Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
2c6275bd9482136a40a16b91a2017515_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2c6275bd9482136a40a16b91a2017515_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2c6275bd9482136a40a16b91a2017515_JaffaCakes118.html
-
Size
216KB
-
MD5
2c6275bd9482136a40a16b91a2017515
-
SHA1
5d8a0532a341f18a710ff9ae57aba66ce0132be8
-
SHA256
d52664cc9548b2211fc022aad5e2c50d788bde4e4029ac5644ddbaf25b140516
-
SHA512
b4f1cbd19097d0966b300f1a5715595d3e9ae44f7f7f5aaf3b3d8a0d7d648a9328953aad6118cf15c4950d82cf8288fe6d6c45a035e4d3888d95ccfebf66fdfc
-
SSDEEP
3072:7pPKeftrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ5:NPKefRz9VxLY7iAVLTBQJl5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421461831" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{057F85D1-0E62-11EF-B1CF-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000c845d193f32a9ec17b79c847d2ce2876a31c3bd495a2144f1385e41f44d21ecc000000000e8000000002000020000000cf8231bb90e0a1f0dd207a4a40c230ce01f67e1741fc2b592632077a2461bcc120000000310fcd2d8771c3d7f9a40e68c13abe9000dba68fe2b51647e27fa1732eeadd64400000006b7723193ba2e0e8c3b795283c6c467c413fa2b4a06ae588589dd2afa008897996a3160f8b21b0052be0533730d5b6033d2254c9069b1ef1ecfe53787f052a2b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04601da6ea2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2268 2296 iexplore.exe 28 PID 2296 wrote to memory of 2268 2296 iexplore.exe 28 PID 2296 wrote to memory of 2268 2296 iexplore.exe 28 PID 2296 wrote to memory of 2268 2296 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2c6275bd9482136a40a16b91a2017515_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e68779583b4b77d14b1b9af926318ba
SHA1574a5ffeed5d24e1a8cfc06c1c92c387127dab97
SHA25699cd4b235b49b9cff84bb741fe3a81748509102a005d614d4aabe4b8271baf41
SHA51260b257a355ed119b853290c2ba341cc2300b1982bb8bb5f1600fde0ed150b06db9f18a5165b4e5083082c8d0ae9177e7a4fb8883563b31f9d613f21c65120027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539e025a44fe3c3f19946465ba3717f2e
SHA14ea465b4d65c0cf36709c4114f7d05a7bc67f4a3
SHA2560da2932f636fdf65d534279ee60c86d8d6c99ee6a24a7438bddde7ca321337a2
SHA51219884084b8782e3cbac7fc60b5001ccb5b238ddde089e31a85d8ecc02048d4bc726c454672385cfa16e29a600c8be601a5e3c43b4b1d61facafbb025ee253b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a479bc717e357fe32c20f6abd8e32aa
SHA17734adc6484ab2396a2db3be34d01a71103a1d8b
SHA256a73160e45db3ae79e239e94e7dc163b94c66a24980b4a9fd2bcc08156631b148
SHA512d8df967443f43ea9cde3cba81dd0ffd6f86e40a90fcc538ad1f51015820c0867d56799b185d91ece67522f3ea0b2e79bf06ab2e0c3e25be1c2f93d0cbfff0305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f09930a78264815d017632c63781a4d
SHA1c90f5e12ff1229c96533b6455706579330f07875
SHA256ac12b1c4348944fe4be522dd96e9d6923e0ac4810c30ce6442b6681e0ca3319d
SHA5123375a2b6379d786f6484988bb74e4baee5cf102ad130be060bfd02eeb4aa0d8ee06ca7d337ad83b9afee2f59cbd28f05e39290ba469ba207cde168487a027149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b27c93f1fc78593e3699ff1352b12ae5
SHA1e38124bce5ce7e167280559801bfd41f89d9a118
SHA256dbb473037dde0aece0dad08cc82247ae13948bed9c1cf2ae61141108f70ba38e
SHA512e1aa90bffe3e0d83eace1f0078331525720b892713ad1ae6f097f85b0bba3829dda5db121394378caa8fd90b3c426ad896ff2402153caacec737ff5ad72c9db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e57763f47d90345fc504352cf8a9e0a
SHA10da2f37e7d9e74a8289b5a6b8f359d28c8866687
SHA2563de501bb03510f48194f2a73cc9b6c904f2a6f8a2eac6e31650f488e7bc483e4
SHA51263ac3bd5e0f234e70f9c0108c6a05a3e1274b99e1aeeb6796ed6dddd67ce9a51932004a31355964e0ccb90f039bc214de3b856d455fa6bb0e37dd1093f2cc77e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56146318a3ec4c13c22875bcb6669998e
SHA15c8a8868262ed8cd515e61d62ffa4348d32ca190
SHA2568702366341a8d86e5653a5bd3574b8e3af113f4fe52b7251326b44309f728019
SHA512c352cd51475bd8b733c6de35e76597b1ccee169ab8466c6be816ac2a689f31f9d5769556ab49aa66b85b0cba911be8139583a383a3706fe6dd74a50f3421ddd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56edc8da1f630430ed288a0f0a61f0d16
SHA1ba0a3530aec5c46b558c4a9ca349f8759059165a
SHA256ae1163ef1e1bf122db2c301fc5565e3422bfe26abffe489bf08f13d7cffa7f0d
SHA512364284cf01f5a811d31afd120c0d1d7f0cd41fa7ad413d6bf7a89ddbe0a331daaa7be2c0cfc12c8f33403bd1b32e9558acac0a217ada95a35bb2e2fb9b241055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea4cd65a4df7b2d49f54bfe62898aa4c
SHA11c48009caae61469652e38a48cbae68679c7e54e
SHA25683c477ff969529b0cfd984fbcced90b4f2fdc2ef51b382db18710154debb634d
SHA512303d6b4c52ac8fe105dfc9ac6929cac4f8cff05a100cf4aeb5b25198743156893fa54fea4c6627a838fa17be9fa25a5e554a35e2887476f910238247cd1d71c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e71735ab4e561d02c037967018706b01
SHA140a989b402d5a958e7340893dd3d90ecde70c49f
SHA2565deff96cc47ff981813d86e008ffb2b142d33dab97ec86479b24465d54effca9
SHA512264eec538711381f7b6402bf6d4a0a98895737d4906b3b12965ce36136158cbb50e9f0d0e2de42d7e0cedb7947647845c29a8b5518ad7a8d4052f74f941568fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502bec2d7968be6fe1aef8e918c595b7b
SHA18eb51d13df7c6baac9b13c371f5e337a17d64dc0
SHA2561fa15866026e92d067d313f15ab3a1b04b2745e2baa784c70d7f28958a761840
SHA5121945f9ded95fa55c85740858c7038d8c2bdc50c263971c7e6a6e0040c2ba2cbd965c768e53f9236ebd6d3e1e3fa4b36e8fd495673c4b0b2849a9590ddaaa2a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572f1e4037960f5680cbee33fa9572340
SHA13a03ca51de6bc827846a5a390a7a662d638419a1
SHA256dd64a348a714cce11c8691fa624957ee8b4b058fadc12b422b975ca7d9c159dc
SHA512db4f1b9032e2e61ba98ba55814f52a8ae48d09c8d236996c9949661c1748009914bd7a4896c24853ccffe28bb7602146adfbabaed555c9dcb58496dd4295417d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51331608a6d57f8e9cbe0f7092a9d32b4
SHA1579183626e7bb0c4dcfc377a9238e5c31980dbab
SHA256e58cc830099175c2b8770a8053d10c961dde8114bfb23cbb082cc848fa1cb73d
SHA5129af68794c29b271976e09a328d5ba145fafaff606239c7e2439377f5610ed3fe6b027e258b8b59a0d6a765a28656aed0efe17873429a3b610bf07638db2988e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50818b3201ae73fb826aeee42dc417601
SHA1b5529c7d3813dd556c251fa739f7215dfdc96ceb
SHA256da6b76e9baf46c27e570ae385ec94782b6cc6537996eab424808c4eef0a8dc4c
SHA512f5a11ec2ba46c7b0367529677d8d85461832fbc9d71b087923c9264bc8314de55ad78c0e0607db0daaac2f0ae906c82baa059f4980cb977b417c572d9ca07152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5475d288fcd97f40aff9fff4fc3c895d9
SHA1bbe3f00cae8efa6a10e512dcc84e968a21c36db6
SHA2561209c566de62d15f5d8648b16173c16c4bdd940fc266f8c5187528ef0ad588ac
SHA512a251cf007feffc09307c8d91518baab6b783dbc0940313a646a03604acdaf25c930aeb0051def5c95978bd2926c81d73c60c8c685c3b3a16a0e9d648bd7d4cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3c01ddb20e11b2b430a2b80e7f46657
SHA16c056d6a4ce67c1404dd7e70163a6482d1b14523
SHA256af7f54677eaceb5806bf96b4ee2b2a6bdc137993ef692f2ef6c1cff5ef42e4da
SHA512b96dafae6d2f3721d9c34e66033b980b2e70c109170664b9ddd7faf556308bc30f4c7c93a5e555d7cf24bf8eda974e137c4c3ce1ad428bddd6496807ff859308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba9de604b17651215d6f50d9bf100d4f
SHA1d783a4c9f0579068e5b9892a45d1890549157a75
SHA256879e5f2b3336012ab0a8d624a3ad606f837a8a051fcd5070043bb619e494a4b5
SHA512369efa674e2bd9690722b245f653a480082753b0314424edda69a69596d279090b3a56b7131b52c2077cdb9046325b4a20860402307ae79e4ef204949af5c366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cea648ca33280a312933dd3068aa38a
SHA1886c0b497ef317d8c47f4dd72e4fc3ea84af7065
SHA256d9defe60f1c51ff5cb361ba1567e7c9f1f5b7d153865ad6667b55b68aa70b0d6
SHA5129678fbfb54a4e30f21db4705c340e6eb2b3bd6aa37790fbe1bcc9de5d580cf9310f9da18654f7b99b65ed9459d4310ef1a4a7a157d4448f3a057eac3d38bbce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5312592e8bb40dcaf91aefb6230703444
SHA1d8ef05687f5db5d0e7a115f22bb89109f6bc361d
SHA2563f30d5bde0ba66f86bbf84db3962117d387edd3dd16c3b8cf6d7d4f019bd01db
SHA512c130e2242163a445793195ce70de6ed015ce4cd94ded6300ec2092db8aacfeaa85c495a402ef2844084ed3d43f8b46d6137ff8c22d599a3681cca0a6cdd2f750
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a