Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
2ce5ccbb7481881620419208bfef3809_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2ce5ccbb7481881620419208bfef3809_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2ce5ccbb7481881620419208bfef3809_JaffaCakes118.html
-
Size
73KB
-
MD5
2ce5ccbb7481881620419208bfef3809
-
SHA1
48b846906662fe32a91338d85c88e55ba0f6d6a1
-
SHA256
07b6a3de031db3b93a679b8ac8198358f11e88fbb80d2d7e9d58936570ca443e
-
SHA512
d02df57c8a58f8864335773304fa0292ae894c91cadfe5b9fbda27e744e32b794272f685a5621d329e887d71ddf752fb028b96bd3c2e61bde6bc086ada1d214d
-
SSDEEP
768:JiQgcMiR3sI2PDDnX0g6sy6nYCQLtLHkzktEoTyS1wCZkoTyMdtbBnfBgN8/lboz:JIkTpdTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8183D21-0E74-11EF-8554-DE288D05BF47} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000e41ccc7e3203af6b40c4f88c7f044e377846c70062878ebcf4665fcacf7583fe000000000e8000000002000020000000cf17706d20d9ca451591eb012438a17806d220c504c2fb2c026f1938dec5340420000000de64eecbe915e8a44fbb683c209e85eaf8dbbb9b3d2a94f243518e2d013ff2a74000000003ca47214c424b057e16c3e09d5f4302901cf9c49e56fec7aac75af5175e5bd56dd7fceec4680389f95c21ea98c9e044a7980a3e5fad3360b0a9eaefc92eb85a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a8c0cc81a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421469968" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2744 1724 iexplore.exe 28 PID 1724 wrote to memory of 2744 1724 iexplore.exe 28 PID 1724 wrote to memory of 2744 1724 iexplore.exe 28 PID 1724 wrote to memory of 2744 1724 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ce5ccbb7481881620419208bfef3809_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54721993145f2d003b00fb7c01391fd2e
SHA1a31709c1bc820b5cccc2310138f68f3cc7f83a17
SHA25634edf98f90c3543e7c8844487131e242c0b1fed75fd0545473f518d514d28b53
SHA512402da22e96a7a75aba0224debf0e69dc08a036e2334ef4620fcd763ecec7aa5257dd56a5751043cf44b8a09f740785f00c8549f6da177560bfea9c0083b6d31c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a38b6ac600fbb03c0ee5449e800dce5
SHA184aff8d44b70086dbe577b443eda67ec0fa661f4
SHA256b9e2b9855ebb4ce669384dfb6f1861122cdd92c8e0d866224a1d9f0854bbc649
SHA512a0102260ca5c187c206fecd3d10bfd5ee91177dc5c6f229065ad755f9f7a1db2ed60e9e99dbe365e1a6ce1eef63768890bccd941a68f3af5038d1711f2eddbb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eff36f52ace5c1cacf5c655600b9a3e4
SHA14c07774186c1c490a0aad7624d4875258316be2f
SHA256d91a1bd4a277d2a32d6a5324f95b0aeb2c477d1e1a382054d5bf2525233e730b
SHA5124dd668b4723af8a032d03a2e762dd98852823f7769ebc851bd29a9b7dc05f5d0f04554b65a6ce26a31fefdf2fb4d99f04fa0a36d70edaf744ebb6d56ee4921dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec9292fd01d764a8f2ca37e6cd88930e
SHA1cf4973e11c0014582441fb7119789f0118011d47
SHA256cbc86cb2412bcf36afd85573127bd23e0b05e498342efcf723c08e9d200ac3af
SHA512c6feab1753c9a7729f127758c749fbb0a8e63def3cff8e61f0d95d90a79f28145f47bc36969469cfc7a8b1e507b2ab4c9f62e195e9472fcb38ff98bb0a7794b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be0ee40cbc0a0066496074257c357c4f
SHA1a51e1e6a5420a8864b4db9b73593eefceb7e54d0
SHA2565d8f5c080e1b248b64068fd91044b5e3ca43a21de6e7c391ec8fca89e470c4c5
SHA5126b8d3c1ec61fcc179d7dd20ec0fabb299b3b401c08be056e384ddb23272949d2e9437975e878bcae55bf6810485ca0678911bc52d0849a631253948e9155f5fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c75f614c8525e2e887c51d6898b4ad
SHA13e67303a0c97a461df28aab9234dc902e44aef5a
SHA2564862cd5830ebff7202755d0df40689cdbf3a591b57ce805e230d4020c1d11890
SHA51250eb23149591669489170940250f6a661fb0295b42f9bef2e23bffa1e04fb60d7d504cac35823dcafe3ace3fe42afa276a8c448f72cf546ce27ba8625105ca82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534cf25b4989bb093d614663574a8d0c0
SHA101a8bc9733c4467c56c4e6b023bace14d7c2f8fe
SHA256349e0e7e9507a7d6bb0e6b9a97ca048b92aeb67da6721c1ef8b04d8aed9ad2e4
SHA512eb83d915f12fd64cd199d84bca52d77b90568434685547ef3898e3726e4d87a67e95e4a185982777865211477e38a2ccad083284f8c750fc00aa0ad20b6269aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ac05785c7b11d55d955bd7214e2a0c1
SHA1944292bf1c16e1a38295a57edddf030a5aa1b075
SHA2569f4c5c1f4ec24f91aeef0bf1ad4ebcc9c11d13aa2c415d2c0c02fffb5d54fdf5
SHA512aef1b5deaae4d41a1431d4978457ba8c0362ea5c082ceee4206c66615b22a474e026c479a225f41251f92fff8acf3ed31c7f71ca75c320f0a1c6ca80669e4bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574c9be9f2fb1170c7a2b1f245efc9075
SHA13ac0c428fbe12ffaef72b9de20b03b1600e0588a
SHA256f4b51b84f7685fcc0c7dbca81e340416b300d831f556c3f02bb3c4af22072b0a
SHA5124a968856adae80cf743286ec51a307337412834a3e9f1cdb144ddc7a5681247cfa9b1846b96045267c4a1646faaed805efb2989094302852e26165c66e2157d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501d991203229e065a4aa2e1d817bb7cf
SHA1c76818d8e8255e9f60306cc588a7c48b2751cd7d
SHA25677f776273fcdd0ffdeb8fb8fde1562ebe8d8290e7fd59789029e52bad6d31a89
SHA5127ae182018847e8c650453ef73c9caca8ad7fb6330c664b3f01c0816786df98fb6bfac6a2174a2ab1ba637289dd2f3239b8f50b2e584028fd78b490c3166951ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f57970d17eff44b746070b20a87a5ff
SHA18097b136c1d832ac79851f0b3e0f2b3c4e5064f0
SHA256498a5d0c1b09110ec85d53f106005258d8e89c57de269a1db8657804dc2a4894
SHA512b3ce5d303f984c94fa8615286a4f55e3fd01ea8794c223b1a5bbd7484c8aeeec4c57892ed06b3190bce0fb6e668c11b81d8cc0bcab0fca6d1239cc6d7dc7ff21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8b05db7c45911b058ac733356956b3d
SHA1cc5bca292b90934dcfbe4e6ccec6de7860e3b78e
SHA25626c1a04fc053daa9d1a81a62a8b57c901fbca9c985fe973a2e43fd1c85ab3de8
SHA512d6e0ef59e41ad70edf747c87bc39e1317897e5afd8c4c72a0ca95fdc80cc3c5b4b42a7372c498a1ae807b08c4e420d5eed9f55e3edbe47540e0f04afbcabdd97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d67975347e96e8bebf436760a35d30e
SHA1d9031a1683ee007e1af6c3e33dfc402cbc5e880f
SHA256523d5d9a82a93c82fc54338e904c671abd74ef43089bebff3e8674b46c123147
SHA5122e5e278fc6d8f62907f611c21a6b9179ea17e964cb2179f60a78e5342f88248eb9968754c2c4f1f66a6b8e9a56db75070a04df549c20183630f0cc537fc8616e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a84f149f4587c887bc6013c9f723fb3
SHA1c458cc0a9b6637a8babb0a258a7686e36be63cfa
SHA2564cd251b3407f2a7b4c4873f2761bfdba92da757a581ad95df3cd93f6c03b7dd7
SHA5124806838565c29cb24519fb4411d053d2b3c28ef98ff306edf274cbac2ba2a08693e5b38f158d9ed7ee145b170f1d93ba530ec8bd23e760585c9f23d2949867e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a62f201bd86b51b70a887456d572df5e
SHA12f8d0a9e9cbe42313348ca907f7b4c7253f1d993
SHA256e8495821a4391268b6414b331b12e9f7c1a30d5c5e39f5da5d3ef131f348c94f
SHA5124e7f201ef48845e0e95a466bd00e8d5b7fccf9ed0b5ae3a127cc09b03e148dec9e46ce87a75623aa75d14114ec84ec781f896e80a950df237314a4838b0b5a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57541f44a68f0edd5fef1e80c8307a382
SHA140e1ebbf63cf018f22cda4a9ce68c7379a2ad8ed
SHA256510baa7cc6401c32fcde8f51f2544cad758ebbf9d5d6b5007c1902077be4214f
SHA5125b526d5c64cd5072228fecca848137d217cb9c3372729ca6b9f06e6438a31491615de4f2de41778f66983900aedda1279a06c4e5fd41b6e96667c97df741c1be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e59a8e06992e073834172a9a157a4fef
SHA12a1ce5d2f1b9993a10ffe797587f1f0b25a22727
SHA256af94b93edf8915cc23cdb592268d6ed70d4c3e5d4d3802b66280c370c516270c
SHA512f173539ede385e20ae5f9d4c424dfd90e9187e2c767caed6f4f1e16e21bac74dc1810ccc04e921f39a040587ebb517a1c97477ec54d170f0f0a08053e49f8fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f795c276b0e5ade2b2ccb406207f1e4f
SHA1cf15c26888f7728d0a5f998ab97ad9684daacda0
SHA256e8eb91e49606b530aa1e249143e047338cfd395e843a53cbcd3f45c81561ba9b
SHA5124bffcc0ecd71f1c13e4168a8f7bfd61e5c5bc27f9640b57016bdacf95e96b651e410617e83cc7f57170711e8f86a7146d62ef562de12adc217599885aecbc8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3e948bf59a1d8a64f9753e05d92e3c6
SHA15670ff23f202cd1d670b5cd23c0e21028a88ee1a
SHA256fba188dc001adb3020cbb63094a0f665c22859b3e48bbfcd060bf6bbb37bb715
SHA512e71c7f7d5269f42a501173450f7d7e41ac40dcd99864e03f111430647418bfe74bae7f4931c1727e637c97c96812ff5ae5a19dd6c2210829c2d7290822b248dd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a