a99daf796d4721dbc5d6325be789a875e000fca7dde7108490ed96000000000e8000000002000020000000b5cc65b0d427ba4ba32bd3cd71863f03b0540a37f78f2452829bb5ead5ca7b5820000000f44dc8c200a82039c36285993173c05dec1305adfa61d8843c55c67cd00eff67400000008213f9408cfae9513bbd195fc883d85a8cd10b783a793337a2206510bcb964c45cfa6b1b3e2ee9a59a1e88d9f62df4f68712faed841f486df3d7fdc674d71cc9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C77C0471-0E43-11EF-A596-F62ADD16694A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c051f79f50a2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421448842" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2652 3032 iexplore.exe 28 PID 3032 wrote to memory of 2652 3032 iexplore.exe 28 PID 3032 wrote to memory of 2652 3032 iexplore.exe 28 PID 3032 wrote to memory of 2652 3032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b981c295e8832348460dc7d3d3bb586_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569ad18cfc29a84e1886223d11878d2e0
SHA1a6cd93a428855f1a2dbc4bddd9ee0e2d06e5dacf
SHA2567df166d213a4576b8f013f565e890ad1e07100b36dc61a0443418f2f08bce9d7
SHA512b2801630fc344dd47d37b72d4b7f2f1c2dd02653e86b6d92083d5f5f8350c29503b5ee278415c0345302e9bf80df7a6594399202d723952f96ee39b360d8829a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a97de9d6f1826d5e3677c8efacfa3bbf
SHA16fbb7e73b21332bb528473c0883aae2a2d90528a
SHA256570d8ffdf76efef4f4e9be6b1bd02e5faa7ffdadd2f2ffa520fb4f6155243822
SHA512b4ca06c70a7ad9d0fcdf07c1995dc7d107c8b64b47f0c34f9a21bba5d4c151ed29da699de3a11054ae0220ca5535ab3db34b6d97415ca67458e83bc9c2f571bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1ba7aa08079fa197b87f7cdd8fc7246
SHA11660317a458b948f8897491314f905adfa7090f0
SHA256b56dc1fdb42410883c917e4990eae9910bcb7b55202f9ffbbee1a2292e753c0e
SHA51290983367cb30839196a04e014f841ae6653f7af7db68619b7e2aa3a91df180f52504ce33d6d030afda4ba55d70e6e3a9c1a5ebd2335b382990ab0e95e815523c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539ef6ddf9812bd8704e92d9502d193cd
SHA1f41dafdf4f4440314fa4875192ea59da1ec41223
SHA2563808450e8337689846a3c861a7e19e463083c5d217be27181224a0260fe0eede
SHA512a48116f8b5f61fe20b9e008d404131c3432dda2e172f8b73de920e73e7398f1264535ab19b697b0497520fa929d456e59c938a2b142050356831bea9dcb0540f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58018afb1e84f0512d237138fd0ef2089
SHA1e25ff3539821d6eff72345934470aeda53df858d
SHA2563fae52483133cde57c5ce320ab914704894d6a1081792c022f8ba58e7ee362cb
SHA512478707b009454af9950e1e5db92a27f15770930463e3b4411c54126caf72854ff0a59493c947bb5f1a672d42c8cb100f9512f1b69a7b5f9e690cc7a2c7fe793b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5101ad8b28bd24b38998cd1e73180efea
SHA16a497baa034fceb9516a605753440e018bc07302
SHA256a198bc77040ee700ca2023644028c4c1a4e26d9920742083054a0bc0df94db7e
SHA5126cd4b8ae9596419a71ed4a064095c3b6622683b78f5417e91cf6850bd9e5c0cd1a21d8aaf25afcf9ddd5753b5df74ff6601bc274ba120ddddd3b8ec4dc729af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53645a46ebdf6fab4296bf8a9524c6572
SHA1d57fc2db0863ef5078c322c1500ad20b0848b404
SHA25647f7bdc27c0ef6732f486f662080035ff08ac0662c945e17c529f95141de4340
SHA5121209d72288e6aaaee9058306f8e3a34144bd86dad20d0f5bab36b6722b49d28fc941d12b217ea62fcf21018838b919fbba9450a0ff788c93386094d7b2c7ead4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e3b274dd0ce1adfb4f5a7d5eb60bda0
SHA1e5d350c35cfd761e07d029ea0d167c3d3dcc1e5c
SHA25653ec40e45ab3e11dd488313997955ef7e1b9f89e1b3c683e07aa06c23b168768
SHA512f28841957bcbc040b37745ec29495019c408705c44dcf4b758ff164b3097ef911825b1fd899b6e15910383ac27580d282174b731621eef2a5dfb300c3ba7cf54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b8a202b2285821a55d20e40834d59ae
SHA120b12acfad3a3151589f05114fc1f6ca5d17ec2c
SHA256a8b1e3e40a21e8d3391e88529b9eed4caa85172c499cb1d6224d479c0aa19a63
SHA512db7b4570a8f48be5115147a55d02e0ec1d699e211081b129512654a05aec378c645f623e7e0fb11612c1e2835b12e8df8897ce49c29485a1c0d5b230666c77c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a56421dbcd56fd7057788a14f59d51aa
SHA1a44d24cf88a466d78f8d803cec3b6dc3cd8eeb24
SHA256c387a3d33961fb593d349b8d55115ea1a65b7ed2374783cf4454d5c6a8334266
SHA5125cfdeb8663f2936219822345471030d41ea69073ae37549c75ab33350408930ed6f4fbd8e3936d67da83a1f0f9c80751de47addcb86e2816a475e988095bb750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb52840b1305383790ce7c4807fd580a
SHA140a909edaf3f2bc3174e14c76afb4add8619fe3d
SHA256260e390091675f4ccab79afd34eb44052dfe3173eda897c799af635c4a8b6aac
SHA512dfa52dfa062ada6909f9eba4dd36594a0c71b83c18a0938fa18fc6020207cb0a1705eebf10dcc03b2917550f15376e04f8828df2cd7f9d11e074f89f9f3796c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6a1107629b56d3b010ff28b760a6587
SHA161b143c2d48a9f3b5fd5c0e15381701c04c64188
SHA25640c8833f1dbde0a1a004d4d55dda374ce2b91be33a6aebc48679af54a2cb91b6
SHA512c35c8f805ed8a55bc17bcbbbf75e70ad93c748404a3dcff83258a202d1f665bfcd56a419fe8f5e911ff342eb7a931bc179e0763605efbefefe2738527eb2c05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf775972d780079f4c6408f5923a5042
SHA16cbe23adcc792f476a6e6b40a36c34b4f577b741
SHA25692bbd67e16ab441a4765ec4a5d9e18b73c4ede0bd7d2ba864af57ba9206b590e
SHA512b39f7c3d65b4c654f3f9ba42a40e025e5d71549155dd77adbc5ab4e896a0b1e2577a57010bf1a119bdd222bacb4c2b14945cbbe06f086a38cca80d64ca84728e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592b3fec83d1c64460144c5c7a9c0f9c3
SHA15fe3e6289a3b1385b6bb7ad5dfd27bf1ae6e210f
SHA2569c587b0db8c724fba944d6521c1b2b4b89a8b5a86226b0ff8a8ad36ddb762f33
SHA5124214844c306436f415e93be61f1b6045daecf727a6ba940a39d4dd34533ac48b942c90f23550e31100eb0a86c3dc8bec7c705efafd23cc64f450b692eb538d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59891940e489e8403820ef8eeb6a7966f
SHA1f719837bbcf71340b262aef45b1fd0f109d24ada
SHA256e7b5e1ae9c3ed0fc84a04a70dc09e7680e77d3d05755a073c87d8877cd15def7
SHA51268274384016b984e7d98984d8e10375640169ffa29a526aa8e5ebea7c230bdd19747ed1322706c763d5d449b7ad48d8c95edb8bd30bc74d6d657765173814397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b10e99366a52369f50840145afeab76d
SHA1c497f719bbb1588ae35d9e8df65045469234be0b
SHA2564d1646887abb7a2f8d39bab347351c23bdac15f09ac5e3dbb12343bc691ec9f2
SHA5121d9b8ce4df0929bf7dc5280a66c2602bf9890c1c88a31f093f688d7d6ffeab6b8fa16d4d99e3938291e03afa471c6088102177c49f2798eb95334e1f3499c8c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ece5c32ac3163176b03c6529c3c270b4
SHA1ca9c60edb5008b1b97e868103dd4d73c33861288
SHA256bd947a8f792031c10dcf563d44d124e797c8b36a083b8e2576097225f526b9eb
SHA5125a64d96f51d1b6870e2484fe686af812116be5598de0874d52c051a5088cfb9607f9070d48e4f94068739a6a160752829138cace48ea5798ead3ee581d533232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e265d961ecf59d087a1351333ea08e84
SHA13109f3c5453882eb2bdc071129882e3c60f8814a
SHA25684349063fca30a871243fbf9ece86d31072233c56118243e1ef7e356a8e5f9f4
SHA5122082b42dd42dd1338c13925404bcc62bd05a3e501ca8edd46356bf4b4348fff0d26a87b4779cc5cb6570d7d455548cd3ea47d4bfb972ecadbc113f041ccba3d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5c0357ffd8b2a4f6d0a7d0a54139e08
SHA1c8c24446db115dbee818e6f86cc602fda33b0a42
SHA256e09c3f24983c978753b447d275700cd53922dde7898a631c8d4193206edf95e5
SHA51259e08b05134a017c3a6037d184003aab65a4313af87302e56586f67ebfdd9afe0cfd7df8baff4394230aad78bd920c547c429979ec41ff0fb8de9a919995a86b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a