Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
2d1038a33169511bcacf8bb98fd29048_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2d1038a33169511bcacf8bb98fd29048_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2d1038a33169511bcacf8bb98fd29048_JaffaCakes118.html
-
Size
39KB
-
MD5
2d1038a33169511bcacf8bb98fd29048
-
SHA1
4648e59263f22c77a13ef9d64a60b2f3f1231706
-
SHA256
d7f4e959842cd9e78786b4e234737bce10b0cda84f81f8aef11383ea4f026b6f
-
SHA512
919b6d10edc164d7bc246a4e8bd13590356f2cd06e00ac0fda70367d11e1007e0e7598c331da6e176b98696bb4fac0a09f83117c41d325bfa493509ed8d70527
-
SSDEEP
768:zUt7AhncE1jBeY7G0ssUm9sSrdffgioPXf91Jw67gevNE5nmob:YtkhncE1jBj7G0sfm9sSrdffgioPXf9I
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421472657" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3AED2101-0E7B-11EF-B04F-52AF0AAB4D51} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90fad60f88a2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000099e80133571acc376a29f5125b5e30f761dafe64c729b5f74cec8909bc49c78f000000000e800000000200002000000082d9ddfb094aa3f142104540c68257e47a44b3e7f6f976c0f0cf5844f5f60858200000000e1a3860bed5be7bac192697832b04c406f7282f82b03b757ca75f14233aea78400000007dbde5c581759b4cbdd1468a1f2d1586deb27952dfafb113f50b1941648d33587dd9279bf6d61f09c708ee2e0937e9bdd9b32e56c255993d94d76158c7ead477 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2564 1976 iexplore.exe 28 PID 1976 wrote to memory of 2564 1976 iexplore.exe 28 PID 1976 wrote to memory of 2564 1976 iexplore.exe 28 PID 1976 wrote to memory of 2564 1976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d1038a33169511bcacf8bb98fd29048_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542335e27547fbad6fa023c97a03e550b
SHA1447dcb7034100051f587c49c5ece2c7a3cd0e3fe
SHA256dfc90d66c825b69f424f06a501e4416181b83f39b410a3640ff6ee00df17225c
SHA512c1e12c13e3592770d1f2e769aa940c3d08981bf28a4330435f18bb95eec0776d645e649355a1063a4b1471da7f990c3e6e57cb0f319c6dba56c382df2f024d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5375ad791a13151d5068afb30f838663d
SHA19af1837a057e8fc6e5f164ae7e890fb0c5489127
SHA2569951de9a751a5abb8b30e4a78d277185677f14830c6fb7891296891646e28481
SHA51216afb79154d76796a177f596139ea15829dbbe11c7eb720e070bc44ac59be98f6ff350098cee95a2e971177cb526a9eb19c53f462fc887ac9086e69939ba1efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad3adabf1bdc1a4453f50cfdaa907898
SHA16cbb6655b2af52bf15d014c52878bc1599ea215b
SHA256b8a7bf3f5d5515702369d024fbfabfbed480457551b45c8121605d21214a329c
SHA5121eecc95791298b26110410b5c5506bee4c57a23f457270279b88f9bd3067d8f181f6abe4fa1f2bb2aefb6049741be3b58c8d0b3759d77af801fff9a70a0d7e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555aa10ef626e25b0e8f78fc397427189
SHA197cc7ae5d1dd851ded92cf33fbc171cdb9fadeef
SHA256c5703bf2106c1346d4686e67b3343ba43319a7d48bb26ef22a8d9b811b4890eb
SHA51296536164015e062aa61dd21cf0fcca64ecfae07090232d35803d79fa36e90e5d217385ef8647658a252b9fca1c0e95afd7709ce12b29b98bb73b4e59fed185a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fff123bba588ca939fe7ebaf087e7c96
SHA14f074ff5bc1a97201594cd1ce4c64cf84337892d
SHA25629bc80dc5ccec745721162931feba8966a29b95a5a5be101eb0d835895089bfc
SHA51286bb0e749561aa27022e6769ac30efacfc404dd26c90d33f728f01d92368e94a9285ad60082e07fcd3455f13271850a2881c346d32d17e30f0144aa0f17ea206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56829d1338f2328512625725314bf4f17
SHA1a17bf482772db19af2a84f00070ff98760be2e4b
SHA256bc754f657b9bbe70725d26f0926c12a745cfc38c1a819531f3cb0f10beadde4a
SHA512b118972026510307419f76cc9aeb974b9bea21b4de683a805168614e141d5cb29635edd0d2b72f07daee68302b7ea8eab953feb5fbf77d6c4390a9ed270b210b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c63570f066faae9128ca8fdd255444f7
SHA1cd4d20dff02cf4ffa81518df0d33d9a07f759481
SHA256f3fda94835ec4bf0c3516690f61af66172668ee66bfb3d8b78996abc2bcee116
SHA512938845b36d3e6adcbaf58c33dcba48cd3d938d86822c843f5a9e63bf4a7feb9d366d2a8b7df7aecc338d99c83699b391688446f8bf30a61c69d18bf937a96a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bddf98a989f179d0b3d4606b5d2f8329
SHA1985f66b4d0e8734724d5a275c55ec56f2504e5b1
SHA256393f015ad333b4e1cf3dbb966b7b01ccbcb34d52dc51a43bb8991ba90148c991
SHA5121913fc3e271ef236c7a53d002a7f058845e3641bb726013afcc40514e4a5f94e940659b6da16f1c554e9212dbd0c18745ce1571226580b508addb57c38748a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba1a0d9b39ba9e1536d697bdc27ae49f
SHA147f774b41fb0dc9808e31884ef27b9cac6b3452d
SHA256ab36a89e5f58ea1a878492a991933b041a6414b95129b4edf81faef51f2e266a
SHA51261a4928b438e60cc00aaea560f2336da17ee1aac6df31f50ba315879bc2de999f2dcbd1e6fe5f407fb3acf07817ba67c6d03d3b62c33f1e42ac2898bd4d42ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5559bf77f623940d5ec450cab654e801c
SHA18a99be39d35c73b646762aad7638ddf99fc3b561
SHA25698b3c6404c9f9cd4e367da29241e77c9cf5b046bffa22ccd130ed28694433d0a
SHA512878f84bbb04ee34509c75f4ad6bf196fb22cf56db90888e297cbef09ea4351f65afcd8500ba6eca4b0abfad78d64944b25b97d09a2a816a1cd71a95297f03852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d558551406b4aefaf811f9885560a4cd
SHA1c0657f4ff6bb461a50153024f60fdcfa0e6626f0
SHA2564c27758c2140490517e32db4dd6a210df557b789e28d20e5aa1147bcce5f6d4d
SHA51260ddc71224d133b2d58a669ba76b297b4daf01c67eccb48a35817d395a30d56a854825fb82239d8f132dfd62f6f4e63a61bfa9e8949ad7a732f439cabe5b3eaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534a682b69cfd1966ac5007eea6692bc8
SHA118dabf4de3b5fb3421f4957d0c22b1382cd5c42d
SHA25696a9f2ed73a8f8d557b814b99bb98eec2a1b2f9d014539b6085b0455cc3732a3
SHA512e198931c527d71456d4669b6e9ee571a4125c752f01664e8d20a37ce3a018709fb0fbf958a2f946c42965954d3597e66a7b081aa68af36131646634b00e0c0f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5589dd7f30a8a47a3985d99470e2867d1
SHA17668191d4e4c6b7e4e299e4e9cddaba190ac9c05
SHA2565b27ae0dafd456a2bec280c93f364544bc84026bda73486a86db08b440ff400e
SHA512bab9ff7a1e13373cd3ee6c76391ecff4fa1fcb1c82b9ae7d0857c9a61912cb264c7042851ffe0afe6120625f3ec74c6f3f2b370ea872e4313d2076fa8fee78a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4618ccaba5880087bb5a01900142f5b
SHA17656f079ed87e20fbab269409e8ca6d7f445b170
SHA256d37b02b43a944725816209da7f5e0b51d923b661df22d2043e0e22417bcecb3a
SHA51252af4e8d5c58cc99e5040e1da6a77982e7a94ed98c318394c86d3a42ca38cd6f699fff8f8e9dc95170a828ed7b7eeb0b90fbc441d095f22b65e390e0f129fa92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5606220ebc073e1de0a18ef095cae43
SHA1f4270713a3396025dc2b9d1d6b5551682bc3fbb5
SHA256a5e29b9c5e74ce12703fdee6110550fee0621fa15a691e9a3695c99d496a4d55
SHA5127c6bf4f22add95d5023887eb1899e6e940bdf7e8fc01e07b5b8b271ada5397f78f6dd557283a1638420fba88c421dc60873147cc27e91e62a3d0d755a9903175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5813014779f5fd7020c93805c0bdb5d5c
SHA1d0aca5cf6ec25e57ba9cecb2642213ddb527a95b
SHA25651b679dbdd78938b8f0b2a949ce4c7845017dcdc8928fe8720993c67c1da7dae
SHA51226c42e2448c517252cf22841f0771df0fdf7cc6b909f85c037e8e5e61b7058c55d018f168c097fc599f44d0c29d23444232e86b3411fff93fd9e9f2c6c2bef2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2e66e516cb0278e63fb7ce0ae877142
SHA178992455dc77d1dfe32c0b893043ae265f119877
SHA256fe49a3451ee6034431e56df985a18ec6c00f83fc6cb5359760c9acbe29c96f49
SHA512357fd778f7578c35baa46dc3a144c666b2b1a05a1081b66f7ad79b546d33759fb138afa0ea834f99542d02aee6131bc9d9b8a17e678aa49c27f9a4a451e2b690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c58418d2e4ef5833cac63709bda4d00d
SHA17081371e693817f6f14917cefabad1370f7852f8
SHA256f0e61ed761e86337b9a8dc32b5b5f987ab66063b29e1178a945e5a21b2c78caf
SHA5121c9251aef562556f5afcfedacf0e33db2a9594e52ec853312d5e96aaf8501ba4a13e113ccfbb68a2b265e5b62ac8cf9e4eba2e8e8e2d5632dae85e5b0e3327df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c37de0a8ff24fc426d31c46d8ca616da
SHA1a693ebed50d0feba94f291494351eee7684c0459
SHA256d2e30dae698e40f028b104314dc5b0957e574d65218c3ac4527a3d5606be26fd
SHA512afd583b0b417f0d5b87e2980f4132276b54154389dffd9e15e0c4eecfd66e7bdf180b8346fc1a064993bc4b3c97303779cf28f172419c7714e7ca67f7d0abd24
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a