Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
2c858a77042600385dffe05ff43654ff_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2c858a77042600385dffe05ff43654ff_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2c858a77042600385dffe05ff43654ff_JaffaCakes118.html
-
Size
34KB
-
MD5
2c858a77042600385dffe05ff43654ff
-
SHA1
b3b27c6efb2a306d72bd77e37424247f1cdb2740
-
SHA256
29894c701a391f89bcf032cd0886856d4a8dbaf2ad849dfb616756e74e8e7256
-
SHA512
b650e4f74e9af33c0310969d28014a617e415860268a6ebc378a7d552e9306ffd953b7e94091e814f6f5ac70b4c3a52a4894a29760221dab10d600af84343a8f
-
SSDEEP
768:wqArFRc6xna0sk1IJbt/7v8nsyEHAsv68p+3:wqio2pBCbt/z8nsPTbps
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0bec0ea73a2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421464000" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12E63D91-0E67-11EF-97A3-C6E8F1D2B27D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000b6bbad1fe65670c49055fcb7e76dece8615d3cbbbf4961fed87757426097ecab000000000e8000000002000020000000f99668d21b06700620b77996c9a8cd69b0af52d2e86c68b4bc7454f447fd6f51200000004aaf7d52e860dab01ef79802edfe4f60934e74e8e16290fb236c51f781d3905c400000006ec3dce1efd5506ce12c063b10e5b6e2dadfc4250ad4a7f91964f2fde1edbd31708256d795ddbb8db05cc394dcfc103dd530ac7d391d365f0bec82271dc26630 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1648 2420 iexplore.exe 28 PID 2420 wrote to memory of 1648 2420 iexplore.exe 28 PID 2420 wrote to memory of 1648 2420 iexplore.exe 28 PID 2420 wrote to memory of 1648 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c858a77042600385dffe05ff43654ff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50763614e3d75d774c2303ff4e0da676e
SHA1e8bf2e2c99a5c06809e5c176fd73e252f95f5547
SHA2567b70e634812e71cce4401df687fba02a517e48a5782ad9067d97303a3d8c416e
SHA5126ac53c1c4a60df7d589dc0f687ccd4e16a4b378f3eb99c2f1654e940cafaba56969321ba0b285e4f231e791d29a065c853394bf8a7f6b4736abcefaea2a6d2fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59337f8ff22dbc0f7901e0605ca1196db
SHA12a70d6f23863daae9e765e523c675bf723caa7a6
SHA25629ca16a0efb4267c51eb03068f6a9999bd743bc737c9a30321a5666a5e6d2b8b
SHA5124399878b4cf021735e5ae95a672ba5959ccd00ede03d43e54826966f856ff277678693efc28aa48c40f47e8ec39898eac92d0f9b5bca32f24a71314866ccb9f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ed0a2bf8763204c7e1e15c8ace603cc
SHA190977e19dc3c420156ca085331c34690830c467b
SHA25602763dce994aedaca362c60b7917917ffbdce335b07dd49958d6f404534c6bd2
SHA512086cd726c30c01861fefbd3981c940451e7d6282fe34e5d97b83abc29fcf94cfef7255ed4869961d7fd8cbd4dfd9f1aff7d6b576d9cd991270fec9eef90dad98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565f539378b0255b140ae29509ef92365
SHA1545908365552341951df50c50450641cf5597c1f
SHA2561515edb7cbeee90daf9fae1a072c2c085ae86f556edb3f7e56694dad6de502ab
SHA512ffe394958d2d4bc9c25ea64f35e982f8c554066868945c06286674c4d3cb7bdf8169bcaeb29bfedfeb755ca69f380a8e33a123ca044f1ed58b52f36e42bbec25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576c027a0f561aff1dfcca2bdaa129144
SHA13c03e43655fd98c3957be2954d5d6bf46721d4b7
SHA256d24c8d3525bc588ae09eb88de53e2170ebb1d0eec31d69578ae3f179136fbd10
SHA5126c61da26c974fee95c5695528b4bc096cf1cbe22cfdf71a27a820c52022dd88f2b56840744c6076205186a26ccf1d400dc4bcf697b6f003ae9580b8ea7ba2cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515605f49dc6603882b469964904eb073
SHA1323165a999b8a5a3af29e58120dd13e439bfd224
SHA256c2fc67d9e47906651e69fb8a21ff3bb010bd42f5e512ee8c02e30ec5467c0753
SHA51234f99998f5bc542d81bc0fbc6aeddaf29a48a6726529edd68269bc0744dfdfe0ae370ad6954a8d83dc17ae79823dbfd154e6b05bda49a0a5f8ea91bda6598980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d0db3f14850f3a61a56148ddd4ed8db
SHA13ad46a5367b96252018010b17e882d6b50abcf3d
SHA256f0b5ae300678561f9bdfcd2e9cdc131c407a60a6cfca48a0eb1b7acbb395b8bb
SHA512081dc29c2cc42dadd4208851250c974b2c0a765d20a6be4626e10b53aa7ab0dda7c725ba1be6aff8bab994b0bb11d2c9eac684cc7456134844fa3770c3c9a157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8f6939db623edf2c3b5199a308e83e5
SHA1bc1ac2dfe17724adc2806ea5c8bbc5368b9c0292
SHA25646a04fcb13af58711dc87f5271a9df349695e988ed2e5319e1eed03d3d7e7c67
SHA5126cab16e7703dd25b22e4ea71e1189c90f3ad40965d59ff00257502233c174c39ddd72a3d3da38da226e5bae90510c12100e1346f4560e20811ebe5aba4b58b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ef66c042f54c19502d5a6adc7aa3ec3
SHA10047d65ba094b94c7355b5b5d44c9381c2be9302
SHA256d1e23e8170dfc88604e0bbde06abfcc616779a636791ab8f4c4aa9e611cc6a3b
SHA5125fd2f7caa1909f647c230b783218503ddea6981b0aa438b68cf0b30060a4bd157f758577e6d32cb67a0aedd02239d5ac5b98ea5f52eda2ee48a27d31db940920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530d734da781f9716487f9c7da46848c1
SHA1b0f4a828dc79e869dd94c7d55ec2c32b89ec1d90
SHA2561e83d5324c275932389856331b6957edf5ae91f5de43d42555b9bf17c9f2849e
SHA512d24ed0da96eefee4473d89cedc3d6a80223c461679cfdbd95ef01361a4a943d13af6795fa5ae3d383797a8d0eb6248a1cb924c8fe83bbc6d9192210ac221d985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e46406c6e7a8407e34962ec20980e61c
SHA17f7e380e3a861700cdedbe8a4d160f7f8e9a05e5
SHA256ac8dd3a57583041d8fdb8e6e69babdf12c3c35c08a95b357a0de5e1eede497c4
SHA5129dbd3bbe79f83e89533faf0953febda6b95dd2467a354d1430c8a101e2a68ab44aa92893c6c16f29bb1476a27074b3ab9336e0d5458c9cfcbfd5401a77f0b1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cfc48418daa8ca628e077d595658245
SHA17a7ac49693165a94a0ba410218e6510c2af87596
SHA256ec9fdc2a70e43dd45408fa096ab22b4f7ce2e1c0218ab4d8aab167c512c2c94d
SHA51238654472f2576c70374bc0837e13bdd9dcd824156a22887afe8e6cd7181b6e5543649bda5fba4a20589fc2d10f7daeae3eaea556be18b106651739906d85246c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d9407e801473edd952aca65119a03fb
SHA153f00c8872130c11bbbf93c63a6dc6a2acb8b05d
SHA2564445f62add7f0ab29b86d04efe8e9e03bcffa043cb4711b6210adda2887ee9bc
SHA512a70e09248a78b2f9733949edcee4a39502dfdc2d8acbcc12bbad9182f0f85741f4860f9661dd2b4d22271934221356c60dcf03952f92c29f9e3c9cb78dd9c7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ecad5501bbef7a14d8f3ae3491d05f8
SHA14cadf6932b74bbbd73281f031921f2e49dac105f
SHA256778a2943062b60e3bc94bb1d7f511556e736156021896741780f595ac844ff11
SHA512c7c290486c8d18b08ac6db159f96067e1b12e2128e71982483b9e1c9ea200c2197f88770a3ad8b2bcc1bccd1f0d19a304a5c3c6444cf810897817aac5c51eddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c215fde5556c8c46adf478efab0ed255
SHA18d2e2b9fb220938fadb64e26f6d02bae7a1199ad
SHA2566486cf6b10858f77bf4fc7c7c648116bf99afb898d4e8fdda0724cd3709513f5
SHA512006dbaab4e034d30ea40968a1a4c6f0b529b486891adf626ed2cf540c27fcb899e78d6e2117dac02ef10eb778ddda6a4ece64602efb9863040a83a35d5b23c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5657be6c8656c44e011390605b1872d23
SHA17ccef457258ebb05d769d5a7c45823600ff0945c
SHA25623c5ffa84e434a36763fec6a29ae3120ee4d15e65dd11d14a3fbec6710eff190
SHA5120d0e861233042008b657abf32514bfe2c455ffcbffeeca292100f97c4019fb0ac4aca1c94a5c211d8325a210792662d303510df0b171a4ffd9f614b963d52117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eef1a0689057681a31d615daa2d7a1a7
SHA16b175e3be83c885f5107a6ec91beea436b8c1dc7
SHA2564364b4419d5432a3ffdd52efc72b2e77ca19cc34dcc80b942b9bb396ca008124
SHA512b4c916444b7c215499a18f6ca862ff46f59f564a710fd140e12c1e4a0794fcb4b7c17520759b9d172476a5baf0b8e0fc390b63ab116fa4490dba12301b446b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54dc7aaa09e245e0cf830f4d3adc26dd6
SHA1be4db330eac077f235d92b71dea5445bb9605e96
SHA256f1ddac8e0caf4dfbcc7293c1d8c90094738455199fe4f227385204932d5ac2f3
SHA512a2e71262d1db80a0fe15bed8a3fc424d1127e5c26ef09d4b9f6b484e4e10fadb6f2dc6e83efe9913618c6deea0d7544c72e7d2ead4bd196afe2a437456f63b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a2a8790340710aff2a4770e8d8be036
SHA15942c2ea06dffaf883d9cb51c07f0d2865a3e674
SHA2562da7fba4c6b654bcca8adfa7089f0c3f955b72321e80e59a3f1a2c33cec2f3c2
SHA5121b209f2177e9f90dbefcd4a8b2b3902123934d6c58162f5b9193714e979d7d8e5a2e99ba97e2f3e19a9b7ddbd31f0cd9a9e217b708e044b85121fb527aea31cc
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a