Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
2b9cdd658b7dbcfcc94160df2424a58b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2b9cdd658b7dbcfcc94160df2424a58b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2b9cdd658b7dbcfcc94160df2424a58b_JaffaCakes118.html
-
Size
70KB
-
MD5
2b9cdd658b7dbcfcc94160df2424a58b
-
SHA1
028c0b8e474da3483ccbcf3f0eaf89ee88df277d
-
SHA256
fb1102cc3ec839df7dd40d7562244b9f40a2e67d2faad45ce52924e7377ba1b4
-
SHA512
3341aaec7a4f9adf24ed30ceef2869a608c925daaeda3c7276e15ad3eb4b6f780c21f77794680e06b698cb0212e84f78ca0e891e9876fc2f746d7e3e17fcf21a
-
SSDEEP
1536:mrYkclBo7mo8uqdVbXyQsRcPyQ1nkzZK2A9tqUxmUqNbrZSbx:mEkclW7Yuq/XyQsRcCK9tRxmUqNbrZSd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421449169" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89C1A121-0E44-11EF-A0EE-F2EF6E19F123} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2904 2876 iexplore.exe 28 PID 2876 wrote to memory of 2904 2876 iexplore.exe 28 PID 2876 wrote to memory of 2904 2876 iexplore.exe 28 PID 2876 wrote to memory of 2904 2876 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b9cdd658b7dbcfcc94160df2424a58b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD586308eb0cc87af12d593771994826323
SHA176f74ee893a0fa2deb63a38352d290052e03363f
SHA25634ca1dc3b6a8fa498e3b0a1b5f6dc80e41ffefd986e742791f6bc36a9a851009
SHA512bbecbeabf49f8ab6dfd1cb2c7258ea086ce0d90f97a0d95a8a75917d18eaf69df7b63153fa65f89522179a9eea1a1464bfe595c27b43ee036dac11804cbe33f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fb923e80e7255ea930316e960443cee
SHA15aafa3214cf661fc6d6c9df7b3ffd486a63da7cd
SHA256324dc7c29ab4d4e1e11055d88a14aed04e4437bf2ce2b87fd056d7878349ce06
SHA512537a4119105a4b72146476836608b6cf8464758c98df37c0b5dd19f42c0d869914a401701cfae8986023772fc9d404639c06fcbc7c04ea5afe5220ee2b5c8078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590a76bde9c9c2227810f7f62aea24765
SHA18f570f51ed83b6dc3a218871e5d04e45297a9464
SHA2569dd7954dd1e418ccc450be4ee2fe89a58d62627dcf0201b4a5db8a507620dea8
SHA512c56d13e49b14df60411f647cf0a22d6f416ba3947c97736b72a67698cb153706f77ced23fb1057bbb5a9e598509e6708ebdcb7a49a82a540fe9972b53d2d465d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b51fabe2a76499e487e705bc22c83ec5
SHA1cc7c3406f489770784790fb8ab8eb567a32a9e32
SHA2568681635b5ebcfd331c119b48ed208686ac09caa007e228ed0fb4396a0b12c4f5
SHA512f3d8f06e6ea1b010c3f51ecc8c7bb6209a3cd9667f0dde4225454b4ced623b071f63ba8eb4f2cd0580b2ef094f69532830eaf767cfa446bb7d37c5b3360c46d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57966c047b20b0c7a8f9db70abc02d2f4
SHA110d11519e5404c741f35ad0e1f1850a6b21d67a8
SHA2561896d4c2da9f02dace1b96e9d938262b99823648e962672a1cbc6010102b973d
SHA51298bbb0a7043f03e9218995b867c76d2a94075d19513bd01b585be5f9b97ba808cfa6c13db0dd59056c89009140716a32c40df21fba158f99765dd303389ef70f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a142608b0c7a1daef72286d83bda9156
SHA19a705372e8df20ced268db474b8662af9bf8365d
SHA2562e70b32565ab4e285a1cc28625d3531067f3566d3dd9a5f182e901a4a0c587b5
SHA512273f5481961b20968c96f15ad7f929da0d9448f89f8dafb8edb68bf1c916a8730e676caaba843759fd7e0506cb949261f4eb37fdf7bffa2e97398407c59b8d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b61e49dbc7dc855ca1345f473466e20c
SHA142f7465356e4fc4e596317ac6f9f9933176a27c0
SHA2569c9e5981844485167fa33595540609699cdeaa95b00cc6d825a2c924c878c5ee
SHA512382d4819810d4171ce8c1b6b2ba361c5a7cd56c22398a5381b00093d7ef489c35ad38b04129adc2726d400d49591fd3186d27a23215a3b043a2c46c7b6b5086c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa64daff2d3816d20225e3468ee5431f
SHA15c560c9775b78fa3e883bf67d2a8887aaceacd98
SHA256d5a821b74eac503c9645260a55ac47da78b145a2833c5fd6b2236d462bde11a2
SHA512c1e4146ca0a8544b9957f90c1d75e4942b65415572adf798e25a49cd43ed8c6ba54a1657c32faa29cb6a8e9a15b64de88b2d9255d22c060df7abd403fe632ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f94c0a1fc4f72b5450c9f866a4db0a81
SHA13987f775bacc43ff1a307129e5be920ba49ef3b9
SHA25690b17134ceed34cedaae0e75f3bdceaa0b1b872e20215c2f8ead71b9dee5661a
SHA512d0ad41eb10ad443429dcb0871d27ae5ec2344cc502ef39f438a6fa16cb64144aa2b417252c2436a7db5c35bed13832d7ada7b25783c84a68d787131e8e7fe169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8bf8322c8cf57404c3464e01aafe3f4
SHA159a6aa249994857b7a594d6d4f670bd1286e6054
SHA256809ec74228f2adadfb9bb8298b3ded3a3be78a75724a339fb3d1948e629517f4
SHA51214c23294b6102a58d215b8bd3b43b47e9fed7311ef8a4eed819ec768c07552ba94da8d5caa8f6243ca71471b6aa8e8d7e259fc82f52dd43897298293a774e738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510ec846eedc56d97074c552be4b53e62
SHA1c384ed5dab52d1ab64d87df3a410255ff1a469e4
SHA256ffb48732a3aa549838a2781904984efcbf82a37b5920d5d709edcffea01bffe4
SHA512bf5b0c7786489efc15a92fa1dd591b3ea15c5c56eb10f8d1523368130d743cc958000fbe09c1cb62930d33d3de88aaf29f9ceda53173562b4af30416c302ad94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5420c9420ebd71736db8893c3af4067c6
SHA17c0204ecf3e96a50e538bbdf2420b04912e70545
SHA2567c45f2275333be67fe933ab056f22964089141448d10c70fe64248eb90f988af
SHA512d8d4322a0e818ccc4ac45461d39c080e5fae01f519abed22db80dbb052a7bfcdc76d9fbf291bf2a9b7970494ed4218bf3a6a9796595e9fe5d53a6e218c6b76b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f53b531bf70b88ad4c67eb3cb9a71991
SHA1146b07e004e9ee3b2eb72fc3bc3f9fe36fde784b
SHA256eb81437502b46f0261ca8f99294624ff64f7f3da8754417c11714ded64d970c4
SHA512770bc37adc1ebb6861e3cceaa2c9bd39604a2647fb9f572540a763ccc84307b10c5ffac49e71e98d2d879d5d211a3f79875d39931106b10164ea46c6979ef045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD589636af4c5aec68056a7993e723c7c06
SHA11bba376999da781a0467172eca150801d746a16a
SHA256c4775004176b5334790252448c95495e8835f3593db43a5efabb7290879cdd38
SHA512f0f0dfb3753ced054d941a6257beadf4a215667a903fbb513fb8950fd6942b46a6b2c89783a5accddc3a228c73d8df425d923d5ead958187483999b829861ce0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a