Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
2cd14fc9f0572297b6ebfce874c679d7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2cd14fc9f0572297b6ebfce874c679d7_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
2cd14fc9f0572297b6ebfce874c679d7_JaffaCakes118.html
-
Size
57KB
-
MD5
2cd14fc9f0572297b6ebfce874c679d7
-
SHA1
3870a923128386ea9dbc2689a6f521ede1c3b87c
-
SHA256
a99625f1a4b60feeeb5c5509130d78f23f9ba959480bf77fa1db751af8fa8df8
-
SHA512
c1cf4246bdb515b1fd08b7377828d2b3d1010d2f13b3bf930b6faa250435379ec9e01afd16ccefac6829548f0c1614525276003decf2e8f9fff3884c0321fede
-
SSDEEP
768:9VEkpepE3tHX8gLXYC1gryXRowAYES4LB:9VEmd38grYCarKK5F
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30c8f1ef7ea2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EAB73031-0E71-11EF-84C7-4637C9E50E53} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000286212e2895ae4faddfba59c6f76e7990ce43d9ffb3dec69c0aa0b4eb69cd4f6000000000e8000000002000020000000452da9252d77c8580be4bb736d2dd34e6d45d67fc0c9aae47f30bc4fa9ab557220000000f328f368863d40393cb44ef008588fe7412041d7b7a0872ebd9d4cf2ac97aaf0400000004a9cd7d54dbbac99823c5ecee87a41b507dce0b771442466896454c0883112d12b1a1948bd18d151bf916bef619695ceb96788bf9c28d93bf587c144951b7eb2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421468657" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2056 1732 iexplore.exe 28 PID 1732 wrote to memory of 2056 1732 iexplore.exe 28 PID 1732 wrote to memory of 2056 1732 iexplore.exe 28 PID 1732 wrote to memory of 2056 1732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2cd14fc9f0572297b6ebfce874c679d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512839ff8c96da464aa874d9f5b6b786f
SHA1a26ac786ca0f7c829d66cde3dd863fa1a6ba2717
SHA2561d121b1e369e801748b5a053fc07d7282501b64725e62f452262d3e927468546
SHA51242537ca2c32dbe28effffe8e28fd106ea63a6ff9406b3c489bc43a205425384491108852531511197402675311abe9248c751d4fbc8925bdd2bc0c03f86918e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ea7801ca4ba34ea9e4910a3369163a4
SHA149fa12994dfc168ecf659a4c73170bed91f42baa
SHA256f5d20d8111eab455e4c946aeef577b918b012a884819699d4a07501389564ebc
SHA5123950cdd16c9abc64ac0560a4b04826e29f558657efdbaf8b3b52d2b4af9f7d2bf89574fdd83506bb88aa48d1c5be11c34e00012c24d5f4d8b33c75a0c5fbce17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504a2794e87a3a9093222d11177ee1990
SHA17353b89b384b8e48a23987f753a7ccdd09f6542a
SHA256fafba7613daa94a1bbe387c133d2d72c4f06d2bb380ce49de0eb494dccf019b6
SHA512c97816a519745fc51713e720bd95d95d15619f1bb2d09f70fff87b3e1d3783883eb72707fdd0c9831ab46a59bb1dbec430a1ef56d1c318631940a871f539f3c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf7e2f710f1f3cbdd66b02df7b35560e
SHA1dd891361f7899f07ecf9a09bbe2bf625b95e3aec
SHA2566a59c9ab7b238aaaf608d18a416434b87808468567f5a2d2b3bab2bef889de2a
SHA5128f5edb1ad5f191e8b8669c5388ef2a08c08f5b941d0f2261f7ceecce26ece2d5ce8b67c762ccca5b8c1bdeb43396ec5f1d5a7695565ae41aa7d3c2745ab2e332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54173b4fb96910017d6c10c700c04e432
SHA179135993e7fe43269f2e2d48cca5fd71a5a8ac36
SHA256a9a48e2af7fec5c17820fd91f1d65c48790afce3bb8b5be76633250b670be4c3
SHA512b0f3dab9179cb20ba467830b5f3447fb7b191f883f4cb0261401090b021f891167be772ae7d9443daf7a8cec2296f1b4abe6aa3c03a06e5a8c6a0c7475ee17dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb37aff2774b28c0348ae1f007537e8c
SHA14b543b77ed2ec045f08732daaccbd83243752841
SHA256e87cfabb9f37a936029eafeccaf24a128fbeab57a955a563b6277cd9cd05d354
SHA512e9dbeff3a9c013889dd9ed916ccf638d94c9edb449532341b51bbcdf61e83e5b3cab9617cf630c9f6e4267c4dfe35d9269b6b6a51f7e86c9b006541f57ecd39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549d349af2690bbb9d94242a397ed8ad0
SHA10c1613a6dccc50efa41a6ce7f18854ede9e92253
SHA2561871027daecfa108580b18aa33bad1f9a2445aaad4af203335f5391dd0251fd8
SHA512ae5e488556bfd9fc3225723c87746368f3f87ece1333eaad4d89da259b67bb1f9d5494a743561e6a284de5d89c1534812000d8f36bf24b9fd3922d28da432d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5689fd862606f1483277ffdbdaf4c5151
SHA1d4b6fe0de705520698b73f343c04eb61e0273349
SHA2564d454b727b60957ce1faeb544e579c7c2fe240a351775aecbe97c0afda262d22
SHA5129ab94fafd891243a68523e5c2f0e11650be1143fd57d9fec52b8ddd049065ff5bc0e987938e27a42f62fd0b5e21007449ca758d9ff6418728ae2938ab2c3420e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8c3891793b86c8fc1757af25f8a8019
SHA1cb7443afb731f73db305f1e3b3d3f454c597ae4c
SHA256d3b658a8ba317ed9e4057c076327f62b3e5f251ea1739af55154a473f82a19b8
SHA512735bdb7fbf4a9ed5e03a45f8be4ac10436d7eae06ee7258d965d7ae31dd7e3186684d6ad9c4f149f0acc675e634f6be7bfb193873c5c4b2a88b49bdefaac422f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52856b7bd1bd7f8a97d8428595bfd4f94
SHA138dbaa6eebfd0768ca4b9f5561e582cdf8d7ef8c
SHA256f3138a912e7c70200b509ce9d565ce8902cfe6d5df72a5f528f262144b524f26
SHA512ae28fe34b4d8dd74365f9f206e7df7ccb06fb33da8d98be9ee8d6c2dd999fdc964dd9d12cc069c0f4380ed12064ce42a767f5e05a6eed5b92d2553c2889da58e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555d7f15aee62cc62e794080ca95676a1
SHA1a696317e0cdad3501c20838eb2d6ad433b15f514
SHA25669f4a5e52c18369c483282da35f572b4ee3cc3efa33f8e40da0e6af78ad4a5e5
SHA512166507765bad11410eabcdcf57c953f464ced56a1a2679ea95e08a9176cda21a485654ae69bed71a107e9660a7ac9071e74016e229206d166f4687c5fd7fe726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5991d196ce72e91b911a5139cf73d9740
SHA1915a5533400fa1f32519248b94777e65a83e485a
SHA256d94a9b4fe51bbf006e5f29430441817356a7da1412f9f5f71708fed73b80f814
SHA512b8ffb4182a487b1975edfc333d6119fd15dab0312a9dae4d1a36a663f055a374868a405c655031ae720feaa0b027dd44be730b323a920e10125b35b073132e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b6d61f67f5fa55d87491a21e6fa29d5
SHA1b562d7637290c62947bd6ba6a50f38a5cba8661c
SHA256e2ff0d7fb8312919c38d9fcba6acab0cdf9d5e11ebc8eeb64f5ba9aaab1d0bf1
SHA512d09c7fd1b8dbb384af8c5ab6b3099f22de2a779f6361f511701a124b81bfe04f103a4e8159af32971c76abbf758e21cf85368269cc69ce5a71c2384d3ba31ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5041260a896625c2c8faba37cfc13587c
SHA19fd0c03d2f4dbf18f521eda1d74f9fc25d89b587
SHA2563b3a32fc7030161a38578470870958a04b5ba58e745653c6980e6526cba6a9c3
SHA512fa027f863bb9cb8c1f8d672201853e302f41d221c16bbb9790d6b1d91f23a2a938815aef2920b72f9993c6f0f1345b59421743095af1f613c847e5a8a2272c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5771db36e11fc7462089d09e1c4b64b8b
SHA1a0867ff941bb87f0e4e4c28bc16163a6026cc3c8
SHA256f4a9ba25ec8bc72f1abd1881dbc2bb2985553168bafb9c134205894d54680213
SHA51228b14db1ea61aabc9b599d6429f10c68c139a7f7d13f7a5d85c8b52333f1aa19b1443b47d02ff7c36ea08020d70c69127273f82e06cab46e618d876d7b1e4510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c9168497a16d628d41bdebc6903fea1
SHA15bad1fb676d70f4ee9b11f0bd665340ea725ba5d
SHA25664ef4c6773ca671678fb83f40f5b1a0fe6071f79d2fcc63e3bef4ac1af9a0d0c
SHA5120154ecb047d5422aa306c07fdaa5ad2e02b79a00efc57070c59d0de4b329dbb8cedee6172edb03ad4d6dce7e565e872db61dc5df480b22e04617cbe87beed8b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534c8b0bfbdda2646401047a77056715f
SHA1933965b973b8520a2b910a775098c8c63a8372f8
SHA25689755369c4c8dc5066b4e568a2e6a6b722beb0ea7cf67fe8759452bbe9f654c8
SHA512e9b084f52bed25b7ac050e6c411997309cdf827fdc8a302857ea6bb5b54587a3c587a2d26d838501776fe6e6fddbade065d4c077e127ca123935ffeb97970518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0e645a7d23f1b8d09532ffabc3442b6
SHA1d2e9b5ee4ee5d5096f42014632c611da0e8b562b
SHA256eb4236395520fab39383b1bbfa31e58d560e158b95c64d7962c09b8d657382c3
SHA51261d9b0f86a00b06acfa3b5f598fde0e5690c152a397c023dd4a4bedf4e949490cfb43687ab179f1fe989fb5589c2c00146228699a3e6761ef32ab460dfc7ef93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dad0b2d8150c02569b73df3f0ad05d76
SHA1995f7468e3f8aff67d5f74fe9f0c9ddcae0e0f75
SHA256f18cf8f3911f44167b08377a133b07e0b4c1b3b42683000c95b5d976a8149090
SHA512674e10a2044fc52dab55a0704b8e0e4d7faea5dd7157586993e67f68adcf7c29bcb1a12d9ef0015047cc29f6a4f43bf86767f20c8570f31583a8b61517d4886a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d46856666274e0b6567ef6a8a6b3f49e
SHA10a1fd3f0dc4b6d3f95da4f9e4203a2e159c219e4
SHA256d3bfee9fab5afab6e3043e8dd0c2045b7898e3a9ee01dc33cf459871f1e6a28e
SHA5126e3797c90b64f6234c5f973457e2e28cbfbe50922abc188a8de7843823d04f4c43ded53fbe7610056d85635a6e7908e5c85fd8eb6428f4ea78a093a8730c07e6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a